Noprint |
---|
Info |
---|
Click Link_in_new_tab |
---|
Bold | true |
---|
Text | here |
---|
URL | https://na104.salesforce.com/sfc/p/80000000MWQE/a/3b000000XjGx/eX0R9hDWQSkoEy8T3Io.uv.6IQBx6e.5yc_TxOO5ig0 |
---|
| to view and download a PDF version of this document. |
|
Table of Contents
About SBC Release Notes
This document describes new features, the latest software requirements, known limitations and other pertinent release information for the latest release of SBC Core.
Info |
---|
Please note that all Ribbon bugs reported by customers on a given software release will be fixed in the latest release on that software release branch. To view and download the latest End of Product Sale (EoPS) and other End Of Life (EOL) notices, navigate to the Resource Library on the corporate website (https://ribboncommunications.com/company/get-help/resource-library). |
The SBC Core 07.02.xx documentation is located at the following Wiki space: SBC Core Documentation.
Release Notes Use and Distribution
Ribbon Release Notes are protected under the copyright laws of the United States of America. This work contains proprietary information of Ribbon Communications, Westford, MA-01886, USA. Use, disclosure, or reproduction in any form is strictly prohibited without prior authorization from Ribbon Communications.
Anchor |
---|
| Associated Ribbon Bulletins |
---|
| Associated Ribbon Bulletins |
---|
|
Associated Ribbon Bulletins
The following Ribbon Bulletins are referenced in this release note:
- Warning-18-00028165: SBC 5110 uses wrong encryption key intermittently SRTP
- Warning-17-00022847: The DNS configuration parameters within the address contexts may cause certain configurations to fail during an upgrade
- Warning-17-00022689: Duplicate Trunk Group or Zone names can cause unexpected behavior
- Bulletin-18-00028529: The System Security Intrusion Detection AIDE Reports False Positive Alarms
Problems or Questions
For problems or questions, contact Ribbon Support through telephone or fax:
Worldwide Voice: 1 (978) 614-8589
USA Toll-free: 1 (888) 391-3434
Worldwide Fax: 1 (978) 614-8609
About SBC Core
The SBC Core platforms address the next-generation needs of SIP communications by delivering media transcoding, robust security and advanced call routing, enabling service providers and enterprises to quickly and securely enhance their network by implementing services like SIP trunking, secure Unified Communications and Voice over IP (VoIP).
For more product information, refer to the section About SBC Core in the main documentation space.
Interoperability
The SBC Core software interoperates with the following:
- SIP compliant IADs and IP-PBXs
- PSX Policy Server Softswitch via SIP redirects and/or Diameter+ protocol
- SBC 9000 through SIP call signaling and Networks MCS protocol
- NetScore collection, analysis, monitoring, and reporting of selected Key Performance Indicators (KPIs) on a near-real time basis
Info |
---|
|
NetScore maintains a list of remote host keys for all nodes from which it collects data. If NetScore is deployed in your network, connectivity to the SBC will be lost any time the SBC software is reinstalled because the SBC’s host key is updated during the install. Refer to NetScore Release Notes for steps needed to reconnect to the SBC. |
Compatibility with Ribbon Products
Tip |
---|
|
When upgrading your network, ensure to upgrade each product to the most current release to take advantage of the latest features, enhancements, and fixes. |
Info |
---|
|
For complete interoperability details between various Ribbon products, including backwards compatibility, refer to Ribbon Product Compatibilities. |
Refer to SBC 5000-7000-SWe Interoperability Matrices for the latest and minimum compatible product versions supporting the 07.02.00S401 release.
