Escolar Documentos
Profissional Documentos
Cultura Documentos
5 Restore a backup 30
Appendix A Logs 31
A.1 Event logs 31
A.2 System logs 31
A.3 Audit logs 32
A.4 Crash reports 32
A.5 Log bundle 32
Cisco Trademark 36
1 Introduction
Cisco Meeting Management is a management tool for Cisco's on-premises video conferencing
platform, Cisco Meeting Server. It provides a user-friendly browser interface for video
operators to monitor and manage meetings that are running on the Meeting Server.
This guide is for administrators of Cisco Meeting Management, providing instructions on how to
install and configure Cisco Meeting Management.
Note: If you have a medium size deployment and think you may need higher capacity later, then
configure your VM for a large deployment.
Call Bridges 1-8 Call Bridges on Cisco 9-24 Call Bridges run on Cisco
Meeting Server 1000 Meeting Server 1000
or or
1 Call Bridges on Cisco Meeting 3 Call Bridges run on Cisco
Server 2000 Meeting Server 2000
or or
1-4 Call Bridges run on X3 5-10 Call Bridges run on X3 server
server
Call legs started at peak time 10 call legs started per second 20 call legs started per second
Storage 100 GB, thick provisioned, eager 100 GB, thick provisioned, eager
zeroed zeroed
RAM 4 GB 8 GB
Hypervisor VMware ESXi 5.5 U2 or later, ESXi 6.0 VMware ESXi 5.5 U2 or later, ESXi 6.0
U3, ESXi 6.5 U3, ESXi 6.5
Network interfaces 1 1
Note: If you have a medium size deployment and think you may need higher capacity later, then
configure your VM for a large deployment.
Note: The VM is configured for small to medium deployments. For large deployments, you must
change the sizing manually during setup.
2.3 Resilience
To add resiliency to your Meeting Management deployment, you can connect up to 2 instances
of Meeting Management to the same Meeting Server deployments. They must be configured
independently—both get their information directly from the connected Call Bridges and no
information is exchanged between them.
Decide if you want to set up 1 or 2 instances of Meeting Management. They must be configured
separately, and the requirements are the same for both.
Note: Make sure that you set up a DNS record for your Meeting Management. Also, make sure
that any firewalls are open for Call Bridges to reach the FQDN you set up for Meeting
Management as CDR receiver address.
Meeting Management maps to existing user groups on your LDAP server. Make sure that you
have configured appropriate user groups on your LDAP server before you set up Meeting
Management.
Note: Meeting Management does not support nested groups. If a mapped group contains other
groups, the members of those nested groups will not have access to Meeting Management.
At least one administrator group must include the person who will perform the initial
configuration. This administrator group will be added during the LDAP setup.
Note: There is no local user account on Meeting Management. Meeting Management will give
you a single-use username and password during installation that you will use to sign in and set
up LDAP server details and 1 administrator group. After that, only members of that first
administrator group can sign in to Meeting Management to complete the initial configuration.
Note: Internet Explorer does not force updates, so we recommend that you manually check that
you have the latest version.
Note: Safari cannot be used for the first run, because it does not work with a self-signed
certificate. It may let you sign in with a self-signed certificate, but it will keep displaying the
connection error window.
Certificate requirements:
l The certificate chain should include the certificate of the CA that signed the certificate,
plus any certificates higher in the certificate chain, up to and including the root CA
certificate.
l Your CDR receiver address, as well as any addresses your users will use for the browser
interface, should be included in the certificate.
Note: If participants join using access methods, we recommend using Meeting Server
2.2.8 or later to ensure that changing layout for the meeting affects all participants. For
more information, see Meeting Server issue CSCvg01532.
Note: Owner for a meeting scheduled with TMS is only displayed if you use TMS 15.6 or
later and Meeting Server 2.2.6 or later.
Note: 2.1.x versions do not support changing layouts for all participants in a meeting.
Meeting Server API HTTPS The TLS listening port for the webadmin as configured
on the MMP of the Meeting Server
Note: The administrator can configure Meeting Management-> Meeting Server connectivity on
a port other than 443. If so, then the selected port will need to be opened in any firewall.
Note: As recommended by VMware, you must use the web vSphere client (Flash) for deploying
your Meeting Management VM.
Note: Your vSphere client may differ slightly from what is described in the steps below.
