Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service, Release 11.5(1)SU5

Similar documents
Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service,

Compatibility Matrix for Cisco Unified Communications Manager and IM & Presence Service, Release 10.x

Compatibility Matrix for Cisco Unified Communications Manager and IM & Presence Service, Release 11.x

SAML-Based SSO Solution

SAML-Based SSO Solution

Interdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2

Configuration and Administration for the IM and Presence Service, Release 11.5(1)SU5

Backup the System. Backup Overview. Backup Prerequisites

Interdomain Federation for the IM and Presence Service, Release 10.x

Disaster Recovery System Overview

Security Certificate Configuration for XMPP Federation

Configuration and Administration of IM and Presence Service on Cisco Unified Communications Manager, Release 9.1(1)

Interdomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 10.5(1)

Security and Certificates

Interdomain Federation with Office 365

Configure Centralized Deployment

Read Me for Cisco Unified IM and Presence, Release 11.5(1) SU1

Mobile and Remote Access Through Cisco Expressway

Cisco Unified Communications XMPP Federation

Cisco Unified Presence 8.0

Partitioned Intradomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2

TLS Setup. TLS Overview. TLS Prerequisites

Configuration and Administration of IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)

Interdomain Federation with Skype for Business

Unified Communications Mobile and Remote Access via Cisco Expressway

Unified Communications Mobile and Remote Access via Cisco VCS

Interdomain Federation to Microsoft Lync

IM and Presence Service Configuration for XMPP Federation

SAML SSO Deployment Guide for Cisco Unified Communications Applications, Release 12.0(1)

Disaster Recovery System

Understanding Upgrades and Migrations

Federating Cisco Jabber

Mobile and Remote Access Through Cisco Video Communication Server

Overview of this Integration

Unified Communication Cluster Setup with CA Signed Multi Server Subject Alternate Name Configuration Example

Skype for Business Configuration for Partitioned Intradomain Federation

Mobile and Remote Access Through Cisco Expressway

Push Notifications (On-Premises Deployments)

How to Configure SSL Interception in the Firewall

Configure Service Parameters

SAML SSO Okta Identity Provider 2

Set Up Certificate Validation

User Management. Jabber IDs

Mobile and Remote Access Through Cisco Expressway

Read Me for Cisco Unified IM and Presence, Release 11.5(1) SU5a

Mobile and Remote Access Through Cisco Video Communication Server

Quick Start Guide for SAML SSO Access

Disaster Recovery System Administration Guide for Cisco Unified Communications Manager and IM & Presence Service, Release 10.0(1)

Requirements and Limitations

SAML-Based SSO Configuration

Mobile and Remote Access Through Cisco Video Communication Server

Release Notes for Cisco Prime License Manager, Release 11.5(1)

Requirements. Software Requirements

Mobile and Remote Access Through Cisco Expressway

LDAP Directory Integration

Configuration of Microsoft Live Communications Server for Partitioned Intradomain Federation

LDAP Directory Integration

Manage SAML Single Sign-On

Quick Start Guide for SAML SSO Access

Mobile and Remote Access Through Cisco Expressway

Contents. Configuring SSH 1

Cisco Jabber for Mac 10.6 Release Notes. Release Notes 2 Release Information 2 Requirements 4 Limitations and restrictions 7 Caveats 8

Cisco Jabber for Android 10.5 Quick Start Guide

Mobile and Remote Access Through Cisco Expressway

Configure Mobile and Remote Access

About FIPS, NGE, and AnyConnect

Intercluster Peer Configuration

Encrypted Phone Configuration File Setup

Cisco Jabber for Mac 9.6 Installation and Configuration Guide

CCNA Voice. Unified Communications Overview.

User Management. Jabber IDs

Port Usage Information for the IM and Presence Service

Unified Communications Mobile and Remote Access via Cisco Expressway

Cisco Jabber 10.6 Deployment and Installation Guide

Configure Push Notifications for Cisco Jabber on iphone and ipad

Replace Single Server or Cluster

Mobile and Remote Access Through Cisco Expressway

Setting Up the Server

IM and Presence Service Network Setup

IM and Presence Service Configuration for SIP Federation

Expressway for Mobile and Remote Access Deployments, page 1 Cisco AnyConnect Deployments, page 9 Survivable Remote Site Telephony, page 17

