Overview

The SBC Edge is certified to offer Microsoft Teams Direct Routing services; the SBC Edge can be used to connect any Teams client to:

  • A PSTN trunk, whether based on TDM (e.g. PRI, BRI, etc.), CAS, or SIP
  • 3rd-party, non-Teams-certified SIP/TDM based PBXs, analog devices, and SIP clients

These instructions detail how to configure the SBC Edge (SBC 1000/2000) to connect Microsoft Teams Direct Routing services deployed in an Enterprise network (On Premises) to an analog device via FXS port. The network diagram below displays the connection topology for Microsoft Teams Direct Routing deployed in an Enterprise network.

SBC Edge connects to Microsoft Teams Direct Routing Deployed in an Enterprise Network

Step 1: Install SBC Edge

These instructions assume the SBC Edge product (SBC 1000/2000) is installed and running. If the product is not installed, refer to the links below.


Step 2: Review Prerequisites for Microsoft Teams Direct Routing

Microsoft Teams Direct Routing Configuration

Consult the Microsoft documentation for detailed information on Direct Routing interface configuration guidelines, including the RFC standards and the syntax of SIP messages.

SBC Edge Software

Ensure you are running the latest version of SBC software:

Obtain IP Address and FQDN

Requirements for configuring the SBC Edge in support of Teams Direct Routing include:

SBC Edge Requirements

RequirementHow it is Used

Public IP address of NAT device (must be Static)*

Private IP address of the SBC

Required for SBC Behind the NAT deployment.

Public IP address of SBCRequired for SBC with Public IP deployment.
Public FQDN The Public FQDN must point to the Public IP Address.

*NAT translates a public IP address to a Private IP address.


Domain Name

For the SBC Edge to pair with Microsoft Teams, the SBC FQDN domain name must match a name registered in both the Domains and DomainUrlMap fields of the Tenant. Verify the correct domain name is configured for the Tenant as follows:

  1. On the Microsoft Teams Tenant side, execute Get-CsTenant.
  2. Review the output.
  3. Verify that the Domain Name configured is listed in the Domains and DomainUrlMap attributes for the Tenant. If the Domain Name is incorrect or missing, the SBC will not pair with Microsoft Teams.

Users may be from any SIP domain registered for the tenant. For example, you can configure user user@SonusMS01.com with the SBC FQDN name sbc1.hybridvoice.org, as long as both names are registered for the tenant.

Domain Name Examples

Domain Name*Use for SBC FQDN?FQDN Names - Examples
SonusMS01.com(tick)

Valid names:

  • aepsite6.SonusMS01.com

hybridvoice.org

(tick)

Valid names:

  • sbc1. hybridvoice.org
  • ussbcs15. hybridvoice.org
  • europe. hybridvoice.org

Non-Valid name:

sbc1.europe.hybridvoice.org (requires registering domain name europe. hybridvoice.org in “Domains” first)

*Do not use the *.onmicrosoft.com tenant for the domain name.

Configure Domain Names - Example

 

Obtain Certificate

Public Certificate

The Certificate must be issued by one of the supported certification authorities (CAs). Wildcard certificates are supported.

Configure and Generate Certificates on the SBC

Warning: Common Encryption Certificate Issues Arise from Missing Root Certificates
  • Did you only install the CA-signed SBC certificate, along with the intermediate certificate(s) sent by your issuing CA?
  • Did you get the following error message from the SBC?




If so, the likely reason is a missing CA Root Certificate. The SBC does not have any pre-installed CA root X.509 certificates, unlike typical browsers found on your PC. Ensure the entire certificate chain of trust is installed on the SBC, including the root certificate. Acquire the CA root certificate as follows:

  1. Contact your system administrator or certificate vendor to acquire the root, and any further missing intermediate certificate(s) to provision the entire certificate chain of trust within the SBC;
  2. Load the root certificate, along with the intermediate and SBC certificates, according to Importing Trusted Root CA Certificates.

NOTE: Root certificates are easily acquired from the certificate authorities. For example, the root certificate for the GoDaddy Class 2 Certification Authority may be found at https://ssl-ccp.godaddy.com/repository?origin=CALLISTO . For more information about root certificates, intermediate certificates, and the SBC server (“leaf”) certificates, refer to this tutorial.

For other certificate-related errors, refer to Common Troubleshooting Issues with Certificates in SBC Edge.


