Ads 468x60px

Pages

Subscribe:

Saturday, June 18, 2011

Network Requirement in Cisco



Standards and Protocols

Cisco Unified MeetingPlace Release 8.0 uses the following standards and protocols:

  • SIP signaling as per RFC-3261
  • SDP protocol RFC-2327
  • Offer answer based on RFC-3264 (an Offer/Answer Model with the Session Description Protocol (SDP))
  • RTP as RFC-3550
  • Session Initiation Protocol (SIP) REFER Method RFC-3515
  • Out of band DTMF digits as per either RFC-2833 or KPML-RFC4730 (indirectly RFC-3265)
  • H.264 Video as per RFC-3984
  • H.263 video as per RFC-2190
  • MIME Type Registration of RTP Payload Formats RFC-3555
  • isFocus flag as per RFC-4579
  • SOCKS protocol for connecting to Cisco WebEx via a proxy configuration
The Hardware Media Server supports escalation of audio calls to video if the endpoint is video-enabled.

WebEx Port Ranges for Firewalls Used in Cisco Unified MeetingPlace Deployment Options

To ensure traffic to and from the WebEx domain is routed appropriately through your firewall or proxy servers, review the settings below:

Web browser exceptions Add an exception for the entire webex.com domain = *.webex.com. We ask that WebEx sites are not cached (content, IP-path) on proxy servers. Cisco WebEx Production IP Exceptions

US production IP Exceptions: 64.68.96.0/19 (CIDR) or 64.68.96.0 - 64.68.127.255 (net range) 66.114.160.0/20 (CIDR) or 66.114.160.0 - 66.114.175.255 (net range) 66.163.32.0/20 (CIDR) or 66.163.32.0 - 66.163.47.255 (net range) 209.197.192.0/19 (CIDR) or 209.197.192.0 - 209.197.223.255 (net range)

Outside of the US: 210.4.192.0/20 (CIDR) or 210.4.192.0 - 210.4.207.255 (net range) 62.109.192.0/20 (CIDR) or 62.109.192.0 - 62.109.207.255 (net range) 114.29.192.0/19 (CIDR) or 114.29.192.0 - 114.29.223.255 (net range) *India

TCP/UDP Ports Used in Cisco Unified MeetingPlace Scheduling Deployment Options

This section lists the incoming and outgoing ports that are used by the various components of the Cisco Unified MeetingPlace Release 8.0 system. The information refers to Cisco Unified MeetingPlace Scheduling deployment options.


Use these tables to make sure that your firewalls do not block access to Cisco Unified MeetingPlace from users or integrated systems, and to make sure that you do not block communication among the Cisco Unified MeetingPlace components and servers.


The ports that you do not need to expose to system administrators or end users are used for local communication between the Cisco Unified MeetingPlace elements or between Cisco Unified MeetingPlace and local services such as Cisco Unified Communications Manager or Microsoft Exchange. Such ports should be blocked in the DMZ or external firewall, but should not be blocked between internal components of the Cisco Unified MeetingPlace solution.


Table: Incoming Ports Used in Cisco Unified MeetingPlace Scheduling Deployment Options
Protocol Port Type Ports Port Usage Special Requirements
Application Server/Express Media Server

SSH

TCP

22

Secure access

Expose to system administrators

HTTP, HTTPS

TCP

80, 443

Administrator web access for Cisco WebEx

Expose to system administrators

NTP

UDP

123

Network Time Protocol communication from the Web Servers and Hardware Media Servers

Expose to Web Server in the DMZ

SNMP

UDP

161

SNMP configuration

Expose to system administrators

-

TCP

1270-1279

For Cisco WebEx

-

MP_REPL

TCP

2008

Database replication between the active and standby servers for Application Server failover

-

-

TCP

2000-2009

For Cisco WebEx

-

GWSIM

TCP

5003, 5005

Receive attachments from the external Web Server to Application Servers (active server and standby server, if one exists) in segmented meeting access configurations.

Expose to Web Server in the DMZ.


Used in segmented meeting access configurations.


If you configured your network for reverse connection, where your Web Servers are configured with a Cisco Unified MeetingPlace hostname instead of an IP address, the Application Server can initiate a reverse connection to the Web Server in the DMZ when port 5003 inbound is blocked.

