CUCILync Installation and Configuration - Cisco Systems. This document provides step- by- step installations and integrations of CUCILync with Microsoft Lync 2. Cisco Unified Communication Manager. Top VIdeos. Warning: Invalid argument supplied for foreach() in /srv/users/serverpilot/apps/jujaitaly/public/index.php on line 447. VMware vShphere 6 Install, Configure, Manage: Part 1 (Show Available Courses)(Hide Available Courses). Before performing these steps in this article make sure to successfully complete all of the prerequisite actions covered in Part 1 of this series. This document provides step-by-step installations and integrations of CUCILync with Microsoft Lync 2010 and Cisco Unified Communication Manager. Note: The document covers steps that are required to install AD, Exchange and Lync in the lab and does not cover CUCM, Cisco Unity Connection. For staged approach to the Standard Edition Lync deployment, this is the minimum configuration required to run Lync. The initial Standard Edition topology deployment described in this document includes these environment and components: A single forest, single domain Active Directory structure. A single domain controller with Domain Name System (DNS) and an Enterprise Root certification authority (CA)Exchange. The information in this document is based on these software and hardware versions: Active Directory Server. Exchange Server. Lync 2. Server. Cisco Unified Communication Manager (CUCM) 8. PC Client Machine. Note: VMWare for AD, Exchange and Lync. The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command. Refer to the Cisco Technical Tips Conventions for more information on document conventions. Microsoft Lync Server 2. IM), presence, conferencing, and telephony solutions that can support enterprise- level collaboration requirements. Cisco Unified Communication Integration (CUCI) for Microsoft Lync is a desktop integration that provides access to Cisco Unified Communications for Microsoft Lync. The solution extends the presence and instant messaging (IM) capabilities of Microsoft Lync by providing access to a broad set of Cisco Unified Communications capabilities, which includes softphone standards- based video, unified messaging, audio, video and web conferencing, desk- phone control, and phone presence. Cisco UC Integration for Microsoft Lync is tightly integrated with Microsoft Lync to deliver a consistent and compelling user experience while providing the benefits of increased employee productivity and collaboration, reduced infrastructure complexity, and a lower total cost of ownership (TCO). These are the pre- requisites for CUCILYNC integration. After the installation of Pre- requisites install Active Directory (AD)Create Users inside Active Directory. Activate DNS and add DNS entries for Servers and Clients. Activate Certificate Authority (CA) Services on the same server. After installing Pre- requisites install Exchange. Create Mailbox. Verify email exchange through Outlook. After the installation of Pre- requisites install Microsoft Lync 2. Verify IM & Presence with native Lync 2. Install Lync 2. 01. Clients on PC. Install Outlook 2. Mailbox. This document uses this network setup: Install Active Directory Domain Services (AD DS) on a member server that runs Windows Server 2. R2 with the Active Directory Domain Services Installation Wizard (Dcpromo. The member server should be located in the forest root domain. After you install AD DS successfully, the member server becomes a domain controller. You can install AD DS with the Windows user interface (UI). The Windows UI provides two wizards that guide you through the installation process for AD DS. One wizard is the Add Roles Wizard, which you can access in Server Manager. The second wizard is the Active Directory Domain Services Installation Wizard (Dcpromo. Complete these steps for installation. Disable IPv. 6 with these steps: Uncheck it on the network adapter in order to disable IPv. In order to add the DWORD to the registry, choose Run and type Regedit. Then choose HKEY_LOCAL_MACHINESYSTEM > Current. Control > Set. Services > Tcpip. Parameters > Disabled. Components and set the value to 0x. FFFFFFFF. Start the Server Manager and start the installation of the AD DS role. For that from Server Manager, Click Add Roles. On the Add Roles wizard window, click Next. Choose the Active Directory Domain Services Role. You are prompted to install the . NET framework 3. 5. Choose Add Required Features and click Next. An introduction to Active Directory Domain Services appears with some points to note that you have to read. Then click Next. Next is the confirmation and summary page of the role installation. Click Install. When the installation role finishes. Click on Close. Complete these steps in order to install Active Directory. Choose Start > Run and type dcpromo. On the window that appears, uncheck Use advanced mode installation and click Next. Choose Create a new domain in a new forest. Set the FQDN of the forest root domain as sjclab. You can give any name here based on your domain name. Set the Forest functional level to Windows Server 2. Next. Set the Domain functional level to Windows Server 2. R2 and click Next. Choose additional options for this domain controller. Ensure that the DNS server is checked and click. Next. The A delegation for this DNS server cannot be created.. Do you want to continue? Click Yes. This particular setup assumes a brand- new forest and everything, so no action is required. Default Database / Log files / SYSVOL folder locations as C: \Windows\NTDS should be fine, when you create a smaller deployment with less loads. Otherwise you need to reconsider the locations. Click Next after you choose those locations. Enter a Directory Services Restore mode administrator password and click Next. On the Summary Window, click Next. The Installation continues to proceed. Click Finish when it is done. Then the system restarts. Complete these steps in order to create a new user: Choose Start > All Programs > Administrative Tools > | Active Directory Users and Computers. Create a new user object in the current container. Enter the New User details and password. Click Next. Click Finish and then the new user is created. Now right click on the newly created user and choose Properties. On the Window that appeared in the General tab, ensure that you add E1. Telephone number to AD Users. Complete these steps in order to accomplish the task. The first step is to configure the Reverse lookup zone. This has to be done before you add the DNS entries for Servers and Clients. Choose Start > Administrative Tools > DNS. Launch DNS Manager and navigate to the root domain, right- click on Reverse Lookup Zone and choose the option to create New Zone in order to launch the wizard. When the New Zone Wizard appears, click Next. On the Zone Type page, choose Primary Zone, and then click Next. On the Active Directory Zone Replication Scope page, choose replication To all DNS servers running on domain controllers in the forest, and then click Next. On the Reverse Lookup Zone Name page, in the Network ID field, type the start of the subnet range of your network, and then click Next. On the Dynamic Update page, choose Allow only secure dynamic updates and click Next. On the Reverse Lookup Zone Name page, choose IPv. Reverse Lookup Zone, and then click Next. On the Completing The New Zone Wizard page, click Finish. Now add DNS entries for Exchange, Lync servers and Lync clients. Forward and Reverse DNS)Launch DNS Manager and navigate to root domain under forward lookup zones. Right- click on domain and choose New Host (A or. AAAA) in order to add the DNS entry. On the New Host wizard page enter the Name, IP Address and Check Create associated pointer (PTR) record for reverse lookup entries and click Add Host. Note: The steps from 1. Lync Servers and Lync Clients with their respective name and IP Address. Complete these steps in order to accomplish the task. Log on to AD as a domain administrator. Choose Start > Administrative Tools > Server Manager. In the Roles Summary section, click Add Roles. On the Select Server Roles page, choose the Active Directory Certificate Services check box. Then click Next two times. On the Select Role Services page, choose the Certification Authority check box, and then click Next. On the Specify Setup Type page, click Enterprise, and then click Next. On the Specify CA Type page, click Root CA, and then click Next. On the Set Up Private Key and Configure Cryptography for CA pages, you can configure optional configuration settings, which includes cryptographic service providers. But, for basic testing purposes, click Next twice in order to accept the default values. In the Common name for this CA box, type the common name for this CA, as Active. Directory, and then click Next.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
November 2017
Categories |