Microsoft Teams Direct Routing allows only TLS connections from the SBC for SIP traffic with a certificate signed by one of the trusted certification authorities.

Request a certificate for the SBC External interface and configure it based on the example using GlobalSign as follows:

  • Generate a Certificate Signing Request (CSR) and obtain the certificate from a supported Certification Authority.
  • Import the Public CA Root/Intermediate Certificate on the SBC.
  • Import the Microsoft CA Certificate on the SBC.
  • Import the SBC Certificate.

The certificate is obtained through the Certificate Signing Request (instructions below). The Trusted Root and Intermediary Signing Certificates are obtained from your certification authority.

Step 1: Generate a Certificate Signing Request and obtain the certificate from a supported Certification Authority (CA)

Many CA's do not support a private key with a length of 1024 bits. Validate with your CA requirements and select the appropriate length of the key.

  1. Access the WebUI.
  2. Access Settings > Security > SBC Certificates.
  3. Click Generate SBC Edge CSR.

  4. Enter data in the required fields.

  5. Click OK. After the Certificate Signing request finishes generating, copy the result to the clipboard.


    Generate Certificate Signing Request

  6. Use the generated CSR text from the clipboard to obtain the certificate. 

Step 2: Deploy the SBC and Root/Intermediate Certificates on the SBC

After receiving the certificates from the certification authority, install the SBC Certificate and Root/Intermediate Certificates as follows:

  1. Obtain Trusted Root and Intermediary signing certificates from your certification authority.
  2. Access the WebUI.
  3. To install Trusted Root Certificates, click Settings > Security > SBC Certificates > Trusted Root Certificates.
  4. Click Import and select the trusted root certificates.
  5. To install the SBC certificate, open Settings > Security > SBC Certificates > SBC Edge Certificate.
  6. Validate the certificate is installed correctly.

    Validate Certificate

  7. Click Import  and select X.509 Signed Certificate.
  8. Validate the certificate is installed correctly.

    Validate Certificate

Firewall Rules

Ribbon recommends the deployment of the SBC Edge product behind a firewall, within the DMZ, regardless of the assignment of a public IP to the SBC in question. Refer to SBC Edge Security Hardening Checklist for more information about the SBC and firewalls.

This section lists the ports, protocols and services for firewalls that are in the path of the SBC connecting to Teams Direct Routing.

Basic Firewall Rules for All Call Flows

Inbound Public (Internet to SBC)
  • SIP TLS: TCP 5061*

  • Media for SBC 1000: UDP 16384-17584**
  • Media for SBC 2000: UDP 16384-19384*
  • Media for SBC SWe Lite: UDP 16384-21384
Outbound Public (SBC to Internet)
  • DNS: TCP 53

  • DNS: UDP 53

  • NTP: UDP 123

  • SIP TLS: TCP 5061

  • Media: UDP 49152-53247

Public Access Information

The tables below represent ACL (Access Control List) examples that protect the SBC Edge. When using Easy Configuration Teams related wizards in an Enterprise deployment, these attributes are automatically provisioned. If you are manually configuring the SBC Edge as part of a Microsoft Teams Direct Routing migration scenario (for example Skype for Business or CCE), you must manually configure these ports. For details on ACLs, refer to Creating and Modifying Rules for IPv6 Access Control Lists.

