This document describes SSL Connection/Certificate Verification status displays in Cisco Unified Presence Administration when you configure the Exchange Presence Gateway.
Checklist for Managing Self-Signed and Third-Party Certificate Exchanges
Install the Certificate CA Service
Generate a CSR on IIS of Exchange server
Submit the CSR to the CA Server/Certificate Authority
Download the signed certificate
Upload the signed certificate onto Exchange IIS
Download the root certificate
Upload the root certificate to the Cisco Unified Presence server
Status :- SSL Connection/Certificate Verification - Verified
Cisco Unified Presence verified the SSL connection with the Exchange server. Select View for the certificate details.
Status :- SSL Connection/Certificate Verification Failed - Certificate Missing From Chain
One or more certificates that Cisco Unified Presence requires to establish a secure connection to the Exchange server are missing. The Certificate Viewer can provide details of the missing certificates.
Complete these steps in the Certificate Viewer to display any missing certificates:-
1. Select Configure to open the Certificate Viewer.
2. Check Accept Certificate Chain.
3. Select Save.
4. The certificate chain details display. Note any certificates with a status of Missing.
5. Close the Certificate Viewer.
6. To complete the certificate chain, you must:
a. Download the missing certificates files from the Exchange server.
b. Copy or FTP the missing certificate files to the computer that you use to administer Cisco Unified Presence.
c. Use the Cisco Unified OS Administration to upload any of the required missing certificates.
If the certificates are not available in the Certificate Viewer, you may need to manually download and install the missing certificates from the Exchange server, and upload these certificates in Cisco Unified OS Administration as follows:-
If required, go to Cisco Unified OS Administration and upload certificates to complete the certificate chain.
Return to the Presence Gateway Configuration window in Cisco Unified Presence Administration, reopen the Certificate Viewer, and verify in the Certificate Viewer that all certificates in the certificate chain now have a status of Verified.
You must restart the Cisco UP Presence Engine after you upload Exchange trust certificates. Select Cisco Unified Serviceability > Tools > Service Activation. Note that this can affect Calendaring connectivity.
Select either Configure or View to launch the Certificate Chain Viewer where you can view the details of the certificate chain. The Configure button will display if there are any issues with the certificate chain that Cisco Unified Presence downloads from the Exchange server - for example, the missing certificates scenario described above. Once you successfully import and verify the certificate chain, the SSL Connection / Certificate Verification status will update to Verified and the View button will replace Configure.
These instructions describe the view of the customized Certificate Import Tool. If you are simply verifying connection status, the tool indicates the verified status but you do not have the option to Save.
Status :- SSL Connection/Certificate Verification Failed- Subject CN Mismatch
The Presence Gateway field value must match the Subject CN value of the leaf certificate in the Certificate Chain. You can resolve this issue manually using the Certificate Viewer, or by entering the correct value in the Presence Gateway field.
Verify that your entry in the Presence Gateway field is correct as follows:
1. Reenter the correct Subject CN value in the Presence Gateway field. Cisco Unified Presence uses the Presence Gateway field value to ping the server. The host (FQDN or IP address) that you enter must exactly match the IIS certificate Subject Common Name.
2. Select Save.
Alternatively, complete these steps if you want to use the Certificate Viewer to resolve the Subject CN mismatch:
1. Select Configure to open the Certificate Viewer.
2. Select Accept Certificate Chain.
3. Select Save.
4. Select Close to close the Certificate Viewer. After you close the Certificate viewer, an alert displays to indicate a change to the Presence Gateway field value (assuming you updated it) and the Presence Gateway page is refreshed.
5. Verify the value of the Presence Gateway field is updated.
6. Verify that the value of the SSL Connection / Certificate Verification reads Verified.
Select either Configure or View to launch the Certificate Chain Viewer where you can view the details of the certificate chain. The Configure button will display if there are any issues with the certificate chain downloaded from the Exchange server - for example, the missing certificates scenario described above. Once you successfully import and verify the certificate chain, the SSL Connection / Certificate Verification status will update to Verified and the View button will replace Configure.
Status :- SSL Connection/Certificate Verification Failed - Bad Certificates
Information in the certificate is incorrect, which renders it invalid.
Typically, this occurs if the certificate matches the required Subject CN but not the public key. This could happen if the Exchange server regenerates the certificate but the Cisco Unified Presence server still maintains the old certificate.
To resolve this, complete these actions:
•Select the logs to determine the cause of the error.
•If the error is due to a bad signature, you need to remove the outdated certificate from Cisco Unified Presence in Cisco Unified OS Administration, and then upload a new certificate in Cisco Unified OS Administration.
•If the error is due to an unsupported algorithm, you need to upload a new certificate that contains the supported algorithm in Cisco Unified OS Administration.
Hi All, I am currently in a setup of Hybrid Data Security on Webex Teams, involving 3x KMS.I already have a case open, but the engineer looks not understanding ...In fact, the KMS are configured with IP:10.10.10.1010.10.10.2010.10.10.30For a total un...
Hi guys,one question for my better understanding.What happens, if the quantity of registering devices exceeds the maximum of 2500 per Expressway node?Is the registration of these devices rejected on this node and Jabber will try to connect to another node...
Hey guys. I found something been changed in the SIP message of VCS Expressway-E. When a terminal registered on CUCM calls an external server or terminal, the Request-URI was changed .I captured the diagnos...
Cisco Meeting Manager with CMS isn't up to expectations ... Turned up CMS 24 March with CMM. Completed 692 meetings to date. Average participants is 30 to 40 with over 7 simultaneous calls running totalling over 70 participants. ...
Has anyone been able to get the Group Call tcl script working that you can "purchase" from ciscoscript.com? Since Cisco UCM doesn't have a clear solution for auto group-conferencing calling, TAC referred us to a 'former' voice engineer that ca...