Anchor | ||||
---|---|---|---|---|
|
Add_workflow_for_techpubs | |||||||||
---|---|---|---|---|---|---|---|---|---|
|
|
Warning | ||
---|---|---|
Warning | ||
| ||
You must follow these steps completely and in the order shown. Failure to do so increases the risk of node failure. | ||
Section | ||
Column | | |
| ||
Panel | Table of Contents | |
| ||
Column |
Info | ||
---|---|---|
| About this Page | |
The intent of this article to provide a step-by-step procedure for CCE High Availability Deployment on SBC Edge. |
Following diagram displays the typical CCE Deployment Scenarios:
A public domain name prepared and mapped with your Office 365 tenant.See: Create an Office 365 tenant
An Office 365 tenant with some E5 license or E3 + Cloud PBX. See: Create an Office 365 tenant.
Have an O365 tenant account with ADMIN privileges that will be used during CCERe-DeploymentSpecificSteps.
A public certificate authority ready to sign a certificate for EDGE FQDN. See https://technet.microsoft.com/en-us/library/mt605227.aspx, Information you need to gather before deployment \ Certificate requirements.
A properly configured firewall. See: https://technet.microsoft.com/en-us/library/mt605227.aspx. See https://technet.microsoft.com/en-us/library/mt605227.aspx, Information you need to gather before deployment \ \ Ports and protocols.
Latest System Release 6.1.0 SBC Firmtware.
Latest System Release 6.1.0 SbcComms Firmware.
Caption | ||||
---|---|---|---|---|
| ||||
Info | ||||||||
---|---|---|---|---|---|---|---|---|
Optionally, if you want to configure a secondary |
| |
Microsoft's Windows Update and Cloud Connector Edition update can be triggered by Microsoft from Office 365. The CCE will not be functional until Windows Updates completes the download and installation.. Windows Update could also restart the ASM. If no calls can be established (typically the failure is between CCE and O365) but the relevant Signaling Group is up, the following two issues can be expected:
In some instances, an ASM being updated has also closed the SIP Signaling Group. Technicians can manually stop and disable the Windows Update service, which will re-instantiate as a manual, running process after the ASM is restarted. |
Panel | |
---|---|
In this section...
|
A public domain name prepared and mapped with your Office 365 tenant.See Create an Office 365 Tenant.
Spacevars | ||
---|---|---|
|
An Office 365 tenant with an E5 license or E3 + Cloud PBX.
You must have the Global administrator role for your O365 tenant account.
A public certificate authority ready to sign a certificate for the
Spacevars | ||
---|---|---|
|
A properly configured firewall. See Ports and Protocols at Microsoft Technet.
Latest SBC Firmware.
Latest SbcComms Firmware.
The following diagram shows typical CCE deployment scenarios on a PSTN site. The PSTN site is a combination of Cloud Connector instances, deployed at the same location, and with common PSTN gateways pool connected to them. PSTN sites allow you to:
Provide connectivity to gateways closest to your users.
Allow for scalability by deploying multiple Cloud Connector instances within one or more PSTN sites.
Allow for high availability by deploying multiple instances of Cloud Connector within a single PSTN site.
Caption | ||||
---|---|---|---|---|
| ||||
Scenario 1 and Scenario 2 are covered in Configuring the SBC Edge for a Single CCE. This document contains steps for Scenario 3 and Scenario 4 .
Noprint |
---|
For this best practice, the CCE is deployed For this best practice, CCE deployment is completed in the following network:
Caption | ||||
---|---|---|---|---|
| ||||
|
The In this best practice the router/firewall is configured with the following rules are applied:
Caption | ||||
---|---|---|---|---|
| ||||
d Firewall Rules fu |
Microsoft defines the multi-site CCE deployment in https://technet.microsoft.com/en-us/library/mt740650.aspx. Based on this article, we will use the following information in our best practice example:
CCE Site FQDN | Aepsite1.sonusms01.com |
CCE-1: Edge Server External IP | 192.168.211.86 | CCE-2 Edge Server External IP | 192.168.211.81 | |
CCE-1: Edge Server Public IP | 12.8.245.86 | CCE-2: Edge Server Public IP | 12.8.245.81 | |
CCE-1: Domain Controller IP | 192.168.210.115 | CCE-2: Domain Controller IP | 192.168.210.121 | |
CCE-1: Central Management Store IP | 192.168.210.116 | CCE-2: Central Management Store IP | 192.168.210.122 | |
CCE-1: Mediation Server IP | 192.168.210.117 | CCE-2: Mediation Server IP | 192.168.210.123 | |
CCE-1: Edge Server Internal IP | 192.168.210.118 | CCE-2: Edge Server Internal IP | 192.168.210.124 | |
SBC-1 FQDN and IP | 192.168.210.113 | SBC-2 FQDN and IP | 192.168.210.125 |
Based on above table entries and on our deployment scenario, make sure that CCE FQDN is resolving to both Edge Server PublicIP addresses. To do so, login to your DNS server and create the relevant entries as shown below:
Warning |
---|
The following sections describe a clean install of the CCE. If your environment has already deployed with CCE, and you are planning to re-deploy, it is necessary to clean up the site(s) that may already exists in O365. To do so, please follow the steps in CCE Re-Deployment Specific Steps in Best Practice for CCE Deployment on SBC Edge. |
Both ASMs must be re-initialized with the latest image that contains the latest CCE software (in this example it is 1.4.1 version).
