In this section:

 

Release SBC 8.1 onwards, support is added to the virtual SBC SWe, I-SBC and D-SBC for gateway-to-gateway signaling between the SBCs, and between the SBC and the GSX9000 in an N:1 model when using an external PSX.

Additional functionality:

  • The SBC SWe supports IP address-based configurations.
  • The SBC Cloud supports IP address configurations using metavariables for gateway signaling.

The SBC uses gateway signaling to communicate between the SBC/GSX system and the SBC SWe cloud, and between the two SBC cloud platforms when using an external PSX.

GW signaling port limitations:

  • Create the GW signaling port under the default address context and within the 'defaultSigZone'.
  • GW signaling port must use an ID of "1".

Note

The SBC 52x0 and SBC 7000 systems support creating IP Interface Groups containing sets of IP interfaces that are not "processor friendly" (i.e. carried on physical Ethernet ports served by separate processors). However, restrictions exist regarding the usage of such Interface Groups.

(This ability does not apply to the SBC 51x0 and SBC 5400 systems which have only two physical media ports. IP interfaces from the two physical ports may be configured within the same IP Interface Groups without restriction.)

For complete details, refer to Configuring IP Interface Groups and Interfaces.

  1. Configure an IP interface with an IPv6 address:

    % set addressContext default ipInterfaceGroup LIFG1 ipInterface LIF_1 ceName SBX1-1 portName pkt0 ipAddress 10.32.113.1 prefix 16 altIpAddress fc00::3200:0:0:113:1 altPrefix 64
  2. Configure an IPv6 signaling port under the default address context and zone:

    % set addressContext default zone defaultSigZone gwSigPort 1 ipAddress fc00::3200:0:0:113:99 ipInterfaceGroupName LIFG1 state enabled mode inService

    The configuration fails if the specified IP address is set to 'loopback', 'link local' or 'unspecified', or is an IPv4-mapped IPv6 address.

  3. Configure a GW trunk group under the default address context and zone with an ingress prefix on the egress gateway:

    % set addressContext default zone defaultSigZone gwTrunkGroup GW_TG state enabled mode inService ingressIpPrefix fc00::3200:0:0:112:99 128
  4. Disable the internal policy server and configure an external policy server because the SBC must use an external policy server to run GW-GW calls.

    % set system policyServer localServer PSX_LOCAL_SERVER mode outOfService state disabled 
    % set system policyServer remoteServer PSX_REMOTE_SERVER ipAddress 10.31.240.106 mode active state enabled

Configure an SNMP target to view the new IPv6 GW link traps:

% set oam snmp trapTarget trapDest ipAddress 10.31.240.108 port 162 state enabled trapType v2

GW-GW Signaling Configuration Example

The following example shows gateway-gateway signaling configuration on an I-SBC/D-SBC:

set oam eventLog typeAdmin debug filterLevel info
commit
 
set addressContext default ipInterfaceGroup LIG1 ipInterface LIF1 ceName vsbc1 portName pkt0 ipVarV4 IF2.IPV4 prefixVarV4 IF2.PrefixV4 ipPublicVarV4 IF2.FIPV4 state enabled mode inService 
set addressContext default ipInterfaceGroup LIG2 ipInterface LIF2 ceName vsbc1 portName pkt1 ipVarV4 IF3.IPV4 prefixVarV4 IF2.PrefixV4 ipPublicVarV4 IF3.FIPV4 state enabled mode inService
commit
 
set addressContext default zone ZONE_IAD id 2 sipSigPort 2 ipInterfaceGroupName LIG1 ipVarV4 IF2.IPV4 ipPublicVarV4 IF2.FIPV4 portNumber 5060 state enabled transportProtocolsAllowed sip-udp,sip-tcp
set addressContext default zone ZONE_AS id 3 sipSigPort 3 ipInterfaceGroupName LIG2 ipVarV4 IF3.IPV4 ipPublicVarV4 IF3.FIPV4 portNumber 5060 state enabled transportProtocolsAllowed sip-udp,sip-tcp
commit
 
set addressContext default staticRoute 10.54.80.0 24 192.168.3.1 LIG1 LIF1 preference 100
set addressContext default staticRoute 10.54.80.0 24 192.168.4.1 LIG2 LIF2 preference 100
commit
 
set addressContext default zone ZONE_IAD id 2 sipTrunkGroup TG_IAD media mediaIpInterfaceGroupName LIG1 mediaIpVar IF2.IPV4
set addressContext default zone ZONE_IAD id 2 sipTrunkGroup TG_IAD ingressIpPrefix 10.54.80.0 24
set addressContext default zone ZONE_IAD id 2 sipTrunkGroup TG_IAD state enabled mode inService
commit
 
set addressContext default zone ZONE_AS id 3 sipTrunkGroup TG_AS media mediaIpInterfaceGroupName LIG2 mediaIpVar IF3.IPV4
set addressContext default zone ZONE_AS id 3 sipTrunkGroup TG_AS state enabled mode inService
set addressContext default zone ZONE_AS ipPeer EGRESS_PEER ipAddress 10.54.80.8 ipPort 9898
commit
 
set global callRouting routingLabel EGRESS_RL routingLabelRoute 1 trunkGroup TG_AS ipPeer EGRESS_PEER
set global callRouting route none Sonus_NULL Sonus_NULL standard 9876543210 1 all all ALL none Sonus_NULL routingLabel EGRESS_RL
commit
set addressContext default zone defaultSigZone id 1 gwSigPort 1 ipVar IF2.IPV4 portNumber 2569 ipInterfaceGroupName LIG1 mode inService role primary state enabled
commit
set addressContext default zone defaultSigZone gwTrunkGroup GATEWAY_TG media mediaIpInterfaceGroupName LIG1
commit 
set addressContext default zone defaultSigZone gwTrunkGroup GATEWAY_TG state enabled mode inService ingressIpPrefix 10.34.0.0 16
commit  

  • No labels