Deploying OAuth with Cisco Collaboration Solution Release 12.0

Manage Certificates. Certificates Overview

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode

Read Me for Cisco Unified IM and Presence, Release 11.5(1) SU4

Community Manager Guide: Jive Jabber Add-on

Polycom RealPresence Access Director System

Cisco Emergency Responder Version 11.5(4) Release Notes

Unity Connection Version 10.5 SAML SSO Configuration Example

Post-Change Task List

Best Practices: Server Security Hardening

Cisco Jabber for iphone and ipad 9.6 Installation and Configuration Guide

Polycom RealPresence Access Director System

Port Usage Information for the IM and Presence Service

Cloud Secure Integration with ADFS. Deployment Guide

You can use the following directory servers with Cisco Jabber:

Cisco Interoperability with Microsoft Part 1 Collaboration

Junos Pulse Secure Access Service Supported Platforms Guide

CLI users are not listed on the Cisco Prime Collaboration User Management page.

System Administration

Transcription:

Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service, Release 11.5(1)SU5 Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service 2 Revision History 2 Upgrade Paths 2 Cisco Unified Communications Manager Compatibility Information 6 IM and Presence Service Compatibility Information 13

Revised: September 19, 2018 Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service Revision History Date Sept. 19, 2018 Revision Added LDAP directory support for the IM and Presence Service Upgrade Paths This section contains upgrade paths for this release. This release of Cisco Unified Communications Manager and the IM and Presence Service supports virtualized deployments only. However, depending on your current setup, you may be upgrading from a Cisco Media Convergence Server deployment or from a virtualized deployment. The upgrade paths are slightly different for each type of upgrade. Deployments on Cisco Media Convergence Servers Hardware You cannot install or run Cisco Unified Communications Manager and the IM and Presence Service directly on server hardware; you must run these applications on virtual machines. The tables below list the supported migration paths for deployments that are currently running on Cisco 7800 Series Media Convergence Server (MCS 7800) hardware. All of the supported migration paths listed below are physical-to-virtual (P2V) migrations. Note The tables below list the upgrade paths supported for MCS 7800 Series servers, with the following exceptions: MCS 7816-C1 for Business Edition 3000 (BE3000) MCS 7828 for Business Edition 5000 (BE5000) PCD migrations are not supported for BE3000 and BE5000 deployments. We recommend a fresh installation for upgrades from these products. Table 1: Cisco Unified Communications Manager Releases Installed on MCS 7800 Series Hardware From 6.1(5) 7.1(3) and 7.1(5) 8.x 9.x To Supported Method 2

Table 2: Cisco Unified Presence and IM and Presence Releases Installed on MCS 7800 Series Hardware From CUP 8.5(4) CUP 8.6(3), 8.6(4), and 8.6(5) IM and Presence 9.x To Supported Method Deployments on Virtual Machines The tables below list the supported upgrade and migration paths for Cisco Unified Communications Manager and IM and Presence Service deployments that are currently running on virtual machines. All of the supported upgrade and migration paths listed below are virtual-to-virtual (V2V). Service Updates (SU) within each path are supported, unless otherwise indicated. Table 3: Cisco Unified Communications Manager Releases Installed on Virtual Machines From 8.6(x) 9.0(x) 9.1(x) 10.0(x) 10.5(x) 11.0(1) To 11.5(y) Supported Method Cisco Unified OS Admin (Direct Refresh) PCD Upgrade (Direct Refresh) PCD Upgrade (Direct Refresh) PCD Upgrade (Direct Refresh) Cisco Unified OS Admin (Direct Refresh) PCD Upgrade (Direct Standard) PCD Upgrade (Direct Standard) Cisco Unified OS Admin (Direct Standard) Cisco Unified OS Admin (Direct Standard) PCD Upgrade (Direct Standard) Cisco Unified OS Admin (Direct Standard) PCD Upgrade (Direct Standard) 3

