You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 18 Next »

Table of Contents

About SBC Release Notes

The RN PN: 550-08477 describes new features, the latest hardware and software requirements, known limitations and other pertinent release information for the latest release of SBC Core.

Please note that all Ribbon bugs reported by customers on a given software release will be fixed in the latest release on that software release branch.

To view and download the latest End of Product Sale (EoPS) and other End Of Life (EOL) notices, navigate to the Resource Library on the corporate website (https://ribboncommunications.com/company/get-help/resource-library).

Related Documentation

The SBC Core 08.01.xx documentation is located at the following Wiki space: SBC Core Documentation.

Release Notes Use and Distribution

Ribbon Release Notes are protected under the copyright laws of the United States of America. This work contains proprietary information of Ribbon Communications, Westford, MA-01886, USA. Use, disclosure, or reproduction in any form is strictly prohibited without prior authorization from Ribbon Communications.

Associated Ribbon Announcements

The following Ribbon announcements (formerly known as WBAs) are referenced in this release note:

  • Warning-18-00028230: Call failure during LSWU when upgrading 5.x release to 6.2.1 or higher (VMWare or KVM) with 10 or more vCPUs configured.
  • Warning-17-00022847: The DNS configuration parameters within the address contexts may cause certain configurations to fail during an upgrade
  • Warning-17-00022689: Duplicate Trunk Group or Zone names can cause unexpected behavior
  • Warning-14-00020748: Verify system and databases are fully in sync prior to Live Software Upgrade (LSWU). Applies to SBC 5100, SBC 5110, SBC 5200, and SBC 5210 only.
  • Bulletin-18-00028529: The System Security Intrusion Detection AIDE Reports False Positive Alarms

To view/download Ribbon announcements, do the following:

  1. Log on to the 
    Unable to show "metadata-from": No such page "_space_variables"
    Support Portal (https://ribboncommunications.com/services/ribbon-support-portal-login).
  2. From the Quick Access menu, click and download the "Ribbon Support Portal User Guide", and navigate to the "ANNOUNCEMENTS tab" section for instructions to search for and view announcements.

Problems or Questions

For problems or questions, contact Ribbon Support through telephone or fax: 

Worldwide Voice: 1 (978) 614-8589

USA Toll-free: 1 (888) 391-3434

Worldwide Fax: 1 (978) 614-8609

About SBC Core

The SBC Core platforms address the next-generation needs of SIP communications by delivering media transcoding, robust security and advanced call routing in a high-performance, 2RU, and 5RU form-factor devices enabling service providers and enterprises to quickly and securely enhance their network by implementing services like SIP trunking, secure Unified Communications and Voice over IP (VoIP).

For more product information, refer to the section About SBC Core in the main documentation space.

Interoperability

The SBC Core software interoperates with the following:

  • SIP/H.323 compliant IADs and IP-PBXs
  • PSX Policy Server Softswitch via SIP redirects and/or Diameter+ protocol
  • SBC 9000 through SIP call signaling and Networks MCS protocol
  • NetScore collection, analysis, monitoring, and reporting of selected Key Performance Indicators (KPIs) on a near-real time basis

Note

NetScore maintains a list of remote host keys for all nodes from which it collects data. If NetScore is deployed in your network, connectivity to the SBC will be lost any time the SBC software is reinstalled because the SBC’s host key is updated during the install. Refer to NetScore Release Notes for steps needed to reconnect to the SBC.

H.323-SIP and SIP-H323 Calls

When using H.323-SIP and SIP-H.323 call flows, an additional Re-invite/Update may get generated towards the SIP side. To suppress this, enable the IP Signaling Profile (IPSP) flag Minimize Relaying Of Media Changes From Other Call Leg at the SIP side.

Note

H.323 is not supported on SBC SWe cloud deployments.

Compatibility with Ribbon Products

Tip

When upgrading your network, ensure to upgrade each product to the most current release to take advantage of the latest features, enhancements, and fixes.

Info

For complete interoperability details between various Ribbon products, including backwards compatibility, refer to Ribbon Product Compatibilities.

Refer to SBC 5000-7000-SWe Interoperability Matrices for the latest and minimum compatible product versions supporting the 08.02.00R000 release.

Sample Heat Templates Included in This Release

To instantiate the SBC instances, the following templates can be used:

SBC Heat Templates

 Template NameDescription
heatRgNoDhcp.yamlUsed to instantiate no DHCP, IPv4 or IPv6 deployments. The template supports I-SBC, M-SBC, S-SBC, MRFP and SLB node types. This template includes instructions to enable port redundancy.
heatOamNoDhcp.yamlUsed to instantiate an OAM node.
heatRgNoDhcp-TSBC-template.yamlUsed to instantiate a T-SBC node.

Note

Example template files are packaged together in .tar.gz and .md5 files separate from the SBC Core application installation and upgrade files:

  • cloudTemplates.tar.gz
  • cloudTemplates.tar.gz.md5

SBC SWe Cloud Requirements for OpenStack

The system hosting the SBC SWe Cloud must meet the below requirements for OpenStack:

Server Hardware Requirements


ConfigurationRequirement
Processor

Intel Xeon processors (Nehalem micro-architecture or above) with 6 cores and above (processors should support hyper-threading).

Note

Ribbon recommends Westmere (or newer) processors for better SRTP performance. These processors have the AES-NI instruction set for performing cryptographic operations in hardware. 

 RAMMinimum 24 GiB
 Hard DiskMinimum 100 GB
Network Interface Cards (NICs)

Minimum 4 NICs.

Note

Make sure NICs have multi-queue support which enhances network performance by allowing RX and TX queues to scale with the number of CPUs on multi-processor systems.

Note

The Intel I350, x540, x550, and 82599 Ethernet adapters are supported for configuring as SR-IOV and DirectPath I/O pass-through devices.

Note

The PKT ports must be 10 Gbps SR-IOV enabled ports.

Note

6 NICs are required to support PKT port redundancy.

The system hosting the SBC SWe must meet the following requirements to achieve the performance targets listed: 

S-SBC SWe Requirement

S-SBC SWe Requirements
for 1000 CPS/120K Signaling Sessions 
Notes

32 vCPUs

Due to the workload characteristics, allocate 20 physical cores with two hyper-threaded CPUs from each core to the SBC.

128 GiB RAM

Must be Huge Page memory. The minimum page size is 2048 KiB, but 1048576 is recommended.

100 GB Disk

None

4 vNICs/6 vNICs

Attach MGT0 port to the Management VirtIO Tenant network.

HA port has to be on IPv4 VirtIO Tenant network.

Attach PKT0 and PKT1 ports to SR-IOV and Provider network.

M-SBC SWe Requirement

M-SBC SWe Requirements
for 40K Media Sessions
Notes

16 vCPUs

Due to the workload characteristics, allocate 10 physical cores with two hyper-threaded CPUs from each core and from single NUMA node to the SBC.

32 GiB RAM

Must be Huge Page memory. The minimum page size is 2048 KiB, but 1048576 is recommended.

100 GB Disk

None

4 vNICs/ 6 vNICs

Attach MGT0 port to the Management VirtIO Tenant network.

HA port has to be on IPv4 VirtIO Tenant network.

Note

All NIC ports must come from the same NUMA node from which the M-SBC SWe instance is hosted.

OpenStack Requirements

The SBC SWe supports the following OpenStack environments:

  • Newton with RHOSP 10 and RHEL 7.4
  • Queens with RHOSP 13 and RHEL 7.5
Note

The SBC SWe was tested on OpenStack Queens with RHOSP 13 and RHEL 7.5.

SBC SWe Requirements for KVM

The following table lists the server hardware requirements.

KVM Hypervisor Server Hardware Requirements


Configuration Requirement
Processor

Intel Xeon processors (Nehalem micro-architecture or above) with 6 cores and above (processors should support hyper threading).

Note

Ribbon recommends using Westmere (or newer) processors for better SRTP performance. These processors have the AES-NI instruction set for performing cryptographic operations in hardware.

Note

The supported CPU Family number is 6 and CPU Model number must be newer than 26. Refer to the Intel Architecture and Processor Identification document for more information.


 RAMMinimum 24 GB
Hard DiskMinimum 500 GB
Network Interface Cards (NICs)
Minimum 4 NICs
Note

Make sure NICs have multi-queue support which enhances network performance by allowing RX and TX queues to scale with the number of CPUs on multi-processor systems.

Note

The Intel I350, x540, x550, and 82599 Ethernet adapters are supported for configuring as SR-IOV and DirectPath I/O pass-through devices.


Ports

Number of ports allowed:

SBC SWe Requirements for VMWare

Warning

The SBC SWe software only runs on platforms using Intel processors. Platforms using AMD processors are not supported.