SIP

TCP UDP

5060

SIP B2BUA

-

-

TCP

7676

Accept the connection from the Cisco WebEx Node

-

HTTP

TCP

8080

HTTP services

-

HTTP

TCP

9090

Media Server Administration

Expose to system administrators

SIP

TCP UDP

61002

Recording signaling

-

Recording control

TCP

61003

Recording control

For remote RSS servers only

HTTP

TCP

61004

Communication from the external Web Server to the Application Server for prompts, recordings, attachment access, and login service for remote users

Expose to Web Server in the DMZ


Used in segmented meeting access configurations

RTP, RTCP

UDP

16384-32767

Recording media for both Hardware Media Server and Express Media Server

-

Hardware Media Server

FTP

TCP

21

Retrieving log files

Expose to system administrators

Telnet

TCP

23

Telnet

Expose to system administrators

HTTP

TCP

80

Web user interface

Expose to system administrators

NTP

UDP

123

Network Time Protocol

-

SNMP

UDP

161

SNMP configuration

Expose to system administrators

MPI

TCP

2010

MPI (Pompa control protocol)

-

MPI

TCP

2010

MPI (Pompa control protocol)

-

DCI

TCP

3333

DCI (DCS control protocol)

-

XML control

TCP

3336

XML control

-

XML cascading

TCP

3337

XML cascading

-

File server

TCP

3340

File server

-

SIP

TCP UDP

5060

SIP

-

RTP/RTCP

UDP

16384-16683

Audio Blades

Expose to system administrators and end users

RTP/RTCP

UDP

20000-21799

Video Blades

Expose to system administrators and end users

Video Blade control

TCP

2944-2945

Video Blade control (H.248)

-

Web Server

HTTP

TCP

80

User web access


Cisco Unified MeetingPlace for Microsoft Outlook client

Expose to system administrators and end users


For external users to participate in web meetings, access must be granted from the Internet to the Web Server in the DMZ. However, access to port 80 may be closed if the Web Server is configured for HTTPS and you open TCP port 443.

HTTPS

TCP

443

Secure user web access


Cisco Unified MeetingPlace for Microsoft Outlook client

(Optional) Expose to system administrators and end users. If you have external users, then grant access from the Internet to the Web Server in the DMZ.

SQL

TCP

1433

Communication between the Web Server and the SQL Server database

-

RTMP

TCP

1627

Web meeting room

Note: This port is only used for systems that were upgraded to Release 8.0 from Release 7.0.

(Optional but recommended for best performance) Expose to system administrators and end users. If you have external users, then grant access from the Internet to the Web Server in the DMZ.

DCOM

TCP

Dynamically open 1024 to 65535

Cisco Unified MeetingPlace for Microsoft Outlook to Microsoft Exchange uses the CDO API

Required only for Release 7.0.1 systems using the back-end Microsoft Outlook integration.

Control connection

TCP

5003

Control connection between Web Servers and the Application Server

Expose to Application Server

Cisco WebEx Node for MCS (including WebEx Cloud)

HTTP

TCP

80

User web access from Cisco WebEx client

Internal network use only

-

TCP

1270-1279

User web access from Cisco WebEx client

Internal network use only

-

TCP

2000-2009

User web access from Cisco WebEx client

Internal network use only

HTTPS

TCP

443

Meeting entry from the Cisco WebEx client


Checking time from the NTP server

The Cisco WebEx Site will redirect to the Cisco WebEx Node if configured.

IBM Lotus Sametime

TCP/UDP

TCP UDP

8083

Java RMI lookup service for IBM Lotus Sametime (1)

-

TCP

TCP

8086

RMI calls (JRMP) for IBM Lotus Sametime web conferencing (2)

-



(1) RMI = Remote Method Invocation


(2) RMP = Java Remote Method Protocol


Table: Outgoing Ports Used in Cisco Unified MeetingPlace Scheduling Deployment Options
Protocol Port Type Port Usage Special Requirements
Application Server

SMTP

TCP

25

Send information to the SMTP or Microsoft Exchange Server for email notification

-

HTTP

TCP

80

Send information to the Microsoft Exchange Server for Microsoft Exchange integration

-

SOCKS

TCP

1080

Optional configuration for connecting to Cisco WebEx via a proxy configuration

This is an optional configuration that is not used unless you specifically configure it. The standard SOCKS port is 1080 but is configurable. Other types of proxies (such as HTTP) are not supported by Cisco Unified MeetingPlace for Cisco WebEx connectivity.

HTTPS

TCP

443

Send information to the Microsoft Exchange Server when SSL is enabled


Two permanent Telephony Service Provider (TSP) TLS Socket connections to send information to the Cisco WebEx cloud

-

-

TCP

5003, 5005

Control connection between the external Web Server and Application Servers (active server and standby server, if one exists) in segmented meeting access configurations

Open bidirectional


If you configured your network for reverse connection, where your Web Servers are configured with a Cisco Unified MeetingPlace hostname instead of an IP address, the Application Server can initiate a reverse connection to the Web Server in the DMZ when port 5003 inbound is blocked.