Public Access In - Requirements

Description

Protocol

Action

Src IP Address

Src Port

Dest IP Address

Dest Port

Outbound DNS Reply

TCP

Allow

0.0.0.0/0

53

SBC/32

0-65535

Outbound DNS Reply

UDP

Allow

0.0.0.0/0

53

SBC/32

0-65535

Outbound NTP Reply

UDP

Allow

0.0.0.0/0

123

SBC/32

123

Outbound SIP Reply

TCP

Allow

0.0.0.0/0

5061

SBC/32

1024-65535

Inbound SIP Request

TCP

Allow

0.0.0.0/0

1024-65535

SBC/32

5061*

Inbound Media Helper

UDP

Allow

52.112.0.0/14

49152-53247

SBC/32

16384-17584**

Deny All

Any

Deny

0.0.0.0/0


0.0.0.0/0


Public Access Out - Requirements

Description

Protocol

Action

Src IP Address

Src Port

Dest IP Address

Dest Port

Outbound DNS Request

TCP

Allow

SBC/32

0-65535

0.0.0.0/0

53

Outbound DNS Request

UDP

Allow

SBC/32

0-65535

0.0.0.0/0

53

Outbound NTP Request

UDP

Allow

SBC/32

0-65535

0.0.0.0/0

123

Outbound SIP Request

TCP

Allow

SBC/32

0-65535

0.0.0.0/0

5061

Inbound SIP Reply

TCP

Allow

SBC/32

5061*

0.0.0.0/0

1024-65535

Outbound Media Helper

UDP

Allow

SBC/32

16384-17584**

52.112.0.0/14

49152-53247

Deny All

Any

Deny

0.0.0.0/0


0.0.0.0/0


* Define in Tenant configuration

** SBC SWe Lite does not require this rule to be created since Media ports are opened as needed. This rule is required only for SBC 1000, SBC 2000 and then depends of the Media Port paired configured in the SBC.

Firewall Rules for the SBC with Media Bypass

Apply the following firewall rules below:

The Teams Client IP address cannot be predicted. As a result, allow Any IP (0.0.0.0/0).

Inbound Public (Internet to SBC) 

Media for SBC 1000: UDP 17586-21186**

Media for SBC 2000: UDP 19386-28386**

Outbound Public (SBC to Internet)

Media: UDP 50000-50019

If the device that handles the NAT between the Teams Client and SBC Public IP is performing PAT (Port Address Translation), verify that this device has the source port range of the Teams Client media or open all the ports from 1024 to 65535.

For SBC behind NAT, the firewall should allow access between the firewall IP and the NAT device's IP.

For SBC not using NAT, there must be access between the firewall and the SBC's Public IP.

Public Access

The tables below represent ACL (Access Control List) examples that protect the SBC Edge; these ACL attributes are automatically provisioned if the Teams-related Easy Configuration wizards are used (applies to the greenfield deployment scenario only).

Public Access In - Requirements (Media Bypass Scenario)

Description

Protocol

Action

Src IP Address

Src Port

Dest IP Address

Dest Port

Inbound Media Bypass Helper

UDP

Allow

0.0.0.0/0

1024-65535

SBC/32

16384-21186**

Public Access Out - Requirements (Media Bypass Scenario)

Description

Protocol

Action

Src IP Address

Src Port

Dest IP Address

Dest Port

Outbound Media Bypass Helper

UDP

Allow

SBC/32

16384-21186**

0.0.0.0/0

1024-65535

* Define in Tenant configuration

** SBC SWe Lite does not require this rule to be created since Media ports are opened as needed. This rule is required only for SBC 1000, SBC 2000 and then depends of the Media Port paired configured in the SBC.

Step 3: Configure SBC Edge for Microsoft Teams Direct Routing to Support Analog Devices

These instructions assume the SBC Edge is installed and running, and is connected to the WebUI.

Access the SBC Edge WebUI

Access the WebUI. Refer to Logging into the SBC Edge.

Configure Host Information and DNS

The Host Information and DNS configuration contains system information that is used by the SBC Edge, including host, domain, and NTP server information.

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access System > Node-Level Settings. The Node-Level Settings page is displayed.
  3. Configure the NTP and DNS Servers with network-specific data.
  4. Leave all other parameters as default.
  5. Click Apply.

    TLS Configuration - Example Values

    ParameterExample Value
    Host Nameaepsite6
    Domain NameSonusMS01.com
    Use NTPYes
    NTP ServerSpecifies the FQDN, IPv4, or IPv6 address of the NTP server. If the host name is supplied, the SBC uses the DNS to connect to the NTP server.
    Use Primary DNSYes
    Primary Server IPXXX.XXX.XX.XXX

    Node-level Settings - Example

Configure Logical Interface

The SBC Edge supports system-supported Logical Interfaces, which are used to hold the IP address for each Ethernet port. One of these logical interfaces is assigned an IP address for transporting the VoIP media packets (i.e., RTP, SRTP) and protocol packets (i.e, SIP, RTCP, TLS). In this example, Ethernet 1 is configured for transporting packets for the Microsoft Teams Direct Routing connection.

Ensure the IP Routing Table contains the same information as in the network topology.
  1. In the WebUI, click the Settings tab.
  2. In the left navigation pane, go to Node Interfaces > Logical Interfaces.
  3. Configure the parameters as shown below (example values are shown in the table; configure as per your network requirements). For details on field descriptions, refer to Configuring and Modifying Logical Interfaces.
  4. Leave all other parameters as default.
  5. Click Apply.