The following table lists the server hardware requirements:

Server Hardware Requirements


 ConfigurationRequirement
Processor

Intel Xeon processors (Nehalem micro-architecture or above) with 6 cores and above (processors should support hyper threading).

Note

Ribbon recommends using Westmere (or newer) processors for better SRTP performance. These processors have the AES-NI instruction set for performing cryptographic operations in hardware.

Note

The supported CPU Family number is 6 and CPU Model number must be newer than 26. Refer to the Intel Architecture and Processor Identification document for more information.

Note

ESXi 6.5 and later releases require approximately 2 physical cores to be set aside for hypervisor functionality. The number of VMs which can be hosted on a server must be planned for accordingly.

 RAMMinimum 24 GB
Hard DiskMinimum 500 GB
Network Interface Cards (NICs)

Minimum 4 NICs, if physical NIC redundancy is not required.

Note

Make sure NICs have multi-queue support which enhances network performance by allowing RX and TX queues to scale with the number of CPUs on multi-processor systems.

Note
  • The following NICs are supported for configuring as SR-IOV and DirectPath I/O pass-through devices. SR-IOV is supported only with 10 Gbps interfaces (x540/82599/x710):

Intel I350, x540, x550, x710 and 82599, Mellanox Connect - 4x, and Mellanox Connect - 5x. 

  • The VMware Enterprise Plus license is required for SR-IOV.
Ports

Number of ports allowed:

Requirements for Using the Infrastructure as Code Environment with SBC SWe

The following tarball file is required to use the IaC environment to deploy SWe N:1 deployments on VMware:

  •  iac-1.1-20190808-060356.tar.gz

The environment in which you place and expand the IaC tarball must include:

  • A Linux server running RedHat Enterprise Linux (RHEL), CentOS 7 or Debian 9
  • Python 2.7 or later
  • An internet connection for downloading and installing additional files that may be required for your deployment
  • Root access on the instance or ability to become root (for example, using sudo su -)
  • Access to the vSphere ESXi host IP from the Linux server where the IaC environment is set up.

For more information on IaC, refer to  Using the Ribbon IaC Environment to Deploy SBC SWe on VMware.

Required Software and Firmware Versions

The following SBC 5000 series (51x0/52x0), SBC 5400 and SBC 7000 software and firmware versions are required for this release. For 5xx0 the BIOS can be installed during app install, whereas for 5400 and 7000 the BIOS is included in the firmware package and is installed during the firmware upgrade. 

Required Software and Firmware Versions

Components

Software/Firmware

Version

SBC Platform

  

SBC 51x0/52x0 BMC

V03.20.00-R000

SBC 51x0/52x0 BIOSV2.7.0
SBC 5400 Firmware

BMC: V03.20.00-R000

BIOS: V1.17.0

SBC 7000 Firmware

BMC: V03.20.00-R000

BIOS: V2.13.0

SBC Application

 

 

Operating System (OS) Version

V07.01.01-R000
SonusDB

V08.01.00-R000

SBC Application

V08.01.00-R000

Note

The firmware package of SBC 5400 and 7000 series includes BMC, BIOS, and other binaries. The firmware is upgraded from the BMC.

How to Verify Currently Installed Software/Firmware Versions

Use the EMA to verify the currently installed software and firmware versions.

Log on to the EMA, and from the main screen navigate to Monitoring > Dashboard >  System and Software Info.

Software Bundles

The following software release bundle is available for download from the Customer Portal:

  • SBC5x7x_8.1

Download the appropriate software packages for your desired configuration from the Customer Portal (https://ribboncommunications.com/services/ribbon-support-portal-login) to your PC:

SBC 5000 Series (51x0/52x0) Firmware

  • firmware-5XX0-V03.20.00-R000.img

  • firmware-5XX0-V03.20.00-R000.img.md5

  • bmc5X00_v3.20.0-R0.rom.md5sum

  • bmc5X00_v3.20.0-R0.rom

SBC 5400 Firmware

  • firmware-5400-V03.20.00-R000.img
  • firmware-5400-V03.20.00-R000.img.md5

SBC 7000 Series Firmware

  • firmware-7X00-V03.20.00-R000.img
  • firmware-7X00-V03.20.00-R000.img.md5

Note

Execute the Method Of Procedure (MOP) only for upgrading the FPGA image of an SBC 7000 DSP-LC card when the SBC 7000 DSP-LC FPGA version is 0x14. The MOP can be applied at any version time, with the only restriction being that the BMC firmware version is at least 1.25.0. However, if the SBC application is running version V05.01.00R000 or higher, then the DSPs will be set to disabled and transcoding and transrating calls will fail if the SBC 7000 DSP-LC FPGA version is 0x14. Therefore, it is necessary to upgrade the SBC 7000 DSP-LC FPGA if the version is 0x14, before upgrading the SBC to 5.1.0. However, the MOP can be applied if the application version is higher than 5.1.0. Click Here to view the 550-06210_DSP-LC_FPGA_Upgrade_MOP.

SBC Core Operating System Installation Package

The ConnexIP Operating System installation package for SBC Core:

  • sbc-V08.02.00R000-connexip-os_07.01.01-R000_9_amd64.iso
  • sbc-V08.02.00R000-connexip-os_07.01.01-R000_9_amd64.iso.md5

Note

 Once the ConnexIP ISO procedure is completed, the SBC application package is automatically uploaded to SBC platforms.

SBC Core Application Package

The SBC Application installation and upgrade package for SBC Core:

  • sbc-V08.02.00R000-connexip-os_07.01.01-R000_9_amd64.qcow2
  • sbc-V08.02.00R000-connexip-os_07.01.01-R000_9_amd64.qcow2.md5
  • sbc-V08.01.00-R000.x86_64.tar.gz
  • sbc-V08.01.00-R000.x86_64.md5
  • sbc-V08.01.00-R000.x86_64.signature

For detailed information on installation and upgrade procedures, refer to SBC Core Software Installation and Upgrade Guide.

Cloud Service Archive (CSAR) Packages for VNFM Deployment on OpenStack

These files are for SBC SWe deployments in the OpenStack cloud using VNFM.

For VNFM deployment, the VNF Descriptor (VNFD) file is provided in a Cloud Service Archive (CSAR) package for the type of SBC cluster being deploying. VNFs are independent and CSAR definitions are imported into the VNFM via an Onboarding mechanism. There is a procedure for producing the required CSAR variant, for different personalities (S-SBC, M-SBC), different interface types (virtio, sriov).

Files required for CSAR creation: 

  • createVnfmCsar.py
  • vnfmSol001VnfdTemplate.yaml
  • sbc-V08.02.00R000-connexip-os_07.01.01-R000_9_amd64.qcow2

For detailed information on installation and upgrade procedures, refer to SBC Core Software Installation and Upgrade Guide.

For details on CSAR creation, refer to Creating a CSAR Package File. 

Upgrade Notes

Warning

A LSWU on an SBC 7000 should only be performed when the total number of active calls on the system is below 18,000. If the criteria is not met, a double failure during the upgrade may occur, thereby losing all active calls. If such a failure occurs, both active and standby SBC services will go down.  Contact Ribbon Support immediately.

Note

Release 8.0 requires additional user account security practices for SBC SWe deployments in Openstack cloud environments. During upgrade of SBC SWe cloud instances deployed using Heat templates, you must use a template that includes SSH keys or passwords for the admin and linuxadmin accounts. The example Heat templates have been updated to include information on how to specify this type of data in the userdata section of a template.

Note

Once the installation or upgrade completes on the SBC 51x0 and SBC SWe platforms, the copy of the installation package (SBC Core Installation and Upgrade Package) is automatically removed from the system.

Note

As an SBC Core password security enhancement, user passwords automatically expire after upgrading to 8.0.x. As a result, users are required to change their passwords upon initial login immediately following the upgrade.

Note

Customers using network licensing mode will be converted to node locked mode (formerly legacy mode) after upgrade to the SBC 8.0.0 Release.

Note

The SBC 8.0 5xx0 and 7000 platforms may exhibit a 7% degradation of CPU performance relative to earlier releases. This is attributable to the Spectre/Meltdown security patches.

Note

For the procedure specific to SBC SWe upgrades on KVM Hypervisor or VMware to take advantage of performance improvements due to hyper-threading, refer to MOP to increase vCPUs Prior to Upgrading SBC SWe on VMware or KVM Hypervisor.

Note

In the case of a Live Software Upgrade (LSWU) from 6.0.0R000/6.0.0R001/6.0.0F001/6.0.0F002 to 8.0, The action “Perform Pre-Upgrade Checks” from PM is not supported. Please contact Ribbon Support.

Note

The number of rules across SMM profiles in a system is limited to 2000, and the number of actions across profiles in a system is limited to 10000.

Ensure the above conditions are met before LSWU.

Note

 In NFV environments, the method used for upgrades involves rebuilding the instance, which requires additional disk space on the host. The minimum disk space needed for this operation is listed in the table below.

