You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

 

Table of Contents

About SBC Release Notes

This document describes new features, the latest hardware and software requirements, known limitations and other pertinent release information for the latest release of SBC Core.

Please note that all Ribbon bugs reported by customers on a given software release will be fixed in the latest release on that software release branch.

To view and download the latest End of Product Sale (EoPS) and other End Of Life (EOL) notices, navigate to the Resource Library on the corporate website (https://ribboncommunications.com/company/get-help/resource-library).

Related Documentation

The SBC Core 07.02.xx documentation is located at the following Wiki space: SBC Core Documentation.

Release Notes Use and Distribution

Ribbon Release Notes are protected under the copyright laws of the United States of America. This work contains proprietary information of Ribbon Communications, Westford, MA-01886, USA. Use, disclosure, or reproduction in any form is strictly prohibited without prior authorization from Ribbon Communications.

Associated Ribbon Bulletins

The following Ribbon Bulletins are referenced in this release note:

  • Warning-18-00028230: Call failure during LSWU when upgrading 5.x release to 6.2.1 or higher (VMWare or KVM) with 10 or more vCPUs configured.
  • Warning-17-00022847: The DNS configuration parameters within the address contexts may cause certain configurations to fail during an upgrade
  • Warning-17-00022689: Duplicate Trunk Group or Zone names can cause unexpected behavior
  • Warning-14-00020748: Verify system and databases are fully in sync prior to Live Software Upgrade (LSWU)
  • Bulletin-18-00028529: The System Security Intrusion Detection AIDE Reports False Positive Alarms

  • Warning-19-00028624: Custom EMA TLS certificate is overwritten with a default self-signed SBC certificate during an upgrade to versions 6.1.x, 6.2.x, 7.1.x, 7.2.x 
  • Warning-19-00028636: SBC SWe Gateway-to-Gateway signaling is disabled in certain SBC SWe versions 
  • Warning-19-00029555: CDR Viewer and Live Monitoring cannot be enabled/disabled
  • Warning-17-00022737: Re-installing an SBC from an ISO image and restoring the config. from a tar.gz backup file may cause loss of encrypted config. parameters for certain releases
  • Warning-19-00022867: SM Process may core dump after upgrading to version 3 of the BMC software

To view/download Ribbon bulletins, do the following:

  1. Log on to the Support Portal (https://ribboncommunications.com/services/ribbon-support-portal-login)
  2. Click Announcements link from the menu bar. 
  3. Enter the bulletin number (last eight numbers) in the search field and press Return.
Note

The WBA section may not include all Warnings, Bulletins and Alerts associated with this release. Before attempting to upgrade to any release, it is recommended to check the Customer Portal in Salesforce for any newly published WBAs that may include this release in the "affected versions" section.

Problems or Questions

For problems or questions, contact Ribbon Support through telephone or fax: 

Worldwide Voice: 

Unable to show "metadata-from": No such page "_space_variables"

USA Toll-free: 

Unable to show "metadata-from": No such page "_space_variables"

Worldwide Fax: 

Unable to show "metadata-from": No such page "_space_variables"

About SBC Core

The SBC Core platforms address the next-generation needs of SIP communications by delivering media transcoding, robust security and advanced call routing in a high-performance, 2RU, and 5RU form-factor devices enabling service providers and enterprises to quickly and securely enhance their network by implementing services like SIP trunking, secure Unified Communications and Voice over IP (VoIP).

For more product information, refer to the section About SBC Core in the main documentation space.

Interoperability

The SBC Core software interoperates with the following:

  • SIP/H.323 compliant IADs and IP-PBXs
  • PSX Policy Server Softswitch via SIP redirects and/or Diameter+ protocol
  • SBC 9000 through SIP call signaling and Networks MCS protocol
  • NetScore collection, analysis, monitoring, and reporting of selected Key Performance Indicators (KPIs) on a near-real time basis

Note

NetScore maintains a list of remote host keys for all nodes from which it collects data. If NetScore is deployed in your network, connectivity to the SBC will be lost any time the SBC software is reinstalled because the SBC’s host key is updated during the install. Refer to NetScore Release Notes for steps needed to reconnect to the SBC.

H.323-SIP and SIP-H323 Calls

When using H.323-SIP and SIP-H.323 call flows, an additional Re-invite/Update may get generated towards the SIP side. To suppress this, enable the IP Signaling Profile (IPSP) flag Minimize Relaying Of Media Changes From Other Call Leg at the SIP side.

Note

H.323 is not supported on SBC SWe cloud deployments.