SBC SWe Cloud for AWS
Sample AWS CFN Templates Included in This Release
To instantiate the SBC instances, the following templates are used:
Caption |
---|
|
Template | Description |
---|
AWS_Stand_Alone_template.json | Orchestration of Standalone SBC. | AWS_HFE_HA_template_auto_subnet.json | HA with High-Availability Front End (HFE) and PKT0 subnet auto created. | AWS_HFE_HA_template.json | HA with HFE and PKT0 subnet. Not auto created, and user choice of subnet selection. | AWS_HA_template.json | Orchestration of High-Availability SBC. |
|
SBC SWe Cloud Requirements for AWS
Info |
---|
|
Prior to the 7.0 release, the default CLI admin user name and password for AWS SWe was admin/admin. Release 7.2 removes passwords for linuxadmin and admin users and enforces additional user account security practices for SBC SWe deployments in AWS. The following significant changes are introduced in the SBC 07.02.00S400 instances on AWS: |
Info |
---|
|
Ribbon recommends m5.xlarge or higher instance type if this instance type is available in your zone. Use c5.2xlarge instance type or higher to handle more calls with transcoding. As of release 7.2S401, only following Instance types are supported for deployment in AWS: m5.xlarge m5.2xlarge - c5.2xlarge
- c5.4xlarge
- c5.9xlarge
- c5n.2xlarge
- c5n.4xlarge
- c5n.9xlarge
- g3.4xlarge
- p3.2xlarge
|
SBC SWe Cloud for GCP
SBC SWe Cloud Requirements for GCP
Info |
---|
|
- Only standalone SBC is supported on GCP.
- Only Sandybridge and Broadwell processor types are supported.
- Only one private IP and one public IP can be associated per interface.
- An SSH key pair cannot be used because cloud-init support is not available in current Debian version of SWe.
- SSH console access from the dashboard is not supported in this release. However, the interactive serial console access is supported.
- Template-based deployment not supported in this release.
|
Required Software Versions
The following SBC software versions are required for this release:
Caption |
---|
0 | Table |
---|
1 | Required Software Versions |
---|
|
Components | Software/Firmware | Version |
---|
SBC Application | Operating System (OS) Version | V06.02.00-S401 |
---|
SonusDB | V07.02.00-S401 | SBC Application | V07.02.00-S401 | EMA | V07.02.00-S401 |
|
How to Verify Currently Installed Software Versions
Use the EMA to verify the currently installed software versions.
Log on to the EMA, and from the main screen navigate to Monitoring > Dashboard > System and Software Info.
Anchor |
---|
| Upgrade Notes |
---|
| Upgrade Notes |
---|
|
Upgrade Notes
Warning |
---|
|
A software upgrade on SBC SWe should only be performed during periods of lower call activity. If the total number of active calls approaches the capacity limit of the SWe during upgrade, a double failure may occur tereby losing all active calls. If such a failure occurs, both active and standby SBC services will go down. Contact Ribbon Support immediately. |
Info |
---|
|
Release 7.2 of AWS requires that prior to upgrade you must update the user-data to include SSH keys for the admin account, and provide settings to enable creation of Linux cgroups to support 3rd Party application (cgroup only if needed). Please refer to the procedures in AWS SBC Software Upgrade Support. |
Info |
---|
|
As an SBC Core password security enhancement, user passwords automatically expire after upgrading to 7.2.x. As a result, users are required to change their passwords upon initial login immediately following the upgrade. |
Info |
---|
|
Once installed, resizing instances in AWS is not supported. |
Supported Live Software Upgrade (LSWU) Paths
The following are the supported upgrade paths for this release.
- 07.02.00S400 to 07.02.00S401
- 07.00.00S406 to 07.02.00S401
- 07.00.00S407 to 07.02.00S401
New Features
New features in 07.02.00S401 Release
No new features are included in the 07.02.00S401 Release.
Resolved Issues
Resolved Issues in 07.02.00S401 Release
The following issues are resolved in this release:
Div |
---|
|
Caption |
---|
| Issue ID | Sev | Problem Description | Resolution |
---|
| 1 | PortFix SBX-86684: SCM Process cores when Refer call is made where more than 2 SCM's are present in an ISBC setup. When N:1 changes came, Refer code was not modified to pick the changes of N:1 slot ID.