Disk Space Requirements

Flavor
Extra Space Required (GB)
S-SBC80
M-SBC80
PSX-M360
PSX-S360
PSX-Test360
EMS_SA150

Note

The SBC 51xx and 52xx systems require 24GB of RAM to run 6.x code or higher. 

Note

SWe SBC software enforces I-SBC instances to run only with a single vNUMA node in order to achieve deterministic performance. SWe SBC VM having >8 vCPUs hosted on dual-socket physical server with VMware ESXi software needs to follow the steps below to correct vNUMA topology before upgrading to latest SWe SBC software: 

  • Check the ‘Number of virtual sockets’ field. It should be set to 1.
  • Check ‘numa.nodeAffinity’ settings on VM. It should be either 0 or 1 based on which NUMA node PKT ports are connected. The following command on ESXi host can be used to check PKT port NUMA affinity:

     vsish -e get /net/pNics/<PKT port name - vmnicX>/properties | grep "NUMA"

 If any of the above settings requires modification, follow the steps below on SWe SBC HA system:

  • Shutdown the standby instance.
  • Set ‘number of virtual sockets’ field under [Edit settings > Hardware > CPUs > Number of virtual sockets] to 1 if not already set and adjust ‘number of cores per virtual socket’ accordingly. ‘Number of cores per virtual socket’ field should be equal to total number of vCPUs on the VM.
  • If ‘numa.nodeAffinity’ settings are missing, add the following rows:

numa.autosize.once  = FALSE

numa.nodeAffinity’   =  0 or 1 (based on PKT port NIC affinity)

On ESXi 6.5 and above releases, vSphere web client can be used to add above rows under  Edit settings > VM options > configuration parameters > add parameters;

On ESXi 6.0 and below releases, it can be added under Edit > Advanced > general > configuration parameters > add rows using vSphere client.

  • Power-on standby instance.
  • Once standby instance is up and running, do manual switchover through CLI and repeat above steps to modify ‘number of virtual sockets’ , ‘numa.nodeAffinity’ and ‘numa.autosize.once’ settings.

For more information, refer to:


08.02.00R000 Upgrade Information

Warning

Prior to performing an upgrade to release 08.00.0R000, usernames that do not conform to the new SBC user-naming rules must be removed to prevent upgrade failure. Upgrade can proceed successfully after removing all invalid usernames. The following user-naming rules apply:

  • Usernames can begin with A-Z a-z _ only.
  • Usernames cannot start with a period, dash, or digit.
  • Usernames can contain a period(.), dash(-), alphabetic characters, digits, or underscore(_).
  • Usernames cannot consist of digits only.
  • Usernames can contain a maximum of 23 characters.

The following names are not allowed:

tty disk kmem dialout fax voice cdrom floppy tape sudo audio dip src utmp video sasl plugdev staff users nogroup i2c dba operator

Note: Any CLI usernames consisting of digits only or not conforming to new user naming rules will be removed after performing a restore config in release 8.0.0R000. 

Warning

Prior to performing an upgrade to the 8.0 release, the dnsGroups with type mgmt must be specified/updated with the "interface" field. The steps are included in announcment "W-17-00022847".
If the above MOP is not run, the LSWU process may fail because of duplicate trunk group or zone names.

Warning

Prior to performing an upgrade to 8.0 release, the duplicate trunk groups or zones must be removed. The steps are included in announcement "W-17-00022689".

If you are upgrading from any SBC version with ePSX configuration to the 08.02.00R000 release, execute the Method of Procedure, MOP to Re-configure SBC (with ePSX) to External PSX Prior to an Upgrade to 06.00.00R000 Release prior to performing an upgrade. For a list of supported LSWU paths, refer to Supported Upgrade Paths.

Support of maddr Post-Upgrade

When upgrading SBC Core to release 5.0.0 (and above) from a pre-4.2.4 release, complete the "Action to take" immediately after the upgrade if either condition that follows is applicable:

  • If you are using the SBC with a Broadsoft system and the SBC is configured for registration access (where the SBC sits between SIP phones and the Broadworks System). Otherwise no new REGISTER will be processed (phones will lose registration).
  • If you are using the SBC with other feature servers that require maddr processing.

Action to take: On the SIP trunk group facing Broadsoft (or other feature server), set the SIP Trunk Group signaling flag, honorMaddrParam, to enabled on the Trunk Group(s) requiring maddr handling. The default is ‘disabled’.

set addressContext <addressContext name> zone <zone name> sipTrunkGroup <TG name> signaling honorMaddrParam <disabled | enabled> 

See the following pages for configuration details:

SBC SWe Pre-Upgrade Requirements

VM CPU resource allocation requirements

Starting with 4.2.4R0 release, CPU resource allocation requirements for SBC SWe VM are strictly enforced contrary to previous releases. You must review and verify these VM settings (including co-hosted VMs) against the documented "VM Configuration Recommendations" on the For VMware page in the Hardware and Software Requirements section before upgrading. If you encounter a problem, correct the CPU reservation settings as specified in step 6 of the "Adjust Resource Allocations" procedure on Creating a New SBC SWe VM Instance with VMXNET3. CPU reservation should be set as “number of vCPUs assigned to VM * physical processor CPU frequency". If VM uses the same number of vCPUs as the number of physical processors on the server, this reservation may not be possible. In this case, reduce the number of vCPUs assigned to VM by one and set the CPU reservation to the appropriate value.

When using the show table system serverSoftwareUpgradeStatus command during the upgrade, the Standby server's LSWU status will always display "Upgrading" even though the upgrade may have failed due to host checker validation. To check if host validation failed for the Standby, check for HostCheck Validation Failed message in the upgrade.out log.

Disable Call Trace feature prior to LSWU/upgrade

As a prerequisite for SWe LSWU/upgrade, disable the Call Trace feature prior to performing the LSWU/upgrade and re-enable it once the LSWU/upgrade is completed.

Manually check for Hostcheck Validation Failed message

Perform the following procedure on the Standby to check for the Hostcheck Validation Failed message in the upgrade.out log.

  1. Log on to ESXi of the Standby SBC SWe.

  2. Check in/opt/sonus/staging/upgrade.out (this log shows the Hostcheck Validation Failed error).

  3. Power off the VM.

  4. Reduce the number of vCPUs assigned to VM by one and set the CPU reservation to the appropriate value.

  5. Power on the VM. The SBC SWe successfully upgrades to the latest version 6.2.0. 

  6. Run the command show table system serverSoftwareUpgradeStatus to confirm the successful upgrade.

  7. Perform similar procedure for LSWU on Active.

Preparing for Upgrade (All Platforms)

Warning

Prior to performing a Live Software Upgrade (LSWU), verify if the system and the databases are in sync. The steps are included in announcement "Warning-14-00020748".

Note

The SBC 8.0 release skips the SRV query if the flag in a DNS NAPTR response from the DNS server indicates to proceed with "A" record query as per RFC 2915/3403. This is a change in behavior from previous releases, where the SBC performed SRV queries irrespective of the "flag" setting returned by DNS Server.  If you use DNS NAPTR/SRV/A record query from SBC to determine peer transport address, ensure the DNS Server is configured to return ‘S’ flag to invoke an SRV query.

Note

In this release, LSWU infrastructure is added to the Platform Manager (PM), providing the ability to perform LSWU upgrades to later releases using the PM. However, this feature is not currently supported in 4.2.x releases and should not be used at this time.

Please read the following information and take necessary actions before starting your upgrade to this release.

Since the release 4.1.4, the cryptographic key pair used to sign and verify the package has been changed to enhance security. When installing/upgrading from all 4.0.x releases, all pre-4.1.4 releases (4.1.3 and earlier), and all pre-4.2.3 releases (4.2.2R00x and earlier), do one of the following, depending upon your upgrade method:

  • LSWU through CLI: Skip the integrity check during LSWU by using the CLI command below.

    During LSWU, use the integrityCheck skip option when upgrading from CLI:

    > request system serverAdmin <server> startSoftwareUpgrade integrityCheck skip package <package>
    Note

    Integrity check works as expected only when upgrades are started from 4.1.x releases (4.1.4R000 or later) or from 4.2.3R000 or later releases.