    Logical Interfaces Configuration - Example Values

    ParameterExample Value
    AliasTo Microsoft Phone 5
    DescriptionInterface to Interconnect with Microsoft Phone System
    Admin InterfaceEnable
    IP Assign MethodStatic
    Primary Address<Public IP of your SBC> (in the example 192.168.211.80)
    Primary Netmask<Mask of Public Interface of your SBC> (in the example 255.255.255.0)

    Logical Interfaces - Example

     

Create Profiles

For interconnecting with Microsoft System Direct Routing, the following profiles are required:

  • Teams Direct Routing Profile (SIP)
  • Analog Device Profile

Create Teams Direct Routing Profile

The Teams Direct Routing profile is used for connecting the SBC Edge to Microsoft Teams.

Create the Teams Direct Routing Profile as follows:

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access SIP > SIP Profiles.
  3. Click the ( ) icon at the top of left corner and add a new SIP profile.
  4. Configure the parameters as shown below (example values are shown in the table; configure as per your network requirements). For details on field descriptions, refer to Creating and Modifying SIP Profiles.
  5. Leave all other parameters as default.
  6. Click OK.

    SIP Profile Configuration - Example Values

    ParameterExample Value
    DescriptionTeams Direct Routing Profile
    FQDN in From HeaderSBC Edge FQDN
    FQDN In Contact HeaderSBC FQDNNOTE: For Microsoft Teams, the Signaling Group facing the Teams server must be configured as SBC Edge FQDN or Static (if there is more than one signaling group connected to Teams Direct Routing). The FQDN in Contact Header should be the same FQDN used in Office 365 Tenant Online Gateway. If the IP Address of the SBC is configured in the Contact Header instead of the FQDN of the SBC, a Forbidden message is received.NOTE: If you set this field to Static and you expect the port number of the Contact header in the outbound SIP messages, you must configure the Static Host FQDN/IP field with the Listen Port number of the SIP signaling group.
    Origin Field Username <FQDN of SBC> (in the example aepsite6.SonusMS01.com)

    SIP Profile - Example

Create Analog Device Profile

CAS Profiles control various aspects of loop start, DTMF, tone detection and other features associated with the variants of CAS calls. The Ribbon SBC 1000/2000 supports FXS, E&M and R2 signaling through CAS.

  1. In the WebUI, click the Settings tab.
  2. In the left navigation pane, go to CAS > CAS Signaling Profiles.
  3. From the Create CAS Profile drop down box, select FXS Profile.
  4. Configure the parameters as shown below. Leave the default values for all other parameters.
  5. Click OK.

    Analog Profile Entries - Example Values

    ParameterValue
    DescriptionAnalog Device
    Loop Start Type
    Specifies the loop start method. This field is country-specific, and may need to be adjusted for your country.
    Disconnect Tone GenerationSpecifies whether or not a disconnect tone is generated when a call is disconnected from the far end. This field is country-specific, and may need to be adjusted for your country.

    Analog Device Profile - Example

Create SDES-SRTP Profile

The SDES-SRTP Profile defines the encryption mechanism used between the SBC and the Microsoft Teams Direct Routing interface; the Crypto Suite specifies the algorithm used to negotiate with a peer device.

Create a SDES-SRTP Profile as follows:

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access Media > SDES-SRTP.
  3. Click the ( ) icon at the top left corner and add a new SDES-SRTP Profile.
  4. Configure the parameters as shown below. For details on field descriptions, refer to Creating and Modifying SIP Profiles.
  5. Leave all other parameters as default.

    Media Crypto Profile Configuration - Example Values

    ParameterExample Value
    DescriptionTeams Direct Routing SRTP
    Operation OptionRequired
    Crypto SuiteAES_CM_128_HMAC_SHA1_80

    Media Crypto Profile - Example

Create Media List

The Media List contains one or more of Media Profiles, which the SBC Edge uses for call transmission. A Media Profile specifies the individual voice codecs the SBC Edge uses for voice compression, voice quality, and associated settings.

