UCX Console Troubleshooting
How to use the troubleshooting guide
This page describes basic troubleshooting techniques and most frequent issues you may face during the application setup and usage.
The first part describes the basic tests to be made after you completed the configuration task list. Those test can reveal issues in the configuration and can help you to identify them.
The second part is a list of common issues and their causes. Look for the symptom and follow the tips. To know how to configure the product, please refer to the relevant pages in this guide.
Please understand that the problem may be related to complex PBX and network configurations, and that is not possible to list all them all. This guide must be considered as a tool to guess the origin of the issue.
When launching UCX Console client, it doesn’t connect to Imagicle Server:
Check network connectivity between UCX Console PC and Imagicle server:
If unencrypted connection is used, Imagicle server should be reachable on TCP port 51234
If encrypted TLS 1.2 connection is used, Imagicle server should be reachable on TCP port 51235 and proper Digital Certificate should be in place. Check relevant paragraph below.
When launching UCX Console, login fails:
Check Imagicle Server credentials are correct and still valid (i.e. expired domain password).
Check authentication settings in Admin ⇒ System Parameters ⇒ Users authentication settings. They should match users' provisioning source, if any (Local or AD/LDAP or CUCM or Webex)
When launching UCX Console, it opens with a wrong console type (i.e. UCX Console Professional instead of UCX Console Enterprise or viceversa):
Check related license type in Admin ⇒ User Management; in “UCX Console” section, “Console license type (BAP, BAE, AG1, AG2, AG3)” field should be populated with correct license.
“Park Button” in the UCX Console doesn’t work:
Check on CuCM that CTI park ports range has been defined.
When launching UCX Console, “CTI/TAPI error: the related extension is not controlled by the server” is displayed:
Check “ImagicleCTI” Application User. It should include operator’s phone device into “Controlled Devices” list (Cisco only)
Check PBX configuration and make sure operator's phone service is associated to an available CTI resource (TAPI, CSTA or TSAPI)
Check that TAPI Service Provider version is aligned to current PBX release. If versions are misaligned, Imagicle CTI Server can’t monitor operators’ phones.

When UCX Console's "Record" button is hit, call recording does not start and an error message is displayed (Cisco only)
Please check that phone device, and relevant DN, are enabled for "Selective" Call Recording
Phone device should be included in the list of TAPI-controlled devices
When Supervisor's Silent Monitoring and/or Whisper Coaching buttons are hit, no connection is established with agent on call (Cisco only)
Please check the following:
Supervisor should be added into the queue with "Advanced Supervisor" permissions
Supervisor's phone line should have an adequate “Monitoring CSS”, including both Supervisor's and monitored agent's Partitions
Monitored agent's phone must be enabled to Built-In Bridge
Monitored agent's phone must be TAPI monitored. (Standard CTI Allow Call Monitoring role in Application User is needed) See here
Monitored agent's phone should be busy (active call) ⇒ red BLF
Additional Troubleshooting hints for encrypted connection
Please locate the following log file in your PC workstation:
C:\Users\<windows_user>\Documents\Imagicle Attendant Console\Logs\RequestManagerLogFile.txt
Locate the following line includes IP, TCP port and connection type in use:
Opening connection to 192.168.6.5:51234, useSecureConnection=False
If you are experiencing errors related to Digital Certificate validation, you should find a message in same above log file, similar to the following line:
OpenConnection - Exception during certificate validation: System.Security.Authentication.AuthenticationException: The remote certificate is invalid according to the validation procedure.
Another useful log file available in your PC workstation is the following:
C:\Users\<windows_user>\Documents\Imagicle Attendant Console\Logs\ApplicationLogFile.txt
Here you can find additional error messages related to Certificate validation. See below some typical error messages, for different scenarios:
Digital Certificate non available on UCX Suite server
Validate server certificate - Ssl Policy Errors [RemoteCertificateNotAvailable]
In this case, please instal a Trusted or Self-Signed Certificate on UCX Suite node(s), as explained here.
Certificate name is different than UCX Suite host name
Validate server certificate - Ssl Policy Errors [RemoteCertificateNameMismatch]
UCX Console is trying to connect to a host name which is different than Certificate name. Please make sure that both host and Certificate names are consistent.