  • Upgrade through Platform Manager: If upgrading using Platform Manager, simply ignore the "Wrong Signature" warning message and continue the upgrade normally.
Note

Downgrading to any pre-5.0 release from this release requires a ConnexIP re-ISO installation. For more information, refer to:

Supported Live Software Upgrade (LSWU) Paths

The SBC Core supports Live Software Upgrade from releases listed in the table below:

Supported Upgrade Paths

V05.01.xxV06.xxV07.xxV08.xx
V05.01.00R000V06.00.00R000V07.00.00R000V08.00.00R000 
V05.01.00F001V06.00.00R001V07.00.00F001V08.01.00R000
V05.01.00F002V06.00.00F001V07.00.00F002V08.01.00R001
V05.01.00F003V06.00.00F002V07.00.00F003 
V05.01.00F004V06.00.00F003V07.00.00F004 
V05.01.00F005V06.00.00F004V07.00.00F005 
V05.01.00F006V06.00.00F005V07.00.00F006 

V05.01.00F007

V06.00.00F006V07.01.00R000 
V05.01.00F008V06.00.00F007V07.01.00R001 
V05.01.01F001V06.00.00F008V07.01.00R002 
V05.01.01F002V06.00.00F009V07.01.00R003  
V05.01.01F003V06.00.00F010V07.01.00R004 
V05.01.01F004V06.00.00F011V07.01.00F001 
V05.01.01F005V06.00.00F012V07.02.00R000 
V05.01.01F006V06.01.00F001V07.02.00R001 
V05.01.00S608V06.01.00F002V07.02.00R002 
V05.01.00S610V06.01.00F003V07.02.01R000 
V05.01.00S611V06.01.00R000V07.02.01R001 
V05.01.00S612V06.01.00R001V07.02.01R002 
V05.01.00S613V06.01.00R002V07.02.01F002  
V05.01.00S614V06.01.00R003V07.02.01F001  
V05.01.00S617V06.01.00R004  
V05.01.00S619V06.01.00R005   
V05.01.00S620V06.01.00R006  
V05.01.00S621V06.01.00R007  
V05.01.00S622V06.01.00R008   
V05.01.01R000V06.02.00R000  
V05.01.01R001V06.02.01R000  
V05.01.02F001V06.02.01R001  
V05.01.02F002V06.02.01R002   
V05.01.02F003V06.02.01F001  
V05.01.02F004V06.02.01F002  
V05.01.02F005V06.02.01F003  
V05.01.02F006V06.02.01F004  
V05.01.02F007V06.02.01F005  
V05.01.02F008V06.02.02R000  
V05.01.02S001V06.02.02F001  
V05.01.02R000V06.02.02F002  
V05.01.02R001V06.02.02F003  
V05.01.02R002V06.02.02F004  
V05.01.02R003V06.02.02F005  
V05.01.02R004V06.02.02F006  
V05.01.03R000V06.02.02F007  
V05.01.03F001V06.02.02F008  
V05.01.03F002V06.02.02R001  
V05.01.03F003V06.02.04R000  
V05.01.03F004   
V05.01.03F005   
V05.01.03F006   
V05.01.04R000   
V05.01.04F001   
V05.01.04F002   
V05.01.04F003   
V05.01.05R000   
V05.01.05F001   
V05.01.05F002   
V05.01.05F003   
V05.01.05F004   
V05.01.05F005   

New Features in Release 08.02.00R000

SBX-3xxx

SBX-39186 - Support EVS Transcoding

EVS Transcoding is an enhancement to the FR, HR, EFR, AMR, and AMR-WB codecs. The SBC EVS Transcoding supports all bit-rates between 5.9 and 24.4. Source-controlled variable bit-rate operation gives improved capacity. EVS Transcoding is backward inter-operable to AMR-WB. 

This feature incorporates the following functionalities in the SBC:

  • EVS transcoding is supported for bandwidths NB,WB but pass-through is supported for all bandwidth values
  • The SBC allows EVS to EVS pass thru calls for all EVS codec bands.
  • The SBC supports EVS to EVS Transcoding based upon different negotiated bit rates.
  • The SBC supports EVS to non EVS codec transcoding based upon Offer-Answer outcome.
  • The SBC supports configuration of the EVS codec and incorporation of the payload in PSP through PSX.
  • Support both the header-full RTP and the Compact header format.
  • Support of EVS AMR-WB IO mode and the EVS Primary mode.
  • Asymmetric bit rates in Tx and Rx directions (br-send and br-recv)
  • Only single audio channel (mono) is supported. Dual-mode is not supported.

For more information, refer to:

 

SBX-5xxxx

SBX-50090 SIP Priority Call Handling for GETS

This feature enhances the Government Emergency Telecommunications Service (GETS) functionality for the SBC. The following summarize the enhancements to the GETS feature:

Criteria to detect GETS calls.

  • Handling of error or unexpected cases.
  • CAC enhancements for GETS.
  • Logging improvement for GETS.
  • Call queuing support.
  • Differentiated Services Code Point (DSCP) marking and priority treatment for GETS call packets.

The following features are covered in the SIP Priority Call Handling for GETS Feature:

  • SBX-56529
  • SBX-63719

For more information, refer to the following pages: 

Guide/Section
Page
SBC Core Configuration Guide
SBC Core Features Guide
CLI Reference Guide
EMA User Guide
SBC Core Alarms Guide
MIB Reference

 

 

SBX-50523 SIP Call Queuing for GETS

Calls are usually assigned to an idle resource (trunk or IP bandwidth) in a trunk group. If no resource is found in the trunk group and the call is recognized as an HPC call, the SBC queues the call till the required resource is available.

The SBC Core is enhanced to allow configurable queuing of HPC calls.

Note: The SBC performs HPC Call Queuing only if the TG CAC and HPC Oversubscription measures are already full.

Note: For an HA pair, the queued HPC calls are released during a switchover; only stable calls are synced to the standby SBC.

 

 

SBX-50524 Prioritize GETS-related Ingress Packets Based on Provisioned DSCP

A new profile for Differentiated Services Code Point (DSCP) is introduced to associate it with any interface. The DSCP profile contains DSCP values of HPC and non-HPC calls.

With this enhancement, the SBC preserves the received DSCP value in the initial Invite, and performs DSCP marking based on the HPC profile configuration.

Prior to the enhancement, DSCP configurations for SIP signaling were present in the HPC profile, and the SIP Signaling port (non-HPC).

 

SBX-52425 Supporting CPC to SIP Mappings for Trunk Groups in SBC Default Signaling Zone

This feature updates the SBC to support SIP Cause Code Mapping for CPC to SIP for trunk groups regardless of the signaling zone.

The PSX sends the SIP_USED_IN_CORE flag with the policy response to the egress SBC. If the egress SBC receives the SIP_USED_IN_CORE flag and the ingress zone of the egress SBC is in the default signaling zone, the egress SBC does not allow SIP Cause Code Mapping for CPC to SIP because the scenario is SIP In Core. If the PSX either is not present or does not enable the SIP_IN_CORE flag, then SIP Cause Code Mapping for CPC to SIP functions as if the SBC uses a non-default signaling zone.

For more information, refer to:

 

 

SBX-53120 Redesign Backup/Restore Screen

The Backup/Restore EMA screens are updated for this release.

For more information, refer to the following section:


SBX-53178 D-SBC: Support Legacy LI, IMS LI and P-DCS-LAES LI

Note: This feature is applicable only for CALEA users.

The SBC Core is enhanced to support all LI varieties (Default LI, IMS LI, and PSCI LI), when deployed as D-SBC (S-SBC and M-SBC) on cloud platforms.

With this enhancement, all LI varieties supported by the SBC are available across the following platforms:

  • Hardware: SBC 5000 series, SBC 5400, and SBC 7000
  • SWe/Cloud: I-SBC and D-SBC (S-SBC and M-SBC) on KVM and Openstack

Prior to this enhancement, only PSCI LI was supported on D-SBC.

Note: Default LI on D-SBC supports interception of Audio streams only; lawful Intercept of other media streams are supported by IMS LI and PSCI LI.

For more information, refer to the following pages:

 


SBX-53179 D-SBC: Support for Multi-party scenarios - REFER, REPLACE

The D-SBC is enhanced to support REFER (without replaces) in relay and local processing mode for audio pass-through calls.

For more information, refer to the following pages:

 

 

SBX-6xxxx

 

SBX-65775 Generate CDRs in Q-Series SBC CDR Format

For deployments that require it, users with admin privileges can configure the SBC Core to generate CDRs in the format of the (former GENBAND) Q-SBC. Similar to SBC Core CDRs, the Q-SBC format is an ASCII-format text file with multiple records per file. Ribbon CDR fields and other data are mapped to populate Q-SBC CDRs.

To verify CDR data integrity and authenticity when transmitting Q-SBC format CDR files to another system, you can also configure the SBC Core to generate an HMAC-MD5 (Hash-Based Message Authentication Code - Message Digest algorithm 5) checksum and include it in each Q-SBC CDR log file. A receiving system uses the checksum to verify the file transmitted correctly and that there was no data tampering during transmission.

For more information, refer to:

 


 

SBX-66686 Support for LI integration with Siemens LiOS Delivery Function

The interface between PSX and the SBC is enhanced for the PSX to send, and the SBC to receive, the TAP ID. Use the EMS to perform the relevant configurations.

The TAP ID, or Lawful Intercept ID, is a decimal value between 1 and 4,294,967,295 (4 bytes). The default value of TAP ID is 0.

