Add_workflow_for_techpubs |
---|
AUTH1 | UserResourceIdentifier{userKey=8a00a0c85bb25531015bc4122a4f0003, userName='null'} |
---|
JIRAIDAUTH | CHOR-9807 |
---|
REV5 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cabc04c3, userName='null'} |
---|
REV6 | UserResourceIdentifier{userKey=8a00a0c85bb25531015bc4122a4f0003, userName='null'} |
---|
REV3 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cc2d0797, userName='null'} |
---|
REV1 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cef20cbf, userName='null'} |
---|
|
Note |
---|
|
When the is deployed in Azure, the supports Local Media Optimization. The Central SBC and the Proxy SBC roles are supported in all deployments as follows: - Confirm that in all deployments, private interfaces are assured between relevant parties, as identified at: https://docs.microsoft.com/en-us/microsoftteams/direct-routing-media-optimization
- Secondly, acceptable network connectivity and performance between all nodes (typically indicated by KPIs) must be maintained for an acceptable level of LMO service.
- Exercise caution and ensure a high quality link to the Public Cloud (Azure) to ensure acceptable Central SBC/Proxy SBC roles and LMO behavior. Currently, Ribbon and Microsoft strongly encourage the use of ExpressRoute to ensure proper LMO performance.
- Ribbon and Microsoft reserve the right to decline support for LMO issues should proper care and network conditions not meet the requirements listed out in the point above.
|
Info |
---|
|
This best practice uses the term Microsoft Teams Direct Routing, which is also known as Phone System Direct Routing. |
This best practice outlines how to use the to configure the Central SBC with Local Media Optimization for Microsoft Teams Direct Routing. Local Media Optimization allows the Microsoft Teams Direct Routing media flow to always use the shortest path to improve the 's media quality and bandwidth usage. The Microsoft Teams Direct Routing media flow can be directly established between the Teams client and the , even if the does not have Microsoft Teams Direct Routing connectivity. The , , and support the Central SBC. For more details about this feature, refer to Local Media Optimization for Direct Routing.
Caption |
---|
0 | Figure |
---|
1 | Microsoft Teams Direct Routing Media Flow |
---|
|
|
This best practice describes greenfield and migration deployments and explains the requirements for each case. This best practice includes cautions to specify the deployment scenarios.
Though the
,
, and
support the Local Media Optimization Central SBC role for Microsoft Teams Direct Routing, this best practice uses the
as a Central
in the central site as an example.
Info |
---|
|
For the Central , recommends that you use the because it has higher CPS (up to 10 CPS) and higher session density (up to 1200 simultaneous Direct Routing calls).Make sure the licensed quantity of sessions on the accommodates the maximum number of Local Media Optimization calls. |
The Ribbon TEAMS Local Media Optimization (LMO) solution supports Teams Music on Hold (MOH). The Microsoft Teams LMO document suggests disabling the MOH feature for an LMO deployment because not all SBC vendors support the Teams MOH feature for LMO deployments.
Microsoft does not support Early 183. You should disable Early 183 for all
signaling groups that use Local Media Optimization. For information about Early 183, refer to the Early 183 section in
Creating and Modifying SIP Signaling Groups.
This section outlines the prerequisites for Local Media Optimization for Microsoft Teams Direct Routing.
Capacity
When deploying Local Media Optimization, the Central has to handle the local traffic plus all the traffic from other non-LMO SBCs (SBC not processing the LMO calls), You must ensure the Central has the capacity and the license to handle the load. See the following load impacts:
- Call made to and from a Teams client that is internal to the customer network:
- The Central consumes the Proxy Media Mode with Encryption resource.
- The non-LMO SBC (SBC not processing the LMO calls) consumes the SIP with corresponding RTP Media resource.
- Call made to and from a Teams client that is external to the customer network:
- The Proxy consumes the SIP with corresponding RTP Media resource.
- The Downstream consumes the SIP with corresponding RTP Media resource.
The Central
requires the following firmware: 9.0.0 and later.