Compatibility with Ribbon Products

Tip

When upgrading your network, ensure to upgrade each product to the most current release to take advantage of the latest features, enhancements, and fixes.

Info

For complete interoperability details between various Ribbon products, including backwards compatibility, refer to Ribbon Product Compatibilities.

Refer to SBC 5000-7000-SWe Interoperability Matrices for the latest and minimum compatible product versions supporting the 07.02.03R001 release.

Sample Heat Templates Included in This Release

To instantiate the SBC instances, the following template can be used:

SBC Heat Templates

 Template NameDescription
heatRgNoDhcp.yamlM-SBC/S-SBC Heat template for No DHCP IPv4 or IPv6. This template include instructions to enable port redundancy.

Note:

Example template files are packaged together in .tar.gz and .md5 files separate from the SBC Core application installation and upgrade files:

  • cloudTemplates.tar.gz
  • cloudTemplates.tar.gz.md5

SBC SWe Cloud Requirements for OpenStack

The system hosting the SBC SWe Cloud must meet the below requirements for OpenStack:

Server Hardware Requirements

 

ConfigurationRequirement
Processor

Intel Xeon processors (Nehalem micro-architecture or above) with 6 cores and above (processors should support hyper threading).

Note

Ribbon recommends Westmere (or newer) processors for better SRTP performance. These processors have the AES-NI instruction set for performing cryptographic operations in hardware. 

 RAMMinimum 24 GiB
 Hard DiskMinimum 100 GB
Network Interface Cards (NICs)

Minimum 4 NICs.

Note

Make sure NIC has multi-queue support which enhances network performance by allowing RX and TX queues to scale with the number of CPUs on multi-processor systems.

Note

The PKT ports must be 10 Gbps SR-IOV enabled port.

Note

6 NICs are required for supporting PKT port redundancy.

The system hosting the SBC SWe must meet the following requirements to achieve the performance targets listed: 

S-SBC SWe Requirement

S-SBC SWe Requirements
for 1000 CPS/120K Signaling Sessions 
Notes

32 vCPUs

Due to the workload characteristics, allocate 20 physical cores with two hyper-threaded CPUs from each core to the SBC.

128 GiB RAM

Must be Huge Page memory. The minimum page size is 2048 KiB, but 1048576 is recommended.

100 GB Disk

None

4 vNICs/6 vNICs

Attach MGT0 port to the Management VirtIO Tenant network.

HA port has to be on IPv4 VirtIO Tenant network.

Attach PKT0 and PKT1 ports to SR-IOV and Provider network.

M-SBC SWe Requirement

M-SBC SWe Requirements
for 30K Media Sessions
Notes

20 vCPUs

Due to the workload characteristics, allocate 10 physical cores with two hyper-threaded CPUs from each core and from single NUMA node to the SBC.

32 GiB RAM

Must be Huge Page memory. The minimum page size is 2048 KiB, but 1048576 is recommended.

100 GB Disk

None

4 vNICs/ 6 vNICs

Attach MGT0 port to the Management VirtIO Tenant network.

HA port has to be on IPv4 VirtIO Tenant network.

OpenStack Requirements

The SBC SWe supports the following OpenStack environments:

  • Newton with RHOSP 10 and RHEL 7.4
  • Queens with RHOSP 13 and RHEL 7.5
Note

The SBC SWe Cloud was tested on OpenStack Queens with RHOSP 13 and RHEL 7.5.

SBC SWe Requirements for KVM

The following table lists the server hardware requirements.

KVM Hypervisor Server Hardware Requirements

 
Configuration Requirement
Processor

Intel Xeon processors (Nehalem micro-architecture or above) with 6 cores and above (processors should support hyper threading).

Note

Ribbon recommends using Westmere (or newer) processors for better SRTP performance. These processors have the AES-NI instruction set for performing cryptographic operations in hardware.

Note

The supported CPU Family Number is 6 and CPU Model Number must be newer than 26. Refer to Intel Architecture and Processor Identification document for more information.


 RAMMinimum 24 GB
Hard DiskMinimum 500 GB
Network Interface Cards (NICs)
Minimum 4 NICs.
Note

Make sure NIC has multi-queue support which enhances network performance by allowing RX and TX queues to scale with the number of CPUs on multi-processor systems.

Note

The Intel I350, x540, and 82599 Ethernet adapters are supported for configuring as SR-IOV and DirectPath I/O pass-through devices.


