Skip Navigation

Configure the Blast system

If you have not selected the 
Launch CiscoBlastSystemSetup Configuration
 check box on the last installation screen, navigate to the folder 
<DRIVE>:\Program Files (x86)\Syn-Apps\BlastSystem\Setup\Configuration
, right-click the 
CiscoBlastSystemConfig.exe
 file and run as administrator.
  1. On the User 
    Account Control
     pop-up screen, click 
    Yes
    .
  2. On the 
    Blast System Configuration
     screen, complete the following fields:
    Field
    Description
    Blast System Settings
    These Settings apply to the entire Blast system.
    IP
    Displays the default IP Address of the server on which the Blast System is installed. If this server has multiple IP addresses and if you want to use a different one, enter the IP address manually.
    Port
    Enter the port number as desired. The default port is 8008.
    Because IP Phone callbacks are directed to this port, the certificate chain must be uploaded to CUCM. For detailed information about uploading the certificates to CUCM, see Upload certificates to CUCM.
    License File
    Click 
    Browse
    , and then navigate to the 
    AtHoc
     SA-Announce Revolution license located in the working folder. The Blast Setup utility copies the file to 
    <DRIVE>:\Program Files (x86)\AtHoc\SAAnnouncesRevolution
    .
    To update the license file in the future, copy it over the existing file.
    SSL Settings
    Security– related settings
    .
    SSL Enabled
    Select the 
    SSL Enabled
     check box to secure all communication.
    SSL certificates are automatically created. If the Port specified in settings is already bound to an interface then configuration will fail.
    For more information about validating the SSL Key, see SSL private key validation.
    Private Key
    Enter a password that will be used with the private key of the SSL certificate chain. This field is displayed only when SSL Enabled is checked.
    User Supplied Certificates:
     Enter the private key that was used when generating the certificates.
    System Generated Certificates
    : Enter a password to use with the private key of the SSL certificates.
    If you are configuring SSL for the first time, you will need the private key or password (whichever you enter here) later when prompted to validate the certificates. If you are reconfiguring Blast, the SSL Key field must be filled with any value to continue with the configuration.
     
    Trust Phones
    Select the 
    Trust Phones
     check box.
    Trust Phones employs a trust all certificates method when checked. This trust only applies to the initial POST leg from the Blast Notifier to the phones in the notification. Select the check box if phone certificates are not installed on the Blast application server.
    CA Certificate
    If you are using self-signed certificates generated by the Blast System, leave this field blank.
    If you are using certificates from an authorized certificate of authority, browse and select the certificate.
    App Certificate
    If you are using self-signed certificates generated by the Blast System, leave this field blank.
    If you are using certificates from an authorized certificate of authority, browse and select the certificate.
    CUCM Settings
    Settings that apply to the notifier for CUCM access.
    CUCM IP Address
    Enter the 
    CUCM IP Address
    . IP Address of the CUCM server that the notifier must connect to, to discover the devices and other CUCM objects it needs to be aware of.
    CUCM User
    Enter the username you created in the Create a UCM User and UCM Roles section of this guide.
    The user can be a CUCM user or a CUCM application user with AXL access permissions, used to gather CUCM data for the IP phone devices. User account needs proper roles for this access.
    This setting is encrypted in the registry and cannot be changed manually. Run the Blast System Configuration program to change it.
    CUCM Password
    Enter the password you created for the new user.
    This setting is encrypted in the registry and cannot be changed manually. Run the Blast System Configuration program to change it.
    CUCM Version
    Change the version if required. Only the first two version identifiers are used. For example, 10.5, though others can be entered.
  3. When you finish entering the values in each of the fields, click 
    Configuration
     in the top right corner of the screen.
    A pop-up notification screen with instructions to complete additional configuration steps is displayed.
    The first part of the notification refers to the CUCM authentication process, which will take place after testing of the authentication service. Complete the CUCM Authentication configuration regardless of whether SSL is enabled.
    The second part of the notification refers to the certificates that you will upload later after they are generated. At the end the installation process, you will delete the certificates from the installation folder. For more information about the deletion process, see NDS configuration for Cisco IP phones.
    Cisco
     IP phones cannot receive Blast commands until the CUCM enterprise parameters for the authentication URL (secure and non-secure) have been changed to the authentication URL provided by the notice. Restart the phones to acquire the new setting.
    Cisco
     IP phones cannot receive Blast commands until the CUCM enterprise parameters for the authentication URL (secure and non-secure) have been changed to the authentication URL provided by the notice. Restart the Phones to acquire the new setting.
  4. In the 
    Notice
     window, click 
    OK
    . The system configuration begins. The individual module installers run one by one and the configuration settings are applied across the module settings files to create a contiguous integration.
    CUCM settings are not validated at this stage. The Blast Notifier 
    log.txt
     file must be checked to determine if there is any issue with the current settings.
    When the installation process reaches the SSL certificate creation stage, three pop-up screens will appear in succession.
  5. On the 
    Create Private Key Password
     screen, in the 
    Password
     and 
    Confirm Password
     fields, enter the password that you created for the private key.
  6. Click 
    OK
    .
  7. On the 
    Enter Private Key Password
     screen for the 
    Subject
     key, enter the password that you created for the private key.
  8. Click 
    OK
    .
  9. On the 
    Enter Private Key Password
     screen for the 
    Issuer Signature
     key, enter the password that you created for the private key.
  10. Click 
    OK
    .
  11. On the 
    Configuration Completed Successfully
    , click 
    OK
    .