Create a Media List for Teams Direct Routing as follows:

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access Media > Media List.
  3. Click the ( ) icon at the top left corner and add a new Media List.
  4. Configure parameters as shown below. For details on field descriptions, refer to Creating and Modifying Media Lists.
  5. Leave all other parameters as default.

    Media List Configuration - Example Values

    ParameterExample Value
    DescriptionTeams Direct Routing Media List
    Media Profiles ListIn the Media Profiles List field, click Add/Edit. G711a and G711u are the default Media Profiles.
    • G711a
    • G711u
    NOTE: See Microsoft documentation for the list of codecs supported by Microsoft.
    SDES-SRTP Profile
    Teams Direct Routing SRTP. This profile was created in the previous step.

    Media List - Example

Configure a SIP Server Table

SIP server tables define the information for the SIP interfaces connected to the SBC Edge; a SIP Server Table is required to support the Microsoft Phone System.

Create a Teams Direct Routing Server

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access SIP > SIP Server Tables
  3. Click the ( ) icon at the top left corner and add a new SIP Server Table.
  4. For Description, enter Teams Direct Routing Server.
  5. Click OK.

    Create SIP Server Table

Configure Entries in the Teams Direct Routing Server

The information you configure in the SIP Server table pairs the SBC Edge to the Microsoft Teams Direct Routing interface. Three entries in the SIP Server table offer server redundancy to ensure a server is always up and communicating. If a server is down or not communicating, the SBC Edge will automatically move to the next Server entry on the list. 

Configure Teams Direct Routing Server entries as follows:

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access SIP > SIP Server Tables.
  3. Select the name of the table created in the previous step.
  4. From the Create SIP Server drop down list, select IP/FQDN.
  5. Repeat this configuration for two additional SIP Server entries, using the field entries below. For details on field descriptions, refer to Creating and Modifying Entries in SIP Server Tables.

    SIP Server 1 Table - Example Values

    ParameterValue
    Priority1
    Hostsip.pstnhub.microsoft.com
    Port5061
    ProtocolTLS
    TLS ProfileTeams Direct Routing TLS
    MonitorSIP Options

    SIP Server 1 - Example Values

    SIP Server 2 Table - Example Values

    ParameterValue
    Priority2
    Hostsip2.pstnhub.microsoft.com
    Port5061
    ProtocolTLS
    TLS ProfileTeams Direct Routing TLS
    MonitorSIP Options

    SIP Server 2 - Example Values

     

    SIP Server 3 Table - Example Values

    ParameterValue
    Priority3
    Hostsip3.pstnhub.microsoft.com
    Port5061
    ProtocolTLS
    TLS ProfileMicrosoft Phone System
    MonitorSIP Options

    SIP Server 3 - Example Values

Create Transformation Tables and Entries

This Transformation Table contains a list of call routes that include routing configuration for calls between Microsoft Teams and an Analog Device. Two Transformation tables are required:

  • For Calls from Microsoft Teams to Analog Device
  • For Calls from Analog Device to Microsoft Teams

Calls From Microsoft Teams to Analog Device

This Transformation Table contains a list of call routes that include routing configuration for calls from Microsoft Teams to an Analog Device.

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access Call Routing > Transformation
  3. Click the ( ) icon at the top left corner to add a new Transformation Table.
  4. For Description, enter From Microsoft Teams to Analog Device
  5. Click OK.

    Create Transformation Table

  6. In the left navigation panel, select the new table:  Transformation > From Microsoft Teams to Analog Device
  7. Click the Create ( ) icon.
  8. Configure the parameters as shown below. Leave the default values for all other parameters.
  9. Click OK.

    Transformation Entries - Example Values

    ParameterValue
    DescriptionExtract Analog Device Extension Number
    Match TypeOptional (Match One)
    Input FieldType: Called Address/Number
    Value: .*3(\d{3})
    Output FieldType: Called Address Number
    Value: \1

    Transformation Entry - Example


     

    Transformation Table - Entry Added

Calls From Analog Device to Microsoft Teams

This Transformation Table contains a list of call routes that include routing configuration for calls from the Analog Device to Microsoft Teams.

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access Call Routing> Transformation
  3. Click the ( ) icon at the top left corner to add a new Transformation Table.
  4. For Description, enter From Analog Device to Microsoft Teams
  5. Click OK.