Ports

Number of ports allowed:

  • 1 Management port
  • 1 HA port
  • 2 Media ports

SBC SWe Requirements for VMWare

The following table lists the server hardware requirements:

Server Hardware Requirements

 
 ConfigurationRequirement
Processor

Intel Xeon processors (Nehalem micro-architecture or above) with 6 cores and above (processors should support hyper threading).

Note

Ribbon recommends using Westmere (or newer) processors for better SRTP performance. These processors have the AES-NI instruction set for performing cryptographic operations in hardware.

Note

The supported CPU Family Number is 6 and CPU Model Number must be newer than 26. Refer to Intel Architecture and Processor Identification document for more information.

Note

ESXi 6.5 and later releases require approximately two physical cores to be set aside for hypervisor functionality. Number of VMs which can be hosted on a server needs to be planned accordingly.

 RAMMinimum 24 GB
Hard DiskMinimum 500 GB
Network Interface Cards (NICs)
Minimum 4 NICs, if physical NIC redundancy is not required.

Otherwise, 8 NICs (preferably with SR-IOV capability to support SWe optimizations).

Notes
  • Make sure NIC has multi-queue support which enhances network performance by allowing RX and TX queues to scale with the number of CPUs on multi-processor systems.
  • The Intel I350, x540, and 82599 Ethernet adapters are supported for configuring as SR-IOV and DirectPath I/O pass-through devices. The SR-IOV is supported only with 10 Gbps interfaces (x540/82599).
  • The Enterprise Plus license is required for SR-IOV.
Note

 Intel x710 NICs are also supported on VMware (ESXi versions 6.5 and above) with SR-IOV enabled. x710 NICs are not supported on Direct I/O or KVM. 

Ports

Number of ports allowed:

  • 1 Management port
  • 1 HA port
  • 2 Media ports

 

 

Warning

The SBC SWe software only runs on platforms using Intel processors. Platforms using AMD processors are not supported.

Required Software and Firmware Versions

The following SBC 5000 series (51x0/52x0), SBC 5400 and SBC 7000 software and firmware versions are required for this release. For 5xx0 the BIOS can be installed during app install, whereas for 5400 and 7000 the BIOS is included in the firmware package and is installed during the firmware upgrade. 

Required Software and Firmware Versions

Components

Software/Firmware

Version

SBC Platform

  

SBC 51x0/52x0 BMC

V03.21.00-R000

SBC 51x0/52x0 BIOSV02.06.00
SBC 5400 Firmware

BMC: V03.21.00-R000

BIOS: V1.18.0

SBC 7000 Firmware

BMC: V03.21.00-R000

BIOS: V2.14.0

SBC Application

 

 

Operating System (OS) Version

V06.02.03-R001
SonusDB

V07.02.03-R001

EMAV07.02.03-R001

SBC Application

V07.02.03-R001

Note

The firmware package of SBC 5400 and 7000 series includes BMC, BIOS, and other binaries. The firmware is upgraded from the BMC.

How to Verify Currently Installed Software/Firmware Versions

Use the EMA to verify the currently installed software and firmware versions.

Log on to the EMA, and from the main screen navigate to Monitoring > Dashboard >  System and Software Info.

Software Bundles

The following software release bundles are available for download from the Customer Portal:

  • SBCSWe_7.2
  • SBC5x7x_7.2

Download the appropriate software packages for your desired configuration from the Customer Portal (https://ribboncommunications.com/services/ribbon-support-portal-login) to your PC:

SBC 5000 Series (51x0/52x0) Firmware

  • firmware-5XX0-V03.21.00-R000.img

  • firmware-5XX0-V03.21.00-R000.img.md5

  • bmc5X00_v3.21.0-R0.rom.md5sum

  • bmc5X00_v3.21.0-R0.rom

SBC 5400 Firmware

  • firmware-5400-V03.21.00-R000.img
  • firmware-5400-V03.21.00-R000.img.md5

SBC 7000 Series Firmware

  • firmware-7X00-V03.21.00-R000.img
  • firmware-7X00-V03.21.00-R000.img.md5

Note

Execute the Method Of Procedure (MOP) only for upgrading the FPGA image of an SBC 7000 DSP-LC card when the SBC 7000 DSP-LC FPGA version is 0x14. The MOP can be applied at any version time, with the only restriction being that the BMC firmware version is at least 3.2.1R0. However, if the SBC application is running version V05.01.00R000 or higher, then the DSPs will be set to disabled and transcoding and transrating calls will fail if the SBC 7000 DSP-LC FPGA version is 0x14. Therefore, it is necessary to upgrade the SBC 7000 DSP-LC FPGA if the version is 0x14, before upgrading the SBC to 5.1.0. However, the MOP can be applied if the application version is higher than 5.1.0. Click Here to view the 550-06210_DSP-LC_FPGA_Upgrade_MOP.