Info |
---|
|
This document outlines only the recommended firmware. |
You must configure the following for Microsoft Teams Direct Routing:
- You must plan the Microsoft Teams tenant for Local Media Optimization usage according to the Local Media Optimization for Direct Routing document.
- You must configure the Microsoft Teams tenant for Local Media Optimization usage according to the Configure Local Media Optimization for Direct Routing document. When you configure the Microsoft Teams Direct Routing, you must also configure the following items:
CsTenantTrustedIPAddress
CsTenantNetworkRegion
CsTenantNetworkSite
CsTenantNetworkSubnet
CSOnlinePSTNGateway
CsOnlineVoiceRoute
The LMO functionality requires the Downstream SBCs to use a Proxy/Central SBC as a registrar, hence this requires the Proxy/Central SBC to have SIP Registration licenses. This applies for both 1000/2000 and SBC SWe Edge.
The Central requires a certificate signed by a public certificate authority.
The public certificate must be issued by one of the supported certification authorities (CAs). Wildcard certificates are supported.
Domain Name
For the
to pair with Microsoft Teams, the
FQDN domain name must match a name registered in both the
Domains and
DomainUrlMap fields of the Tenant.
Verify the correct domain name is configured for the Tenant as follows:
- On the Microsoft Teams Tenant side, execute Get-CsTenant.
- Review the output.
- Verify that the Domain Name configured is listed in the Domains and DomainUrlMap attributes for the Tenant. If the Domain Name is incorrect or missing, the will not pair with Microsoft Teams.
Users may be from any SIP domain registered for the tenant. For example, you can configure user user@SonusMS01.com with the
FQDN name
sbc1.hybridvoice.org, as long as both names are registered for the tenant.
Caption |
---|
0 | Table |
---|
1 | Domain Name Examples |
---|
|
Domain Name* | | FQDN Names - Examples |
---|
SonusMS01.com | | Valid names: | hybridvoice.org | | Valid names: - sbc1. hybridvoice.org
- ussbcs15. hybridvoice.org
- europe. hybridvoice.org
Non-Valid name: sbc1.europe.hybridvoice.org (requires registering domain name europe. hybridvoice.org in “Domains” first) |
*Do not use the *.onmicrosoft.com tenant for the domain name. |
Caption |
---|
0 | Figure |
---|
1 | Configure Domain Names - Example |
---|
|
|
The Central
FQDN needs to be resolved in a publicly accessible DNS.
Info |
---|
|
This best practice uses host entries. |
This best practice uses the FQDN and ports illustrated in the following figure.
Caption |
---|
0 | Figure |
---|
1 | FQDN and Port Usage |
---|
|
|
This section outlines how to prepare the Central
.
and Perform Initial Setup
Note |
---|
|
Perform this procedure only if you are creating a new for the Central role (a greenfield scenario). |
Use the following procedure to install the
and perform the initial setup:
Installing SBC SWe EdgeOnce your
is up and running, you must configure the
to connect to the Microsoft Teams Direct Routing Server and
allow the Downstream connection.- Access a compatible web browser.
- In the browser, enter the IP address of the in the URL address bar. The Welcome to screen is displayed.
- Review the Pre-Login message.
- Enter the administrator User Name and Password configured during initial setup.
- If the Acknowledge Pre-Login Message checkbox is displayed, click on it to acknowledge you have reviewed the pre-login information above. After initial login, this checkbox can be enabled and disabled via the Global Security Options. By default, this checkbox is configured as disabled.
Click Login. The main screen provides all WebUI functions, including tabbed options, menu tree, device name, and the last login date and time of the system.
Select Tasks > SBC Easy Setup > Easy Config Wizard.
Caption |
---|
0 | Figure |
---|
1 | Easy Config Wizard |
---|
|
|
In the Application field, select your application. This best practice configures the SIP Trunk ↔ Microsoft Teams.
Caption |
---|
0 | Figure |
---|
1 | Easy Configuration Step 1 |
---|
|
|
- Configure the other fields in Step 1 and click Next.
In the SIP Trunk section, configure the Border Element Server with the FQDN or IP of the central SIP Trunk.
In the Teams Connection Type field, select Local Media Optimization.