Table 4: Cisco Unified Presence and IM and Presence Releases Installed on Virtual Machines From CUP 8.5(4) CUP 8.6(3), 8.6(4), and 8.6(5) CUP 8.6(x) IM and Presence 9.0(x) IM and Presence 9.1(x) IM and Presence 10.0(x) IM and Presence 10.5(x) IM and Presence 11.0(1) IM and Presence To 11.5(y) Supported Method PCD Upgrade (Direct Refresh) Cisco Unified OS Admin (Direct Refresh) PCD Upgrade (Direct Refresh) PCD Upgrade (Direct Refresh) Cisco Unified OS Admin (Direct Refresh) PCD Upgrade (Direct Standard) PCD Upgrade (Direct Standard) PCD Upgrade (Direct Standard) Cisco Unified OS Admin (Direct Standard) Cisco Unified OS Admin (Direct Standard) PCD Upgrade (Direct Standard) Cisco Unified OS Admin (Direct Standard) PCD Upgrade (Direct Standard) COP Files Required for Upgrades to Release 11.5 The tables below lists the upgrade paths that require COP files. You must install COP files on each node before you begin an upgrade using the Cisco Unified OS Admin interface, or before you begin an upgrade or migration using the Prime Collaboration Deployment (PCD) tool. If you are using PCD, you can perform a bulk installation of the COP files before you begin the upgrade. 4

Table 5: Required COP Files for Upgrades and Migrations to Cisco Unified Communications Manager Release From 8.6(x) To Upgrade Type Refresh upgrade. Required COP files: ciscocm.version3-keys.cop.sgn Optional COP files: ciscocm.vmware-disk-size-reallocation-<latest_version>.cop.sgn) ciscocm.free_common_space_v<latest_version>.cop.sgn 9.1(x) Refresh upgrade. Required COP files: ciscocm.version3-keys.cop.sgn Optional COP files: ciscocm.vmware-disk-size-reallocation-<latest_version>.cop.sgn) ciscocm.free_common_space_v<latest_version>.cop.sgn 10.5(x) 11.0(x) 11.5((y) Standard upgrade; no COP file required. Standard upgrade; no COP file required. Standard upgrade; no COP file required. Table 6: Required COP Files for Refresh Upgrades from Cisco Unified Presence Releases From Cisco Unified Presence Release 8.5(4) through 8.6(1) To IM and Presence Release Upgrade Type Refresh upgrade. Requires the following COP files: cisco.com.cup.refresh_upgrade_v<latest_version>.cop ciscocm.version3-keys.cop.sgn Table 7: Required COP Files for Refresh Upgrades from IM and Presence Service Releases From IM and Presence Release 9.1(x) 10.5(x) 11.0(x) To IM and Presence Release 11.5(y) Upgrade Type Refresh upgrade. Requires the following COP file: ciscocm.version3-keys.cop.sgn Standard upgrade; no COP file required. Standard upgrade; no COP file required. Standard upgrade; no COP file required. 5

Cisco Unified Communications Manager Compatibility Information Cisco Collaboration Applications This release of Cisco Unified Communications Manager and the IM and Presence Service are compatible wth the Cisco Collaboration Systems release 11.5. For a list of Cisco Collaboration applications that are supported with release 11.5, see the Cisco Collaboration Systems Release Compatibility Matrix at: https://www-author3.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/uc_system/unified/communications/system/compatibility/ CSR-Compatibility-Matrix-InteractiveHTML.html Virtualization Requirements This release of Cisco Unified Communications Manager and the IM and Presence Service supports virtualized deployments only. Deployments on Cisco Media Convergence Servers are not supported. Virtualization Requirements for Cisco Unified Communications Manager For information about Cisco Unified Communications Manager virtualization requirements, go to https://www.cisco.com/c/dam/en/ us/td/docs/voice_ip_comm/uc_system/virtualization/virtualization-cisco-unified-communications-manager.html. Virtualization Requirements for the IM and Presence Service For information about the IM and Presence Service virtualization requirements, go to https://www.cisco.com/c/dam/en/us/td/docs/ voice_ip_comm/uc_system/virtualization/virtualization-cisco-ucm-im-presence.html Virtualization Requirements for Cisco Business Edition Deplloyments For information on the virtualization requirements for Cisco Unified Communications Manager in a collaboration solution deployment such as Cisco Business Edition, go to https://www.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/uc_system/virtualization/ collaboration-virtualization-hardware.html Supported LDAP Directories The following LDAP directories are supported: Microsoft Active Directory 2003 R1/R2 (32-bit) Microsoft Active Directory 2008 R1 (32-bit) / R2 (64-bit) Microsoft Active Directory Application Mode 2003 R1/R2 (32-bit) Microsoft Active Directory 2012 Microsoft Active Directory 2016 Microsoft Lightweight Directory Services 2008 R1(32-bit) / R2(64-bit) Microsoft Lightweight Directory Services 2012 Sun ONE Directory Server 7.0 Open LDAP 2.3.39 6