Platform/Feature: SBC | Modified refer code to pick N:1 changes for slot ID. | SBX-87944 / SBX-89230 | 2 | Blind transfer call fail due to DLRBT. The internal tone flag on leg B was not reset properly. This resulted in leg C failing to cancel tone. Platform/Feature: SBC | Reset the tone flag when B is connected. |
|
|
Resolved Issues in 07.02.00S400 Release
The following issues are resolved in this release:
Div |
---|
|
Caption |
---|
| Issue ID | Sev | Problem Description | Resolution |
---|
SBX-86137 / SBX-85900 | 2 | DRM/XRM Congestion Alarms - AWS SBC. Platform/Feature: SBC CE: HA | Issue was caused by AIDE process periodically starting through CRON job. Disabled process as it is not supported on SBC AWS at this point and was removed from CRON. | SBX-87448 | 3 | In AWS SBC, ssh keys stored in confd database are lost during upgrade to 07.xx.xx. Platform/Feature: SBC Core: AWS | In AWS, where volume replacement based upgrades are used, standby undergoing an upgrade was not requesting confd.conf keys from the older active. This resulted in any ssh keys stored in confd database being lost during the upgrade. This was resolved by having the standby undergoing upgrade request confd.conf keys from the active before proceeding with the upgrade. |
|
|
Known Issues
Known Issues in 07.02.00S401 Release
There are no known issues in this release.
Known Issues in 07.02.00S400 Release
The following issues exist in this release:
Div |
---|
|
Caption |
---|
| Issue ID | Sev | Problem Description | Impact / Workaround |
---|
SBX-87531 | 3 | On initial deployment using CFN, the SBC may fail to come into service in an HA SBC with HFE configuration. The sbcDiagnostic.sh script shows "ERROR:LifeCycleAgent:EIP is not associated on HFE secondary IP : 172.31.10.99 , Exiting LCA !!!". This issue caused by a random race condition between HFE and SBC instantiation. If SBC instantiation completes before HFE, then this error will occur. Platform/Feature: SBC Core: AWS | Impact: The SBC will not come into service unless rebooted. Workaround: Reboot both SBC instances. |
|
|
Known Limitations
The following limitations exist in this release:
- This release supports Amazon Web Services(AWS) deployment with Ribbon SBC.
- This release also provides limited support for Google Cloud Platform(GCP) with Ribbon SBC - contact Ribbon before attempting to deploy SBC in GCP.
- Only standalone SBC is supported on GCP.
- Only a four VCPU instance profile (with 15GiB memory and Intel Broadwell or later CPU) is supported on GCP
- Upgrade Support is limited.
- Only latest AWS field release SBC Release 07.00.00S406 to AWS SBC Release 07.02.00S401 is supported.
- Upgrade of GCP instances is not supported.
Restricted Functionality with SBC in Public Cloud Release
The following functionalities are not supported with SBC Public Cloud:
- Far end NAT traversal
- RTCP termination for pass-through calls
- Direct Media and Antitrombone
- NICE
- Rx, Rf interfaces
- Multimedia - MSRP, BFCP
- Fax detection
- ICE/STUN
- SIP REPLACE
Two stage calls
- H323 support
- GW signaling support
Restricted Functionality with SBC for AWS
The following functionalities are not supported with SBC for AWS:
- The EC2 does not support VM console. The SSH must be used to access the VM.
- The
smarctl
disk status is not supported on Amazon instance. - All the networking ports must be in different subnets.
- The instance creation and reboot process take approximately 4 to 6 minutes to complete.
- IP spoofing or L2 learning is not supported.
- It is required to associate an EIP on MGT0 for an HA, and the CFN template automatically assigns the EIP. This is required for communicating with AWS servers while instance switchover. The EIP switchover takes 15-20 seconds.
Restricted Functionality with SBC in GCP
- Only standalone SBC is supported on GCP.
- Only Sandybridge and Broadwell processor types are supported.
- Only one private IP and one public IP can be associated per interface.
- An SSH key pair cannot be used because cloud-init support is not available in current Debian version of SWe.
- SSH console access from the dashboard is not supported in this release. However, the interactive serial console access is supported.
- Template-based deployment not supported in this release.