Overview
Microsoft Teams Direct Routing allows a direct connection between a supported, customer-provided SBC and the Microsoft Cloud in which services are provided to Teams calling clients. Microsoft has certified the SBC 1000/2000 for use with Teams Direct Routing. Perform the steps that follow to identify and investigate integration issues.
Step 1: Validate SIP Options
The signaling groups configured for Microsoft Teams Direct Routing include counters for SIP request and response messages related to incoming and outoing options. As the SBC Edge 1000/2000 operates with Microsoft Teams Direct Routing, these message counters show increasing numbers. Complete the following steps to check the message counts and investigate potential sources of related integration issues.
- In the WebUI, click the Settings tab.
- In the left navigation pane, click Signaling Groups.
- For the signaling group configured for Microsoft Teams Direct Routing, click Counters.
- Check for an increasing message count in Outgoing Options. If the number is not increasing, check the following:
- Confirm that the is properly configured and reachable.
- Confirm setup for Logial Interfaces (Node interfaces > Logical Interfaces), and the Default route in Protocols > IP > Static Routes.
- Confirm that the is valid.
- Check for an increasing message count in Incoming 2xx. If the number is not increasing, check the following:
- Confirm that the SBC certificate is valid.
- Confirm firmware capability for the following software:
- SBC Edge 7.0.2 or SBC Edge 8.0 for SBC 1000 and SBC 2000
- SBC Edge 7.0.3 for SWe Lite
- Confirm that thonfigured to allow incoming SIP TLS messages.
- Confirm the ACL is using the proper IP address.
- Confirm that the SIP profile is properly configured.
- Check for an increasing message count in Incoming Options. If the number is not increasing, check the following:
- Confi to allow incoming SIP TLS message
- Confirm the federated IP is configured with sip-all.pstnhub.microsoft.com
- Con
For Microsoft Teams, the Signaling Group facing the Teams server must be configured as SBC Edge FQDN or Static (if there is more than one signaling group connected to Teams Direct Routing). The FQDN in Contact Header should be the same FQDN used in Office 365 Tenant Online Gateway. If the IP Address of the SBC is configured in the Contact Header instead of the FQDN of the SBC, a Forbidden message is received.
Check the message count in Outgoing 2xx. If the number is increasing, changes you made during validation have resolved the integration issue(s).
Check SIP Signaling Group Mesage Counters
Step 2: Place a Test Call
Complete the following steps to place a test call:
- In the WebUI, click the Diagnostics tab.
In the left navigation pane, click Test a Call.
Test a Call Parameters in WebUI
Configure the parameters for test calls as in the following table:
Values for Test Call Parameters
Parameter | Value |
---|
Destination Number | Type a telephone number assigned to a Teams user. |
Origination/Calling Number | Type a telephone number assigned to a Local user |
Call Routing Table | Select the routing table that handles the calls from Local resources. |
Click OK; the call should ring the Teams Client
If the test call does not ring the Teams client:
Cgured.
- Check whether you can from Teams to the SBC.
- If the cn complete the following:
Confirm that the firewall is properly configured to allow incoming SIP TLS messages.
Confirm that the federated IP addresses are properly configured.
- If the call is Anonymous, refer to Configuring SBC Edge for Select Microsoft Teams Direct Routing Related Migration Scenarios for more details.
- If the call from the SBC to Teams does not connect due to a SIP 488 "Not Acceptable Here" coming from Teams with the reason "IceCandidatesAbsent", disable Media Bypass on Teams or enable ICE Lite on the SBC. For details, refer to Configuring SBC Edge for Select Microsoft Teams Direct Routing Related Migration Scenarios.
Step 3: Check for Operation that Relates to Known Issues
Complete the following steps to check for operation related to known issues.
Call Released by Teams when Using Edge Browser
Resolution: The EDGE browser did not have Admin Access to the MIC.
Steps To Fix:
- Go to Start , then select Settings > Privacy > Microphone.
- Choose your preferred setting for Allow apps to access your microphone.
Under Choose which apps can access your microphone, turn on or off the individual settings for apps and services.
Edge Browser Privacy Settings
Call One-Way Audio (PSTN to Teams Only) when the SBC is behind a NAT
- Access the WebUI.
- Access the SIP Signaling Group designated for Microsoft Direct Routing.
- Verify Outbound NAT Traversal is configured as Static NAT and the proper public IP address is configured as NAT Public IP (Signaling/Media).
- On the Firewall and the internet router that is NATing the Public IP Address, verify the Media port used by the SBC (refer to Microsoft Teams Direct Routing - On Premises Deployment for media configuration) is open and routed to the SBC internal IP address.
Outbol from Teams to PSTN show as Anonymous when ForwardPAI is enabled on the CSOnlinePSTNGateway
When ForwardPAI is enabled on the Tenant CsOnlinePSTNGateway, Microsoft adds a PAI and Privacy SIP header on the outbound call to the SBC. RFC 3325 defined the 'id' value for the Privacy header, which is used to request the network remove the P-Asserted-Identity header field.
Different behavior may be required, as follows:
- If the SBC is in a trusted network, it should not remove the PAI information and allow the last equipment to remove it. SBC will forward the FROM, PAI and Privacy header.
- Outbound SIP profile -> Send Assert Header: Trusted Only (Default)
- Outbound SIP profile -> Trusted Interface: Enable (Default)
- If the SBC is the last trusted equipment, it should hide the PAI information. SBC will remove the PAI and Privacy header and make the FROM header Anonymous.
- Outbound SIP profile -> Send Assert Header: Trusted Only (Default)
- Outbound SIP profile -> Trusted Interface: Disable
- If the SBC is in a trusted network but the equipment behind it makes the call anonymous due to the Privacy header (and the customer does not want the call anonymous), the SBC can remove the PAI and Privacy header and keep the FROM Header.
- Outbound SIP profile -> Send Assert Header: Never
- Outbound SIP profile -> Trusted Interface: Enable (Default)
Calling number is wrong when call is transferred by Teams user
If the calling number displayed to the forward destination is not the calling number of the Teams Client that did the forward.
- Enable "ForwardPAI" in CsOnlinePSTNGateway. Teams Direct Routing adds P-Asserted-Identy header and Privacy:id in INVITE for transfer.
- On Teams Direct Routing SIP Profile, leave the "Calling Info Source" as "RFC Standard" (by default).
For ISDN: Add a transformation table entry to set the Calling Presentation "Allowed", otherwise the called party sees the calling number as anonymous.
Call drop after 15 sec of call
If Early Media is enabled, disable Early Media on the Teams Direct Routing SIP Signaling Group. This is a known Direct Routing issue until a fix is provided from Microsoft.
SIP Signaling Group - Early Media
If call forwarding is failing, use the following SBC releases:
- SBC SWe Lite or higher
- SBC 1000-2000 7.0.3 or higher
No audio after Hold/Unhold
Microsoft Teams does not properly support a=sendonly in the Re-INVITE SDP for hold. If the local SIP endpoint uses a=sendonly, use the following SMM:
- Access the SBC WebUI.
- Access Settings > SIP > Message Manipulation.
Create the following SIP Message Rule Table:
In this table, create the following entry:
Assign the newly created SIP Message Rule Table to the Outbound Message Manipulation in the Teams SIP Signaling Group.
Assign Message Rule Table