Open LDAP 2.4 Oracle Directory Server Enterprise Edition 11gR1 Other LDAPv3 Compliant Directories Supported Web Browsers The following web browsers are supported: Firefox, latest browser version only, with Windows 10 (64-bit) Chrome, latest browser version only, with Windows 10 (64-bit) IE 11 with Windows 10 (64-bit) IE 11 with Windows 7 (64-bit) IE 11 with Windows 8.1 (64-bit) Edge browser with Windows 10 (32-bit/64-bit) Safari, latest browser version only, with MacOS (10.x) SFTP Server Support For internal testing, Cisco uses the SFTP Server on Cisco Prime Collaboration Deployment (PCD) which is provided by Cisco, and which is supported by Cisco TAC. Refer to the following table for a summary of the SFTP server options: Table 8: SFTP Server Support SFTP Server Cisco Prime Collaboration Deployment SFTP Server from a Technology Partner Support Description This server is the only SFTP server that is provided and tested by Cisco, and which is fully supported by Cisco TAC. Version compatibility depends on your version of Unified Communications Manager and Cisco Prime Collaboration Deployment. See the Cisco Prime Collaboration Deployment Administration Guide before you upgrade its version (SFTP) or Unified Communications Manager to ensure that the versions are compatible. These servers are third party provided and third party tested. Version compatibility depends on the third party test. See the Technology Partner page if you upgrade their SFTP product and/or upgrade Unified Communications Manager for which versions are compatible: https://marketplace.cisco.com 7

SFTP Server SFTP Server from another Third Party Support Description These servers are third party provided, have limited Cisco testing, and are not officially supported by Cisco TAC. Version compatibility is on a best effort basis to establish compatible SFTP versions and Unified Communications Manager versions. Note These products have not been tested by Cisco and we cannot guarantee functionality. Cisco TAC does not support these products. For a fully tested and supported SFTP solution, use Cisco Prime Collaboration Deployment or a Technology Partner. SAML SSO Support Although Cisco Collaboration infrastructure may prove to be compatible with other IdPs claiming SAML 2.0 compliance, only the following IdPs have been tested with Cisco Collaboration solutions: OpenAM 10.0.1 Microsoft Active Directory Federation Services 2.0 (AD FS 2.0) PingFederate 6.10.0.4 F5 BIG-IP 11.6.0 API Development Cisco Unified Communications Manager and the IM and Presence Service support OpenJDK for application development. This release uses OpenJDK version 1.7.0.181. Secure Connections TLS 1.2 Support Cisco Unified Communications Manager and the IM and Presence Service support the use of TLS 1.2. For detailed information on TLS1.2 support, refer to the TLS 1.2 Compatibility Matrix for Cisco Collaboration Products at: https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/uc_system/unified/communications/system/compatibility/tls/ TLS1-2-Compatibility-Matrix.html SSL Connections For Secure Sockets Layer (SSL) connections, this release supports either OpenSSL or Cisco SSL. You can use either of the following versions: OpenSSL 1.0.1e 48.el6_8.4 CiscoSSL 1_0_2o_6_1_410 SSH Clients This release supports OpenSSH client version 5.3p1 123.el6_9 for SSH connections. 8

Supported Ciphers for Cisco Unified Communications Manager The following ciphers are supported by Cisco Unified Communications Manager: Table 9: Cisco Unified Communications Manager Cipher Support for TLS Ciphers Application / Process Protocol Port Supported Ciphers Cisco CallManager 2443 AES256-GCM-SHA384: AES256-SHA256: AES128-GCM-SHA256: AES128-SHA256:AES128-SHA: CAMELLIA128-SHA DRS 4040 DHE-RSA-CAMELLIA256-SHA: DHE-RSA-CAMELLIA128-SHA: AES128-SHA:CAMELLIA128-SHA Cisco Tomcat 8443 / 443 DHE-RSA-AES256-GCM-SHA384: DHE-RSA-AES256-SHA256: DHE-RSA-AES256-SHA: DHE-RSA-CAMELLIA256-SHA: DHE-RSA-AES128-GCM-SHA256: DHE-RSA-AES128-SHA256: DHE-RSA-AES128-SHA: DHE-RSA-CAMELLIA128-SHA: ECDHE-RSA-DES-CBC3-SHA: EDH-RSA-DES-CBC3-SHA: DES-CBC3-SHA ECDHE-ECDSA-AES256-GCM-SHA384: ECDHE-ECDSA-AES256-SHA384: ECDHE-ECDSA-AES256-SHA: ECDHE-ECDSA-AES128-GCM-SHA256: ECDHE-ECDSA-AES128-SHA256: ECDHE-ECDSA-AES128-SHA: ECDHE-ECDSA-DES-CBC3-SHA 9

