In this section:
There are multiple network methods to deploy the Ribbon SBC MS Teams SIP trunking support.
In ESBC Public WAN IP Deployment, the SBC’s WAN interface can be configured with a public IP directly to the perimeter security device and firewall filter rules for the ports-required applied to the firewall policy or placed directly on the public network.
The SBC’s WAN interface is protected by its own firewall and dynamically assigns RTP/SRTP ports for the duration of the SIP session from an array of configurable ports.
Also, the SBC is configured in a private DMZ deployment with a public IPv4 address provided by the perimeter security device. In this model, the perimeter security device must not provide NAT or PAT to the public IPv4 address forwarded to the SBC. This is the model chosen for the SBC’s configuration discussed in the document.
ESBC Public WAN IP Deployment
Configuring the SBC’s WAN and LAN IP Addresses
The system default LAN IP is 192.168.1.1 with username 'root' and password 'default'.
Attach LAN Port 1 of the system to the LAN network or directly to the management computer for the first-time IP networking setup.The system will prompt you to change the default password.
Password change is confirmed. Click the link provided to log in with the new password.
Once you log in, the landing page appears.
Select Network from the Configuration Menu on the left-hand side.
Configure the LAN Interface Settings.
Configure the WAN Interface and Default Gateway Settings.
Configure the Primary and the Secondary DNS to a public DNS server and select Submit. The system will now apply the configured network settings. Install the system on the network and reconnect from the management computer to the configured LAN IPv4 Address and log in.
Creating a CSR
Generate a Certificate Signing Request and obtain the certificate from a supported Certification Authority (CA). Refer to Microsoft documentation for certificate information.
This step discusses how to create a certificate signing request (CSR) to be signed by an approved certificate authority, which are listed at CCADB documentation. The certificate is used by the SBC for TLS SIP signaling support to MS Teams. This signed certificate will be applied to the WAN interface of the system.
Many CAs do not support a private key with a length of 1024 bits. Validate the CSR with your CA requirements and select the appropriate length of the key.
Choose Security > Certificates from the Configuration Menu on the left-hand side.
On the Create a Certificate pane, enter the data for the fields displayed.
Click Download to download the CSR certificate and key file.
Open the .csr file with an application like Notepad and copy the complete certificate request.
Configure the signed certificate on the system by using the Add a Certificate pane on the Certificates page and click Add Certificate. The signed certificate must use the .key file from the CSR generation.
Download the root CA on the system and click Add Certificate.
Select Submit All to save the certificates to the system.
The certificates are now displayed and available to be assigned to system services.
Configuring the SBC’s VoIP Settings
Select VoIP from the Configuration Menu on the left-hand side.
Configure the system’s VoIP settings.
Configure the SIP Server Settings for the SIP trunking service parameters.
- Click Submit to apply changes.
Configuring the B2BUA and Header Manipulation rules
This step discusses how to configure a B2BUA trunking device to the WAN side of the system for MS Teams support. Header manipulation rules are used to modify the headers required for interoperability to-and-from MS Teams and to-and-from the SIP trunking provider.
Choose VoIP > SIP > B2BUA from the Configuration Menu on the left-hand side.
Add a B2BUA Trunking Device for the MS Teams cloud servers and click Update. Then, scroll to the bottom and click Submit.
Create a routing group for the MS Teams servers with the Trunking Group Availability function.
- Choose VoIP > SIP > B2BUA from the Configuration Menu on the left-hand side. Header manipulation rules are used to modify the headers required for interoperability to-and-from MS Teams and to-and-from the SIP trunking provider.
- Scroll down to Actions and add the actions mentioned in the following steps, and associated HMR rules.
- The first Actions is “ToTeams”. This rule has an associated “Match” rule for calls going to Teams.
- Configure the parameters in the actions pane.
- Configure each Header Value one at a time and click Add before creating the next rule.
Click Update and then click Submit to save the action.
NoteIn the example given in the following table, the dialing code +1 is used in reference to the USA. Change it to the dialing code of the country of your choice.
- The second action is FromTeams2ServerAnonymous. This rule has an associated “Match” rule for calls with “Anonymous” in the SIP URI. For example, when a Teams caller is blocking their number, the SIP From URI will have the following format:
From: "Anonymous"sip:anonymous@anonymous.invalid:5060.
This rule allows anonymous calls inbound from Teams to the SIP trunking provider.To add a new action click anywhere in the New Entry bar.
- Configure the parameters in the actions pane.
- Configure each Header Value one at a time and click Add before creating the next rule.
Click Update and then click Submit to save the action.
The third action is “FromTeams2Server”. This rule will have an associated “Match” rule for calls outbound from Teams to the SIP Trunking provider for destination call routing. This example uses a “P-Asserted-Identity” header string which is common to many SIP trunking providers. Please verify with your trunking provider if they require these SIP headers or have other header requirements for interoperability with their SIP service.
To add a new action click anywhere in the New Entry bar.Configure the parameters in the actions pane.
Configure each Header Value one at a time and click Add before creating the next rule.
Click Update and then click Submit to save the action.
Scroll down to the Match pane to configure the patterns you wish to match to the actions just created. The match function provides dial plan routing to Actions and relates to the direction the call is coming from. This could be from Teams or from the SIP trunking provider. The examples given in this section will use a dial plan of 408.555.1000-1099 to provide basic knowledge of how to apply your dial plan to the previously created Actions.
The example uses a “Redirect” rule from Teams as “+1.”. By default, Teams will add this to the beginning of every outbound call going to the SBC for SIP trunk routing. This rule is mapped to the Action.”FromTeams2Server” will remove the +1 from the SIP message and then perform the other header modifications before forwarding the SIP message to the trunking provider. If you’ve configured Teams to not add the +1, then modify the “FromTeams2Server” Action and other header manipulation rules that reference +1 and remove the reference.
The +1. (dot ) portion of the string matches one or more digits. This (dot) allows dialed destinations greater than 10 or 11 digits to be called. If international calling is desired, please verify that the MS Teams voice route to the SBC also includes pattern matches to accommodate international calling. 911, 411 and any other dial plans must also be considered as an SBC or MS Teams pattern match to route the call correctly.NoteMatch rules are in order of priority from top to bottom. A specific rule must be above a generic rule.
The first “Match” rule is for the Teams dial plan assigned by the SIP trunking provider. In this example the DID range for this MS Teams configuration is 408.555.1000-1099.
Configure the parameters in the match pane.
Click Update and then click Submit to save the Match.
The second Match rule is to allow the blocked caller ID’s from Teams, which presents as “anonymous” in the SIP header. For example,
From: "Anonymous"sip:anonymous@anonymous.invalid:5060.
To add a new action click anywhere in the New Entry bar.Configure the parameters in the match pane.
Click Update and then click Submit to save the Match.
The third Match rule is to match +1. SIP messages from MS Teams to the Actions that routes the call to the configured SIP trunking provider, after the header manipulation is performed. This rule is required for normal caller-ID routing.
To add a new action click anywhere in the New Entry bar.Configure the parameters in the match pane.
Click Update and then click Submit to save the Match.
You have now completed the Ribbon Communications EdgeMarc configuration for Microsoft Teams and are ready to start testing calls.
As a final step, save the SBC’s configuration at this point or when you are finished testing.
Saving the ESBC's Configuration
This section discusses how to save the running SBC’s configuration to restore the system back to a known working configuration if required.
Choose Admin > Backup/Restore from the Configuration Menu on the left-hand side.
Click Create New Config Backup. A dialog box will appear. Click OK.
The system will create a backup file of the current running configuration. Click the file name to download the backup file to the management computer.