Info |
---|
The Easy Configuration Wizard automatically generates two ACL tables for Microsoft Teams Direct Routing. In the table that contains the Teams Direct Routing ACL in the name, Rule #4 was setup for deployments where a single ethernet port was used for both Microsoft Teams Direct Routing and a SIP Trunk; this rule may be too permissive for your configuration. If the SBC was deployed with only Microsoft Teams Direct Routing on an ethernet port, Rule #4 could be modified to have the Source IP Address set to 52.112.0.0 and Source Netmask set to 255.252.0.0. This change allows only SIP Signaling from Microsoft Teams. |
Configure the other fields in the Microsoft Teams section and click Next.
Review your configuration information in Step 3 and click Finish.
This section outlines how to import a certificate on the Central
.
Anchor |
---|
| config_certificate |
---|
| config_certificate |
---|
|
Configure and Generate Certificates on the
Expand |
---|
title | Click here to expand for how to generate Certificates on the SBC |
---|
|
Warning |
---|
title | Warning: Common Encryption Certificate Issues Arise from Missing Root Certificates |
---|
| - Did you only install the CA-signed certificate, along with the intermediate certificate(s) sent by your issuing CA?
- Did you get the following error message from the ?
If so, the likely reason is a missing CA Root Certificate. The does not have any pre-installed CA root X.509 certificates, unlike typical browsers found on your PC. Ensure the entire certificate chain of trust is installed on the , including the root certificate. Acquire the CA root certificate as follows:- Contact your system administrator or certificate vendor to acquire the root, and any further missing intermediate certificate(s) to provision the entire certificate chain of trust within the ;
- Load the root certificate, along with the intermediate and certificates, according to Importing Trusted Root CA Certificates.
NOTE: Root certificates are easily acquired from the certificate authorities. For example, the root certificate for the GoDaddy Class 2 Certification Authority may be found at https://ssl-ccp.godaddy.com/repository?origin=CALLISTO . For more information about root certificates, intermediate certificates, and the server (“leaf”) certificates, refer to this tutorial.For other certificate-related errors, refer to Common Troubleshooting Issues with Certificates in SBC Edge Portfolio. |
Microsoft Teams Direct Routing allows only TLS connections from the for SIP traffic with a certificate signed by one of the trusted certification authorities.Request a certificate for the External interface and configure it based on the example using GlobalSign as follows:- Generate a Certificate Signing Request (CSR) and obtain the certificate from a supported Certification Authority.
- Import the Public CA Root/Intermediate Certificate on the .
- Import the Microsoft CA Certificate on the .
- Import the Certificate.
Info |
---|
| The certificate is obtained through the Certificate Signing Request (instructions below). The Trusted Root and Intermediary Signing Certificates are obtained from your certification authority. |
Many CA's do not support a private key with a length of 1024 bits. Validate with your CA requirements and select the appropriate length of the key. - Access a compatible web browser.
- In the browser, enter the IP address of the in the URL address bar. The Welcome to screen is displayed.
- Review the Pre-Login message.
- Enter the administrator User Name and Password configured during initial setup.
- If the Acknowledge Pre-Login Message checkbox is displayed, click on it to acknowledge you have reviewed the pre-login information above. After initial login, this checkbox can be enabled and disabled via the Global Security Options. By default, this checkbox is configured as disabled.
Click Login. The main screen provides all WebUI functions, including tabbed options, menu tree, device name, and the last login date and time of the system. - Access Settings > Security > SBC Certificates.
Click Generate CSR. Enter data in the required fields. Click OK. After the Certificate Signing request finishes generating, copy the result to the clipboard.
- Use the generated CSR text from the clipboard to obtain the certificate.
and Root/Intermediate Certificates on the After receiving the certificates from the certification authority, install the Certificate and Root/Intermediate Certificates as follows:- Obtain Trusted Root and Intermediary signing certificates from your certification authority.
- Access a compatible web browser.
- In the browser, enter the IP address of the in the URL address bar. The Welcome to screen is displayed.
- Review the Pre-Login message.
- Enter the administrator User Name and Password configured during initial setup.