Application / Process Protocol Port Supported Ciphers Cisco CallManager 5061 ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-SHA384: ECDHE-RSA-AES256-SHA ECDHE-ECDSA-AES256-SHA: AES256-SHA:CAMELLIA256-SHA ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA256: ECDHE-RSA-AES128-SHA ECDHE-ECDSA-AES128-SHA: ECDHE-ECDSA-DES-CBC3-SHA Cisco CTL Provider 2444 Cisco Certificate Authority Proxy Function 3804 CTIManager 2749 AES128-SHA:CAMELLIA128-SHA Cisco Trust Verification Service 2445 AES128-SHA:CAMELLIA128-SHA Cisco Intercluster Lookup Service 7501 AES256-GCM-SHA384: AES256-SHA256:AES256-SHA: CAMELLIA256-SHA: 10

Application / Process Protocol Port Supported Ciphers Secure Configuration download (HAPROXY) 6971, 6972 DHE-RSA-CAMELLIA256-SHA: DHE-RSA-CAMELLIA128-SHA: Authenticated Contact Search 9443 DHE-RSA-CAMELLIA256-SHA: DHE-RSA-CAMELLIA128-SHA: Supported Ciphers for SSH The following ciphers are supported by SSH: Table 10: Cipher Support for SSH Ciphers Service SSH Server Ciphers/Algorithms Ciphers: aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com MAC algorithms: hmac-sha2-512 hmac-sha2-256 hmac-sha1 Kex algorithms: ecdh-sha2-nistp521 ecdh-sha2-nistp384 ecdh-sha2-nistp256 diffie-hellman-group14-sha1 diffie-hellman-group1-sha1 diffie-hellman-group-exchange-sha256 diffie-hellman-group-exchange-sha1 11

Service SSH Client Ciphers/Algorithms Ciphers: aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com MAC algorithms: hmac-sha2-512 hmac-sha2-256 hmac-sha1 Kex algorithms: ecdh-sha2-nistp521 ecdh-sha2-nistp384 ecdh-sha2-nistp256 diffie-hellman-group14-sha1 diffie-hellman-group1-sha1 diffie-hellman-group-exchange-sha256 diffie-hellman-group-exchange-sha1 DRS Client Ciphers: aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com MAC algorithms: hmac-sha2-512 hmac-sha2-256 hmac-sha1 Kex algorithms: ecdh-sha2-nistp521 ecdh-sha2-nistp384 ecdh-sha2-nistp256 diffie-hellman-group14-sha1 diffie-hellman-group1-sha1 diffie-hellman-group-exchange-sha256 diffie-hellman-group-exchange-sha1 12

Service SFTP client Ciphers/Algorithms Ciphers: aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com MAC algorithms: hmac-sha2-512 hmac-sha2-256 hmac-sha1 Kex algorithms: ecdh-sha2-nistp521 ecdh-sha2-nistp384 ecdh-sha2-nistp256 diffie-hellman-group14-sha1 diffie-hellman-group1-sha1 diffie-hellman-group-exchange-sha256 diffie-hellman-group-exchange-sha1 IM and Presence Service Compatibility Information Platform Compatibility The IM and Presence Service shares a platform with Cisco Unified Communications Manager. Many of the compatibility topics for Cisco Unified Communications Manager double as support topics for the IM and Presence Service. You can refer to the Cisco Unified Communications Manager compatibility chapter for information on the following items: Secure Connections Operating System Support Virtualization Requirements Supported Web Browsers Supported LDAP Directories External Database Support Many IM and Presence Service features such as Persistent Chat, High Availability for Persistent Chat, Message Archiver, and Managed File Transfer require that you deploy an external database. For information on database support, see the Database Setup Guide for the IM and Presence Service at https://www.cisco.com/c/en/us/support/unified-communications/ unified-communications-manager-callmanager/products-installation-and-configuration-guides-list.html. LDAP Directory Servers Supported IM and Presence Service integrates with these LDAP directory servers: Microsoft Active Directory 2000, 2003, 2008, 2012, and 2016. 13

