Add_workflow_for_techpubs |
---|
AUTH1 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cb8305e9, userName='null'} |
---|
JIRAIDAUTH | SYM-2261824215 |
---|
REV5 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cb8305e9, userName='null'} |
---|
REV6 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cb8305e9, userName='null'} |
---|
REV3 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26c87d0111, userName='null'} |
---|
REV1 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cc5207f0, userName='null'} |
---|
|
Excerpt Include |
---|
| Not_for_SWe |
---|
| Not_for_SWe |
---|
nopanel | true |
---|
|
Warning |
---|
title | READ BEFORE BEGINNING |
---|
|
You must follow these steps completely and in the order shown. Failure to do so increases the risk of node failure. |
Section |
---|
column |
|
Panel |
---|
| title | Table of ContentsIn this section...
columninfo
---|
|
The intent of this article to provide a step-by-step procedure for CCE High Availability Deployment on SBC Edge. |
CCE Deployment Scenarios
Following diagram displays the typical CCE Deployment Scenarios:
Image Removed
Prerequisites
A public domain name prepared and mapped with your Office 365 tenant.See: Create an Office 365 tenant
An Office 365 tenant with some E5 license or E3 + Cloud PBX. See: Create an Office 365 tenant.
Have an O365 tenant account with ADMIN privileges that will be used during CCERe-DeploymentSpecificSteps.
A public certificate authority ready to sign a certificate for EDGE FQDN. See https://technet.microsoft.com/en-us/library/mt605227.aspx, Information you need to gather before deployment \ Certificate requirements.
A properly configured firewall. See: https://technet.microsoft.com/en-us/library/mt605227.aspx. See https://technet.microsoft.com/en-us/library/mt605227.aspx, Information you need to gather before deployment \ \ Ports and protocols.
Latest System Release 6.1.0 SBC Firmtware.
Latest System Release 6.1.0 SbcComms Firmware.
- MSFT CCE image 1.4.0 on ASM recovery partition.
- SBC Edge is already configured with two IP interfaces, one for internal / corporate network, and the second one for external / internet network as shown below:
Caption |
---|
0 | Figure |
---|
1 | Pre-configured IP Interfaces |
---|
|
Image Removed |
Info |
---|
Optionally, if you want to configure a secondary in your environment, make sure to have the secondary network interface is configured accordingly to be able to reach out to CCE's internal / corporate network. |
Network Settings
For this best practice, CCE deployment is completed in the following network:
Caption |
---|
0 | Figure |
---|
1 | Typical Deployments |
---|
|
Image Removed Image Removed |
Firewall Settings
The following rules are applied:
Caption |
---|
|
d Firewall Rules fuImage Removed |
Prerequisites
Microsoft defines the multi-site CCE deployment in https://technet.microsoft.com/en-us/library/mt740650.aspx. Based on this article, we will use the following information in our best practice example:
CCE-1: Edge Server External IP | 192.168.211.86 | | CCE-2 Edge Server External IP | 192.168.211.81 |
CCE-1: Edge Server Public IP | 12.8.245.86 | | CCE-2: Edge Server Public IP | 12.8.245.81 |
CCE-1: Domain Controller IP | 192.168.210.115 | | CCE-2: Domain Controller IP | 192.168.210.121 |
CCE-1: Central Management Store IP | 192.168.210.116 | | CCE-2: Central Management Store IP | 192.168.210.122 |
CCE-1: Mediation Server IP | 192.168.210.117 | | CCE-2: Mediation Server IP | 192.168.210.123 |
CCE-1: Edge Server Internal IP | 192.168.210.118 | | CCE-2: Edge Server Internal IP | 192.168.210.124 |
SBC-1 FQDN and IP | sbc1.sonusms01.com 192.168.210.113 | | SBC-2 FQDN and IP | sbc2.sonusms01.com 192.168.210.125 |
DNS Settings
Based on above table entries and on our deployment scenario, make sure that CCE FQDN is resolving to both Edge Server PublicIP addresses. To do so, login to your DNS server and create the relevant entries as shown below:
Image Removed
Warning |
---|
The following sections describe a clean install of the CCE. If your environment has already deployed with CCE, and you are planning to re-deploy, it is necessary to clean up the site(s) that may already exists in O365. To do so, please follow the steps in CCE Re-Deployment Specific Steps in Best Practice for CCE Deployment on SBC Edge. |
Re-Initialization of ASM
Both ASMs must be re-initialized with the latest image that contains the latest CCE software (in this example it is 1.4.1 version).