To do so:
ASM-1 | ASM-2 |
---|---|
Both ASM's must be re-initialized with the latest image that contains the latest CCE software (in this example it is 1.4.1 version).
To do so:
ASM-1 | ASM-2 |
---|---|
Change the Admin Password on both ASM:
ASM-1 | ASM-2 |
---|---|
SBC-1 | SBC-2 |
---|---|
CCE-1 | CCE-2 |
---|---|
CCE-1 | CCE-2 |
---|---|
CCE-1 | CCE-2 |
---|---|
After the step above, several checks and (if needed) corrections are needed in the INI file.
The CCE deployment internally sets the domain suffix as defined under VirtualMachineDomain attribute. Although your SBC may have an FQDN that can be reached from your corporate network, it is important to setup the SBC's Gateway FQDN parameter accordingly with the VirtualMachineDomain value, so that CCE can communicate with SBC without a problem.
In addition, when deploying a High Availability systems, it is important to have Management IP Prefix to be unique on each HA system. For instance, if your HA Master CCE system has 192.168.213.x as the Management IP Prefix, you need to be sure to configure this attribute differently on HA Slave system. While doing this, also make sure that subnet that you are defining in this field does NOT conflict in your IP infrastructure.
To verify these values or correct them in Configuration.INI file, follow the steps as shown below:
Above step creates a shared site directory that both CCE-1 and CCE-2 will use on SBC Edge-1 ASM. To verify that this particular directory is successfully created proceed with the following steps:
CCE-1 | CCE-2 |
---|---|
ASM-1 | ASM-2 |
---|---|
While on ASM > PoweShell, you may verify the appliances registration by using the O365 Tenant user with Admin privileges (by running series of commands on PowerShell:)
enter the credentials for O365 Admin Tenant
Once the login is successful, execute Get-CsHybridPSTNAppliance command on PowerShell as shown below:
Tip |
---|
Please note that due to a possible certificate issue, this step may fail! Relevant workaround for this is already covered in: after fixing the certificate issue, starting the Edge Server Services, and fixing the Virtual Machine Network adapter settings, CCE High Availability Master Node settings completes. Now you need to publish the CcAppliance to proceed with CcAppliance installation on HA Slave Node. |
Tip |
---|
Similarly, due to a possible certificate issue, this step may fail as well. Relevant workaround for this is already covered in: after fixing the certificate issue, starting the Edge Server Services, and fixing the Virtual Machine Network adapter settings, CCE High Availability Slave Node settings completes. |
Above wizard run configures the necessary settings for SBC Edge-1 and CCE integration, which you can see all relevant configuration items in Settings tab as shown below:
Above wizard run configures the necessary settings for SBC Edge-2 and CCE integration, which you can see all relevant configuration items in Settings tab as shown below:
To allow SIP communication between the CCE Mediation Server and SBC-Edge, Split DNS entries need to be added on each SBC-Edge systems with the following information:
as shown below:
SBCE Edge-1 | SBCE Edge-2 |
---|---|
Lastly, the Mediation Server FQDNs MUST be added to SIP Server Table and SIP Signaling Group Federated FQDN fields with the following information:
SBCE Edge-1 | SBCE Edge-2 |
---|---|
| |
Make sure that CCE FQDN is resolving to the
Spacevars | ||
---|---|---|
|
Warning |
---|
The following sections describe a clean install of the CCE. If your environment has already deployed with CCE, and you are planning to re-deploy, it is necessary to clean up the site(s) that may already exists in O365. To do so, please follow the steps in CCE Re-Deployment Specific Steps in Re-initializing the ASM. |
Noprint |
---|
Tip |
---|
For best results:
|
Note |
---|
During the initial setup, SBC Edge have to be configured with two IP interfaces, one for internal company network (corporate network), and the second one for DMZ network (Internet network) as shown below: |
Caption | ||||
---|---|---|---|---|
| ||||
Caption | ||||
---|---|---|---|---|
| ||||
|
Info | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
When configuring a secondary
|
If your ASM has been used previously, reinitialize it following the steps in Re-Initializing the ASM.