If the SBC receives a non-zero TAP ID from the PSX, it embeds the value in the Correlation ID (CCID) and sends the TAP ID as a separate Tag Length Value (TLV) in the Direct Signaling Report (DSR) message.

If the SBC receives the value 0 as TAP ID, it does not take any action.

For more information, refer to the following page:

 

 

  

SBX-66742 Custom User Groups on SBC

The SBC includes several default groups (such as Administrator, Operator, Field Service, Guest, Calea and Security Auditor) that use various levels of access to CDB data, and to CLI and NETCONF commands. Group permissions are based on the defined AAA rules which are not user-editable. As a result, there is little flexibility to create user-defined groups with permissions for the pre-defined groups. Additionally, users belonging to the custom group can only login to the CLI, but not the EMA.

The SBC is enhanced to create user-defined groups with flexibility to modify the AAA rules. New functionality includes:

  • Providing custom group users access to both the CLI and EMA.
  • Flexibility to modify the AAA rules to the newly created custom group.

For more information, refer to:

 

 SBX-66765 Support for IPsec for Media with UDP Transport for LI

The SBC 5xx0, 5400 and 7000 systems are enhanced to add IPsec encryption for media packets directly inside the network processor. The enhancement also includes support for IPSec over UDP for X3 packets.

 Prior to this enhancement:

  • IPsec encryption for media packets was not supported directly inside the SBC
  • IPSec for LI with media was supported only over TCP

 For more information, refer to the following pages:

 

 

SBX-67793 Call Established Time on CDR

Unlike some systems which includes the CDR Established Time field in the CDR, the SBC calculates the CDR Established Time value using the CDR fields.

The SBC calculates the Call Established Time using the following fields stored in the CDR records:

  • Start Time (Date) of the call from field number 6
  • Start Time (Time) of the call from field number 7
  • Ticks from Setup Msg to Service Est from field number 10 in START and STOP Records and INTERMEDIATE records from filed number 9

For more information, refer to:

 

 

SBX-68147 Redesign Routing Label, Routing Label Route, and Route Screen Using Angular

This feature updates the EMA Routing screen. The Routing screen replaces the Toolkit workspace panel with buttons, and other selection options, in the Routing Labels + Routing Label Routes and Routes tabs. This feature also updates the configuration panels in these tabs to improve usability.

For more information, refer to:

 

 

 

SBX-7xxxx

SBX-70399 Non-INVITE 3xx Handling with Contact That has TGRP/Trunk-context and Embedded Route Headers

This feature updates the SBC to handle a 3xx response to the non-INVITE OOD SIP messages with a Contact header that has the tgrp and trunk-context parameters in the embedded Route header.

For more information, refer to:

 

SBX-70429 IMS LI: Buffering DSR Messages when Mediation Server Connection is Down

The SBC allows configuration of a maximum of 16 mediation servers for IMS LI in the Call Data Channel (CDC). When a call is tapped, the SBC selects among the Delivery Function 2 (DF2) servers in a round-robin manner, and establishes persistent TCP connections with all configured mediation servers. Prior to the enhancement, only one mediation server was supported.

Each mediation server object contains the Signaling(X2) and Media (X3) IP addresses. The SBC allows configuration of multiple mediation servers with the same X2 IP address but a different X3 IP address.

For IMS LI, the SBC does not support any Active-Standby configuration for the X2 servers. It assumes that the DF2 servers are running in Active-Active mode, and in case of a failure, moves the IP address of the active DF2 server to the standby DF2 server.

The X2 and X3 servers operate independently. Even if the X2 servers are not reachable, the SBC sends X3 media if DF3 servers are available, and vice versa.

The parameter dsrProtocolVersion is added to callDataChannel, and the groupTwoThousand is added as a vendorId.

Two alarms, sonusSbxImMediationServerX2MsgBufferFull and sonusSbxImMediationServerX2MsgBufferAvailable, are introduced to indicate the status of the DSR buffer. The alarms are raised depending on whether the DSR buffer is full, or available.

For more information, refer to the following pages:

 

 

SBX-70525 Support BFD for Link Detection

The SBC uses Bidirectional Forwarding Detection (BFD) in remote end points and routers to continuously monitor the link availability of the SBC. If the BFD session is down, the router declares the link as down and the upper layer application protocol performs the appropriate actions (such as, not sending control packets).

Note: The SBC supports this feature only on User Datagram Protocol (UDP) and IPv4. This feature does not support any authentication mechanism.

The SBC supports the BFD asynchronous mode. In the asynchronous mode, the detection time decides the failure of the BFD session.

The ipInterface configuration adds the bfd parameter and its associated parameters.

For more information, refer to:

 

SBX-70668 Capability to Support OCSP Stapling on SBX

The SBC supports Online Certificate Status Protocol (OCSP) stapling (refer to RFC 6961). OCSP stapling allows you to provide the validity information of your security certificate. With OCSP stapling, the client (the ingress peer that initiates the call to the SBC) does not need to query the OCSP responder to retrieve the certificate status.

Note: OSCP stapling supports the following interworking scenarios:

  • UDP-TLS
  • TLS-UDP
  • TCP-TLS
  • TLS-TCP

The security configuration adds the ocspStapling flag and ocspResponseCachingTimer parameter in the ocspProfile.

For more information, refer to:

 

 

SBX-71768 CALEA X3 Support For All Media Types With SS8

The D-SBC is enhanced to support interception of all supported media streams, such as:

  • Audio
  • Video
  • T.140
  • MSRP
  • BFCP
  • FECC

Prior to the enhancement, D-SBC supported interception of Audio calls only.

For more information, refer to the following pages:

 

 

SBX-71836 GW Protocol Support for Message Bodies Including PIDF-XML

In earlier releases, the message body is not sent transparently to the other gateway when the following conditions applied:

  • The SBC is the first gateway
  • Any of the recently known message bodies comes in the INVITE request
  • The transparency flag (either IPSP or HTP) is enabled

The SBC is enhanced so that:

  • The second gateway can be either an SBC or GSX
  • A generic approach is used for achieving transparency of recently known message bodies over GW-GW

 

 

SBX-71966 Call Trace to Capture SIPREC Legs

The SBC Core is enhanced with the capability to trace SIPREC legs to assist in debugging various issues associated with SIPREC legs, such as:

  • Missing media packets
  • Missing Signalling packets towards SIP Recording Server (SRS) in debug (.DBG) logs
  • Crank back issues in QUAD SIPREC

As part of the enhancement, the flag sipRecLegsCapture is introduced under the callFilter parameter of the global callTrace object.

When the main call is traced and SIPREC is invoked based on a matching criteria, if the flag sipRecLegsCapture is set to enable:

  • For single and DUAL SIPREC calls:
    • The media packets of the main call's leg (non-SIPREC side) and the SIPREC legs are logged in .PKT file.
    • The .TRC file contains SIP Protocol Data Units (PDUs) for SIPREC calls, as well as tracing data of the main call (depending on the level of the trace).
  • For QUAD SIPREC calls:
    • Packets are not captured for the main call and the .PKT files do not have the media of the main call. However, media packets of the SIPREC legs are logged in the .PKT files.
    • The .TRC file contains SIP PDUs for SIPREC calls, as well as tracing data of the main call (depending on the level of the trace).

For more information, refer to the following pages:

 

 

SBX-73083 - D-SBC should support m=application with "TCP" 

The SBC supports relay of "Application TCP/UDP" streams established using a SIP session.

New application bandwidth is introduced to allocate bandwidth from the media bandwidth pool. Before this feature, the application TCP/BFCP was supported only with video stream. This feature supports the application TCP/BFCP stream independent of video stream. 

This feature provides D-SBC with support to relay application streams established using SIP session with TCP, TCP/BFCP, TCP/* and UDP protocols.

 

For more information, refer to:

 

 

SBX-73526 EMA Live Monitor Support for EVS Transcoding

The EMA Live Monitor capability now supports reporting on EVS transcoding. In the License Service Usage graph, for a customer configurable duration, EMA can display the number of licensed EVS transcoding sessions and the usage level.

For more information, refer to:

 

 

SBX-73700 IMS LI Server Load Sharing

The SBC allows configuration of a maximum of 16 mediation servers for IMS LI in the Call Data Channel (CDC). When a call is tapped, the SBC selects among the Delivery Function 2 (DF2) servers in a round-robin manner, and establishes persistent TCP connections with all configured mediation servers. Prior to the enhancement, only one mediation server was supported.

Each mediation server object contains the Signaling(X2) and Media (X3) IP addresses. The SBC allows configuration of multiple mediation servers with the same X2 IP address but a different X3 IP address.

For IMS LI, the SBC does not support any Active-Standby configuration for the X2 servers. It assumes that the DF2 servers are running in Active-Active mode, and in case of a failure, moves the IP address of the active DF2 server to the standby DF2 server.

