Motorola TEAM WSM - Cisco Unified Communications Manager Express (CME) Integration Summary This setup covers the of the TEAM VoWLAN solution with a Cisco Communications Manager Express 4.1 +. This integration is a trunk-side integration. Pre-requisite Properly setup TEAM Environment (DNS, DHCP, AAA, etc) o Must have A record and PTR record for the WSM in the DNS server. WSM o Release 2.1 EWP o Release P1.72_REL01.34.08F-US Cisco (CME 4.1 +) o Cisco Communications Manager Express 4.1 (used in this guide) Supported Features Basic Calls DID/DOD Call Forward Consultative Transfer Blind Transfer Voicemail Message Waiting Indication (MWI) Caller ID Call Hold/Resume Call Park/Retrieve Simultaneous Ringing Call Waiting Meet-me Conference Multiple Call Appearances (4)
Procedure Configuring WSM 1. In the WebNSM (open a browser and put in the IP address of the WSM), login as nsmserv and go to WSM Configuration. Click on WebNSM WSM Configuration. Verify and configure and the following parameters: SIP address-of-record the domain used for the Voice network Voice Server Security None/TCP 2. Under the External Services tab set the Voice Server host name to either the FQDN or IP address of the PBX. Set the Voice Server port to 5060. Also set the Primary AAA Server host name to the IP address of the WSM. This will use the internal AAA server in the WSM appliance. Leave the other fields default.
3. Under the WLAN Handsets tab, the PBX Type parameter is set to Cisco-CME. The Voice mail phone number is set to the pilot number used in the CME. 4. Click on Push to WSM. A restart may be needed on the WSM after the push has been successful. 5. You may have to log back into the WebNSM after the push. Create users by clicking on WebNSM Provisioning. Click the Add User button on the top of the page. The required fields are in bold. Fill in the relevant information. 6. Click on the Dispatch tab and configure the relevant push-to-talk information. The click Submit.
7. Click on the Change User Pwd button. Select All Users in the Change Mode field. Configure a password for all the users. You may give each user a different password if desired by selecting Single User for each. This user name and password is used in the internal AA server to authenticate the users. These usernames and passwords will be configured in the phones.
Configuring the Cisco Communications Manager Express PBX 8. Open Putty and login to the CME. 9. Type conf t. 10. Type in the following commands and press Enter after each one: dial-peer voice 1 voip destination-pattern 30.. session protocol sipv2 session target ipv4: 192.168.1.24 session transport tcp dtmf-relay rtp-nte 11. type exit and press Enter. 12. Type copy run start and press Enter. 13. Type show run and press Enter.
Current configuration : 8269 bytes version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname cme boot-start-marker boot-end-marker logging buffered 51200 warnings no aaa new-model clock timezone zone -5 clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00 dot11 syslog ip cef ip domain name nhvoip.com ip name-server 192.168.1.10 ip name-server 68.87.71.226 multilink bundle-name authenticated voice-card 0 no dspfarm voice service voip allow-connections h323 to h323 allow-connections h323 to sip allow-connections sip to h323 allow-connections sip to sip supplementary-service h450.12 no supplementary-service sip moved-temporarily no supplementary-service sip refer h323 sip voice class codec 1 codec preference 1 g711ulaw crypto pki trustpoint TP-self-signed-3727951331 enrollment selfsigned
subject-name cn=ios-self-signed-certificate-3727951331 revocation-check none rsakeypair TP-self-signed-3727951331 crypto pki certificate chain TP-self-signed-3727951331 certificate self-signed 01 30820246 308201AF A0030201 02020101 300D0609 2A864886 F70D0101 04050030 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 69666963 6174652D 33373237 39353133 3331301E 170D3131 30323032 30323531 31305A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 37323739 35313333 3130819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 8100DD8A EBF9D8D1 DBDE42D2 596D4975 3A572344 37D757D1 30CBFC39 BB084E6C 5F3947D4 E14EE4BD FDAE8BC7 B48475BA 6F888A3D 06757833 E85097C9 254E09E5 CC238AB3 A785E065 E54649F0 FB210E24 813F45C5 A7AF021A 2A820A9C B3F220FC E4345624 F0F76C48 6F37218B 487D711A 7B2E2258 466D4F45 4591C99E B4C1A5FF 4B9F0203 010001A3 6E306C30 0F060355 1D130101 FF040530 030101FF 30190603 551D1104 12301082 0E636D65 2E6E6876 6F69702E 636F6D30 1F060355 1D230418 30168014 76AE1321 74DC693F 43876237 46A262BF 665C132E 301D0603 551D0E04 16041476 AE132174 DC693F43 87623746 A262BF66 5C132E30 0D06092A 864886F7 0D010104 05000381 81003245 4AE97568 72D2A16A 711F02AD 27E68BEC 80F1A4CE 4195B142 BB0F3328 B5778F04 8276C629 8A537154 DF0A1B4E 32281127 7BF09C89 0765180D 8A7375BC 381F8931 917267D3 6B41D7F7 60B39F19 C9E056DD 6D6DDD6A 0EC903EA 51D77C11 F3571C08 8DC5B031 0B2E1821 11500536 09CC0C4D C59CD47E 1BB44CD6 263EB2D4 9F76 quit username admin privilege 15 secret 5 $1$LmQn$09lvPRzSXhVjUbwz2K.950 archive log config hidekeys ip ssh version 2 interface FastEthernet0/0 description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-FE 0/0$$ES_WAN$ ip address dhcp ip dns view-group dns duplex auto speed auto interface FastEthernet0/1 description $ES_LAN$ ip address 192.168.1.40 255.255.255.0 duplex auto speed auto ip default-gateway 192.168.1.100 ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 FastEthernet0/0