Confirm that the ASM is ready to deploy the CCE by following these steps.
Note | ||||
---|---|---|---|---|
Perform these steps on both
|
Step | Action | |||||||
---|---|---|---|---|---|---|---|---|
1 | Login to the WebUI of the
| |||||||
2 | Click the Task tab, and then click Opreational Status. | |||||||
3 | Verify that:
| |||||||
4 | Change the ASM Admin password:
|
Noprint |
---|
Deploying CCE 1.4.1 on the
Spacevars | ||
---|---|---|
|
Spacevars | ||
---|---|---|
|
Spacevars | ||
---|---|---|
|
Note | ||
---|---|---|
| ||
|
Anchor | ||||
---|---|---|---|---|
|
Note | ||||
---|---|---|---|---|
Perform these steps on both
|
Step | Action | ||||
---|---|---|---|---|---|
1 | Login to the WebUI of both
| ||||
2 | Navigate to Tasks > Setup Cloud Connector Edition. | ||||
3 | Click the ASM Config tab and configure/verify the Network and IP settings of your ASM as shown below.
CCE-1
CCE-2 | ||||
4 | Click Apply. After receiving the activity status as successfully completed, click the Generate CSR tab. |
This process is required only if you don't have a public certificate for your deployment. If you already have a certificate, proceed to Import Certificate.
Note | ||||
---|---|---|---|---|
Perform these steps on only one of the
|
Step | Action | |||||||
---|---|---|---|---|---|---|---|---|
1 | Login to the WebUI of one of the
| |||||||
2 | Navigate to Tasks > Setup Cloud Connector Edition > Generate CSR. | |||||||
3 | Generate the CSR as shown below with following information. Note: This example uses aepsite1.sonusms01.com and sip.sonusms01.com as common name and SAN To ensure creating a valid CSR for Cloud Connector Edition usage, please see the section "Certificate requirements" on https://technet.microsoft.com/en-us/library/mt605227.aspx .
|
Noprint |
---|
Note | ||||
---|---|---|---|---|
Perform these steps on both
|
Step | Action | ||||
---|---|---|---|---|---|
1 | Login to the WebUI of both
| ||||
2 | Navigate to Tasks > Setup Cloud Connector Edition and then click the Import Certificate/Keys tab. | ||||
3 | On SBC-1, click the Action drop-down list and select the appropriate option:
CCE-1
CCE-2 | ||||
4 | Click OK. | ||||
5 |
|
Anchor | ||||
---|---|---|---|---|
|
Note | ||||
---|---|---|---|---|
Perform these steps on both
|
Step | Action | ||||
---|---|---|---|---|---|
1 | Login to the WebUI of the
| ||||
2 | Open the Tasks tab and click Setup Cloud Connector Edition in the navigation pane. | ||||
3 | Click the Configure CCE tab. | ||||
4 | Configure all necessary information and then click OK as shown below: CCE-1
CCE-2 | ||||
5 | After receiving the activity status as successfully completed, click the Prepare CCE tab to continue. |
Warning |
---|
Noprint |
---|
You must verify (and possibly correct) the CCE Configuration INI File after configuring the CCE.
Info | ||||||||
---|---|---|---|---|---|---|---|---|
The CCE deployment internally sets the domain suffix as defined under VirtualMachineDomain attribute. Although your In addition, when deploying a High Availability (HA) systems, it is important to have Management IP Prefix unique on each HA system. For instance, if your HA Master CCE system has 192.168.213.x as the Management IP Prefix, you need to be sure to configure this attribute differently on HA Slave system. While doing this, also make sure that subnet that you are defining in this field does not conflict in your IP infrastructure. |
Note | ||||
---|---|---|---|---|
Perform these steps on both
|
Follow these steps to verify and correct values in the CCE Configuration INI File.
Note | ||||
---|---|---|---|---|
Perform these steps on both
|
Step | Action | |||||||
---|---|---|---|---|---|---|---|---|
1 | Login to the WebUI of the
| |||||||
2 | Click the Configure CCE tab and then click Click to re-configure CCE application. | |||||||
3 | Click OK on the popup dialog box. | |||||||
4 | Click the Edit Raw Config button. | |||||||
5 | Verify/correct the values in the CCE Configuration INI File and then click OK.