To do so:
- login to WebUI of both SBC Edge systems
- Under Task (tab), click on Reinitialize (in navigation pane)
- Select the appropriate image from the drop-down menu and click Apply as shown below:
ASM-1 | ASM-2 |
---|
Image Removed | Image Removed |
Upgrade of SBCcomms
Both ASM's must be re-initialized with the latest image that contains the latest CCE software (in this example it is 1.4.1 version).
To do so:
- login to WebUI of both SBC Edge systems
- Under Task (tab), click on Install ASM Update (in navigation pane)
- Using the Choose File button, browse to the latest SBCcomms firmware and click Apply as shown below:
ASM-1 | ASM-2 |
---|
Image Removed | Image Removed |
ASM Admin Password
Change the Admin Password on both ASM:
- login to WebUI of both SBC Edge systems
- Under Task (tab), click on Change Admin Password (in navigation pane)
- Enter the desired Admin Password twice and click OK as shown below:
ASM-1 | ASM-2 |
---|
Image Removed | Image Removed |
Node FQDN
- login to WebUI of both SBC Edge systems
- Under Settings (tab), click on Node-Level Settings (in navigation pane)
- Make sure to have host and domain names of the SBCs are configured correctly as shown below:
SBC-1 | SBC-2 |
---|
Image Removed | Image Removed |
CCE Deployment
ASM Config
- login to WebUI of both SBC Edge systems
- Under Tasks (tab), click on Setup Cloud Connector Edition (in navigation pane)
- Click on ASM Config (tab)
- Fill in the IP information as shown below (accordingly with your environment) as shown below:
CCE-1 | CCE-2 |
---|
Image Removed | Image Removed |
Generate CSR
- login to WebUI of one of your SBC Edge systems.
- Under Tasks (tab), click on Setup Cloud Connector Edition (in navigation pane)
- Click on Generate CSR (tab)
- Generate the CSR as shown below with following information. Please note that in this example we are using aepsite1.sonusms01.com and sip.sonusms01.com as common name and SAN as shown below:
Image Removed
Import Certificate Keys
- login to WebUI of both SBC Edge systems
- Under Tasks (tab), click on Setup Cloud Connector Edition (in navigation pane)
- Click on Import Certificate Keys (tab)
- Select the certificate Action (in this example we are using Import PKCS12 Certificate and Key selection), enter the password, select the relevant certificate file using Choose File button and click OK as shown below:
CCE-1 | CCE-2 |
---|
Image Removed | Image Removed |
Configure CCE
- ogon to WbUI of both SBC Edge systems
- Under Tasks (tab), click on Setup Cloud Connector Edition (in navigation pane
- Click on Configure CCE (tab)
- Configure all necessary information and click OK as shown below:
CCE-1 | CCE-2 |
---|
Image Removed | Image Removed |
CCE Configuration.INI file verification and Update
After the step above, several checks and (if needed) corrections are needed in the INI file.
The CCE deployment internally sets the domain suffix as defined under VirtualMachineDomain attribute. Although your SBC may have an FQDN that can be reached from your corporate network, it is important to setup the SBC's Gateway FQDN parameter accordingly with the VirtualMachineDomain value, so that CCE can communicate with SBC without a problem.
In addition, when deploying a High Availability systems, it is important to have Management IP Prefix to be unique on each HA system. For instance, if your HA Master CCE system has 192.168.213.x as the Management IP Prefix, you need to be sure to configure this attribute differently on HA Slave system. While doing this, also make sure that subnet that you are defining in this field does NOT conflict in your IP infrastructure.
To verify these values or correct them in Configuration.INI file, follow the steps as shown below:
- ON both SBC-1 and SBC-2 webUI > under Configure CCE (tab) click on Click to re-configure CCE application button
- Click on OK on the popup
- Click on Edit Raw Config button
- In CCE Configuration INI File (raw file), verify/correct the values and click OK as shown below:
Image Removed
Verification of Shared Site Directory on HA Master CCE
Above step creates a shared site directory that both CCE-1 and CCE-2 will use on SBC Edge-1 ASM. To verify that this particular directory is successfully created proceed with the following steps:
- Remote Desktop to ASM of the SBC Edge-1 system
- Launch the PowerShell
- Execute Get-CcSiteDirectory command.