SBC Core Operating System Installation Package

The ConnexIP Operating System installation package for SBC Core:

  • sbc-V07.02.03R001-connexip-os_06.02.03-R001_3_amd64.iso
  • sbc-V07.02.03R001-connexip-os_06.02.03-R001_3_amd64.iso.md5

 

Note

 Once the ConnexIP ISO procedure is completed, the SBC application package is automatically uploaded to SBC platforms.

SBC Core Application Package

The SBC Application installation and upgrade package for SBC Core:

  • sbc-V07.02.03R001-connexip-os_06.02.03-R001_3_amd64.qcow2
  • sbc-V07.02.03R001-connexip-os_06.02.03-R001_3_amd64.qcow2.md5
  • sbc-V07.02.03-R001.x86_64.tar.gz
  • sbc-V07.02.03-R001.x86_64.md5
  • sbc-V07.02.03-R001.x86_64.signature

For detailed information on installation and upgrade procedures, refer to SBC Core Software Installation and Upgrade Guide.

Cloud Service Archive (CSAR) Packages for VNFM Deployment on OpenStack

These files are for SBC SWe deployments in the OpenStack cloud using VNFM.

For VNFM deployment, the VNF Descriptor (VNFD) file is provided in a Cloud Service Archive (CSAR) package for the type of SBC cluster being deploying. VNFs are independent and CSAR definitions are imported into the VNFM via an Onboarding mechanism. The SBC has several different CSAR variants, for different personalities (S-SBC, M-SBC) and interface types (virtio, sriov). The supported CSAR packages for the SBC are:

  • ssbc_virtio_7.2.csar
  • ssbc_sriov_7.2.csar
  • msbc_virtio_7.2.csar
  • msbc_sriov_7.2.csar

Files required for CSAR creation: 

  • createVnfmCsar.py
  • vnfmSol001VnfdTemplate.yaml
  • sbc-V07.02.03R001-connexip-os_06.02.03-R001_3_amd64.qcow2

For detailed information on installation and upgrade procedures, refer to SBC Core Software Installation and Upgrade Guide.

Upgrade Notes

Warning

Only perform a LSWU on an SBC 70000 when the total number of active calls on the system is below 18,000. If the criteria is not met, a double failure during the upgrade may occur, thereby losing all active calls. If such a failure occurs, both active and standby SBC services will go down.  Contact Ribbon Support immediately.

Note

Release 7.2 requires additional user account security practices for SBC SWe deployments in Openstack cloud environments. During upgrade of SBC SWe cloud instances deployed using Heat templates, you must use a template that includes SSH keys or passwords for the admin and linuxadmin accounts. The example Heat templates have been updated to include information on how to specify this type of data in the userdata section of a template.

Note

Once the installation or upgrade completes on the SBC 51x0 and SBC SWe platforms, the copy of the installation package (SBC Core Installation and Upgrade Package) is automatically removed from the system.

Note

As an SBC Core password security enhancement, user passwords automatically expire after upgrading to 7.2.x. As a result, users are required to change their passwords upon initial login immediately following the upgrade.

Note

Customers using the Network licensing mode will stay on the Network licensing mode after upgrade to the SBC 7.2.3 Release.

Customers using Legacy mode will stay on the Legacy mode after upgrade to SBC 7.2.3 Release. Once upgraded to SBC 7.2.3 Release, the customer will not be able to set Network License mode.

Note

The SBC 7.2 5xx0 and 7000 platforms may exhibit a 7% degradation of CPU performance relative to earlier releases. This is attributable to the Spectre/Meltdown security patches.

Note

For the procedure specific to SBC SWe upgrades on KVM Hypervisor or VMware to take advantage of performance improvements due to hyper-threading, refer to MOP to increase vCPUs Prior to Upgrading SBC SWe on VMware or KVM Hypervisor.

Note

 In NFV environments, the method used for upgrades involves rebuilding the instance, which requires additional disk space on the host. The minimum disk space needed for this operation is listed in the table below.

Disk Space Requirements

Flavor
Extra Space Required (GB)
S-SBC80
M-SBC80
PSX-M360
PSX-S360
PSX-Test360
EMS_SA150

Note

The SBC 51xx and 52xx systems require 24GB of RAM to run 6.x code or higher.