    Create Transformation Table

  6. In the left navigation panel, select the new table:  Transformation > From Analog Device to Microsoft Teams
  7. Click the Create ( ) icon.
  8. Configure the parameters as shown below. Leave the default values for all other parameters.
  9. Click OK.

    Transformation Entries - Example Values

    ParameterValue
    DescriptionConvert to Teams Client Number
    Match TypeOptional (Match One)
    Input FieldType: Called Address/NumberValue: (.*)
    Output FieldType: Called Address NumberValue: \1

    Transformation Table Entry

    Transformation Table - Entry Added

Create Signaling Groups

Signaling groups allow telephony channels to be grouped together for the purposes of routing and shared configuration. In the case of SIP, they specify protocol settings and link to server, media and mapping tables. For Teams Direct Routing, you configure the Signaling Group to designate routing information for calls between SBC Edge and the Microsoft Phone System. Two Signaling Groups are required:

  • Signaling Group - Calls from Microsoft Teams to Analog Device
  • Signaling Group - Calls from Analog Device to Microsoft Teams


Calls From Microsoft Teams to Analog Device

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access Signaling Groups
  3. From the Create Signaling Group drop down box, select SIP Signaling Group.
  4. Configure the parameters as shown below. Leave the default values for all other parameters.
  5. Click OK.

    Signaling Group Configuration - Example Values

    ParameterValue
    DescriptionMicrosoft Teams
    SIP ProfileTeams Direct Routing Profile
    Media List IDTeam Direct Routing List
    Signaling Media/Private IP
    Ethernet 1 (example, choose the interface which faces Microsoft Teams Direct Routing)
    Listen Port5061 TLS
    Federated IP/FQDNsip-all.pstnhub.microsoft.com
    SIP server tableTeams Direct Routing Server
    Load BalancingPriority: Register All
    SIP ProfileMicrosoft Phone System (from previous step)
    Call Routing TableDefault Routing Table
    Outbound NAT Traversal*Static NAT
    NAT Public IP*IP Address (Only required if “Static NAT” is selected)
    Static NAT InboundDisabled (this field should not be configured for Non-Media Bypass Teams deployment)
    *Outbound NAT Traversal and the NAT Public IP is required when the SBC is behind a NAT (the public IP address of the NAT device is required when the SBC has a Private IP).

    Signaling Group - Example


Calls from Analog Device to Microsoft Teams

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access Signaling Groups
  3. From the Create Signaling Group drop down box, select CAS Signaling Group.
  4. Configure the parameters as shown below. Leave the default values for all other parameters.
  5. Click OK.

    Signaling Group Configuration - Example Values

    ParameterValue
    DescriptionAnalog Device
    CAS Signaling ProfileSelect (FXS) Analog Device
    Caller ID TypeCountry-specific
    Assigned ChannelsAssign CAS channels.
    Call Routing TableDefault Routing Table

    Signaling Group - Example

Create Call Routing Tables

Two Call Routing Tables for transporting calls between the SBC and Microsoft Teams are required:

  • Call Route - Calls from Microsoft Teams to Analog Device
  • Call Route - Calls from Analog Device to Microsoft Teams

From Microsoft Teams to Analog Device

This Call Routing Table routes calls from Microsoft Teams.

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access Call Routing Table.
  3. Click the () icon at the top left corner and add a new Call Routing Table.

    Create Call Routing Table

  4. Configure the Description as From Microsoft Teams and click OK.
  5. From the left navigation pane, click on the Call Routing > Call Routing table.
  6. Select From Microsoft Teams (the entry you just created).
  7. Click the ().
  8. Configure the parameters as shown below. Leave all other parameters as default.
  9. Click OK.

    Call Routing Table Configuration - Example

    ParameterValue
    DescriptionFrom Microsoft Teams to Analog Device
    Number/Name Transformation TableFrom Microsoft Teams to Analog (select Transformation Table you created above)
    Destination Signaling GroupsFrom Microsoft Teams

    Call Routing Table - Example

From Analog Device to Microsoft Teams

This Call Routing Table routes calls from the Analog Device and sent to Microsoft Teams.

To add and configure a new Call Routing Table:

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access Call Routing Table.
  3. Click the () icon at the top of  left corner and add a new Call Routing Table.

    Create Call Routing Table

  4. Configure the Description as Microsoft Phone system and click OK.
  5. From the left navigation pane, click on the Call Routing > Call Routing table.
  6. Select From Analog Device (the entry you just created).
  7. Click the ().
  8. Configure the parameters as shown below. Leave all other parameters as default.
  9. Click OK.