The X2 and X3 servers operate independently. Even if the X2 servers are not reachable, the SBC sends X3 media if DF3 servers are available, and vice versa.

The parameter dsrProtocolVersion is added to callDataChannel, and the groupTwoThousand is added as a vendorId.

For more information, refer to the following pages:

 

 

SBX-74192 - SWe-Estimation Framework Support - 2.0

SBC SWe traffic profiles are used to characterize the call mix that operators expect to occur on their SBC SWe systems. SBC SWe systems can then enhance their VM performance by allocating CPU cores in a manner that maximizes capacity for the call mix specified in the active traffic profile. SBC SWe traffic profiles now include four additional parameters to better characterize the call mix of an SBC SWe system:

  • sigCostFactor
  • mediaCostFactor
  • txPPSFactor
  • rxPPSFactor

These profile parameters enable two additional attributes to appear in SWe capacity estimation output:

  • Estimated TX PPS
  • Estimated RX PPS

For more information, refer to:

 

 

SBX-75262 Qualification of SBC SWe on HP/Dell Server + RHEL + KVM  

The SBC SWe is qualified for the Dell EMC PowerEdge r740 in addition to the HP ProLiant.

 

SBX-75914 Upgrade to 4.18 Stretch Backport Kernel

The SBC is enhanced with the latest Debian Stretch kernel, so that the latest fixes and features are received from the Debian community.

 

 

SBX-75915 Upgrade DPDK version to 18.11.xx

The SBC is enhanced in this release with an updated Data Plane Development Kit (DPDK) to facilitate moving to the latest LTS release of the third-party open source software to allow access the latest fixes and features from the open source community.

 

 

SBX-76034 Support for CPU+GPU Hybrid Transcoding Instances

The term "Hybrid Transcoding" implies leveraging both CPU and GPU resources efficiently to accommodate a given codec combination for transcoding capability. With Hybrid Transcoding, a suitable VM instance (SBC SWe on KVM/Openstack) utilizes all the CPU and GPU resources allocated to it for provisioning a given transcode call mix scenario.

Prior to Hybrid Transcoding, the SBC supported either a pure CPU transcoding solution, or a pure GPU transcoding solution. However, in the pure GPU solution, many CPUs are left unused. For example, when a 32 vCPU, GPU-ISBC instance is used to provision just AMRWB-G711u calls, only 13 vCPUs are used, although such an instance can handle 7680 sessions for AMRWB-G711u transcoding. With Hybrid Transcoding, the remaining 19 vCPUs (32-13 vCPUs) are used for provisioning additional AMRWB-G711 sessions.

Hybrid Transcoding enables a GPU-SBC to support GPU codecs as well as non-GPU-supported codec in the same instance. For example, AMRWB-G711 and G726-G711 codecs are supported in the same instance. 

Hybrid Transcoding is supported in Custom GPU and Standard GPU traffic profiles.

For more information, refer to the following pages:

 

 

SBX-76605 Error Response For INVITE/OPTIONS

The SBC is enhanced to send a response code for any internal errors or failures encountered by defining a new error string in an existing profile that consists of mapping of error strings to SIP response codes. The SBC defines a unique error string for each location in the code from where the error originates. The SBC then maps the error string to the configurable SIP response code using the existing profile.

Prior to SBC Core version 8.1, if a trunk group was in Out-of-Service state and the SBC received the INVITE message on that trunk group, it rejected the INVITE message with a fixed error code. 

For more information, refer to: 


 

SBX-76710 - Consolidate HA Models

To bring consistency and simplicity to deployment models, the SBC now supports only two basic high-availability (HA) models. The supported models are:

  • 1:1 - this model includes a single active node backed up by a single standby node. Configuration consistency between the two nodes is maintained when the active node syncs its database with the standby node.
  • N:1 - this mode includes up to four active nodes backed up by a single standby node. Configuration consistency between the SBC nodes is maintained by a 1:1 HA pair of dedicated Operations, Administration, and Maintenance (OAM) nodes. The OAM nodes are used to configure the SBC nodes and to keep the SBC node databases up to date.

  

 

SBX-8xxxx

SBX-85140 N:1 HA Support on SWe

N:1 HA deployments are now supported for SBC SWe deployments on VMware. Ribbon provides an infrastructure as code (IaC) environment to deploy SBC SWe N:1 HA instances in a VMware environment. The IaC environment provides the code, templates, sample files, and instructions needed for launching and managing virtualized SBC deployments. The instructions for working within the IaC environment are embedded as inline comments within the sample and template files and as separate readme files.

For more information, refer to:

 

SBX-85753 Remove Policing Function From the SBC

 Some networks are divided into geographical superzones. In such cases, when video traffic travels between the superzones, the SBC applies the following policing for video traffic (the values shown here are hypothetical):

  • Token Bucket Size (bytes): 80,000
  • Fill Rate (kbps):                   b-line * 1.5 

The maximum of Token Bucket Size of GilCo's NGN is 100,000. Thus, when B-line is more than 10,000, the SBC may apply excessive policing and cause video deterioration. Therefore, token bucket size 80,000 for video is increased to more than 100,000 or disabling policing. To address this need, you can now disable the SBC's media policing function for audio/video/application streams.

For more information, refer to the following pages:

 

 

SBX-86182 OAM Node - Phase 2

For SBC SWe cluster deployments operating in OAM configuration mode, new command parameters provide additional options for managing configuration changes when using the CLI.

  • If you start a CLI session and the OAM node holds a candidate configuration (committed changes that have not been save-activated), a warning banner indicates this condition.
  • A new request command parameter (viewConfigurationChanges) allows you to list the pending list of committed changes.
  • If you determine that you have committed configuration changes that you do not want to save-activate, the request parameter (discardCandidateConfiguration) allows you to discard the pending changes.

 For VNFM users, new options provided for the "createVnfmCsar.py" script that generates CSAR packages allow you to define VNFD files that create multiple redundancy groups in the same VNF and that enable customizing VM sizing of either the SBC or OAM nodes.

 In addition to N:1 deployments in an OpenStack cloud environment, SBC SWe N:1 HA deployments on VMware also require use of  OAM node configuration mode. 

For more information, refer to:

 

 

SBX-89069 Alternative IP address cannot configure up to 254

The altIpVar configuration is the equivalent of altMediaIp configuration in cloud. Initially, when support for alt media IP addresses was added, a configuration of up to 14 addresses was supported. It is now extended to 254 addresses.

For more information, refer to the following page:

 

Resolved Issues

Resolved Issues in 08.02.00R000 Release 

The following issues are resolved in this release:

Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-91540 / SBX-912242

PortFix SBX-91224: The SBC is using the surrogate Registration hostPart as the target FQDN. (Originated in Release 7.2.2)

Platform/Feature: SBC

 

The code is modified to not over-write egress IpPeer fqdn(target route) with surrogate hostPart.

SBX-91375 / SBX-908672

PortFix SBX-90867: Ssreq server has memory leaks, which can eat up virtual memory when there is call load via ssreq client. (Originated in Release 6.2.5)

Platform/Feature: SBC

The code is modified to fix the memory blocks, deleting every block promptly.
SBX-91353 / SBX-905812

PortFix SBX-90581: Mismatch in the response header transfer-encoding. (Originated in Release 7.2.2)

Platform/Feature: SBC

The code is modified to avoid setting header transfer-encoding explicitly in java code for the SBC platform manager functionalities. Header transfer-encoding is handled by configuration files.
SBX-913321

Getting the IP peer current statistics for an individual IP peer was not working.
The issue is reproduced when multiple IP peers are configured under the same zone.

Platform/Feature: SBC

The issue is fixed by adding the comparison for IP peer specified in the CLI against the IP peer statistics list, with other existing validations.
SBX-91183 / SBX-880701

PortFix SBX-88070: In case a call to sonusPeerUpload.expect is made and co-incidentally the peer goes down, there is a wait time for the SCP connection, resulting in the application healthcheck timing out after 10 seconds. This causes the application to crash.

Platform/Feature: SBC

A timeout is installed for the SCP and used in sonusPeerUpload.except script to ensure the wait time is longer than 2 seconds for the SCP connection to be established.
SBX-90918 / SBX-908762

PortFix SBX-90876: The GENcom client sends an error 481 for a call park retrieval INVITE because of an incorrect tag in the Replaces header sent by the SBC. (Originated in Release 7.2.2)

Platform/Feature: SBC

The code is modified to merge the issue and egress lookup using the correct tags.
SBX-908752

A bug in the GW Signaling code can cause a core when the GW Signaling Links are bouncing. 