Cisco WebEx Node for MCS (including Cisco WebEx Cloud)

HTTPS

TCP

443

Tunnel meeting information from the Cisco WebEx Node to the Cisco WebEx cloud

  • MCS-7835: two connections max with SSLv3
  • MCS-7845: four connections max with SSLv3

Only outbound firewall to Internet

-

TCP

7676

Control connection with the Application Server

Internal network use

Web Server

NTP

UDP

123

Time synchronization between Web Servers and Application Server

-

Control connection

TCP

5003

Control connection between Web Servers and the Application Server

-

-

TCP

5003, 5005

Control connection between the external Web Server and Application Servers (active server and standby server, if one exists) in segmented meeting access configurations

Open bidirectional


If you configured your network for reverse connection, where your Web Servers are configured with a Cisco Unified MeetingPlace hostname instead of an IP address, the Application Server can initiate a reverse connection to the Web Server in the DMZ when port 5003 inbound is blocked.

HTTP

TCP

61004

Recording control

-

TCP/UDP Ports Used in Cisco WebEx Scheduling Deployment Options

This section lists the incoming and outgoing ports that are used by the various components of the Cisco Unified MeetingPlace Release 8.0 system. The information refers to Cisco WebEx Scheduling deployment options.


Use these tables to make sure that your firewalls do not block access from Cisco Unified MeetingPlace to users or integrated systems, and to make sure that you do not block communication among the Cisco Unified MeetingPlace components and servers.

Table: Incoming Ports Used in Cisco WebEx Scheduling Deployment Options
Protocol Port Type Ports Port Usage Special Requirements
Application Server

SSH

TCP

22

Secure access

Expose to system administrators

HTTP, HTTPS

TCP

80, 443

Administrator web access for Cisco WebEx

Expose to system administrators

NTP

UDP

123

Network Time Protocol communication from the Hardware Media Server

-

SNMP

UDP

161

SNMP configuration

Expose to system administrators

-

TCP

1270-1279

For Cisco WebEx

-

MP_REPL

TCP

2008

Database replication between the active and standby servers for Application Server failover

-

-

TCP

2000-2009

For Cisco WebEx

-

SIP

TCP UDP

5060

SIP B2BUA

-

-

TCP

7676

Accept the connection from the Cisco WebEx Node

-

HTTP

TCP

8080

HTTP services

-

HTTP

TCP

9090

Media Server Administration

Expose to system administrators

SIP

TCP UDP

61002

Recording signaling

-

Recording control

TCP

61003

Recording control

For remote RSS servers only

RTP, RTCP

UDP

16384-32767

Recording media for both Hardware Media Server and Express Media Server

-

Hardware Media Server

FTP

TCP

21

Retrieving log files

Expose to system administrators

Telnet

TCP

23

Telnet

Expose to system administrators

HTTP

TCP

80

Web user interface

Expose to system administrators

NTP

UDP

123

Network Time Protocol

-

SNMP

UDP

161

SNMP configuration

Expose to system administrators

MPI

TCP

2010

MPI (Pompa control protocol)

-

DCI

TCP

3333

DCI (DCS control protocol)

-

XML control

TCP

3336

XML control

-

XML cascading

TCP

3337

XML cascading

-

File server

TCP

3340

File server

-

SIP

TCP UDP

5060

SIP

-

RTP/RTCP

UDP

16384-16683

Audio Blades

Expose to system administrators and end users

RTP/RTCP

UDP

20000-21799

Video Blades

Expose to system administrators and end users

Video Blade control

TCP

2944-2945

Video Blade control (H.248)

-

Cisco WebEx Node for MCS (including WebEx Cloud)

HTTP

TCP

80

User web access from Cisco WebEx client

Internal network use only

-

TCP

1270-1279

User web access from Cisco WebEx client

Internal network use only

-

TCP

2000-2009

User web access from Cisco WebEx client

Internal network use only

HTTPS

TCP

443

Meeting entry from the Cisco WebEx client.


Checking time from the NTP server.

The Cisco WebEx Site will redirect to the Cisco WebEx Node if configured.



Table: Outgoing Ports Used in Cisco WebEx Scheduling Deployment Options

Protocol Port Type Port Usage Special Requirements
Application Server/ Express Media Server

SMTP

TCP

25

Send information to the SMTP or Microsoft Exchange Server for email notification

-

HTTP

TCP

80

Send information to the Microsoft Exchange Server for Microsoft Exchange integration

-

HTTPS

TCP

443

Send information to the Microsoft Exchange Server when SSL is enabled


Two permanent Telephony Service Provider (TSP) TLS Socket connections to send information to the Cisco WebEx cloud

-

SOCKS

TCP

1080

Optional configuration for connecting to Cisco WebEx via a proxy configuration

This is an optional configuration that is not used unless you specifically configure it. The standard SOCKS port is 1080 but is configurable. Other types of proxies (such as HTTP) are not supported by Cisco Unified MeetingPlace for Cisco WebEx connectivity.

