Cisco Cisco Customer Voice Portal Downloads

Page of 561
Where the password is your configured password.
Note: Important! Enabling these settings will not allow regular telnet anymore and will only
allow SSH. If you want telnet and SSH available, then enter 
transport input all
 or
transport input telnet
 for telnet-only access.
HTTPS Support for Unified CVP
Unified CVP can be configured to use HTTPS on the VXML Server and on the IVR leg of the
Call Server. Only signed server certificates can be applied to the IOS gateway; self-signed
certificates are not accepted. Unified CVP generates self-signed certificates for Tomcat
applications, which must be signed by a Certificate Authority prior to use. Tomcat VXML
Server users and Call Server users must follow these steps to have the certificate signed.
Note: Refer to the 12.4(15)T IOS documentation for instructions on how to apply the certificates
to the VXML gateway.
Using Tomcat to Present CA-signed Certificates to Inbound HTTPS Clients
Due to the large processing overhead of HTTPS, the Tomcat application server can only achieve
up to 100 simultaneous connections dependent on the configuration (see the Cisco Unified
Customer Voice Portal (CVP) Release 4.x Solution Reference Network Design (SRND)
 document
for further details). For better performance from the VXML Server with HTTPS, it is
recommended that WebSphere be used as the application server.
VXML Server with WebSphere in a Standalone model (Reporting and Datafeed disabled) can
support up to 275 calls.
VXML Server with WebSphere in a Standalone model (Reporting and Datafeed enabled) can
support up to 200 calls.
The Comprehensive call flow model using Call Server and VXML Server with Tomcat can
support up to 100 calls.
For higher performance in a Comprehensive call flow model, it is recommended that VXML
Server with WebSphere be used in conjunction with Call Server. Up to 250 calls can be run in
the above combination when most of the VXML processing is being handled by the VXML
Server running with WebSphere.
The certificate and private key used for HTTPS are: Self-signed certificate:
%CVP_HOME%\conf\security\xxxx.crt
Private key for self-signed certificate: %CVP_HOME%\conf\security\xxxx.key
where xxxx represents the key and the certificate files. Call Server key and certificate files will
be named callserver.key and callserver.crt. VXML Server key and certificate files will be named
vxml.key and vxml.crt.
Configuration and Administration Guide for Cisco Unified Customer Voice Portal Release 4.1(1)
253
Chapter 6: Configuring and Modifying Unified CVP Security
HTTPS Support for Unified CVP