|
Note | ||||
---|---|---|---|---|
Perform these steps on both
|
Step | Action | ||||
---|---|---|---|---|---|
1 | Login to the WebUI of both
| ||||
2 | Open the Tasks tab and click Setup Cloud Connector Edition in the navigation pane. | ||||
3 | Click the Prepare CCE tab. | ||||
4 | Click the Prepare CCE button, enter the password for Edge Server External Certificate, and then click OK: CCE-1
CCE-2 | ||||
5 | To complete the deployment, continue with Manually Configuring the CCE on the ASM. |
Noprint |
---|
Anchor | ||||
---|---|---|---|---|
|
Manually deploying CCE on the ASM requires:
Registering the CCE Appliance
Installing the CCE Appliance
Note | ||||
---|---|---|---|---|
Perform these steps on only one of the
|
Step | Action | ||||
---|---|---|---|---|---|
1 | Remote desktop to the ASM of the
| ||||
2 | Launch PowerShell. | ||||
3 | Execute the following commend for HA Master:
| ||||
4 | Enter the password(s) as prompted for the various users. | ||||
5 | When prompted for the online tenant administrator user name and password, make sure to enter this information correctly. If you make a mistake, refer to Manage Your Office 365 Tenant | ||||
6 | After successful execution, remote desktop to the ASM of the
| ||||
7 | Launch PowerShell. | ||||
8 | Execute the following commend for the HA Slave, and enter the appropriate password(s) when prompted:
ASM-1
ASM-2 |
Noprint |
---|
Step | Action | ||||
---|---|---|---|---|---|
1 | Remote desktop to the ASM of the
| ||||
2 | Launch PowerShell. | ||||
3 | Execute the following command for the HA Master, and enter the appropriate password(s) when prompted:
|
Step | Action | ||||
---|---|---|---|---|---|
1 | Remote desktop to the ASM of the
| ||||
2 | Launch PowerShell. | ||||
3 | Execute the following command, and enter the appropriate password(s) when prompted:
|
Step | Action | ||||
---|---|---|---|---|---|
1 | Remote desktop to the ASM of the
| ||||
2 | Launch PowerShell. | ||||
3 | Execute the following command for the HA Master, and enter the appropriate password(s) when prompted:
|
After the CCE is deployed, integrate the
Spacevars | ||
---|---|---|
|
Spacevars | ||
---|---|---|
|
SIP Provider (193.168.210.103) – SBC Edge (193.168.210.125) – CCE (mediation Server: 193.168.210.123) – O365 Cloud
Step | Action | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Login to the WebUI of
| ||||||||||||||
2 | Navigate to Tasks > SBC Easy Setup and then click the Easy Configuration Wizard. | ||||||||||||||
3 | Follow steps 1, 2, and 3 as shown in the following figure and then click Finish.
The wizard configures the necessary settings for SBC Edge-1 and CCE integration, after which you can see all relevant configuration items in Settings tab as shown below:
|
Noprint |
---|
Step | Action | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Login to the WebUI of
| ||||||||||||||
2 | Navigate to Tasks > SBC Easy Setup and then click the Easy Configuration Wizard. | ||||||||||||||
3 | Follow steps 1, 2, and 3 as shown in the following figure and then click Finish.
The wizard configures the necessary settings for SBC Edge-2 and CCE integration, after which you can see all relevant configuration items in Settings tab as shown below:
|
The Mediation Server FQDNs must be added to SIP Server Table and SIP Signaling Group Federated FQDN fields with the following information:
Caption | ||||
---|---|---|---|---|
| ||||
Noprint |
---|
Both ASMs must be re-initialized with the latest image that contains the latest CCE software (in this example it is version 1.4.1).
Step | Action | |||||||
---|---|---|---|---|---|---|---|---|
1 | Login to the WebUI of both
| |||||||
2 | Navigate to the Tasks tab and then click Reinitialize. | |||||||
3 | Select the appropriate image from the drop-down menu and click Apply as shown below:
|
If the CCE was previously deployed, previously installed information must be cleared in O365. To do so, follow the steps below.
Step | Action | |||||||
---|---|---|---|---|---|---|---|---|
1 | Remote desktop to the ASM system. | |||||||
2 | Launch PowerShell. | |||||||
3 | Execute the following command:
Import-Module skypeonlineconnector $cred = Get-Credential
| |||||||
4 | When prompted, enter the credentials for O365 Admin Tenant.
| |||||||
5 | Execute the following command:
$Session = New-CsOnlineSession -Credential $cred -Verbose Import-PSSession $session
| |||||||
6 | To remove the current appliance, run the following command and copy the Identity into your clipboard:
Get-CsHybridPSTNAppliance
| |||||||
7 | Enter the following command to remove the appliance:
Unregister-CsHybridPSTNAppliance -Identity <paste the identity here> -Force | |||||||
8 | Enter the following command to verify that the appliance has been removed:
Get-CsHybridPSTNAppliance | |||||||
9 | This completes the cleanup. Continue to Configuring the CCE |
Noprint |
---|
...