Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 8 Next »

Note:The Cloudfon CX v3.x is an ALL NEW major release, which means it can't be upgraded from the Cloudfon CX v2.x installation automatically. Version v3.1.0 must be installed on a new server which no v2.x installed. If the server already has v2.0 installed, please follow the steps below to remove it



Prerequisite Knowledge for Linux

To deploy Cloudfon CX on Linux, you need to have some knowledge and skills of the Linux operating system, and here are some Linux infrastructures and popular Linux distributions that will be used.

  • Debian Buster 10, Debian Bullseye 11

  • Ubuntu 20.04 (LTS) Focal, Ubuntu Impish 21.10, Ubuntu 22.04 (LTS) Jammy

  • Docker 20.10 or higher.

  • IPv4/IPv6

  • Systemd

  • IP tables

  • Firewalld

  • HTTP

It only supports 64-bit OS.

This document assumes that the Linux OS is already deployed and administrators of Cloudfon CX have been granted root permission to Linux.

Remove the Cloudfon CX v2.x Installation

Please ignore this section if you haven't installed the Cloudfon CX v2.x version.

If your Linux server has installed Cloudfon CX v2.x, please follow the below steps before installing v3.x. These steps will delete all your CX data. You can back up the user data directory first.

Remove the docker instance

# stop cloudfon services instance
sh cloudfon_cc_ctl.sh stop

# remove cloudfon service instance
sh cloudfon_cc_ctl.sh rm

# remove user data folder(You can keep it or remove it. It will not be used anymore, and you MUST NOT install new version into this folder!!)
# The folder is your cloudfon v2.x installation folder 
rm -fr /root/cloudfon-cc

The above commands will deleted the Cloudfon CX v2.x docker instance. Now let us list the Cloudfon CX v2.x docker image .

# This command will list all docker images
sudo docker image list

# You can use the docker image rm command to delete the Cloudfon PCX image, the "4a16"
# is the first 4 characters of the image tag id.
sudo docker image rm 4a16

Cloud and Virtualization Environment Supported

To build a high-availability communication solution to help clients reduce cost and improve communication performance, Cloudfon CX commits support to cloud services and has confirmed compatibility with the following cloud and virtualized environments:

  • VMware ESX 5.X and above.

  • Microsoft HyperV 2016 R2 and above

  • Amazon AWS

  • ALI Cloud

  • Google Could

  • Microsoft AZURE

  • Digital Ocean

System Performance Depends On the Following Key Factors

  • Maximum simultaneous chat needed for CX

  • Maximum online agents needed for CX

  • Conversations & Files record storage

  • Maximum Flows(Bot) on CX

  • Maximum Chat Queues on CX

Depending on the key features listed above, Cloudfon CX is able to run on PCs and servers with various CPUs ranging from Intel i5 CPUs to Xeon.

Other Requirements

  • Latest Firefox, Google Chrome, Edge browser

  • Knowledge of Linux and Linux Internet administration

  • Ensure server date time is synced correctly.

FQDN Support

Although Cloudfon CX is designed to be able to run on servers without FQDN specified, we recommend specifying FQDN with the following advantages:

  • Easier access to Web Portal for Cloudfon CX

  • Easier management of clients after IP address change for CX

  • Convenient access to HTTPS when accessing Web Portal

  • Avoid browser warnings when accessing the WebRTC Client

The FQDN you are using must be able to be resolved correctly into the server with Cloudfon CX installed in LAN. If Cloudfon CX is installed on the public network, FQDN must be resolved correctly into the public network address for the server with CX installed.

Prepare the TLS certificate

When there is a need for additional security of the conversation traffic for Web (HTTPS) sessions, the Transport Layer Security (TLS) is used to secure the client's conversation connections. In TLS protocol, the data is encrypted and protected. TLS communication requires a certificate to authenticate the recipient of the secured data.

Preparing TLS Certificates for WSS/HTTPS

This guide is for solving the following SSL certificate issues with Cloudfon CX.

  • After you complete the CX setting up, if you get the self-signed certificates warning in the browser when you access CX Web Portal by HTTPS, please follow up on the below steps to solve it

  • The SSL certificates are expired

Please take the steps listed below.

  1. Purchase a Domain (for example, cloudfon.net) from the domain provider (for example, GoDaddy.) for your CX. 

  2. Add an A record in the Domain DNS zone, and resolve the Domain to your CX IP, for example: point the cx.cloudfon.net to CX server IP.

  3. Purchase a certificate from the trust certificate provider for your domain, for example, Digicert, Thawte, GeoTrust; If you want to make it easier to manage multi-tenants, you'd better apply for a wildcard certificate.

  4. Generate the CSR file and private key file according to the certificate provider’s guide, and keep the files. Usually, you will have two files: the certificate and the private key. Note, please choose the certificates for Nginx.

  5. Rename the private key file as yourname_cx.key. 

  6. Submit the CRS file to the certificate provider, and download the certificate files after your certificates were approved. This step will end up with two files: Intermediate CA certificate and SSL certificate . Note, some providers don't have the Intermediate CA certificate.

  7. Please ignore this step if your provider doesn't provide the Intermediate CA certificate. Use a plain text editor for example Windows Notepad (do not use MS Word) to open the Intermediate CA file and SSL certificate file, copy the Intermediate CA contents to append to the SSL certificate file, and rename the SSL certificate file as yourname_cx.pem. In the Linux environment, you can use the below commands to combine the certificate files. 

# Append intermediate file to certificate file
cat intermediate.pem >> cert.pem
 
# Rename certifiate file to yourname_cx.pem
mv cert.pem yourname_cx.pem
  1. Now you will have two certificate files, the certificate file yourname_cx.pem , and the private key file yourname_cx.key.

Note: Please confirm the Certificate is a full-Chain certificate, otherwise some third-party platforms such as WhatsApp will reject the verification request. After the server is initialized, you can test the certificate integrity through the following test sites:

For example: https://www.sslchecker.com/sslchecker

  • No labels