3. Select Local file, then browse to the OVA you have downloaded from cisco.com.
4. Continue through the wizard to select name and location, resource, storage, and network
details.
CAUTION: You must choose thick provisioning, eager-zeroed. On some platforms, lazy-
zeroing can cause performance issues.
Note: If you are asked for IP Allocation settings, leave them blank. Meeting Management
has its own configuration and does not use this information.
Note: During installation, Meeting Management checks that input has the right format, but it
does not perform a full verification. Please check the entered details carefully.
Note: The terminal assumes US keyboard layout. Be aware when you want to type special
characters. For instance, if you have a UK keyboard, press SHIFT+2 to type @.
Note: Square brackets for IPv6 addresses are not allowed in these fields.
14. If you are using a key, enter key number, choose key type, then enter key.
Note: Square brackets are not allowed in NTP Server Address field.
The CN field is mandatory and should be the FQDN that your users will use to access the
Meeting Management browser interface.
All other fields are optional.
The self-signed certificate is for temporary use during first time setup.
Note: For production environments, you must replace the self-signed certificate with a
CA signed certificate. You can do this after you have finished the installation and initial
LDAP setup.
17. Go to End and press enter. Wait for your Meeting Management to start.
The console will display an IP address, fingerprints for your self-signed certificate, and a
set of single-use credentials.
Note: It may take a few minutes before your Meeting Management is ready for you to sign
in to the browser interface.
CAUTION: After you sign in to the browser interface for the first time, the single-use
credentials cannot be used again. You have to redeploy the OVA if you do not finish setting
up LDAP details before the browser is closed. Check the instructions and have all LDAP
details ready before you start.
Note: All user groups must be configured on your LDAP server before you can add them by
mapping Meeting Management to groups on your LDAP server.
CAUTION: You cannot change LDAP server for your Meeting Management after first time setup.
If you want to use a test LDAP server in your lab environment, you must redeploy Meeting
Management when you move it to your production environment.
Note: Safari cannot be used for first time setup, because it does not work with a self-
signed certificate. It may let you sign in with a self-signed certificate, but it will keep
displaying the connection error window.
2. Optional: Check that the self-signed certificate has the right fingerprints before you ignore
the browser warnings.
3. Enter the single-use credentials that you got from the VM console.
CAUTION: After you sign in to the browser interface for the first time, the single-use
credentials cannot be used again. You have to redeploy the OVA if you do not finish setting
up LDAP details before the browser is closed. Check the instructions and have all LDAP
details ready before you start.
4. Enter server address and port number for your LDAP server.
Default port numbers:
l LDAP: 389
l LDAPS: 636
Note: If you are using AD, and your base DN is set on domain component (DC) level only,
use the default ports for searching the Global Catalog - for LDAP port 3268, for LDAPS
port 3269.
Note: If your LDAP server address is a literal IPv6 address, enter it within square brackets.
5. Choose protocol.
LDAP is for connection without certificate, LDAPS is for secure connection, optionally
using the certificate trust store for verification.
6. If you are using LDAPS, click Select certificate trust store to upload the certificate chain for
your LDAP server.
Certificate requirements:
l The certificate chain should include the certificate of the CA that signed the LDAP
server's certificate, plus any certificates higher in the certificate chain, up to and
including the root CA certificate.
l The server address you entered for your LDAP server must be included in the LDAP
server certificate.
Note: If your base DN is set on domain component (DC) level only, use the default ports for
searching the Global Catalog - for LDAP port 3268, for LDAPS port 3269.
9. Choose the LDAP attribute you want users to enter as username when they sign in to
Meeting Management.
10. Enter LDAP path for an administrator group that includes the person who will finish the
Cisco Meeting Management configuration, typically yourself.
The LDAP path is the distinguished name (DN) for the group you want to map to Meeting
Management.
Note: You can only add one group during the setup. You can add more groups later.
Note: If you do not see at the bottom of the black pane to the left, scroll down until
you see it.
3. Optional: Go to the Network tab if you want to add an extra DNS server or IP address.
Note: If you type in IPv6 addresses, do not use square brackets here.
4. Optional: Go to the NTP tab if you want to check the status for your NTP server, or if you
want to add more NTP servers.
Note: If you type in IPv6 addresses, do not use square brackets here.
Note: The time displayed is for your Meeting Management server and may differ from the
time settings on your computer. The offsets shown are between each connected NTP
server and your Meeting Management server.