Platform/Feature: SBC

The GW Signaling code is modified to prevent a core.
SBX-90806 / SBX-903231

PortFix SBX-90323: Subscribe relay refresh, the R-URI must be based from the last Contact received if the first route set has an lr parameter. (Originated in Release 7.2.2)

Platform/Feature: SBC

The logic is changed based on an RFC3261.
SBX-90790 / SBX-904153

PortFix SBX-90415: Currently, all filters are not displayed for the tables such as Call Detail Status, Call Media Status, and Call Resource Detail Status. (Originated in Release 7.2.2)

Platform/Feature: SBC

The code is modified to display filters for all columns in the tables.
SBX-90760 / SBX-858203

PortFix SBX-85820: The CDR records are broken into multiple syslog messages. (Originated in Release 7.2.2)

Platform/Feature: SBC

The code is modified to transfer a complete CDR as one syslog message.
SBX-90512 / SBX-901801

PortFix SBX-90180: When the SIPT library was returning a DISCARD_MSG event to SIPSG while trying to send out a message, it resulted in the call being released if the MIME disposition was required. (Originated in Release 7.2.2)

Platform/Feature: SBC

The code is modified to not release the call if the SIPT library returns DISCARD_MSG while sending out a message.
SBX-90284 / SBX-902501

PortFix SBX-90250: When "show status addressContext <addressContext_name> ipsec ipsecSaStatistics" "show status addressContext <addressContext_name> ipsec ipsecSaStatus" commands are run and IP Sec is configured, the IKE Process will leak memory. (Originated in Release 6.2.4)

Platform/Feature: SBC: IPSec, SIP

The code is modified to make sure buffers are allocated only once when generating IPsec IKE statistics.
SBX-90155 / SBX-873421

PortFix SBX-87342: Issue was observed where in a long load run, few 503 responses are seen from the SBC. (Originated in Release 7.2.2)

Platform/Feature: SBC

The SBC corrected the pre-parsing logic in partial PDU cases when an INVITE word received in the first partial PDU is fractional and the rest of the PDU is in second partial PDU.
SBX-90129 / SBX-900882

PortFix SBX-90088: NOTIFY is rejected with an error 489 Bad Event after a double switchover. (Originated in Release 7.2.2)

Platform/Feature: SBC

Setting the present bits as relayCbPtr->ingressTranspProfile and relayCbPtr->egressTranspProfile in the SipSgActivateRelayCb
SBX-90113 / SBX-864861

PortFix SBX-86486: ISBC does not span across multiple NUMA nodes and the process of spanning the NUMA nodes is handled incorrectly, causing the SWe_NP to fail when launching. (Originated in Release 7.2.1)

Platform/Feature: SBC

The SWe SBC software enforces I-SBC instances to run only with a single vNUMA node in order to achieve deterministic performance. The SWe SBC VM having > 8 vCPUs hosted on a dual-socket physical server with VMware ESXi software must follow the steps below to correct the vNUMA topology before upgrading to the latest SWe SBC software: 

  1. Check ‘Number of virtual sockets’ field. It must be set to 1. 
  2. Check ‘numa.nodeAffinity’ settings on the VM. It must be either 0 or 1 based on which NUMA node the PKT ports are connected to. The following command on ESXi host is used to check PKT port NUMA affinity: 
                    vsish -e get /net/pNics/<PKT port name - vmnicX>/properties | grep "NUMA" 
     If any of the settings above require modification, follow the steps below on the SWe SBC HA system: 
  3. Shutdown the standby instance. 
  4. Set ‘number of virtual sockets’ field under [Edit settings->Hardware->CPUs->Number of virtual sockets] to 1 if it is not already set and adjust ‘number of cores per virtual socket’ accordingly. ‘Number of cores per virtual socket’ field must be made equal to the total number of vCPUs on the VM. 
  5. If ‘numa.nodeAffinity’ settings are missing, add the following rows: 
    numa.autosize.once = FALSE 
    numa.nodeAffinity’ = 0 or 1 (based on PKT port NIC affinity) 
    On ESXi 6.5 and later releases, vSphere web client is used to add the rows above under Edit settings->VM options-> configuration parameters -> add parameters; 
    On ESXi 6.0 and previous releases, it is added under Edit > Advanced->general ->configuration parameters -> add rows using the vSphere client. 
  6. Power-on standby instance. 
  7. Once standby instance is up and running, perform a manual switchover through the CLI and repeat the steps above to modify the ‘number of virtual sockets’ , ‘numa.nodeAffinity’ and ‘numa.autosize.once’ settings. 
SBX-892762

The test call status was not being propagated to the SIPSG from the SIPFE for all messages. As a result, test calls were being treated as a non-test call and when trunk group was disabled, the call resulted in a failure.

Platform/Feature: SBC

The SIPFE maintains a flag to indicate if an INVITE has the test call header and while passing any message to SIPSG, it will pass information indicating if it is a test call or not. Based on this scenario, the SIPSG does not fail the test call even if the Trunk group is disabled.
SBX-89251 / SBX-889891

PortFix SBX-88989: R-URI userpart is incorrect when the To header Transparency is on with the registration. (Originated in Release 7.2.2)

Platform/Feature: SBC

The R-URI is based on contact received from LAD end point.
SBX-891691

NAPT is not learning because of a delay in the media being received. NAPT is adapted for 1sec only for a re-INVITE and after that, the previously taught address is returned to NRMA (which does not work in this case. As far as the end changes, it is for the IP:PORT).

Platform/Feature: SBC

The code is modified to restart the NAPT learning after a timeout for re-INVITE.
SBX-886782

A possible memory leak occurs when the parameter rewriteIdentities is enabled on an SIP trunk group.

Platform/Feature: SBC

The code is modified so that in all scenarios, the freed memory is allocated for the temporary storage to toHeader.
SBX-884353

If the binding to the radius socket has failed, the Enm Process becomes cored.

Platform/Feature: SBC

 

The code is modified to handle socket bind errors correctly.
SBX-88035 / SBX-878931

The Hostname, which needs to be modified, is missing a length check and must directly replace with an Egress SipSigPort IP. 

Platform/Feature: SBC

The required memory is fixed by reallocating the memory. 
SBX-858433

The enhancement to add the XrmRedSecMonSend() Debug logs must be logged into a trace log as well.

Platform/Feature: SBC

The code is modified to log the existing debug log to the trace logs in the XrmRedSecMonSend() function.
SBX-853352

The SBC replaces the custom EMA SSL certificate with a self-signed certificate during an upgrade.

Platform/Feature: SBC

While restoring certificates (server certificate and client CA certificate for EMA TLS Profile) from CDB to cache, the certificates now restores to /opt/sonus/ema/apache/. The SSLVerifyClient in /etc/apache/sites-available/EMA is restored to the default configured value after the upgrade.
SBX-734512

The SNMP v3 does not work after an upgrade/restore.

Platform/Feature: SBC

The version is applied after an SBX start from the incoming configuration database.
SBX-707043

DSP card present status is not updated if the card is administratively disabled. 

Platform/Feature: SBC: Platform

The code is modified to monitor the DSP card presence status every 10 seconds, irrespective of disabled or enabled.
SBX-669012

False positives are thrown by AIDE.

Platform/Feature: SBC: Platform

Disable AIDE in 6.2.x and new implementation of aide.conf, and exception lists to remove the false alarms in the 8.1 release.
SBX-892202

200 OK is not being sent for a call HOLD when the sdpAttributeRelay is enabled on the Trunk Group.

Platform/Feature: SBC

Reset the flag SIP_SDP_CTRL_IS_CHANGED_SDP when there is a change in the Session Attributes.
SBX-890892

If a name change operation is performed to swap any two system names, CE name or peer CE name, then post-operation, the SBC application may fail to start.

Platform/Feature: SBC

The name change operation is modified to reject any name change operation that involves swapping any of the two system names, CE name or peer CE name.
SBX-895862

Token load option not loading values into the template. No action triggered even after click on Token load.

Platform/Feature: SBC

The code is modified to successfully load the token and display the value corresponding to the attributes.
SBX-903791

Pathcheck process currently supports 32 DNS records whereas the DNS client supports 100. There was a mismatch and because of the mismatch of clients, the pathcheck process crash was seen when there are more than 32 records.

Platform/Feature: SBC

The maximum records supported in pathcheck is increased to 100 so that it will be in sync with the DNS client.
SBX-911861

In the case of status commands executed from the CLI, a request is sent to both active and standby nodes. An LVM running on active and standby nodes compares the CE name configured in the LDG with a server name and returns stats only for LDGs that are configured on that CE. However, there is no similar check in the case of a PF stat. Without the check for a PF stat,the statistics displayed for LDGs configured on standby node was not correct.

Platform/Feature: SBC

The code is modified to compare the CE name and return stats associated with the LDGs configured on the respective nodes.
SBX-914931

On the CLI port switch over on a packet interface with random connectivity loss is observed for few seconds for other interfaces.

