天天看点

Your session was ended… Error code:0-0-18100-2-0

Joachim Farla

The last couple of days I was working at a customer side to deploy OCS R2 EE Consolidated Topology, CWA R2 server and OCS R2 Edge. Starting of with OCS R2 EE without any problems. The OCS R2 Documentation is btw very nice to read and makes your OCS R2 deployment much more easier than ever before.

Issue:

When setting up the CWA R2 server and installing the bits for CWA R2 and after that requesting my certificate with the following paramaters:

<b>LcsCmd.exe /Cert /Action:Request /sn:im.contoso.com /san: im.contoso.com,download.im.contoso.com,as.im.contoso.com /ca:ca-server.contoso.com /OU:OCSServers /org:Contoso /country:US /city:Redmond</b>

<b>/state:WA /friendlyName:CWA_Certificate /exportable:TRUE</b>

the webuser was still unable to connect to the pool (pool01.contoso.com). Error message:

Error code:0-0-18100-2-0

So I verified:

Can the CWA R2 server connect to the OCS R2 EE pool server? Start: cmd, nslookup, set type=srv, _sipinternaltls._tcp.contoso.com

Can I telnet to port 5061 on the pool server. telnet pool01.contoso.com 5061 (blank page returned)

Does it make sense when I change the default port 5061 back to 5060?

Does it make sense to enabling Server to Server compression on the Pool/Front End properties on the Compression tab?

Does it make sense to run the Logging Tool on the CWA R2 server?

Does the CWA R2 and OCS R2 server both share the correct Root Certificate Chain?

The last two options will be the best choice for investigating to resolve this issue. After some drill down’s in the CWA R2 Diagnostic Logging I saw some error saying:

UCWEB Failure: Code=OcsFailureResponse, SubCode=OcsOperationTimeout, Reason=  Microsoft.Rtc.Internal.UCWeb.Utilities.UCWException: This operation has timed out. ---&gt; Microsoft.Rt  c.Signaling.OperationTimeoutException: This operation has timed out.     at Microsoft.Rtc.Signaling.SipAsyncResult`1.ThrowIfFailed()     at Microsoft.Rtc.Signaling.Helper.EndAsyncOperation[T](Object owner, IAsyncResult result)     at Microsoft.Rtc.Collaboration.LocalEndpoint.EndEstablish(IAsyncResult result)     at Microsoft.Rtc.Internal.UCWeb.UCWAuthenticatedEndpoint.OotyUserEndpointEstablish_callback(IAsyn  cResult asyncResult)

and:

( 0000000002DCBCA1 )Endpoint unbound: &lt;endpointId=15&gt;, &lt;SipUri=sip:[email protected]&gt;TL_WARN (TF_COMPONENT) UCWeb (UCWEndpointManager.UnBind:endpointmanager.cs(200))        [0]0DBC.0C44  ::05/28/2009-14:21:57.704.00000004      ( 0000000002DCBCA1 )Unbind: Endpoint not found: &lt;endpointId=15&gt;, &lt;SipUri=sip:[email protected]  m&gt;

For me this error was indicating that there was something wrong on the certificate side. When setting up the CWA R2 server, two different certificates are used. One certificate for MTLS usage and one certificate for public SSL web access. The first certificate is used for server-to-server encryption (server to server communication) and the second certificate is used as web server certificate used on your internal or external Virtual CWA R2 website.

In my specific case the CWA R2 server was used for public remote information workers connecting all over the world so we decided to request an third party certificate.

Resolution or workaround:

(Step 1)

Make sure the request a Web Server certificate from a Windows Server CA procedure is going well. So replace the lcscmd.exe command line to your specific configuration:

(Step 2)

Depending on your type of Windows CA (hopefully Windows Server 2008) issue the certificate if needed. Open the Certificate Authority MMC on the CA server en double click the certificate who is now under the folder “issued certificates” and export the entire certificate to a P7B extension.

(Step 3)

On the Communicator Web Access server, click <b>Start</b>, and then click <b>Run</b>. In the <b>Run</b> dialog box, type <b>mmc</b>, and then click <b>OK</b>.On the <b>File</b> menu, click <b>Add/Remove Snap-in</b>.In the <b>Add/Remove Snap-in</b> dialog box, click <b>Add</b>.In the list of <b>Available Standalone Snap-ins</b>, click Certificates. Click <b>Add</b>.In the <b>Certificates Snap-in</b> dialog box click <b>Computer account</b>, and then click <b>Next</b>.In the <b>Select Computer</b> dialog box, ensure that the <b>Local computer: (the computer this console is running on)</b> check box is selected, and then click <b>Finish</b>.Click <b>Close</b>, and then click <b>OK</b>. In the left pane of the <b>Certificates</b> console, expand <b>Certificates (Local Computer)</b>, expand <b>Trusted Root Certification Authorities</b>, and then click <b>Certificates</b>. Right click the <b>Trusted Root Certification Authorities</b> and import the response file (P7B issued by your CA server). And confirm that the certificate is located in this folder.

(Step 4)

Make sure you also copy the certificate to your personal store in the same interface like step 3. Make sure the issuing CA root certificate is also there.

(Step 5)

Double clock the certificate you copied and make sure that the certification path is showing you both the CA server and the issued certificate used for MTLS.

Test your connection again by hitting the CWA URL and you will see that the problem is solved. Any questions please contact me if you want.

本文转自 tigerkillu 51CTO博客,原文链接:http://blog.51cto.com/chenyitai/344950,如需转载请自行联系原作者

继续阅读