    Call Routing Table Configuration - Example

    ParameterValue
    DescriptionFrom Analog Device to Microsoft Teams
    Number/Name Transformation TableFrom Analog Device to Microsoft Teams (select Transformation Table you created above)
    Destination Signaling GroupsFrom Analog Device

    Call Routing Table - Example

Update Signaling Groups for Call Route

The newly created Call Route must be associated to a Signaling Group as follows:

Associate Call Route to Signaling Group for Calls From Teams to Analog Device

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access Signaling Groups > Teams Direct Routing.
  3. From the Call Routing Drop down list, select From Microsoft Teams.
  4. Click OK.

    Select Call Routing Table - Teams Direct Routing

Associate Call Route to Signaling Group for Calls from an Analog Device to Teams

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access Signaling Groups > From Analog Device.
  3. From the Call Routing Drop down list, select From Analog Device.
  4. Click OK.

    Select Call Routing Table - From SIP Trunk


 

Step 4: Configure SBC Edge when Microsoft Teams is in Media Bypass Mode

Non-Media Bypass vs. Media Bypass Deployment


Non-Media Bypass

Non-Media Bypass is Microsoft Teams Direct Routing related deployment where all media flows between Teams clients in the enterprise and the SBC transit the Teams Phone System based in the Azure cloud.

Teams Direct Routing - Without Media Bypass


Media Bypass

Media Bypass is a Microsoft Teams Direct Routing deployment where all media flows between Teams clients in the enterprise connect directly to the SBC without transiting the Teams Phone System.


If Microsoft Teams is in Media Bypass mode, you must configure the SBC Edge as detailed in this section (if Microsoft Teams is not in Media Bypass mode, this configuration is not required).

For Media Bypass, the following is supported:

  • Deployment on a Public IP address
  • Deployment behind NAT

Configure Signaling Group 

Before configuring Outbound NAT Traversal, obtain the Public IP address for your network (the Public IP address specified in the screen graphic is an example only); configuration for NAT is required only if deployment is behind NAT.

  1. In the WebUI, click the Settings tab.
  2. In the left navigation page, access Signaling Groups
  3. From the Create Signaling Group drop down box, select SIP Signaling Group.

  4. Configure the parameters as shown below. Leave the default values for all other parameters.

  5. Click OK.

    Signaling Group Configuration - Example Values

    Parameter

    Value

    RTCP MultiplexingEnable
    ICE SupportEnabled
    ICE ModeLite
    Outbound NAT Traversal*Static NAT
    NAT Public IP (Signaling/Media)*Public Address for the NAT device assigned on the media port for your network
    Static NAT InboundDisabled (this field should not be configured for Media Bypass Teams deployment)

    *Outbound NAT Traversal and the NAT Public IP is required when the SBC is behind a NAT (the public IP address of the NAT device is required when the SBC has a Private IP).

    The peer endpoint must support the a=rtcp-mux exchange in order for the RTP and RTCP ports to be multiplexed into one data port.

    SIP Signaling Group - Example

Step 5: Confirm SBC Edge Links to Microsoft Teams

  1. Access the WebUI. Refer to Logging into the SBC Edge.
  2. Click Monitor.
  3. Under each newly created Signaling Group (created for each Tenant), confirm the channels are green. For details on channel status, refer to Monitoring Real Time Status.

For troubleshooting steps, refer to Best Practice - Troubleshoot Issues with Microsoft Teams Direct Routing.

Step 6: Place a Test Call

Place a test call as follows:

  1. Access the WebUI. Refer to Logging into the SBC Edge.

  2. In the WebUI, click the Diagnostics tab.

  3. In the left navigation pane, click Test a Call.

  4. Configure the parameters as shown below.

  5. Click OK. 

    Place a Test Call - Parameters

    Parameter

    Value

    Destination Number

    Number assigned to a Teams user.

    Origination/Calling Number

    Number assigned to a Local user.

    Call Routing Table

    The routing table that handles the call from Microsoft Teams.

     

    Test a Call - Configuration

    Place a Test Call - Example

     

The test call is now complete. For troubleshooting steps, refer to Best Practice - Troubleshoot Issues with Microsoft Teams Direct Routing.

  • No labels