Netscape Directory Server Sun ONE Directory Server 5.2 OpenLDAP Federation Support SIP Federation Support The following table lists supported SIP Federation integrations Table 11: Supported SIP Federations Third-Party System Single Enterprise Network* (Intradomain or Interdomain Federation) Business to Business (Interdomain Federation) Direct Federation via Expressway via ASA via Expressway Lync 2010 Y Y (SIP Broker) Y Not suported Lync 2013 Y Y (SIP Broker) Y Y (Traffic Classification) Skype for Business 2015 Y Not supported Y Y (Traffic Classification) Office 365 Not applicable Not applicable Not supported Y (Traffic Classification) * The Single Enterprise Network can be partitioned intradomain federation or interdomain federation as the support values are the same for each. Business to Business integrations are always interdomain federation. Supported XMPP Federations This release of IM and Presence Service supports XMPP Federation with the following systems: IBM Sametime WebEx Messenger IM and Presence Service Release 9.x and up any other XMPP-compliant system Intercluster Peering Support This release of the IM and Presence Service supports intercluster peering with the following IM and Presence Service releases: Release 9.x Release 10.x Release 11.x Release 12.x 14

Calendar Integration with Microsoft Outlook The IM and Presence Service supports Microsoft Outlook Calendar Integration with either an on-premise Exchange server or a hosted Office 365 server. Refer to the table below for support informaiton: Table 12: Compatibility Matrix Component Windows Server Cisco Unified Communications Manager IM and Presence Service Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft Exchange Server 2013 Microsoft Exchange Server 2016 Microsoft Office 365 Active Directory A Third-Party Certificate OR Certificate Server Install Compatible Version Service Packs for Windows Server 2003 (SP2) Service Packs for Windows Server 2008 (SP2) Service Packs for Windows Server 2012 (Standard) For Standard Deployments, the Cisco Unified Communications Manager and IM and Presence Service release versions must match. For Standard Deployments, the Cisco Unified Communications Manager and IM and Presence Service release versions must match. Service Packs for Microsoft Exchange 2007 (SP1). Service Packs for Microsoft Exchange 2010 (SP1). Service Packs for Microsoft Exchange 2013 (SP1). Microsoft Exchange 2016 Refer to your Microsoft documentation for details on deploying a hosted Office 365 server. Note Active Directory 2003 with Windows Server 2003 (SP2) Active Directory 2008 with Windows Server 2008 (SP2) Active Directory 2012 with Windows Server 2012 User names configured in Active Directory must be identical to those names defined in Cisco Unified Communications Manager. One or the other of these is required to generate the certificates. Note Microsoft Exchange integration with IM and Presence Service supports certificates using RSA 1024 or 2048 bit keys and SHA1 and SHA256 signature algorithms. Supported Interfaces The following interfaces are supported with this release of IM and Presence Service: SIP/SIMPLE REST SOAP 15

XMPP Cisco AJAX XMPP Library (CAXL) Supported Ciphers for the IM and Presence Service The following ciphers are supported by the IM and Presence Service. Table 13: Cisco Unified Communications Manager IM & Presence Cipher Support for TLS Ciphers Application / Process Protocol Port Supported Ciphers Cisco SIP Proxy 8083 ECDHE-ECDSA-AES256-GCM-SHA384: ECDHE-ECDSA-AES256-SHA384: ECDHE-ECDSA-AES256-SHA: ECDHE-ECDSA-AES128-GCM-SHA256: ECDHE-ECDSA-AES128-SHA256: ECDHE-ECDSA-AES128-SHA: ECDHE-RSA-DES-CBC3-SHA: ECDHE-ECDSA-DES-CBC3-SHA: DES-CBC3-SHA Cisco SIP Proxy 5061 ECDHE-ECDSA-AES256-GCM-SHA384: ECDHE-ECDSA-AES256-SHA384: ECDHE-ECDSA-AES256-SHA: ECDHE-ECDSA-AES128-GCM-SHA256: ECDHE-ECDSA-AES128-SHA256: ECDHE-ECDSA-AES128-SHA: ECDHE-RSA-DES-CBC3-SHA: ECDHE-ECDSA-DES-CBC3-SHA: DES-CBC3-SHA 16