-

TCP

5003, 5005

Control connection between the external Web Server and Application Servers (active server and standby server, if one exists) in segmented meeting access configurations

Open bidirectional


If you configured your network for reverse connection, where your Web Servers are configured with a Cisco Unified MeetingPlace hostname instead of an IP address, the Application Server can initiate a reverse connection to the Web Server in the DMZ when port 5003 inbound is blocked.

Cisco WebEx Node for MCS (including Cisco WebEx Cloud)

HTTPS

TCP

443

Tunnel meeting information from the Cisco WebEx Node to the Cisco WebEx cloud

  • MCS-7835: two connections max with SSLv3
  • MCS-7845: four connections max with SSLv3

Only outbound firewall to Internet

-

TCP

7676

Control connection with the Application Server

Internal network use


Application Server to Hardware Media Server Connectivity

The Hardware Media Server should be on the same local network segment as the Application Server. Cisco Unified MeetingPlace does not support Hardware Media Server blades that are remotely located.


Application Server to Web Server Connectivity

Note: Cisco Unified MeetingPlace Web Servers are only required in Cisco Unified MeetingPlace Scheduling deployments.


Confirm that the system meets the following requirements so that the Web Server can communicate with the Application Server:

  • The Web Server must be able to communicate with the Application Server on TCP port 5003. This can be achieved by opening port 5003 inbound from the Web Server to the Application Server, in which case the normal registration mechanism will operate. Alternately, the Application Server can initiate a reverse (outbound) connection to the Web Server. For the reverse connection to be initiated, you must enter the MeetingPlace Server name as a hostname instead of an IP address during the Web Server installation. You will also have to manually configure this Web Server unit on the Application Server.
  • Connectivity between the Web Server and the Application Server is of high quality and not subject to interruptions because of traffic congestion. Any time the round-trip latency exceeds 100 ms or there is more than 1 percent packet loss, you should expect a noticeable reduction in service quality.
  • TCP port 61004 must be open inbound from the Web Server to the Application Server. There is no "reverse" connection mechanism for this port.
  • Cisco recommends opening UDP port 123 (NTP) bidirectionally between the Web Server and the Application Server. This is used for time synchronization. Alternate time synchronization mechanisms may be used, but any significant clock drift will result in failures.

Cisco WebEx Node for MCS Connectivity

Cisco Webex Node for MCS is an optional component. Cisco Unified MeetingPlace Release 8.0 also supports Webex Software as a Server (SaaS).


Cisco WebEx Node for MCS is deployed internally behind your corporate firewall. There are two separate connections:

  • Cisco WebEx Node for MCS to the Cisco WebEx Cloud
  • Cisco WebEx Node for MCS to the Cisco Unified MeetingPlace Application Server


Cisco WebEx Node for MCS must be installed on either a MCS 7835 or MCS 7845. The 7835 provides two TCP 443 dedicated socket connections to the Cisco Webex cloud outbound via the firewall. The 7845 provides four TCP 443 dedicated socked connections to the Cisco Webex cloud.


Be aware of the following when configuring the Cisco WebEx Node for MCS:

  • Cisco WebEx Node for MCS does not support any HTTPS/TCP 443 proxy configured in a network.
  • All Cisco WebEx Node for MCS outbound TCP Port 443 must be able to traverse firewalls directly without HTTPS proxy servers in between.
  • Cisco Unified MeetingPlace Release 8.0 supports a maximum of three Cisco WebEx Nodes for MCS with a maximum of 1000 sessions load-shared amongst the deployed nodes.
  • For meetings scheduled to allow external attendees, internal ports are consumed by internal users. Once the nodes are full, client connections overflow to the Cisco WebEx cloud. If all nodes fail, all clients failover to the cloud.
  • For meetings scheduled for internal attendees only, internal ports are consumed by internal users. External users are not able to access the meeting. Once the Cisco WebEx Nodes for MCS are full, clients are blocked. If a node fails, client connections go to another node. Failover to the cloud is not possible for internal meetings.

Failover Requirements

To configure failover, you need two Application Servers with a high-speed network connection (preferably 100Mpbs or better) between them. Failover configuration requires the following:

  • When you configure the Application Server for the Express Media Server, both the primary and secondary failover Express Media Servers must have the same licenses and port distribution for scheduled and ad-hoc meetings.
  • The time must be synchronized between the two Application Servers. This is required to resolve conflicts when the same piece of data is modified simultaneously in both Application Servers.
  • If the primary and failover Application Servers share a common set of Audio and Video Blades, you must add all the Audio Blades to both Applications Servers. Be sure to use the same passwords and SNMP community names on the two systems or the failover mechanism will not work.
  • If the primary and failover Application servers are in different data centers (dual data center deployment), then the same VLAN must be extended between both data centers for the replication and failover to be supported.

0 comments:

Post a Comment