Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

How to configure secure Web and SIP

link with Unigy V3.01

Prerequisite:
IPC Unigy Switch with Apps version 03.01.00.00.0174 or higher

Preparation:
1. Install latest released NTR 6.6.x core role
2. Install IPC Unigy integration V3.1.x on Core
3. Add satellite in Web GUI
4. Install a Satellite with IPC Unigy integration V3.1.x channel role including licensing
5. Install a CTI Server with IPC Unigy integration V3.1.x CTI Role with the number of links required
and Adobe flash player

Procedure:
1. Download attachment Certificate tooling.zip and Extract it on the
desktop on the system that has the CTI role installed.
2. Download IPC root certificate from IPC Unigy Switch.

a) On the CTI Server log in to the UMS (Unigy Management System)


(https://10.57.238.167/ums/UMSClient.html) with user acount ipctech and password a123456

b) Navigate to: Configuration -> Enterprice -> Security -> PKI -> Unigy CA Certificates and click on the
entry 1 in the view tab and click export button:
c) Save as: defaultCA.crt
d) Open Certificate Console.msc from the Certificate tooling files
e) Go to Console Root > Certificates > Trusted Root Certification Authorities

f) Import certificate
g)
h) Select defaultCA.crt
i)
j)
k) Certificate was imported successfully
3. Create Certificate Sign Request (CSR) and sign Certificate via UMS
a) On the CTI Server run the batch file make_request.bat from the Certificate tooling folder
b) Press Enter to use the default values untill you see the following example screen

c) Now a certificate sign request is generated in the Certificate tooling folder which we need to sign with
the IPC Root certificate via the UMS (Unigy Management System)
d) On the UMS Navigate to: Configuration -> Enterprice -> Security -> PKI -> Device Certificates and click
on the TAB 3rd party integration.
e) Click browse and navigate to the Certificate Tooling folder on the desktop and select the
file certificate_<IP of CTI Server>.pem and click open

f)
g) Click on button Generate signed certificate

h)
i) Click save as

j) change the filename in certificate_<IP Adress of CTI Server>.crt and change the save as type in: All
Files (*.*)
k) On the CTI Server run the batch file make_cert_from_response.bat from the Certificate tooling folder
and click Enter at CN.
l) Enter the file name of the signed certificate (certificate_<IP Adress of CTI Server>.crt)
m) Press Enter and give private key password (Cyb3rt3ch) press enter and confirm password again:

n) Press Enter

o) Now the signed (personal) certificate has a private key and a NiceCertificate_<IP Adress of CTI
Server>.pfx file is generated in the Certificate tooling folder on the desktop that now can be imported
in the certificate store of the CTI Server.
4. Import the certificate in the Certificate store on the CTI Server
a) Now import just created personal certificate to Console Root > Certificates > Personal > Certificates

b) Import
c)
d) Click "Browse"
e) To select your personal certificate enable .pfx file filter
f)
g) Enter password you've provided while creating personal certificate and enable the checkbox "Mark key
as exportable...."
h) Certificate will be placed in Personal store
i)
j) Import was successful

5. Bind the certificate to port 43443


a) On the CTI Server run the batch file bind_ipc_signed_cert.bat from the Certificate tooling folder.
b) Use default port 43443 and press Enter
c) At CN leave default and press Enter
d) Enter Certificate file name: Certificate_<IP Adress of CTI Server>.crt and press Enter

e)
6. Configure Secure Web and SIP link in NTR Web GUI
a) Open NTR Web GUI
b) Go to cti integration > links
c) Open SIP link settings and configure sip link: set IP port to 5061 and enable SSL checkbox:

d) Save changes
e) Open WEB link settings and configure web link: set IP port to 443 and enable SSL checkbox:

f) Save changes
g) Go to system configuration > channel group and create channels group:
h) Go back to cti integration tab > link groups and create link group:

i) Add both SIP and WEB links to the link group

j) Go to cti integration > links and check if both links are in Logged in state.

You might also like