- Then using the windows explorer verify that relevant directory exists as shown below:
Image Removed
Prepare CCE
- Login to WebUI of both SBC Edge systems
- Under Tasks (tab), click on Setup Cloud Connector Edition (in navigation pane)
- Click on Prepare CCE (tab)
- Click on Prepare CCE button, enter the password for Edge Server External Certificate, and click OK as shown below:
CCE-1 | CCE-2 |
---|
Image Removed | Image Removed |
Register-CcAppliance
- Remote Desktop to ASM of the SBC Edge-1 system
- Launch the PowerShell
- Execute Register-CcAppliance command for HA Master.
- Once the command is executed successfully, Remote Desktop to ASM of the SBC Edge-2 system
- Launch the PowerShell
- Execute Register-CcAppliance command again for HA Slave.
ASM-1 | ASM-2 |
---|
Image Removed | Image Removed |
Verification of Appliances after successful Registration
While on ASM > PoweShell, you may verify the appliances registration by using the O365 Tenant user with Admin privileges (by running series of commands on PowerShell:)
- Import-Module skypeonlineconnector
- $cred = Get-Credential
enter the credentials for O365 Admin Tenant
- $Session = New-CsOnlineSession -Credential $cred -Verbose
Once the login is successful, execute Get-CsHybridPSTNAppliance command on PowerShell as shown below:
Image Removed
Install-CcAppliance on HA Master Node
- Remote Desktop to ASM of the SBC Edge-1 system
- Launch the PowerShell
- Execute Install-CcAppliance command for HA Master as shown below:
Image Removed
Tip |
---|
Please note that due to a possible certificate issue, this step may fail! Relevant workaround for this is already covered in: Best Practice for CCE Deployment on SBC Edge section Best Practice for CCE Deployment on SBC Edge after fixing the certificate issue, starting the Edge Server Services, and fixing the Virtual Machine Network adapter settings, CCE High Availability Master Node settings completes. Now you need to publish the CcAppliance to proceed with CcAppliance installation on HA Slave Node. |
Publish-CcAppliance
- Remote Desktop to ASM of the SBC Edge-1 system
- Launch the PowerShell
- Execute Publish-CcAppliance command as shown below:
Image Removed
Install-CcAppliance on HA Slave Node
- Remote Desktop to ASM of the SBC Edge-2 system
- Launch the PowerShell
- Execute Install-CcAppliance command for HA Slave as shown below:
Image Removed
Tip |
---|
Similarly, due to a possible certificate issue, this step may fail as well. Relevant workaround for this is already covered in: Best Practice for CCE Deployment on SBC Edge section Best Practice for CCE Deployment on SBC Edge after fixing the certificate issue, starting the Edge Server Services, and fixing the Virtual Machine Network adapter settings, CCE High Availability Slave Node settings completes. |
Integration of SBC Edge
Integration of SBC Edge-1 with CCE
- login to WebUI of SBC Edge-1 systems
- Under Tasks (tab), click on SBC Easy Setup > Easy Config Wizard (in navigation pane)
- Follow the steps 1, 2, and 3 as shown below and click Finish
- Click OK on the next two popups to complete the setup as shown below:
Image Removed
Above wizard run configures the necessary settings for SBC Edge-1 and CCE integration, which you can see all relevant configuration items in Settings tab as shown below:
Image Removed
Integration of SBC Edge-2 with CCE
- login to WebUI of SBC Edge-2 systems
- Under Tasks (tab), click on SBC Easy Setup > Easy Config Wizard (in navigation pane)
- Follow the steps 1, 2, and 3 as shown below and click Finish
- Click OK on the next two popups to complete the setup as shown below:
Image Removed
Above wizard run configures the necessary settings for SBC Edge-2 and CCE integration, which you can see all relevant configuration items in Settings tab as shown below:
Image Removed
Adding Split-DNS entries
To allow SIP communication between the CCE Mediation Server and SBC-Edge, Split DNS entries need to be added on each SBC-Edge systems with the following information:
- On SBC-Edge 1, add an entry with DNS Server IP Address as the IP address of CCE-1 AD Virtual Machine's Internal (corporate) IP address and the Domain Name as the the VirtualMachineDomain attribute
- On SBC-Edge 2, add an entry with DNS Server IP Address as the IP address of CCE-2 AD Virtual Machine's Internal (corporate) IP address and the Domain Name as the the VirtualMachineDomain attribute
as shown below:
SBCE Edge-1 | SBCE Edge-2 |
---|
Image Removed | Image Removed |
Adding Mediation Server FQDN entries
Lastly, the Mediation Server FQDNs MUST be added to SIP Server Table and SIP Signaling Group Federated FQDN fields with the following information:
- On SBC-Edge 1, add the CCE-2's Mediation Server FQDN into SIP Server Table as well as into SIP Signaling Group Federated IP/FQDN list as shown below:
- On SBC-Edge 2, add the CCE-1's Mediation Server FQDN into SIP Server Table as well as into SIP Signaling Group Federated IP/FQDN list as shown below:
SBCE Edge-1 | SBCE Edge-2 |
---|
Image Removed | Image Removed |
Note |
---|
SBC Edge supports new deployment with CCE 2.1.0 in Release 6.1.5. Before this release, if your CCE auto-updates to CCE 2.1.0: - To rerun the step “Transfer Credential from SBC”, it will require Release 6.1.5.
- To rerun the step “Register Appliance”, you need to install .NET4.6.2 using Windows Update.
|
Info |
---|
For details on troubleshooting, see Troubleshooting Cloud Connector 6.1.2. |
Multiexcerpt include |
---|
MultiExcerptName | BeforeYouStart |
---|
PageWithExcerpt | Configuring the SBC Edge for a Single CCE |
---|
|
Scenario 1 and Scenario 2 are covered in Configuring the SBC Edge for a Single CCE. This document contains steps for Scenario 3 and Scenario 4 .
Multiexcerpt include |
---|
MultiExcerptName | PreRequisites |
---|
PageWithExcerpt | Configuring the SBC Edge for a Single CCE |
---|
|
Network Settings
Note |
---|
We recommend deploying both Appliances on the same subnet with a resilient connection. |
For the purposes of this document, the CCE is deployed in the following network:
Caption |
---|
0 | Figure |
---|
1 | Typical Deploments |
---|
|
Image Added Image Added |
Firewall Settings
In this best practice the router/firewall is configured with the following rules:
Caption |
---|
0 | Table |
---|
1 | Internal Firewall Rules for CCE |
---|
|
Source IP | Destination IP | Source Port | Destination Port |
---|
Cloud Connector Mediation component – 192.168.210.123 & 192.168.210.117 | Internal clients | TCP 49 152 – 57 500* | TCP 50,000-50,019 (Optional) | Cloud Connector Mediation component – 192.168.210.123 & 192.168.210.117 | Internal clients | UDP 49 152 – 57 500* | UDP 50,000-50,019 | Internal clients | Cloud Connector Mediation component – 192.168.210.123 & 192.168.210.117 | TCP 50,000-50,019 | TCP 49 152 – 57 500* | Internal clients | Cloud Connector Mediation component – 192.168.210.123 & 192.168.210.117 | UDP 50,000-50,019 | UDP 49 152 -57 500* |
|
Caption |
---|
0 | Table |
---|
1 | External Firewall Rules for CCE |
---|
|
Source IP | Destination IP | Source Port | Destination Port |
---|
Cloud Connector Edge External Interface – 192.168.211.81 & 192.168.211.86 | Any | Any | TCP 5061 | Cloud Connector Edge External Interface – 192.168.211.81 & 192.168.211.86 | Any | Any | TCP 80 | Cloud Connector Edge External Interface – 192.168.211.81 & 192.168.211.86 | Any | Any | UDP 53 | Cloud Connector Edge External Interface – 192.168.211.81 & 192.168.211.86 | Any | Any | TCP 53 | Cloud Connector Edge External Interface – 192.168.211.81 & 192.168.211.86 | Any | TCP 50,000-59,999 | Any | Cloud Connector Edge External Interface – 192.168.211.81 & 192.168.211.86 | Any | UDP 3478 | Any | Cloud Connector Edge External Interface – 192.168.211.81 & 192.168.211.86 | Any | UDP 50,000-59,999 | Any | Any | Cloud Connector Edge External Interface – 192.168.211.81 & 192.168.211.86 | Any | TCP 5061 | Any | Cloud Connector Edge External Interface – 192.168.211.81 & 192.168.211.86 | Any | TCP 443 | Any | Cloud Connector Edge External Interface – 192.168.211.81 & 192.168.211.86 | Any | TCP 50,000-59,999 | Any | Cloud Connector Edge External Interface – 192.168.211.81 & 192.168.211.86 | Any | UDP 3478 | Any | Cloud Connector Edge External Interface – 192.168.211.81 & 192.168.211.86 | Any | UDP 50,000 - 59,99 |
|
Caption |
---|
0 | Table |
---|
1 | Host Firewall Rules - Internal or External Access |
---|
|
Source IP | Destination IP | Source Port | Destination Port |
---|
ASM | Any | Any | TCP 53 | ASM | Any | Any | TCP 80 | ASM | Any | Any | TCP 443 |
|
Multiexcerpt include |
---|
MultiExcerptName | DNSSettings |
---|
PageWithExcerpt | Configuring the SBC Edge for a Single CCE |
---|
|
Preparing Your Node
Preparing the SBC Edge for Initial Setup
Update the SBC Edge firmware to the latest release version.
Note |
---|
- Ensure the Node FQDN is definitive. Changing this information requires the CCE to be redeployed.
- Ensure that an NTP server is configured.
|
Sonus recommends starting with a clean and empty configuration.
Caption |
---|
0 | Figure |
---|
1 | Ensure That the Node's FQDN is Correct |
---|
|
Image Added Image Added |
Info |
---|
|
When configuring a secondary in your environment, make sure to have the secondary network interface is configured accordingly to be able to reach out to CCE's internal/corporate network. |
Preparing the ASM
If your ASM has been used previously, reinitialize it following the steps in Re-Initializing the ASM.
Confirm that the ASM is ready to deploy the CCE by following these steps.
Note |
---|
Perform these steps on both systems. |
Step | Action |
---|
1 | Login to the WebUI of the SBC Edge. |
2 | Click the Task tab, and then click Operational Status. |
3 | Verify that: - The ASM Board Status is Up
- The appropriate Service Status is Running
- The Service is the latest version. If the service version (SBC Communications Service) is not the latest, update it by following the steps in Installing an ASM Package.
|
4 | Change the ASM Admin password: - Login to WebUI of both SBC Edge systems
- Click the Task tab and then click Change Admin Password.
- Enter the desired password twice and then click OK.
|
Deploying the CCE
Deploying the CCE on the
consists of two steps:- Prepare the CCE deployment on the SBC Edge using the section below.
- Using Sonus Cloud Link Deployer via Remote Desktop on the ASM Module:
- Register all the CCE appliances.
- Install and publish the CCE Appliance Master.
- Install the CCE Appliance Slave.
Note |
---|
- If this is a re-deployment of a CCE deployment, complete the steps in Redeploying the CCE to clean up previously entered data in O365 before proceeding with the following section.
|
Anchor |
---|
| Configuring the CCE Through the WebUI |
---|
| Configuring the CCE Through the WebUI |
---|
|
Configuring the CCE Through the WebUI
Configuring the ASM
Note |
---|
Perform these steps on both systems. |
Step | Action |
---|
1 | Login to the WebUI of each SBC Edge. |
2 | Navigate to Tasks > Setup Cloud Connector Edition. |
3 | Click the ASM Config tab and configure/verify the Network and IP settings of your ASM as shown below. |
4 | Click Apply. After receiving the activity status as successfully completed, click the Generate CSR tab. |
Caption |
---|
0 | Figure |
---|
1 | Configuring the ASM – CCE-1 |
---|
|
Image Added |
Caption |
---|
0 | Figure |
---|
1 | Configuring the ASM – CCE-2 |
---|
|
Image Added |
Generating the CSR
This process is required only if you don't have a public certificate for your deployment. If you already have a certificate, proceed to Import Certificate.
Note |
---|
Perform these steps on only one of the systems. |
Step | Action |
---|
1 | Login to the WebUI of one of the SBC Edge systems. |
2 | Navigate to Tasks > Setup Cloud Connector Edition > Generate CSR. |
3 | Generate the CSR as shown below with following information. Note: This example uses aepsite1.sonusms01.com and sip.sonusms01.com as common name and SAN To ensure creating a valid CSR for Cloud Connector Edition usage, please see the section "Certificate requirements" on https://technet.microsoft.com/en-us/library/mt605227.aspx . |
Caption |
---|
|
Image Added |
Importing Certificate/Keys
Note |
---|
Perform these steps on both systems. |
Step | Action |
---|
1 | Login to the WebUI of each SBC Edge. |
2 | Navigate to Tasks > Setup Cloud Connector Edition and then click the Certificate and Key tab. |
3 | On SBC-1, click the Action drop-down list and select the appropriate option: - Import X.509 Signed Certificate. If you generated a Certificate Request (CSR) on the previous step, select the Import X.509 Signed Certificate option, and paste the BASE64 certificate in the text box.
- Import PKCS12 Certificate and Key. If you prepare your certificate by yourself, select the Import PKCS12 Certificate and Key option, enter a password and select the relevant certificate file.
- Export PKCS12 Certificate and Key. To export a certificate, select ExportPKCS12 Certificate and Key and enter a password.
- Import PKCS7 Certificate Chain. Select the Import PKCS7 Certificate Chain option, and select a file.
On SBC-2 select the certificate action applicable. For example, use Import PKCS12 Certificate and Key to import the pkcs certificate you exported on SBC-1, enter the password, select the relevant certificate file. |
4 | Click OK. |
5 | - On SBC-1, select the certificate Action, use Export PKCS12 Certificate and Key, enter the password, and then click OK.
- On SBC-2, select the certificate Action, use Import PKCS12 Certificate and Key to import the pkcs certificate you exported on SBC-1, enter the password, select the relevant certificate file using the Choose File button and then click OK.
|
Anchor |
---|
| Configuring the CCE |
---|
| Configuring the CCE |
---|
|
Configuring the CCE Note |
---|
Perform these steps on both systems. |
Step | Action |
---|
1 | Login to the WebUI of each SBC Edge. |
2 | Open the Tasks tab and click Setup Cloud Connector Edition in the navigation pane. |
3 | Click the Configure CCE tab. |
4 | Configure all necessary information and then click OK. Caption |
---|
0 | Figure |
---|
1 | Configuring the ASM – CCE-1 |
---|
| Image Added |
Caption |
---|
0 | Figure |
---|
1 | Configuring the ASM – CCE-2 |
---|
| Image Added | Note: Enterthe ASM's IP address in the HA Master IP Address field. The Slave uses the same root certification as the Master, and this location contains the shared folder that contains the Root CA of the Master. |
5 | After receiving the activity status as successfully completed, click the Prepare CCE tab to continue. |
Warning |
---|
If the deployment environment consists of multiple-site with a single certificate, or a wild card certificate, ensure the CCE Site Name and the Edge Server Public Hostname are correct before proceeding. |
Verifying and Updating the CCE Configuration INI File
You must verify (and possibly correct) the CCE Configuration INI File after configuring the CCE.
Info |
---|
When deploying a High Availability (HA) systems, it is important to have Management IP Prefix unique on each HA system. For instance, if your HA Master CCE system has 192.168.213.x as the Management IP Prefix, you need to be sure to configure this attribute differently on HA Slave system. While doing this, also make sure that subnet that you are defining in this field does not conflict in your IP infrastructure. |
Note |
---|
Perform these steps on both systems. |
Follow these steps to verify and correct values in the CCE Configuration INI File.
Step | Action |
---|
1 | Login to the WebUI of each SBC Edge. |
2 | Click the Configure CCE tab and then click Click to re-configure CCE application. |
3 | Click OK on the popup dialog box. |
4 | Click the Raw (INI) Config drop-down list, and select an option: - Edit. Configurable fields are displayed for editing. Modifications to the CCE configuration requires redeployment of the CCE VM, and this action takes approximately two hours.
- Export. Exports the .ini file.
- Import. Imports the .ini file.
|
5 | Verify/correct the values in the CCE Configuration INI File and then click OK. |
Preparing the CCE
Anchor |
---|
| Preparing the CCE |
---|
| Preparing the CCE |
---|
|
Note |
---|
Perform these steps on both systems. |
Step | Action |
---|
1 | Login to the WebUI of each SBC Edge. |
2 | Open the Tasks tab and click Setup Cloud Connector Edition in the navigation pane. |
3 | Click the Prepare CCE tab. |
4 | Click the Prepare CCE button. A confirmation will request you to enter the password again for the new password. Only the Tenant credentials are already existing. The same password should be used on all Appliances in the site. Click OK as shown below. |
5 | To complete the deployment, continue with Activating the CCE. |
Info |
---|
If you receive this error message: Code Block |
---|
Additional Information: Got an exception deploying CCE: Certificate Chain is broken. Root and Intermediate Certificate needs to be imported on ASM Operating System: A certificate chain could not be built to a trusted root authority. |
...refer to Manually Loading the Root and Intermediate Certificates on the CCE |
Activating the CCE
This step stores the Microsoft product keys, and activates the CCE VM (which is not yet activated).
Note |
---|
Perform these steps on both systems. |
Info |
---|
Each CCE requires four VMs; each Microsoft Product Key activates two VMs. |
Step | Action |
---|
1 | Login to the WebUI of each SBC Edge. |
2 | Open the Tasks tab and click Setup Cloud Connector Edition in the navigation pane. |
3 | Click the Activate CCE tab. |
4 | In Domain Controller and Central Management Store VM > Windows Product Key 1, enter the first Microsoft Product Key. To identify the Product Key, see Identify Microsoft Product Key. |
5 | In Under Mediation Server and Edge Server VM > Windows Product Key 2, enter the second Microsoft Product Key. To identify the Product Key, see Identify Microsoft Product Key. |
6 | Click Activate. |
7 | Access Tasks> Operational Status to verify Windows Activation. |
8 | |
Caption |
---|
|
Image Added |
Info |
---|
title | Identify Microsoft Product Key |
---|
|
To identify the Microsoft Product Key:- Access the bottom of the SBC unit and locate the two Microsoft Certificate of Authenticity stickers.
- Locate the Microsoft Product Key for each.
Sample Microsoft Certificate of Authenticity Sticker Image Added
|
Info |
---|
title | Activation - Troubleshooting Tips |
---|
|
Anchor |
---|
| Troubleshooting |
---|
| Troubleshooting |
---|
| If activation fails, check the following:- If access to the Microsoft Server fails, verify IP and Firewall configuration.
- Verify each Product Key has not reached the allowed limit of 15 activations.
- Verify correct entry of the Product Key.
|
Anchor |
---|
| InstallingtheCCEAppliance |
---|
| InstallingtheCCEAppliance |
---|
|
Installing the CCE Appliance using Sonus Cloud Link Deployer Note |
---|
title | CCE Deployment - Using a Proxy on the ASM Host |
---|
|
If you plan to use a proxy on the ASM Host to reach Office 365, you must add the Management network (192.168.213.0) into the exclusion list and specify proxy settings per machine rather than per user. |
Note |
---|
title | CCE Deployment - What to Expect |
---|
|
- The CCE deployment may exceed two hours.
- The CCE deployment status is visible only on the Remote Desktop to the ASM. The WebUI indicates that the CCE is running while the deployment process is in progress.
- While the CCE deployment is running, you should not perform any actions on the ASM via the WebUI (i.e., Shut Down/Reset/Reboot/Reinitialize/Install etc.).
- If the Office 365 PSTN Site already exists in your tenant, ensure the other Appliance is removed, and the CCE Auto-Update time window is properly configured. If you are in a time window dedicated to the Auto-Update, you should use the command Set-CsHybridPSTNSite to set EnableAutoUpdate to $False. Replication of the information may take up to 30 minutes.
|
Using Sonus Cloud Link Deployer via Remote Desktop on the ASM Module:
- Register all the CCE Appliance.
- Install and publish the CCE Appliance Master.
- Install the CCE Appliance Slave.
Registering the CCE Appliance
Note |
---|
Perform these steps on only one of the systems. |
Step | Action |
---|
1 | Remote desktop to the ASM of the SBC Edge System 1. |
2 | Launch the Sonus Cloud Link Deployer from icon on the desktop. |
3 | Check the first two actions: - Transfer Password from SBC: This step imports the password that has been set during the Preparing the CCE.
- Register Appliance: This step registers this new appliance on your Ofiice365 tenant.
|
4 | Click Apply. |
5 | After successful execution, remote desktop to the ASM of the System 2. |
6 | Launch the Sonus Cloud Link Deployer from icon on the desktop. |
7 | Check the first two action. - Transfer Password from SBC: This step imports the password that has been set during the Preparing the CCE.
- Register Appliance: This step registers this new appliance on your Ofiice365 tenant.
|
8 | Click Apply. |
Caption |
---|
0 | Figure |
---|
1 | Registering the CCE Appliance - Master |
---|
|
Image Added |
Caption |
---|
0 | Figure |
---|
1 | Registering the CCE Appliance - Slave |
---|
|
Image Added |
Install-CcAppliance on the HA Master Node
Step | Action |
---|
1 | Remote desktop to the ASM of the SBC Edge System 1. |
2 | Launch the Sonus Cloud Link Deployer from icon on the desktop. |
3 | Check the last two actions: - Install Appliance: This step deploys the CCE.
- Publish Appliance (HA Only): This will extract the required information from the HA Master
|
4 | Click Apply. |
Caption |
---|
0 | Figure |
---|
1 | Install CcAppliance on HA Master Node |
---|
|
Image Added
|
Install-CcAppliance on the HA Slave Node
Step | Action |
---|
1 | Remote desktop to the ASM of the SBC Edge System 2. |
2 | Launch the Sonus Cloud Link Deployer from icon on the desktop. |
3 | Check the third action: - Install Appliance: This step deploys the CCE.
|
4 | Click Apply. The Installation time depends on the bandwidth between the Master and the Slave. |
5 | After configuring the SBC Edge for CCE, refer to Managing Your Office 365 Tenant to configure CCE update time and user. |
Caption |
---|
0 | Figure |
---|
1 | Install CcAppliance on the HA Slave Node |
---|
|
Image Added |
Integrating SBC Edge With CCE
After the CCE is deployed, integrate the
and allow calls from/to O365 clients. In this example, the following steps will set up the for:
SIP Provider (193.168.210.103) – SBC Edge (193.168.210.125) – CCE (mediation Server: 193.168.210.123) – O365 Cloud
Building Your SBC Edge-1 Configuration
Step | Action |
---|
1 | Login to the WebUI of SBC Edge-1. |
2 | Navigate to Tasks > SBC Easy Setup and then click the Easy Configuration Wizard. |
3 | Follow steps 1, 2, and 3 and then click Finish. The wizard configures the necessary settings for SBC Edge-1 and CCE integration, after which you can see all relevant configuration items in Settings tab. |
Caption |
---|
0 | Figure |
---|
1 | Building your SBC Edge-1 Configuration |
---|
|
Image Added |
Building Your SBC Edge-2 Configuration
Step | Action |
---|
1 | Login to the WebUI of SBC Edge-2. |
2 | Navigate to Tasks > SBC Easy Setup and then click the Easy Configuration Wizard. |
3 | Follow steps 1, 2, and 3 and then click Finish. The wizard configures the necessary settings for SBC Edge-2 and CCE integration, after which you can see all relevant configuration items in Settings tab. |
Caption |
---|
0 | Figure |
---|
1 | Building your SBC Edge-2 Configuration |
---|
|
Image Added |
Multiexcerpt include |
---|
MultiExcerptName | BasicCallVerification |
---|
PageWithExcerpt | Configuring the SBC Edge for a Single CCE |
---|
|
Multiexcerpt include |
---|
MultiExcerptName | O365KnownIssues |
---|
PageWithExcerpt | Configuring the SBC Edge for a Single CCE |
---|
|
Updating the CCE Password
Follow these steps if you need to update the O365 tenant admin password or account.
Step | Action |
---|
1 | On the WebUI, click Tasks and select the Prepare CCE tab (see Preparing the CCE). |
2 | Click Prepare CCE. |
3 | From the Password Setting drop down list, select Change Password. Keep the same passwords for the Edge Server, CCE Service and CA Backup File, but change the passwords for Tenant Account User and Tenant Account Password. |
4 | On Remote desktop, start the Sonus Cloud Link Deployer, and check Transfer Password from SBC to reset the credentials. |
...