Page History
...
Info | ||
---|---|---|
| ||
A tenant is used within the Microsoft environment to describe a single independent enterprise that has subscribed to Office 365 services; through this tenant, administrators can manage projects, users, and roles. |
Microsoft Teams Direct Routing Configuration
Consult the Microsoft documentation for the Direct Routing interface configuration guidelines, including the RFC standards and the syntax of SIP messages.
Anchor | ||||
---|---|---|---|---|
|
Info |
---|
Support for an SBC behind a NAT is in SBC Edge 1000/2000 Release 8.0.2 and later only; support in SBC SWe Lite Edge is planned for a later release. |
Obtain IP Address, FQDN & Public Certificate
Requirements for configuring the SBC Edge in support of Teams Direct Routing include:
Caption | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||
*NAT translates a public IP address to a Private IP address. |
Anchor | ||||
---|---|---|---|---|
|
The SBC FQDN must be from one of the Domain names registered in “Domains” of the Tenant. The table below lists Domain Name examples.
...
Caption | |||||||||
---|---|---|---|---|---|---|---|---|---|
| |||||||||
|
Info |
---|
Users may be from any SIP domain registered for the tenant. For example, you can configure user user@SonusMS01.com with the SBC FQDN name sbc1.hybridvoice.org, as long as both names are registered for the tenant. |
...
Note | ||
---|---|---|
| ||
Verify the correct domain name is configured for the Tenant. The correct domain name is required for the SBC to pair with Microsoft Teams.
|
Anchor | ||||
---|---|---|---|---|
|
Firewall Settings
The following section details the requirements for ports, protocols and services for firewalls in the path of Direct Routing calls.
...
Note |
---|
Ribbon recommends the deployment of the SBC Edge product (including the SBC SWe LiteEdge) behind a firewall, within the DMZ, regardless of the assignment of a public IP to the SBC in question. Refer to to SBC Edge Portfolio Security Hardening Checklist for more information about the SBC and firewalls. |
Anchor | ||||
---|---|---|---|---|
|
Inbound Public (Internet to SBC)
SIP TLS: TCP 5061*
- Media for SBC 1000: UDP 16384-17584**
- Media for SBC 2000: UDP 16384-19384*
Outbound Public (SBC to Internet)
DNS: TCP 53
DNS: UDP 53
NTP: UDP 123
SIP TLS: TCP 5061
Media: UDP 49152-53247
Public Access Information
The tables below represent ACL (Access Control List) examples that protect the SBC Edge; these attributes are automatically provisioned if the Teams-related Easy Configuration wizards are used (applies to the greenfield deployment scenario only).
...
Caption | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Caption | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
* Define in Tenant configuration
...
** Depends of the Media Port paired configured in SBC
Firewall Securing the SBC with Media Bypass
Apply the following firewall rules below:
Info |
---|
The Teams Client IP address cannot be predicted. As a result, allow Any IP (0.0.0.0/0). |
Inbound Public (Internet to SBC)
Media for SBC 1000: UDP 17586-21186**
Media for SBC 2000: UDP 19386-28386**
Outbound Public (SBC to Internet)
Media: UDP 50000-50019
If the device that handles the NAT between the Teams Client and SBC Public IP is performing PAT (
), verify that this device has the source port range of the Teams Client media or open all the ports from 1024 to 65535....
For SBC not using NAT, there must be access between the firewall and the SBC's Public IP.
Public Access
The tables below represent ACL (Access Control List) examples that protect the SBC Edge; these ACL attributes are automatically provisioned if the Teams-related Easy Configuration wizards are used (applies to the greenfield deployment scenario only).
Caption | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||
|
Caption | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||
|
* Define in Tenant configuration
...