Page History
...
- To locate the SBC Edge software current running, refer to: Viewing the Software Version and Hardware ID.
- To download and upgrade a new version of SBC Edge software, refer to: Installing and Commissioning the SBC Edge and SBC SWe LitePortfolio.
Obtain IP Address and FQDN
Requirements for configuring the SBC Edge in support of Teams Direct Routing include:
...
...
SBC Edge Requirements
Requirement | How it is Used |
---|---|
Public IP address of NAT device (must be Static)* Private IP address of the SBC | Required for SBC Behind the NAT deployment. |
Public IP address of SBC | Required for SBC with Public IP deployment. |
Public FQDN | The Public FQDN must point to the Public IP Address. |
*NAT translates a public IP address to a Private IP address.
Anchor | ||||
---|---|---|---|---|
|
...
Users may be from any SIP domain registered for the tenant. For example, you can configure user user@SonusMS01.com with the SBC FQDN name sbc1.hybridvoice.org, as long as both names are registered for the tenant.
Pagebreak |
---|
...
Domain Name Examples
Domain Name* | Use for SBC FQDN? | FQDN Names - Examples |
---|---|---|
SonusMS01.com | Valid names: | |
Valid names:
Non-Valid name: sbc1.europe.hybridvoice.org (requires registering domain name europe. hybridvoice.org in “Domains” first) |
*Do not use the *.onmicrosoft.com tenant for the domain name.
...
Configure Domain Names - Example
...
Obtain Certificate
Public Certificate
The Certificate must be issued by one of the supported certification authorities (CAs). Wildcard certificates are supported.
Refer to Microsoft documentation for the certificate information.
Refer to CCADB Documentation for the comprehensive list of supported CAs.
- Refer to Domain Name for certificate formats.
...
Expand | |||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||||||
Microsoft Teams Direct Routing allows only TLS connections from the SBC for SIP traffic with a certificate signed by one of the trusted certification authorities. Request a certificate for the SBC External interface and configure it based on the example using GlobalSign as follows:
Step 1: Generate a Certificate Signing Request and obtain the certificate from a supported Certification Authority (CA)Many CA's do not support a private key with a length of 1024 bits. Validate with your CA requirements and select the appropriate length of the key.
Step 2: Deploy the SBC and Root/Intermediate Certificates on the SBCAfter receiving the certificates from the certification authority, install the SBC Certificate and Root/Intermediate Certificates as follows:
|
Firewall Rules
Ribbon recommends the deployment of the SBC Edge product behind a firewall, within the DMZ, regardless of the assignment of a public IP to the SBC in question. Refer to SBC Edge Portfolio Security Hardening Checklist for more information about the SBC and firewalls.
...
Expand | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Inbound Public (Internet to SBC)
Outbound Public (SBC to Internet)
Public Access Information | 0 | Table||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Caption | 1 |
Description | Protocol | Action | Src IP Address | Src Port | Dest IP Address | Dest Port |
---|---|---|---|---|---|---|
Outbound DNS Reply | TCP | Allow | 0.0.0.0/0 | 53 | SBC/32 | 0-65535 |
Outbound DNS Reply | UDP | Allow | 0.0.0.0/0 | 53 | SBC/32 | 0-65535 |
Outbound NTP Reply | UDP | Allow | 0.0.0.0/0 | 123 | SBC/32 | 123 |
Outbound SIP Reply | TCP | Allow | 0.0.0.0/0 | 5061 | SBC/32 | 1024-65535 |
Inbound SIP Request | TCP | Allow | 0.0.0.0/0 | 1024-65535 | SBC/32 | 5061* |
Inbound Media Helper | UDP | Allow | 52.112.0.0/14 52.120.0.0/14 | 49152-53247 | SBC/32 | 16384-17584** |
Deny All | Any | Deny | 0.0.0.0/0 | 0.0.0.0/ |
0 |
Public Access Out - Requirements
Description | Protocol | Action | Src IP Address | Src Port | Dest IP Address | Dest Port |
---|---|---|---|---|---|---|
Outbound DNS Request | TCP | Allow | SBC/32 | 0-65535 | 0.0.0.0/0 | 53 |
Outbound DNS Request | UDP | Allow | SBC/32 | 0-65535 | 0.0.0.0/0 | 53 |
Outbound NTP Request | UDP | Allow | SBC/32 | 0-65535 | 0.0.0.0/0 | 123 |
Outbound SIP Request | TCP | Allow | SBC/32 | 0-65535 | 0.0.0.0/0 | 5061 |
Inbound SIP Reply | TCP | Allow | SBC/32 | 5061* | 0.0.0.0/0 | 1024-65535 |
Outbound Media Helper | UDP | Allow | SBC/32 | 16384-17584** | 52.112.0.0/14 52.120.0.0/14 | 49152-53247 |
Deny All | Any | Deny | 0.0.0.0/0 | 0.0.0.0/0 |
* Define in Tenant configuration
** SBC SWe Lite Edge does not require this rule to be created since Media ports are opened as needed. This rule is required only for SBC 1000, SBC 2000 and then depends of the Media Port paired configured in the SBC.
...
Expand | ||||||
---|---|---|---|---|---|---|
| ||||||
Apply the following firewall rules below:
Inbound Public (Internet to SBC)Media for SBC 1000: UDP 17586-21186** Media for SBC 2000: UDP 19386-28386** Outbound Public (SBC to Internet)Media: UDP 50000-50019 If the device that handles the NAT between the Teams Client and SBC Public IP is performing PAT ( ), verify that this device has the source port range of the Teams Client media or open all the ports from 1024 to 65535.For SBC behind NAT, the firewall should allow access between the firewall IP and the NAT device's IP. For SBC not using NAT, there must be access between the firewall and the SBC's Public IP. Public Access The tables below represent ACL (Access Control List) examples that protect the SBC Edge; these ACL attributes are automatically provisioned if the Teams-related Easy Configuration wizards are used (applies to the greenfield deployment scenario only). caption | ||||||
0 | Table | 1 |
Description | Protocol | Action | Src IP Address | Src Port | Dest IP Address | Dest Port |
---|---|---|---|---|---|---|
Inbound Media Bypass Helper | UDP | Allow | 0.0.0.0/0 | 1024-65535 | SBC/32 | 16384-21186** |
Public Access Out - Requirements (Media Bypass Scenario)
Description | Protocol | Action | Src IP Address | Src Port | Dest IP Address | Dest Port |
---|---|---|---|---|---|---|
Outbound Media Bypass Helper | UDP | Allow | SBC/32 | 16384-21186** | 0.0.0.0/0 | 1024-65535 |
* Define in Tenant configuration
** SBC SWe Lite Edge does not require this rule to be created since Media ports are opened as needed. This rule is required only for SBC 1000, SBC 2000 and then depends of the Media Port paired configured in the SBC.
...