ip http server ip http access-class 23 ip http authentication local ip http secure-server ip http timeout-policy idle 60 life 86400 requests 10000 ip http path flash: access-list 23 permit 192.168.1.0 access-list 23 permit 10.10.10.0 0.0.0.7 access-list 23 permit 192.168.1.0 0.0.0.255 tftp-server flash:p00p00307020200.loads tftp-server flash:/p00p00307020200.loads tftp-server flash:p00307020200.loads tftp-server flash:p00307020200.sb2 tftp-server flash:p00307020200.sbn tftp-server flash:p00307020200.bin tftp-server flash:cp7921g-1.2.1.loads tftp-server flash:/phone/7940-7960/p00307020200.bin alias P00307020200.bin tftp-server flash:7940-7960/p00307020200.bin alias P00307020200.bin tftp-server flash:p00403020214.bin control-plane voice-port 0/0/0 voice-port 0/0/1 voice-port 0/0/2 voice-port 0/0/3 dial-peer voice 4900 voip mailbox-selection orig-called-num no vad dial-peer voice 1 voip destination-pattern 30.. session protocol sipv2 session target ipv4:192.168.1.24 session transport tcp dtmf-relay rtp-nte telephony-service load 7910 P00403020214 Create a Dial Peer for the WSM Dial pattern to reach the extension numbers of the EWPs. i.e EWP extensions 3000-3009 will be sent. IP address of the WSM Set RTP Named Telephone Event to RFC 2833
load 7960-7940 P00307020200 max-ephones 12 max-dn 12 ip source-address 192.168.1.40 port 2000 auto assign 1 to 12 voicemail 4900 max-conferences 8 gain -6 web admin system name admin password password transfer-system full-consult transfer-pattern.t create cnf-files version-stamp 7960 Feb 08 2011 06:13:37 ephone-dn 1 dual-line number 9000 ephone-dn 2 dual-line number 9001 ephone-dn 3 dual-line number 9002 ephone-dn 4 dual-line number 9003 ephone-dn 5 dual-line number 9004 ephone-dn 6 dual-line number 9005 ephone-dn 7 dual-line number 9006 ephone-dn 8 dual-line number 9007
ephone-dn 9 dual-line number 9008 ephone-dn 10 dual-line number 9009 ephone-dn 11 dual-line number 9010 ephone-dn 12 dual-line number 9011 ephone 1 mac-address 1CDF.0F51.0E3E type 7921 button 1:1 ephone 2 ephone 3 mac-address 1CDF.0F50.7811 type 7921 button 1:2 ephone 4 ephone 5
ephone 6 ephone 7 ephone 8 ephone 9 ephone 10 ephone 11 ephone 12 banner exec ^C % Password expiration warning. ----------------------------------------------------------------------- Cisco Configuration Professional (Cisco CP) is installed on this device and it provides the default username "cisco" for one-time use. If you have already used the username "cisco" to login to the router and your IOS image supports the "one-time" user option, then this username has already expired. You will not be able to login to the router with this username after you exit this session. It is strongly suggested that you create a new username with a privilege level of 15 using the following command. username <myuser> privilege 15 secret 0 <mypassword> Replace <myuser> and <mypassword> with the username and password you want to use. ----------------------------------------------------------------------- ^C
banner login ^C ----------------------------------------------------------------------- Cisco Configuration Professional (Cisco CP) is installed on this device. This feature requires the one-time use of the username "cisco" with the password "cisco". These default credentials have a privilege level of 15. YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE PUBLICLY-KNOWN CREDENTIALS Here are the Cisco IOS commands. username <myuser> privilege 15 secret 0 <mypassword> no username cisco Replace <myuser> and <mypassword> with the username and password you want to use. IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL NOT BE ABLE TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF. For more information about Cisco CP please follow the instructions in the QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp ----------------------------------------------------------------------- ^C line con 0 login local line aux 0 line vty 0 4 access-class 23 in privilege level 15 login local transport input telnet ssh line vty 5 15 access-class 23 in privilege level 15 login local transport input telnet ssh scheduler allocate 20000 1000 ntp clock-period 17179749 ntp server 192.43.244.18 end 14. Verify that calls can be made to and from the PBX and the WSM. End of Procedure