Application / Process Protocol Port Supported Ciphers Cisco XCP XMPP Federation Connection Manager TCP /TLS 5269 ECDHE-ECDSA-AES256-GCM-SHA384: ECDHE-ECDSA-AES256-SHA384: ECDHE-ECDSA-AES256-SHA: ECDHE-ECDSA-AES128-GCM-SHA256: ECDHE-ECDSA-AES128-SHA256: ECDHE-ECDSA-AES128-SHA: ECDHE-RSA-DES-CBC3-SHA: ECDHE-ECDSA-DES-CBC3-SHA: DES-CBC3-SHA Cisco SIP Proxy TCP /TLS 5061 ECDHE-ECDSA-AES256-GCM-SHA384: ECDHE-ECDSA-AES256-SHA384: ECDHE-ECDSA-AES256-SHA: ECDHE-ECDSA-AES128-GCM-SHA256: ECDHE-ECDSA-AES128-SHA256: ECDHE-ECDSA-AES128-SHA: AES128-GCM-SHA256: AES128-SHA256:AES128-SHA: CAMELLIA128-SHA: ECDHE-RSA-DES-CBC3-SHA: ECDHE-ECDSA-DES-CBC3-SHA: DES-CBC3-SHA 17

Application / Process Protocol Port Supported Ciphers Cisco SIP Proxy 5062 ECDHE-ECDSA-AES256-GCM-SHA384: ECDHE-ECDSA-AES256-SHA384: ECDHE-ECDSA-AES256-SHA: AES256-GCM-SHA384: AES256-SHA256:AES256-SHA: CAMELLIA256-SHA: ECDHE-ECDSA-AES128-GCM-SHA256: ECDHE-ECDSA-AES128-SHA256: ECDHE-ECDSA-AES128-SHA: ECDHE-RSA-DES-CBC3-SHA: ECDHE-ECDSA-DES-CBC3-SHA: DES-CBC3-SHA Cisco XCP Client Connection Manager 5222 ECDHE-ECDSA-AES256-GCM-SHA384: ECDHE-ECDSA-AES256-SHA384: ECDHE-ECDSA-AES256-SHA: ECDHE-ECDSA-AES128-GCM-SHA256: ECDHE-ECDSA-AES128-SHA256: ECDHE-ECDSA-AES128-SHA: ECDHE-RSA-DES-CBC3-SHA: ECDHE-ECDSA-DES-CBC3-SHA: DES-CBC3-SHA 18

Application / Process Protocol Port Supported Ciphers Cisco Tomcat 8443, 443 DHE-RSA-AES256-GCM-SHA384: DHE-RSA-AES256-SHA256: DHE-RSA-AES256-SHA: DHE-RSA-CAMELLIA256-SHA: DHE-RSA-AES128-GCM-SHA256: DHE-RSA-AES128-SHA256: DHE-RSA-AES128-SHA: DHE-RSA-CAMELLIA128-SHA: AES128-GCM-SHA256: AES128-SHA256:AES128-SHA: CAMELLIA128-SHA: ECDHE-RSA-DES-CBC3-SHA: EDH-RSA-DES-CBC3-SHA: DES-CBC3-SHA ECDHE-ECDSA-AES256-GCM-SHA384: ECDHE-ECDSA-AES256-SHA384: ECDHE-ECDSA-AES256-SHA: ECDHE-ECDSA-AES128-GCM-SHA256: ECDHE-ECDSA-AES128-SHA256: ECDHE-ECDSA-AES128-SHA: ECDHE-ECDSA-DES-CBC3-SHA Remote Call Control with Microsoft Lync Cisco Unified Communications Manager and the IM and Presence Service support Remote Call Control with a Microsoft Lync server. For details, including support info, see Remote Call Control with Microsoft Lync Server for the IM and Presence Service at https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/im_presence/lync_integration/11_5_1/cup0_b_ lync-integration-guide-115.html 19

2018 Cisco Systems, Inc. All rights reserved.

Americas Headquarters Cisco Systems, Inc. San Jose, CA 95134-1706 USA Asia Pacific Headquarters CiscoSystems(USA)Pte.Ltd. Singapore Europe Headquarters CiscoSystemsInternationalBV Amsterdam,TheNetherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.