- If the Acknowledge Pre-Login Message checkbox is displayed, click on it to acknowledge you have reviewed the pre-login information above. After initial login, this checkbox can be enabled and disabled via the Global Security Options. By default, this checkbox is configured as disabled.
Click Login. The main screen provides all WebUI functions, including tabbed options, menu tree, device name, and the last login date and time of the system. - To install Trusted Root Certificates, click Settings > Security > SBC Certificates > Trusted Root Certificates.
- Click Import and select the trusted root certificates.
- To install the certificate, open Settings > Security > SBC Certificates > SBC Primary Certificate.
Validate the certificate is installed correctly. - Click Import and select X.509 Signed Certificate.
Validate the certificate is installed correctly.
|
Note |
---|
|
Perform this procedure only if you are using a node that is already configured with another signaling group (a migration scenario). |
If this is not a newly deployed
and you have already configured one of the following, follow the corresponding instructions:
If you configured a SIP Trunk or PSTN Access on this
, you must perform the following procedure to select the previously created signaling group in the From Microsoft Teams Direct Routing table (see the following example call flow). Caption |
---|
0 | Figure |
---|
1 | Call Routing Setup to old PSTN - Proxy SBC |
---|
|
|
Select Settings > Call Routing > Call Routing Table.
- Select the call routing table for Microsoft Teams Direct Routing.
Select the To Outside (Passthrough) route entry.
In the Destination Signaling Groups field, select the Border Element signaling group and click Remove.
In the Destination Signaling Groups field, click Add and add your previously created SIP Trunk or PSTN Access.
In the Audio Stream Mode field, select Direct Preferred over DSP.
Click Apply.
- Click Signaling Groups.
- Delete the Border Element signaling group.
If you configured a connection to Teams Direct Routing or Skype for Business, you must remove the previously created signaling group (see the following example call flow).
Caption |
---|
0 | Figure |
---|
1 | Call Routing Setup to new Teams - Proxy SBC |
---|
|
|
After you configure the Central
, use the following procedure to verify that the
works properly.
- Access a compatible web browser.
- In the browser, enter the IP address of the in the URL address bar. The Welcome to screen is displayed.
- Review the Pre-Login message.
- Enter the administrator User Name and Password configured during initial setup.
- If the Acknowledge Pre-Login Message checkbox is displayed, click on it to acknowledge you have reviewed the pre-login information above. After initial login, this checkbox can be enabled and disabled via the Global Security Options. By default, this checkbox is configured as disabled.
Click Login. The main screen provides all WebUI functions, including tabbed options, menu tree, device name, and the last login date and time of the system.
Select Settings > Signaling Groups.
Make sure the Service Status for all signaling groups is Up.
- If the Service Status for the Teams Direct Routing signaling group is Down, refer to Best Practice - Troubleshoot Issues with Microsoft Teams Direct Routing.
Use the following procedure to place a test call.
- Access a compatible web browser.
- In the browser, enter the IP address of the in the URL address bar. The Welcome to screen is displayed.
- Review the Pre-Login message.
- Enter the administrator User Name and Password configured during initial setup.
- If the Acknowledge Pre-Login Message checkbox is displayed, click on it to acknowledge you have reviewed the pre-login information above. After initial login, this checkbox can be enabled and disabled via the Global Security Options. By default, this checkbox is configured as disabled.
Click Login. The main screen provides all WebUI functions, including tabbed options, menu tree, device name, and the last login date and time of the system.
In the WebUI, click the Diagnostics tab.
In the left navigation pane, click Test a Call.
Use the following table to configure the parameters for your Central SBC.
Caption |
---|
0 | Table |
---|
1 | Test Call for a Central SBC - Parameters |
---|
|
Parameter | Value |
---|
Destination Number | Number assigned to a Teams user. | Origination/Calling Number | Number assigned to a Local user. | Call Routing Table | The routing table that handles the call from the Central . |
|
See the following example configuration of testing a call for a Central SBC.
Caption |
---|
0 | Figure |
---|
1 | Test Call for a Central SBC - Configuration |
---|
|
|
Click OK.