Platform/Feature: SBC

The code is modified to correct the NIF control blocks are chosen for standby ports.
SBX-878611

The SWe_NP thread hang was observed on the packet port cable pull to trigger a port switch over.

Platform/Feature: SBC

The code is modified so the thread health check mechanism on the port resets.
SBX-861301

The SBC Headend cored while importing a configuration script. On the Openstack systems where the SBC is getting deployed, there cannot be any CPU over-subscription.

Platform/Feature: SBC

The code is modified to detect the SBC Headend so that as soon as user logs in, the user is informed of such issues.
SBX-909122

When an incoming INVITE message does not have the INFO in the Allow header and call flow has transcoded free transparency, the SBC sends INFO to the endpoint even when the endpoints to do not support it.

Platform/Feature: SBC

The code is modified to ensure the SBC checks the INFO in the Allow header before advertising an out of band DTMF support from the SIPSG to the NRMA.
SBX-88448 / SBX-882762

Portfix SBX-88276: The Rollover Type filter for the Type Admin List does not work on the SBC Manager when ‘Repetitive’ is selected. (Originated in release 6.2.4).

Platform/Feature: SBC

The code is modified to start using ‘starts-with’ function, instead of the ‘contains’ function.
SBX-883462

After an upgrade, the pre-upgrade shadow file copy is available in /home/admin/shadow.preUpgrade, which is not needed and must be removed.

Platform/Feature: SBC

The pre-upgrade shadow file copy is removed and does not exist in a post upgrade.
SBX-90863 / SBX-90859 / SBX-650132

Portfix SBX-65013: The SBC accesses an invalid address (optional array) in the cacheMsg. (Originated in release 5.1.5)

Platform/Feature: SBC

The code is modified to access the proper address through the savedArray.
SBX-919072

When the SBC was launched with attached cinder volume, the SBC came up failed due to a failure to mount the volume, as volume was not detected by the instance.

Platform/Feature: SBC

The code is modified to wait until the volume is attached and then proceed to mount the volume.
SBX-859373

When there is an SMM teardown on early dialog operation, the SBC adds an SDP in a CANCEL option.

Platform/Feature: SBC

A terminated sipmsgHandle is passed as NULL to not take any headers/value from incoming messages and do a normal teardown.
SBX-902472

The SMM Teardown functionality does not wait for the PRACK transaction to complete, if anything is pending before tearing down the call.

Platform/Feature: SBC

The code is modified to make the SMM Teardown functionality to initiate and not to take any action if the 18x/prack transcation is pending and if the enedtoendprack is enabled. Once the response of PRACK is received/sent based on the call flow, the teardown is initiated based on the SMMTearDown action state
SBX-862392

The CDR connection time outs when the connection greater than 127 seconds are not honored, as the TCP sessions times out after 127 seconds.

Platform/Feature: SBC

The code is modified to change the range for the connection timeout to a range of 15 to 120 seconds.

Known Issues

Known Issues in 08.02.00R000 Release 

The following issues exist in this release:

Known Issues

Issue IDSev

Problem Description

Impact/Workaround                            

SBX-915872

SBX is not preserving the mid-call updated WPS values after a switchover.

Platform/Feature: SBC

Impact: WPS value is mirrored to standby after a call goes stable, i.e. On receiving a 200OK for INVITE. Mid-call updates to the initial WPS value are not mirrored to the standby. Updates to the standby WPS value only occur on call transitions from an unstable to a stable state. SBX is not preserving mid-call updated WPS value after a switchover, or over a GW-GW and neither rejecting mid-call invalid ETS/WPS.

Workarounds: None

SBX-914682

For the REFER Scenario, Call queue is not working when 1 HPC Queue call is configured at TG3 (C-party)

Platform/Feature: SBC: Application 

Impact: Call queuing functionality is new to the SBC and this scenario is an interaction between 3 separate functionalities (HPC, call queuing, and REFER). In addition, the case in question is a corner case that is not likely to be hit. 

Workarounds: None

SBX-906243

The SBC 7K does not reserve DSP resources explicitly for GETS calls.

Platform/Feature: SBC

Impact: The system does not reserve DSP resources explicitly for use by GETS calls during overload conditions. If the system is at a normal DSP call capacity and has exhausted all available DSP resources, when an HPC call comes in, it is rejected due to a DSP resource allocation failure.

Workarounds: None

SBX-919553

The HPC queue stat hpcQueueOverflows is incremented twice for ingress queuing.

Platform/Feature: SBC

Impact Statement: Due to the current SBC logic, the SBC triggers additional 182 towards ingress side and all the statistics incrementing APIs are called twice, including the HPC queue stats.

Workarounds: None

SBX-913442

The SBX services fail to come up on the installed active CE after a switchover, with added delay on the HA link.

Platform/Feature: SBC: HA, Redundancy

Impact Statement: This scenario occurs when an intentional delay of more than 20ms is added on the GR HA link in appliance/SWE.

Workarounds: None

SBX-917311

Performance: Getting a Scm Process coredump after a third switchover.

Platform/Feature: SBC

Impact Statement: On a 5210, up to 60,000 calls may be tried on an HA system. The SBC may breach memory threshold if continuous switchovers are done with more than 60,000 calls.

Workarounds: None

SBX-91558 

Hybrid GPU: ~4.8-5.3 seconds of media loss is observed during SWe_NP kill triggered SWO

Platform/Feature:

Impact Statement: Media switchover is taking 1 second more, as compared to 8.0, if SWE_NP kill is done in M/T-SBC.

Workarounds: None

 


Known Limitations

The following limitations exist in this release:

  • Due to a known EMA GUI issue, it can take up to 10 minutes to process each SMM rule when provisioning SMM on the SBC using the EMA. This will be fixed in a future release.

  • The Access Control List (ACL) is not installed to configure SNMP traps for accepting traffic. A dynamic ACL is added to configure SNMP traps. An ACL must be installed for SNMP traps for accepting traffic.
  • The physical NIC connectivity must be in active state at the hypervisor level before starting the SWe instance on the SBC SWe platforms. In case of SWe instance with SR-IOV interfaces, manual restart of the SWe instance is required if physical NIC connectivity goes down while the instance is in progress.
  • The HA interface must not be configured with link localaddress or subnet. For example, do not configure it with 169.254.0.0/16 subnet. 

  • The Antitrombone feature is not supported on the D-SBC.
  • EMS identifies the nodes based on the VNFC-ID. While instantiating SBC/PSX cloud nodes, ensure that you use a unique VNFC-ID only. If you reuse an existing VNFC-ID, EMS treats this as a re-registration request and overwrites the existing data on the cloud node.
  • While configuring the SBC SWe Cloud instances, the CLIs commits successfully even if any metaVariable provided is incorrect. The SBC SWe Cloud instance cannot validate the CLIs, as the CDB configuration file is stored in the SBC Configurator and is shared among all the other SBC SWe Cloud instances in the cluster.
  • Editing IP Interface is not reflected in the if configuration (ifConfig). This behavior is observed only on the S-SBC when action is set to "dryup" mode on the IP Interface. The IP address changes are not updated in the kernel and will not be displayed when ifconfig linux command is executed. In case of S-SBC, if the ipInterface configuration needs to be modified and if the action is set to "dryup" in ipInterface configuration, it must be set to "force" before disabling the ipInterface and making any changes.
  • A LSWU on an SBC 7000 should only be performed when the total number of active calls on the system is below 18,000. If the criteria is not met, a double failure during the upgrade may occur thereby losing all active calls. If such a failure occurs, both active and standby SBC services will go down. Contact Ribbon Support immediately.

The VLAN tagged SRIOV packet interfaces are unable to ping endpoint Gateway IPs in the VMware platform because of an issue with VMWare.

Performing Heat Stack Update when userdata is Updated with SSH Keys

When upgrading SBC SWe cloud instances to release 8.0, you must update your Heat template userdata section to include mandatory SSH key information. An issue in OpenStack requires that you use the stack-update process rather than re-launch after updating the template, which leads to a new UUID for the instance. As a result, you must regenerate and apply new license bundles to the upgraded instances during the upgrade.

Refer to Upgrading SBC SWe Cloud in an N:1 HA Model for the relevant procedure. 

Restricted Functionality with SBC

The following functionalities are not supported with SBC Microservices:

  • SRTP
  • Far end NAT traversal
  • DTMF inter-working
  • RTCP termination for pass-through calls
  • Direct Media and Antitrombone 
  • NICE
  • Rx, Rf interfaces
  • Multimedia - MSRP, BFCP  
  • Fax detection
  • ICE/STUN
  • SIP REFER
  • SIP REPLACE
  • Two stage calls

  • H323 support


  • 200 OK is not being sent for call HOLD when sdpAttributeRelay is enabled on the Trunk Group

SMM TEARDOWN on early dialog operation, SBC adds SDP in CANCEL

  • No labels