Note: We strongly recommend that you use an FQDN, as IP addresses may change. The
CDR Receiver address field configures only what Meeting Management gives to Call
Bridges, not how your Meeting Management is presented to the wider network. You need
to enter an address that is set up in your network to be resolvable and reachable from your
Call Bridges.
If you want, you can use the same address for your users to access the browser interface.
6. Upload certificate chain to replace your self-signed certificate.
This is the certificate that will be presented to the Call Bridges you want to manage and to
browsers your users use to access the browser interface.
Certificate requirements:
l The certificate chain should include the certificate of the CA that signed the
certificate, plus any certificates higher in the certificate chain, up to and including the
root CA certificate.
l Your CDR receiver address, as well as any addresses your users will use for the
browser interface, should be included in the certificate.
7. Upload the private key for your CA signed certificate.
8. Go to the Restart tab to restart your Meeting Management.
Note: You can restart now, or you can wait until you have completed the initial
configuration. No changes are applied until you have restarted your Meeting Management.
3. In the Port field, enter the port number for your Call Bridge API.
4. Enter the Username and Password for your Call Bridge API.
Note: For security and auditing reasons, we strongly recommend that you use a separate
user account for Meeting Management, as described in the release notes.
If the Call Bridge you added is part of a cluster, the other Call Bridges in the cluster are auto-
discovered and displayed as unmanaged Call Bridges below.
Note: The latest system logs are stored locally, but the limit is 500 MB of system logs. When the
limit is reached, the oldest 100 MB of logs are deleted.
Note: If you type in IPv6 addresses, do not use square brackets here.
4. Choose protocol
5. If you chose TLS, Upload certificate chain.
The requirements for the certificate chain are:
l It must include the full certificate chain, up to and including the root CA certificate.
l The address listed in the certificate must be the same as the one you have entered
for the log server.
6. Click Add.
7. Repeat until you have added the log servers you need.
Note: The changes are not applied until you restart your Meeting Management. You can
restart now or wait until you finished the initial configuration.
Note: In this release, audit logs and system logs are not filtered. They are all sent to your system
log servers.
Note: If you type in IPv6 addresses, do not use square brackets here.
4. Choose protocol
5. If you chose TLS, Upload certificate chain
The requirements for the certificate chain are:
l It must include the full certificate chain, up to and including the root CA certificate.
l The address listed in the certificate must be the same as the one you have entered
for the log server.
6. Click Add.
Note: The changes are not applied until you restart your Meeting Management. You can
restart now or wait until you have completed the initial configuration.
Note: User access to Meeting Management is different from access to the Meeting Server and
the Meeting App. Even if a user signs in to the Meeting Server and Meeting Management with
the same credentials, the same user might have full administrator privileges on the Meeting
Server, but only have access to the Meetings page in Meeting Management.
Note: The backup is encrypted and cannot be used without the password.
If you did not yet restart Meeting Management to save your settings, restart now.
You can now start using Meeting Management!
Note: All users, both video operators and administrators, will be signed out, and data for
ongoing and recent meetings will be lost when you upgrade.
5 Restore a backup
Before you restore a backup:
l Make sure that you have your backup file and the password ready.
The password was chosen when you or another administrator created the backup.
l Decide if you want to restore all settings, or if you just want to restore database or
configuration.
Appendix A Logs
As an administrator, you can access all logs for Meeting Management.
Note: All logs accessed from Meeting Management are for Meeting Management, even though
many of the messages are based on information received from Meeting Server Call Bridges.
Note: Most timestamps are in UTC. The exception is event logs which are displayed in your
browser's time zone when viewed within Meeting Management.
Note: All event logs are deleted when you restart or upgrade your Meeting Management. After
restart, logs will be recreated for start times of ongoing meetings and join times for connected
participants. All other log messages will be lost.
Only the latest logs are stored locally, so we strongly recommend that you set up an external
syslog server to keep the full history in case you need it for Support.
If you need to contact Cisco Technical Support, always include the log bundle.
2017-12-19 Notes that were related to fixed bugs have been removed.
Reference to sales and trials representatives in the Upgrade from previous version section
have been removed.
Cisco Trademark
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates
in the U.S. and other countries. To view a list of Cisco trademarks, go to this url:
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their
respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1110R)