08-14-2013 12:02 PM - edited 03-16-2019 06:52 PM
I have done a fair amount of research on this topic and while I have deployed mixed-mode clusters, I haven't had a situation quite like the one I need to contend with in the next couple of weeks. I am trying to be as prepared as possible and am looking for feedback on some procedures I am drafting.
The situation:
The goal: Get the present solution into a VMware environment running CUCM 9.1(2). Planning on doing the Jump Upgrade procedure (interim hop to 6.1.4).
We found out about the certificate issues during our discovery phase. We have built in time to remediate the certificate issue.
The plan (well, thus far). I am still pulling together my notes and trying to come up with a way to test an implementation plan off line so that I can avoid bricking the phones (they are spread all over north america).
Here is the 10,000 foot view of the plan (obviously, the actually plan will be more detailed):
The customer has said that they are actually fine with the idea of going back to square one and start over with provisioning a secured (mixed-mode) cluster after the 9.1 upgrade. That would be great except that if I uninstall LSCs, change phones to non-secure, and use CTL client to change back to standard-mode, I still have the CTLs left on the phones. No way to bulk delete them in UCM. I am considering using something like UnfiedFX to help me get back to square 1. Right now, I consider this a plan B. Unless feedback to this thread and other research suggests a different tact.
Thanks in advance for any assist.
-Bill
Please remember to rate helpful responses and identify
08-18-2013 04:42 AM
Hi William,
You have a quite a few requirements here. Just to clear things up, there are two type of certificates, first is called "certificate trust", and the other is called "Certificate". For the trust certificates such as Callmanager_trust you can just click on the certificate, make sure that it is expired, and then delete it. this has no impact on the phones. The other type of certificate is called "Certs", you will need to regenerate those certificates, This will regenerate the certificate and also recreates the new "CAPF-trust" or "CallManager-trust" certificates with new date/time ranges.
Doing the above will not impact the phones are the services, however after regenerating the certificates, you will need to restart all the services related to this certificate, for example if you regenerate the tftp certificate, you will need to restart the tftp service on all the servers in the cluster. Same for the Callmanager and the Tomcat.
Please note that whenever you regenerate the Call manager certificate, you will need to run the CTL client with the same Token you used when the server was changed to mixed mode.
In General the below is the procedure to regenerate the certificate
- log into the "Cisco Unified OS Administration" page of the publisher
- choose Security>Certificate Management
- click the link for the expiring certificate
- click "Regenerate"
- restart the service that uses the certificate
That will regenerate the certificate on the publisher. Within the next
10-15 minutes, the updated certificate will be propagated
to the subscribers.
For more details you could refer to :
http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/cucos/6_1_1/cucos/iptpch6.html#wp1040760
Hope this Helps!
Regards,
Karthik Sivaram
08-22-2013 04:43 AM
Karthik,
Thanks for the input. Does the flow I laid out in the original post jive? I have looked through the Cisco documentation. I understand the content provided by Cisco. I just think it is light on details. I have also read some great docs posted to the forum. I am trying to cobble together a cohesive process from different resources.
-Bill
Please remember to rate helpful responses and identify
05-20-2014 11:52 AM
Another thing to consider and make sure is that you have the same original token that was used to enable security on the cluster. Otherwise this is a bit more painful and will need Cisco TAC to help you. They have to log in with root access and disable security on the cluster.
Also you need to make sure all phones are changed to non-secure profiles and you will have to delete the CTL cert from each phone in which you will require a bulk tool that could do this.
Wilson
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide