You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Table of Contents

About SBC Release Notes

This document describes new features, the latest hardware and software requirements, known limitations and other pertinent release information for the latest release of SBC Core.

Please note that all Ribbon bugs reported by customers on a given software release will be fixed in the latest release on that software release branch.

To view and download the latest End of Product Sale (EoPS) and other End Of Life (EOL) notices, navigate to the Resource Library on the corporate website (https://ribboncommunications.com/company/get-help/resource-library).

Related Documentation

The SBC Core 08.00.xx documentation is located at the following Wiki space: SBC Core Documentation.

Release Notes Use and Distribution

Ribbon Release Notes are protected under the copyright laws of the United States of America. This work contains proprietary information of Ribbon Communications, Westford, MA-01886, USA. Use, disclosure, or reproduction in any form is strictly prohibited without prior authorization from Ribbon Communications.

Associated Ribbon Bulletins

The following Ribbon Bulletins are referenced in this release note:

  • Warning-18-00028230: Call failure during LSWU when upgrading 5.x release to 6.2.1 or higher (VMWare or KVM) with 10 or more vCPUs configured.
  • Warning-17-00022847: The DNS configuration parameters within the address contexts may cause certain configurations to fail during an upgrade
  • Warning-17-00022689: Duplicate Trunk Group or Zone names can cause unexpected behavior
  • Warning-14-00020748: Verify system and databases are fully in sync prior to Live Software Upgrade (LSWU)
  • Bulletin-18-00028529: The System Security Intrusion Detection AIDE Reports False Positive Alarms

To view/download Ribbon bulletins, do the following:

  1. Log on to the Support Portal (https://ribboncommunications.com/services/ribbon-support-portal-login)
  2. Click Bulletins link from the menu bar. 
  3. Enter the bulletin number (last eight numbers) in the search field and press Return.

Problems or Questions

For problems or questions, contact Ribbon Support through telephone or fax: 

Worldwide Voice: 

Unable to show "metadata-from": No such page "_space_variables"

USA Toll-free: 

Unable to show "metadata-from": No such page "_space_variables"

Worldwide Fax: 

Unable to show "metadata-from": No such page "_space_variables"

About SBC Core

The SBC Core platforms address the next-generation needs of SIP communications by delivering media transcoding, robust security and advanced call routing in a high-performance, 2RU, and 5RU form-factor devices enabling service providers and enterprises to quickly and securely enhance their network by implementing services like SIP trunking, secure Unified Communications and Voice over IP (VoIP).

For more product information, refer to the section About SBC Core in the main documentation space.

Interoperability

The SBC Core software interoperates with the following:

  • SIP/H.323 compliant IADs and IP-PBXs
  • PSX Policy Server Softswitch via SIP redirects and/or Diameter+ protocol
  • SBC 9000 through SIP call signaling and Networks MCS protocol
  • NetScore collection, analysis, monitoring, and reporting of selected Key Performance Indicators (KPIs) on a near-real time basis

Note

NetScore maintains a list of remote host keys for all nodes from which it collects data. If NetScore is deployed in your network, connectivity to the SBC will be lost any time the SBC software is reinstalled because the SBC’s host key is updated during the install. Refer to NetScore Release Notes for steps needed to reconnect to the SBC.

H.323-SIP and SIP-H323 Calls

When using H.323-SIP and SIP-H.323 call flows, an additional Re-invite/Update may get generated towards the SIP side. To suppress this, enable the IP Signaling Profile (IPSP) flag Minimize Relaying Of Media Changes From Other Call Leg at the SIP side.

Note

H.323 is not supported on SBC SWe cloud deployments.

Compatibility with Ribbon Products

Tip

When upgrading your network, ensure to upgrade each product to the most current release to take advantage of the latest features, enhancements, and fixes.

Info

For complete interoperability details between various Ribbon products, including backwards compatibility, refer to Ribbon Product Compatibilities.

Refer to SBC 5000-7000-SWe Interoperability Matrices for the latest and minimum compatible product versions supporting the 08.00.00R000 release.

Sample Heat Templates Included in This Release

To instantiate the SBC instances, the following templates can be used:

SBC Heat Templates

 Template NameDescription
heatRgNoDhcp.yamlUsed to instantiate no DHCP, IPv4 or IPv6 deployments. The template supports I-SBC, M-SBC, S-SBC, MRFP and SLB node types. This template includes instructions to enable port redundancy.
heatOamNoDhcp.yamlUsed to instantiate an OAM node.
heatRgNoDhcp-TSBC-template.yamlUsed to instantiate a T-SBC node.

Note

Example template files are packaged together in .tar.gz and .md5 files separate from the SBC Core application installation and upgrade files:

  • cloudTemplates.tar.gz
  • cloudTemplates.tar.gz.md5

SBC SWe Cloud Requirements for OpenStack

The system hosting the SBC SWe Cloud must meet the below requirements for OpenStack:

Server Hardware Requirements


ConfigurationRequirement
Processor

Intel Xeon processors (Nehalem micro-architecture or above) with 6 cores and above (processors should support hyper-threading).

Note

Ribbon recommends Westmere (or newer) processors for better SRTP performance. These processors have the AES-NI instruction set for performing cryptographic operations in hardware. 

 RAMMinimum 24 GiB
 Hard DiskMinimum 100 GB
Network Interface Cards (NICs)

Minimum 4 NICs.

Note

Make sure NICs have multi-queue support which enhances network performance by allowing RX and TX queues to scale with the number of CPUs on multi-processor systems.

Note

The Intel I350, x540, x550, and 82599 Ethernet adapters are supported for configuring as SR-IOV and DirectPath I/O pass-through devices.

Note

The PKT ports must be 10 Gbps SR-IOV enabled ports.

Note

6 NICs are required to support PKT port redundancy.

The system hosting the SBC SWe must meet the following requirements to achieve the performance targets listed: 

S-SBC SWe Requirement

S-SBC SWe Requirements
for 1000 CPS/120K Signaling Sessions 
Notes

32 vCPUs

Due to the workload characteristics, allocate 20 physical cores with two hyper-threaded CPUs from each core to the SBC.

128 GiB RAM

Must be Huge Page memory. The minimum page size is 2048 KiB, but 1048576 is recommended.

100 GB Disk

None

4 vNICs/6 vNICs

Attach MGT0 port to the Management VirtIO Tenant network.

HA port has to be on IPv4 VirtIO Tenant network.

Attach PKT0 and PKT1 ports to SR-IOV and Provider network.

M-SBC SWe Requirement

M-SBC SWe Requirements
for 40K Media Sessions
Notes

16 vCPUs

Due to the workload characteristics, allocate 10 physical cores with two hyper-threaded CPUs from each core and from single NUMA node to the SBC.

32 GiB RAM

Must be Huge Page memory. The minimum page size is 2048 KiB, but 1048576 is recommended.

100 GB Disk

None

4 vNICs/ 6 vNICs

Attach MGT0 port to the Management VirtIO Tenant network.

HA port has to be on IPv4 VirtIO Tenant network.

Note

All NIC ports must come from the same NUMA node from which the M-SBC SWe instance is hosted.

OpenStack Requirements

The SBC SWe supports the following OpenStack environments:

  • Newton with RHOSP 10 and RHEL 7.4
  • Queens with RHOSP 13 and RHEL 7.5
Note

The SBC SWe was tested on OpenStack Queens with RHOSP 13 and RHEL 7.5.

SBC SWe Cloud Requirements for AWS

Note

Prior to the 7.0 release, the default CLI admin user name and password for AWS SWe was admin/admin. The hard coded password must not be used for the security vulnerability on the AWS SWe platform. In AWS Outputs tab, the field DefaultCliAdminPassword displays the default password to login to the CLI/EMA/PM admin user. For more information, refer to the sections Instantiating a Standalone SBC SWe Instance and Instantiating an SBC SWe HA Instance.

  • The default password is “eth0” interface ID for standalone instance.
  • The default password is “eth0” interface ID of assigned role active instance (instance with “-1” in the name) for an HA pair.
  • The system hosting AWS requires 65GiB of disk size.
  • AMI ID required to launch an instance is ami-05109212. Contact your Ribbon sales representative to get access to AMI ID.
Note

Ribbon recommends c5.2xlarge or higher instance type if this instance type is available in your zone. Use c5.2xlarge instance type or higher to handle more calls with transcoding.

You can use m5.xlarge instance type if the number of calls are less and does not require transcoding.


SBC SWe Requirements for KVM

The following table lists the server hardware requirements.

KVM Hypervisor Server Hardware Requirements


Configuration Requirement
Processor

Intel Xeon processors (Nehalem micro-architecture or above) with 6 cores and above (processors should support hyper threading).

Note

Ribbon recommends using Westmere (or newer) processors for better SRTP performance. These processors have the AES-NI instruction set for performing cryptographic operations in hardware.

Note

The supported CPU Family number is 6 and CPU Model number must be newer than 26. Refer to the Intel Architecture and Processor Identification document for more information.


 RAMMinimum 24 GB
Hard DiskMinimum 500 GB
Network Interface Cards (NICs)
Minimum 4 NICs
Note

Make sure NICs have multi-queue support which enhances network performance by allowing RX and TX queues to scale with the number of CPUs on multi-processor systems.

Note

The Intel I350, x540, x550, and 82599 Ethernet adapters are supported for configuring as SR-IOV and DirectPath I/O pass-through devices.


Ports

Number of ports allowed:

SBC SWe Requirements for VMWare

Warning

The SBC SWe software only runs on platforms using Intel processors. Platforms using AMD processors are not supported.

The following table lists the server hardware requirements:

Server Hardware Requirements


 ConfigurationRequirement
Processor

Intel Xeon processors (Nehalem micro-architecture or above) with 6 cores and above (processors should support hyper threading).

Note

Ribbon recommends using Westmere (or newer) processors for better SRTP performance. These processors have the AES-NI instruction set for performing cryptographic operations in hardware.

Note

The supported CPU Family number is 6 and CPU Model number must be newer than 26. Refer to the Intel Architecture and Processor Identification document for more information.

Note

ESXi 6.5 and later releases require approximately 2 physical cores to be set aside for hypervisor functionality. The number of VMs which can be hosted on a server must be planned for accordingly.

 RAMMinimum 24 GB
Hard DiskMinimum 500 GB
Network Interface Cards (NICs)

Minimum 4 NICs, if physical NIC redundancy is not required.

Note

Make sure NICs have multi-queue support which enhances network performance by allowing RX and TX queues to scale with the number of CPUs on multi-processor systems.

Note
  • The following NICs are supported for configuring as SR-IOV and DirectPath I/O pass-through devices. SR-IOV is supported only with 10 Gbps interfaces (x540/82599/x710):

Intel I350, x540, x550, x710 and 82599, Mellanox Connect - 4x, and Mellanox Connect - 5x. 

  • The VMware Enterprise Plus license is required for SR-IOV.
Ports

Number of ports allowed:

Required Software and Firmware Versions

The following SBC 5000 series (51x0/52x0), SBC 5400 and SBC 7000 software and firmware versions are required for this release. For 5xx0 the BIOS can be installed during app install, whereas for 5400 and 7000 the BIOS is included in the firmware package and is installed during the firmware upgrade. 

Required Software and Firmware Versions

Components

Software/Firmware

Version

SBC Platform

  

SBC 51x0/52x0 BMC

V03.18.00-R001

SBC 51x0/52x0 BIOSV2.6.0
SBC 5400 Firmware

BMC: V03.18.00-R001

BIOS: V1.17.0

SBC 7000 Firmware

BMC: V03.18.00-R001

BIOS: V2.13.0

SBC Application

 

 

Operating System (OS) Version

V06.02.01-R000
SonusDB

V08.00.00-R000

SBC Application

V08.00.00-R000

Note

The firmware package of SBC 5400 and 7000 series includes BMC, BIOS, and other binaries. The firmware is upgraded from the BMC.

How to Verify Currently Installed Software/Firmware Versions

Use the EMA to verify the currently installed software and firmware versions.

Log on to the EMA, and from the main screen navigate to Monitoring > Dashboard >  System and Software Info.

SBC Core Application Package

The SBC Application installation and upgrade package for SBC Core:

  • sbc-V08.00.00R000-connexip-os_06.02.01-R000_4_amd64.qcow2
  • sbc-V08.00.00R000-connexip-os_06.02.01-R000_4_amd64.qcow2.md5
  • sbc-V08.00.00-R000.x86_64.tar.gz
  • sbc-V08.00.00-R000.x86_64.md5
  • sbc-V08.00.00-R000.x86_64.signature

For detailed information on installation and upgrade procedures, refer to SBC Core Software Installation and Upgrade Guide.

Cloud Service Archive (CSAR) Packages for VNFM Deployment on OpenStack

These files are for SBC SWe deployments in the OpenStack cloud using VNFM.

For VNFM deployment, the VNF Descriptor (VNFD) file is provided in a Cloud Service Archive (CSAR) package for the type of SBC cluster being deploying. VNFs are independent and CSAR definitions are imported into the VNFM via an Onboarding mechanism. The SBC has several different CSAR variants, for different personalities (S-SBC, M-SBC) and interface types (virtio, sriov). The supported CSAR packages for the SBC are:

  • ssbc_virtio_7.2.csar
  • ssbc_sriov_7.2.csar
  • msbc_virtio_7.2.csar
  • msbc_sriov_7.2.csar

Files required for CSAR creation: 

  • createVnfmCsar.py
  • vnfmSol001VnfdTemplate.yaml
  • sbc-V08.00.00R000-connexip-os_06.02.01-R000_4_amd643.qcow2

For detailed information on installation and upgrade procedures, refer to SBC Core Software Installation and Upgrade Guide.

Upgrade Notes

Warning

A LSWU on an SBC 7000 should only be performed when the total number of active calls on the system is below 18,000. If the criteria is not met, a double failure during the upgrade may occur, thereby losing all active calls. If such a failure occurs, both active and standby SBC services will go down.  Contact Ribbon Support immediately.

Note

Release 8.0 requires additional user account security practices for SBC SWe deployments in Openstack cloud environments. During upgrade of SBC SWe cloud instances deployed using Heat templates, you must use a template that includes SSH keys or passwords for the admin and linuxadmin accounts. The example Heat templates have been updated to include information on how to specify this type of data in the userdata section of a template.

Note

Once the installation or upgrade completes on the SBC 51x0 and SBC SWe platforms, the copy of the installation package (SBC Core 08.00.00R000 Release Notes) is automatically removed from the system.

Note

As an SBC Core password security enhancement, user passwords automatically expire after upgrading to 8.0.x. As a result, users are required to change their passwords upon initial login immediately following the upgrade.

Note

Customers using the Network licensing mode will stay on the Network licensing mode after upgrade to the SBC 8.0.0 Release.

Customers using Legacy mode will stay on the Legacy mode after upgrade to SBC 8.0.0 Release. Once upgraded to SBC 8.0.0 Release, the customer will not be able to set Network License mode.

Note

The AWS version is currently available on an R7.0 branch. Customers should use the R7.0 branch or contact their local sales representative if they have a use case for AWS.

Note

The SBC 8.0 5xx0 and 7000 platforms may exhibit a 7% degradation of CPU performance relative to earlier releases. This is attributable to the Spectre/Meltdown security patches.

Note

For the procedure specific to SBC SWe upgrades on KVM Hypervisor or VMware to take advantage of performance improvements due to hyper-threading, refer to MOP to increase vCPUs Prior to Upgrading SBC SWe on VMware or KVM Hypervisor.

Note

In the case of a Live Software Upgrade (LSWU) from 6.0.0R000/6.0.0R001/6.0.0F001/6.0.0F002 to 8.0, The action “Perform Pre-Upgrade Checks” from PM is not supported. Please contact Ribbon Support.


08.00.00R000 Upgrade Information

Warning

Prior to performing an upgrade to release 08.00.0R000, usernames that do not conform to the new SBC user-naming rules must be removed to prevent upgrade failure. Upgrade can proceed successfully after removing all invalid usernames. The following user-naming rules apply:

  • Usernames can begin with A-Z a-z _ only.
  • Usernames cannot start with a period, dash, or digit.
  • Usernames can contain a period(.), dash(-), alphabetic characters, digits, or underscore(_).
  • Usernames cannot consist of digits only.
  • Usernames can contain a maximum of 23 characters.

The following names are not allowed:

tty disk kmem dialout fax voice cdrom floppy tape sudo audio dip src utmp video sasl plugdev staff users nogroup i2c dba operator

Note: Any CLI usernames consisting of digits only or not conforming to new user naming rules will be removed after performing a restore config in release 8.0.0R000. 

Warning

Prior to performing an upgrade to the 8.0 release, the dnsGroups with type mgmt must be specified/updated with the "interface" field. The steps are included in WBA "W-17-00022847". To view the WBA, log on to the Support Portal and click the Bulletins link from the menu bar. Enter the bulletin number (last eight numbers) in the search field and press Return.

If the above MOP is not run, the LSWU process may fail because of duplicate trunk group or zone names.

Warning

Prior to performing an upgrade to 8.0 release, the duplicate trunk groups or zones must be removed. The steps are included in WBA "W-17-00022689". To view the WBA, log on to the Support Portal and click the Bulletins link from the menu bar. Enter the bulletin number (last eight numbers) in the search field and press Return.

If you are upgrading from any SBC version with ePSX configuration to the 08.00.00R000 release, execute the Method of Procedure, MOP to Re-configure SBC (with ePSX) to External PSX Prior to an Upgrade to 06.00.00R000 Release prior to performing an upgrade. For a list of supported LSWU paths, refer to SBC Core 08.00.00R000 Release Notes.

Support of maddr Post-Upgrade

When upgrading SBC Core to release 5.0.0 (and above) from a pre-4.2.4 release, complete the "Action to take" immediately after the upgrade if either condition that follows is applicable:

  • If you are using the SBC with a Broadsoft system and the SBC is configured for registration access (where the SBC sits between SIP phones and the Broadworks System). Otherwise no new REGISTER will be processed (phones will lose registration).
  • If you are using the SBC with other feature servers that require maddr processing.

Action to take: On the SIP trunk group facing Broadsoft (or other feature server), set the SIP Trunk Group signaling flag, honorMaddrParam, to enabled on the Trunk Group(s) requiring maddr handling. The default is ‘disabled’.

set addressContext <addressContext name> zone <zone name> sipTrunkGroup <TG name> signaling honorMaddrParam <disabled | enabled> 

See the following pages for configuration details:

SBC SWe Pre-Upgrade Requirements

VM CPU resource allocation requirements

Starting with 4.2.4R0 release, CPU resource allocation requirements for SBC SWe VM are strictly enforced contrary to previous releases. You must review and verify these VM settings (including co-hosted VMs) against the documented "VM Configuration Recommendations" on the For VMware page in the Hardware and Software Requirements section before upgrading. If you encounter a problem, correct the CPU reservation settings as specified in step 6 of the "Adjust Resource Allocations" procedure on Creating a New SBC SWe VM Instance with VMXNET3. CPU reservation should be set as “number of vCPUs assigned to VM * physical processor CPU frequency". If VM uses the same number of vCPUs as the number of physical processors on the server, this reservation may not be possible. In this case, reduce the number of vCPUs assigned to VM by one and set the CPU reservation to the appropriate value.

When using the show table system serverSoftwareUpgradeStatus command during the upgrade, the Standby server's LSWU status will always display "Upgrading" even though the upgrade may have failed due to host checker validation. To check if host validation failed for the Standby, check for HostCheck Validation Failed message in the upgrade.out log.

Disable Call Trace feature prior to LSWU/upgrade

As a prerequisite for SWe LSWU/upgrade, disable the Call Trace feature prior to performing the LSWU/upgrade and re-enable it once the LSWU/upgrade is completed.

Manually check for Hostcheck Validation Failed message

Perform the following procedure on the Standby to check for the Hostcheck Validation Failed message in the upgrade.out log.

  1. Log on to ESXi of the Standby SBC SWe.

  2. Check in/opt/sonus/staging/upgrade.out (this log shows the Hostcheck Validation Failed error).

  3. Power off the VM.

  4. Reduce the number of vCPUs assigned to VM by one and set the CPU reservation to the appropriate value.

  5. Power on the VM. The SBC SWe successfully upgrades to the latest version 6.2.0. 

  6. Run the command show table system serverSoftwareUpgradeStatus to confirm the successful upgrade.

  7. Perform similar procedure for LSWU on Active.

Preparing for Upgrade (All Platforms)

Warning

Prior to performing a Live Software Upgrade (LSWU), verify if the system and the databases are in sync. The steps are included in WBA "Warning-14-00020748". To view the WBA, log on to the Support Portal and click the Bulletins link from the menu bar. Enter the bulletin number (last eight numbers) in the search field and press Return.

Note

The SBC 8.0 release skips the SRV query if the flag in a DNS NAPTR response from the DNS server indicates to proceed with "A" record query as per RFC 2915/3403. This is a change in behavior from previous releases, where the SBC performed SRV queries irrespective of the "flag" setting returned by DNS Server.  If you use DNS NAPTR/SRV/A record query from SBC to determine peer transport address, ensure the DNS Server is configured to return ‘S’ flag to invoke an SRV query.

Note

In this release, LSWU infrastructure is added to the Platform Manager (PM), providing the ability to perform LSWU upgrades to later releases using the PM. However, this feature is not currently supported in 4.2.x releases and should not be used at this time.

Please read the following information and take necessary actions before starting your upgrade to this release.

Since the release 4.1.4, the cryptographic key pair used to sign and verify the package has been changed to enhance security. When installing/upgrading from all 4.0.x releases, all pre-4.1.4 releases (4.1.3 and earlier), and all pre-4.2.3 releases (4.2.2R00x and earlier), do one of the following, depending upon your upgrade method:

  • LSWU through CLI: Skip the integrity check during LSWU by using the CLI command below.

    During LSWU, use the integrityCheck skip option when upgrading from CLI:

    > request system serverAdmin <server> startSoftwareUpgrade integrityCheck skip package <package>
    Note

    Integrity check works as expected only when upgrades are started from 4.1.x releases (4.1.4R000 or later) or from 4.2.3R000 or later releases.

  • Upgrade through Platform Manager: If upgrading using Platform Manager, simply ignore the "Wrong Signature" warning message and continue the upgrade normally.
Note

Downgrading to any pre-5.0 release from this release requires a ConnexIP re-ISO installation. For more information, refer to:

Supported Live Software Upgrade (LSWU) Paths

The SBC Core supports Live Software Upgrade from releases listed in the table below:

Supported Upgrade Paths

V05.00.xxV05.01.xxV06.xxV07.xx
V05.00.00R000V05.01.00R000V06.00.00R000V07.00.00R000
V05.00.00R001V05.01.00F001V06.00.00R001V07.00.00F001
V05.00.00S102V05.01.00F002V06.00.00F001V07.00.00F002
V05.00.00S104V05.01.00F003V06.00.00F002V07.00.00F003
V05.00.00S200V05.01.00F004V06.00.00F003V07.00.00F004
V05.00.00S201V05.01.00F005V06.00.00F004V07.00.00F005
V05.00.00S202V05.01.00F006V06.00.00F005V07.00.00F006
V05.00.00S203

V05.01.00F007

V06.00.00F006V07.01.00R000
V05.00.00S204V05.01.00F008V06.00.00F007V07.01.00R001
V05.00.00F001V05.01.01F001V06.00.00F008V07.01.00R002
V05.00.00F002V05.01.01F002V06.00.00F009V07.01.00R003 
V05.00.00F003V05.01.01F003V06.00.00F010V07.01.00R004
V05.00.00F004V05.01.01F004V06.00.00F011V07.01.00F001
V05.00.01R000V05.01.01F005V06.00.00F012V07.02.00R000
V05.00.01R001V05.01.01F006V06.01.00F001V07.02.00R001
V05.00.01R002V05.01.00S608V06.01.00F002V07.02.00R002
V05.00.01S001V05.01.00S610V06.01.00F003 
V05.00.01F001V05.01.00S611V06.01.00R000 
V05.00.01F002V05.01.00S612V06.01.00R001 
V05.00.01F003V05.01.00S613V06.01.00R002 
V05.00.02R000V05.01.00S614V06.01.00R003 
V05.00.02R001V05.01.00S617V06.01.00R004 
V05.00.02A059V05.01.00S619V06.01.00R005  
V05.00.02A061V05.01.00S620V06.01.00R006 
V05.00.02F001V05.01.00S621V06.01.00R007 
V05.00.02F002V05.01.00S622V06.01.00R008  
V05.00.02F003V05.01.01R000V06.02.00R000 
V05.00.02F004V05.01.01R001V06.02.01R000 
V05.00.02F005V05.01.02F001V06.02.01R001 
V05.00.03R000V05.01.02F002V06.02.01R002  
V05.00.03R001V05.01.02F003V06.02.01F001 
V05.00.03R002V05.01.02F004V06.02.01F002 
V05.00.03R003V05.01.02F005V06.02.01F003 
V05.00.03F001V05.01.02F006V06.02.01F004 
V05.00.03F002V05.01.02F007V06.02.01F005 
V05.00.03F003V05.01.02F008V06.02.02R000 
V05.00.03F004V05.01.02S001V06.02.02F001 
V05.00.03F005V05.01.02R000V06.02.02F002 
V05.00.03F006V05.01.02R001V06.02.02F003 
V05.00.03F007V05.01.02R002V06.02.02F004 
V05.00.03F008V05.01.02R003V06.02.02F005 
V05.00.04F001V05.01.02R004V06.02.02F006 
V05.00.04R000V05.01.03R000V06.02.02F007 
V05.00.04R001V05.01.03F001V06.02.02F008 
V05.00.05F001V05.01.03F002V06.02.02R001 
V05.00.05F002V05.01.03F003  
V05.00.05F003V05.01.03F004  
V05.00.05F004V05.01.03F005  
V05.00.05F005V05.01.03F006  
V05.00.05F006V05.01.04R000  
V05.00.05F007V05.01.04F001  
V05.00.05F008V05.01.04F002  
V05.00.05R000V05.01.04F003  
V05.00.06R000 V05.01.05R000  
V05.00.06F001V05.01.05F001  
V05.00.06F002V05.01.05F002  
V05.00.06F003V05.01.05F003  
V05.00.06F004V05.01.05F004  
V05.00.06F005V05.01.05F005  

New Features

New Features in 08.00.00R000 Release

43? 46 on ICD page

SBX-25924 / 32316 / 53181 / 60306 / 69021 / 69022 / 69038  MSRP Enhancements

In addition to supporting RFC 6714 "Connection Establishment for Media Anchoring" (CEMA) handling of Message Session Relay Protocol (MSRP) sessions, the SBC now supports the following:

  • Topology hiding or B2BUA support for MSRP sessions
  • TCP connection reuse or multiplexing of MSRP sessions over a common TCP connection
  • Distributed SBC support for MSRP sessions

For more information, refer to: 

SBX-39002 - Improve "clearmode" Codec Negotiation

For more information, refer to: 

SBX-44930 SBC SWe and CE Gateway Signaling Support (MCS)

For more information, refer to: 

SBX-48781 - Use postgres Database in ERE - not needed?

For more information, refer to: 

SBX-51725 / SBX-72926 Active Directory Merge from PSX To ERE / Flexible AD Support for ERE

Active Directory Support is added to the SBC. For large enterprises with a bigger subscriber base, the SBC 5K (along with PSX), provides a better solution in terms of call capacity. 

In Enterprise deployments, ERE is required to retrieve the User information from the Microsoft Active directory database and use it for call routing and policy decisions. This reduces the administrative overhead of provisioning and managing the user information at two places. The ERE will retrieve the Subscriber information by querying the Active Directory database, which includes:

  • Subscriber Identity
  • Display name
  • Home phone number
  • Mobile phone number
  • Office/Lync phone number

Since LDAP is a known slow response protocol, the SBC fetches the data from the remote server and stores it in the local database instead of querying real time to the remote server. This data is later used during calls to manipulate various call parameters and use them in routing logic.

As explained above, for Flexible AD to work, the configurations are classified into two categories:

  1. Configuration to Sync Data from Remote Server
  2. Synced data use during call processing

For more information, refer to: 

 

SBX-63318 /SBX-53949 SBC Support for Multiple Syslog Server and Secure remote Syslog for TCP

For more information, refer to: 

SBX-61487 Support Debian 9

The SBC is migrated to the latest supported version of Debian. This is needed to ensure that there is sufficient runway on Debian community upgrades to meet support requirements, especially in the context of security patches.

For more information, refer to:

SBX-62630 / SBX-68171 tgrp and trunk-context Parameter Taken into Account Together

For more information, refer to: 

SBX-64899 and 72002 Support N:1 HA for on S-SBC and T-SBC cluster

For more information, refer to: 

SBX-67068 REG Relay After Multiple Consecutive 503 Responses

For more information, refer to: 

SBX-67075 Support One Gbps Speed on SBC 5400 Management Port

The SBC 5400 firmware/software is enhanced in this release to add support for 1 Gbps speeds to the management ports (in addition to the existing 100 Mbps support), including the support of half or full duplex with auto-negotiation on all four management ports. Each management port auto-negotiates the speed/mode independently from other management ports.

Additionally, the SBC Core is enhanced to display the negotiated management port speed and current bandwidth for all management ports from the CLI/EMA.

Since this enhancement allows 1 Gbps traffic bandwidth for all management ports, it increases the possibility of a traffic overload condition due to the increased bandwidth of the combined management, media and signaling traffic. To address this, the SBC sets the management traffic as the lowest priority. Thus, the system drops the management packets, as necessary, to avoid impacting media or signaling traffic.

For more information, refer to: 

 

SBX-67513 Increase Number of Variables in SMM Profile

Currently, a SIP adaptor profile cannot use more than 30 variables (from var1 to var30). The number of variables supported in an SMM Profile is now increased from 30 to 100. 

For more information, refer to:

SBX-68167 - Remove SLS from Code and Documentation

For more information, refer to: 

SBX-68179 - SBC SWe: Support D-SBC in a VMware Environment

For more information, refer to: 

SBX-68182 Send 480 for per-peer policing discards of SUBSCRIBE

The SBC is enhanced to use the configured Internal SIP Cause Map Profile attached to the Trunk Group to send an error response when the SUBSCRIBE rate control is reached based on configured CAC profile on Trunk Group/(static) IpPeer.

The SBC also uses the configured cause string in the Internal SIP Cause Map Profile attached to the Trunk Group to send cause text in Reason header when rejecting the SUBSCRIBE message due to Ingress endpoint CAC (Trunk Group/IpPeer).

For this feature, a SUBSCRIBE rate control that sends a 480 (temporarily unavailable) response on per-peer policing is added to the SBC.

The SBC uses the existing sipInternalCauseCode profile to send the custom SIP response code, subsEndPointRatePolicing, which is added under the causeMap parameter. An optional custom cause string for this particular use of a 480 response can be sent in the reason header of the SIP error response, by using the sipCauseText configuration. An example of the optional cause string is "subscription rate limiting". sipCauseText is configurable and is highly desirable for troubleshooting. 

This feature is only for out-of-dialog SUBSCRIBE messages, not in-dialog SUBSCRIBE messages. The SBC will reject inbound Subscription requests from a given peer, based on an ingress rate control set on the peer's interface.

For more information, refer to:

SBX-69356 - Session KeepAlive Retry after Switchover

For more information, refer to: 

SBX-69377 Support for Additional Media Statistics in SBC CDR - SWE

For more information, refer to: 

SBX-70370 - Support SIPRec on D-SBC on any platform including VMware, KVM, Openstack or AWS

For more information, refer to: 

SBX-70520 - Report Licensing Mode in Licensing Interval Statistics

In addition to providing the peak number of instances for different types of calls, the Global Call Count Current Statistics and Call Count Interval Statistics tables now identify the license mode of the SBC from which the statistics were retrieved. The possible values are Node Locked (nodeLocked) and Domain (domain).  Node Locked refers to the most common form of licensing in which a license is bound to a specific SBC node through its serial number (hardware-based SBC) or its universally unique identifier (VM-based SBC SWe systems). Domain refers to network-wide domain licensing (NWDL) in which a license is associated with a domain. NWDL is supported on some large-scale distributed SBC or cloud-based systems.

For more information, refer to: 

SBX-71264 - SIP Aware Front End Load Balancer

For more information, refer to: 

SBX-71271 - Cloud Provisioning OAM Model

For more information, refer to: 

SBX-71313 Rules in SMM Profile are 768

The SBC is enhanced to support up to 768 rules in an SMM profile. The rules are applied sequentially to the messages.

For more information, refer to: 

SBX-71398 - Overflow Route Configured in the routing label, works only for error codes mapped in Crank Back Profile

For more information, refer to: 

SBX-71489 Qualify Intel X550 based NIC Cards for SBC SWe

x550 based NIC cards are qualified. They are supported on KVM (SR-IOV) and VMware (SR-IOV and Direct I/O). 

For more information, refer to:

SBX-72002 - Support for M+N Signaling and Media SBC VNF Relationship Model

For more information, refer to: 

SBX-72181 TCP Connection Failure Alarm in case Socket Queue Limit is Full

For more information, refer to: 

SBX-72198 Support Virt-IO with VLAN Tag on S-SBC

For more information, refer to: 

SBX-72263 - Estimation Accuracy wrt call-mix and Core Allocation

For more information, refer to: 

SBX-73382 - QCOW2 Image Replacement Upgrade Support

For more information, refer to: 

SBX-73494 Address Gaps in GPU Solution

For more information, refer to: 

SBX-73593 - SILK Codec Transcode Support on SBC SWe

For more information, refer to: 

SBX-73680 Local Survivable Mode for Calls and Registrations

For more information, refer to: 

SBX-76818 CLONE - Japan Number Portability Enhancement

The existing control variantType is used, with the value being set to ttc.  

However, the parts of the JJ90.30 specification that ttc actually supports are as follows:

When this control is set to TTC the SBC supports the following interworking mapping:

For SIP to ISUP

  • INVITE sip: + 81312345678;npdi;rn=+8134512345@example.ne.jp;user=phone SIP/2.0
  • The rn parameter gets mapped to the called party number 
  • The R-URI gets mapped to the called directory number
  • The SBC generates the redirection counter parameter with the value of 1.

For ISUP to SIP

If the called directory number parameter is present then it gets mapped into the R-URI, and the called party number is mapped into the rn parameter and the npdi parameter is included.

For more information, refer to:

SBX-85122 - NWL Licensing Documentation Update

For more information, refer to: 

 

(34 total but 43 with the ones paired up)

Resolved Issues

Resolved Issues in 08.00.00R000 Release 

The following issues are resolved in this release:

Resolved Issues

Issue IDSevProblem DescriptionResolution
  

Platform/Feature: SBC

 

Known Issues

Known Issues in 08.00.00R000 Release 

The following issues exist in this release:

Known Issues

Issue IDSevProblem DescriptionImpact/Workaround
  

Platform/Feature: SBC

Impact:

Workaround:



Known Limitations

The following limitations exist in this release:

  • Due to a known EMA GUI issue, it can take up to 10 minutes to process each SMM rule when provisioning SMM on the SBC using the EMA. This will be fixed in a future release.

  • The Access Control List (ACL) is not installed to configure SNMP traps for accepting traffic. A dynamic ACL is added to configure SNMP traps. An ACL must be installed for SNMP traps for accepting traffic.
  • The physical NIC connectivity must be in active state at the hypervisor level before starting the SWe instance on the SBC SWe platforms. In case of SWe instance with SR-IOV interfaces, manual restart of the SWe instance is required if physical NIC connectivity goes down while the instance is in progress.
  • The HA interface must not be configured with link localaddress or subnet. For example, do not configure it with 169.254.0.0/16 subnet. 

  • The Antitrombone feature is not supported on the D-SBC.
  • EMS identifies the nodes based on the VNFC-ID. While instantiating SBC/PSX cloud nodes, ensure that you use a unique VNFC-ID only. If you reuse an existing VNFC-ID, EMS treats this as a re-registration request and overwrites the existing data on the cloud node.
  • While configuring the SBC SWe Cloud instances, the CLIs commits successfully even if any metaVariable provided is incorrect. The SBC SWe Cloud instance cannot validate the CLIs, as the CDB configuration file is stored in the SBC Configurator and is shared among all the other SBC SWe Cloud instances in the cluster.
  • Editing IP Interface is not reflected in the if configuration (ifConfig). This behavior is observed only on the S-SBC when action is set to "dryup" mode on the IP Interface. The IP address changes are not updated in the kernel and will not be displayed when ifconfig linux command is executed. In case of S-SBC, if the ipInterface configuration needs to be modified and if the action is set to "dryup" in ipInterface configuration, it must be set to "force" before disabling the ipInterface and making any changes.
  • A LSWU on an SBC 7000 should only be performed when the total number of active calls on the system is below 18,000. If the criteria is not met, a double failure during the upgrade may occur thereby losing all active calls. If such a failure occurs, both active and standby SBC services will go down. Contact Ribbon Support immediately.

The VLAN tagged SRIOV packet interfaces are unable to ping endpoint Gateway IPs in the VMware platform because of an issue with VMWare.

Performing Heat Stack Update when userdata is Updated with SSH Keys

When upgrading SBC SWe cloud instances to release 8.0, you must update your Heat template userdata section to include mandatory SSH key information. An issue in OpenStack requires that you use the stack-update process rather than re-launch after updating the template, which leads to a new UUID for the instance. As a result, you must regenerate and apply new license bundles to the upgraded instances during the upgrade.

Refer to Upgrading M-SBCs in an N:1 Redundancy Group for the relevant procedure. 

Restricted Functionality with SBC

The following functionalities are not supported with SBC Microservices:

  • SRTP
  • Far end NAT traversal
  • DTMF inter-working
  • RTCP termination for pass-through calls
  • Direct Media and Antitrombone
  • NICE, SIP-REC
  • Rx, Rf interfaces
  • Multimedia - MSRP, BFCP  
  • Fax detection
  • ICE/STUN
  • SIP REFER
  • SIP REPLACE
  • Two stage calls

  • H323 support
  • GW signaling support

Restricted Functionality with SBC for AWS

The following functionalities are not supported with SBC for AWS:

  • The EC2 does not support VM console. The SSH must be used to access the VM.
  • The smarctl disk status is not supported on Amazon instance.
  • All the networking ports must be in different subnets.
  • The instance creation and reboot process take approximately 4 to 6 minutes to complete.
  • IP spoofing or L2 learning is not supported.
  • It is required to associate an EIP on MGT0 for an HA, and the CFN template automatically assigns the EIP. This is required for communicating with AWS servers while instance switchover. The EIP switchover takes 15-20 seconds.

Network Licensing Limitations

After switchover during grace period, when the new standby SBC comes up and establishes itself as standby, there is a short period (a few minutes) when the standby is synchronized for normal operation, but the new standby has not yet completed establishing its licensing state using the grace license information. If there is a second SBC switchover during that window, the new active SBC (which became active before completing license state synchronization) will lose calls until it re-acquires the grace licenses.

For configuring Network Wide Licensing, refer to Configuring Network Wide Licensing on D-SBC. This procedure is common for D-SBC and SBC.

  • No labels