Certificate is not Trusted
Validate server certificate - Ssl Policy Errors [RemoteCertificateChainErrors]
This error means that a non-Trusted Certificate is installed on UCX Suite server (i.e. a self-signed Certificate) and you did not install same certificate on operator's workstation. Please install self-signed Certificate on client side.
How to verify a TLS certificate presented by UCX Suite
During troubleshooting of a TLS connection, it might be useful to know if the server is presenting the correct certificate and if a TLS session can be established between local PC and UCX Suite server.
Requirements
openssl installed on operator's PC
firewall must allow communication between the client and the server on TCP port 51235
Command to perform from operator's PC
openssl s_client -crlf -connect <UC_Suite>:51235 -servername <UCX_SUITE>
where <UCX_Suite>
is the IP or FQDN of the Imagicle UCX on-prem or Cloud Suite.
Expected results with a self-signed certificate
CONNECTED(00000005)
depth=0 CN = EC2AMAZ-5F6ALB2, O = Imagicle S.p.a.
verify error:num=18:self signed certificate
verify return:1
depth=0 CN = EC2AMAZ-5F6ALB2, O = Imagicle S.p.a.
verify return:1
---
Certificate chain
0 s:/CN=EC2AMAZ-5F6ALB2/O=Imagicle S.p.a.
i:/CN=EC2AMAZ-5F6ALB2/O=Imagicle S.p.a.
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/CN=EC2AMAZ-5F6ALB2/O=Imagicle S.p.a.
issuer=/CN=EC2AMAZ-5F6ALB2/O=Imagicle S.p.a.
Line 1 : CONNECTED confirm the server is listening and connection can be established
Line 3 : alert if a self-signed certificate is in use
Rest of the answer provides you details of the certificate presented by remote side
Expected results when implementing a Trusted Certificate from PKI
CONNECTED(00000005)
depth=3 O = Digital Signature Trust Co., CN = DST Root CA X3
verify return:1
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = canalpopc.imagicle.cloud
verify return:1
---
Certificate chain
0 s:/CN=uccs.imagicle.cloud
i:/C=US/O=Let's Encrypt/CN=R3
1 s:/CN=uccs.imagicle.cloud
i:/C=US/O=Let's Encrypt/CN=R3
2 s:/C=US/O=Let's Encrypt/CN=R3
i:/C=US/O=Internet Security Research Group/CN=ISRG Root X1
3 s:/C=US/O=Internet Security Research Group/CN=ISRG Root X1
i:/O=Digital Signature Trust Co./CN=DST Root CA X3
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/CN=uccs.imagicle.cloud
issuer=/C=US/O=Let's Encrypt/CN=R3
---
No client certificate CA names sent
Server Temp Key: ECDH, X25519, 253 bits
---
SSL handshake has read 6094 bytes and written 329 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES128-GCM-SHA256
Session-ID: 54C469AC93D1C7D800B630AE9B7EF62AD7DFF2DE4BA9B7EAB0E33719CC20C374
Session-ID-ctx:
Master-Key: A346DA5784ABCE2BF0ED4C73929B6D2D873BAF1CE7782E0E4205196C67877C9000A5D7B9335C9080D8590C988E82A6C9
TLS session ticket lifetime hint: 86400 (seconds)
TLS session ticket:
0000 - 31 36 33 31 30 33 33 33-39 38 30 30 30 00 00 00 1631033398000...
0010 - c9 00 49 e1 76 45 94 47-ab fd 76 08 e6 b4 02 3b ..I.vE.G..v....;
0020 - 22 4f 08 e3 a9 2c 2b c1-a2 7c 68 b2 40 af f3 d0 "O...,+..|h.@...
0030 - 61 4e 66 0d 33 b5 d9 c0-92 14 8d 88 28 5d a4 f2 aNf.3.......(]..
0040 - 01 ac b7 f1 29 05 7c 97-02 ac 10 0c 71 ef 6b e4 ....).|.....q.k.
0050 - fb f8 86 a0 df 2d b2 ef-f5 ea c6 59 cd ca 27 85 .....-.....Y..'.
0060 - 4f fd 6f 95 8d 5c 78 02- O.o..\x.
Start Time: 1631035955
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Line 1 : CONNECTED confirm the server is listening and connection can be established
Line 3 to 9 : verify the certificate information, if they are trusted or not
Line 11 to 19 : Give information about the certificate chain of the presented certificate
Rest of the answer provides you details of the certificate presented by remote side