07.02.03R001 Upgrade Information

Warning

Prior to performing an upgrade to release 07.02.03R001, remove usernames that do not conform to the new SBC user-naming rules to prevent an upgrade failure. The following user-naming rules apply:

  • Usernames can begin with A-Z a-z _ only.
  • Usernames cannot start with a period, dash, or digit.
  • Usernames can contain a period(.), dash(-), alphabetic characters, digits, or underscore(_).
  • Usernames cannot consist of digits only.
  • Usernames can contain a maximum of 23 characters.

The following names are not allowed:

tty disk kmem dialout fax voice cdrom floppy tape sudo audio dip src utmp video sasl plugdev staff users nogroup i2c dba operator

Note: Any CLI usernames consisting of digits only or not conforming to new user naming rules will be removed after performing a restore config in release 7.2.3R001. 

Warning

Prior to performing an upgrade to the 7.2 release, the dnsGroups with type mgmt must be specified/updated with the "interface" field. The steps are included in WBA "W-17-00022847". To view the WBA, log on to the Support Portal and click the Announcement link from the menu bar. Enter the bulletin number (last eight numbers) in the search field and press Return.

Warning

Prior to performing an upgrade to 7.2 release, the duplicate trunk groups or zones must be removed. The steps are included in WBA "W-17-00022689". To view the WBA, log on to the Support Portal and click the Announcement link from the menu bar. Enter the bulletin number (last eight numbers) in the search field and press Return.

If the above MOP is not run, the LSWU process may fail because of duplicate trunk group or zone names.

If you are upgrading from any SBC version with ePSX configuration to the 07.02.03R001 release, execute the Method of Procedure, MOP to Re-configure SBC (with ePSX) to External PSX Prior to an Upgrade to 06.00.00R000 Release prior to performing an upgrade. For a list of supported LSWU paths, refer to Supported Upgrade Paths.

Support of maddr Post-Upgrade

When upgrading SBC Core to release 5.0.0 (and above) from a pre-4.2.4 release, complete the "Action to take" immediately after the upgrade if either condition that follows is applicable:

  • If you are using the SBC with a Broadsoft system and the SBC is configured for registration access (where the SBC sits between SIP phones and the Broadworks System). Otherwise no new REGISTER will be processed (phones will lose registration).
  • If you are using the SBC with other feature servers that require maddr processing.

Action to take: On the SIP trunk group facing Broadsoft (or other feature server), set the SIP Trunk Group signaling flag, honorMaddrParam, to enabled on the Trunk Group(s) requiring maddr handling. The default is ‘disabled’.

set addressContext <addressContext name> zone <zone name> sipTrunkGroup <TG name> signaling honorMaddrParam <disabled | enabled> 

See the following pages for configuration details:

SBC SWe Pre-Upgrade Requirements

VM CPU resource allocation requirements

Starting with 4.2.4R0 release, CPU resource allocation requirements for SBC SWe VM are strictly enforced contrary to previous releases. You must review and verify these VM settings (including co-hosted VMs) against the documented "VM Configuration Recommendations" on the For VMware page in the Hardware and Software Requirements section before upgrading. If you encounter a problem, correct the CPU reservation settings as specified in step 6 of the "Adjust Resource Allocations" procedure on Creating a New SBC SWe VM Instance with VMXNET3. CPU reservation should be set as “number of vCPUs assigned to VM * physical processor CPU frequency". If VM uses the same number of vCPUs as the number of physical processors on the server, this reservation may not be possible. In this case, reduce the number of vCPUs assigned to VM by one and set the CPU reservation to the appropriate value.

When using the show table system serverSoftwareUpgradeStatus command during the upgrade, the Standby server's LSWU status will always display "Upgrading" even though the upgrade may have failed due to host checker validation. To check if host validation failed for the Standby, check for HostCheck Validation Failed message in the upgrade.out log.

Disable Call Trace feature prior to LSWU/upgrade

As a prerequisite for SWe LSWU/upgrade, disable the Call Trace feature prior to performing the LSWU/upgrade and re-enable it once the LSWU/upgrade is completed.

Manually check for Hostcheck Validation Failed message

Perform the following procedure on the Standby to check for the Hostcheck Validation Failed message in the upgrade.out log.

  1. Log on to ESXi of the Standby SBC SWe.

  2. Check in/opt/sonus/staging/upgrade.out (this log shows the Hostcheck Validation Failed error).

  3. Power off the VM.

  4. Reduce the number of vCPUs assigned to VM by one and set the CPU reservation to the appropriate value.

  5. Power on the VM. The SBC SWe successfully upgrades to the latest version 6.2.0. 

  6. Run the command show table system serverSoftwareUpgradeStatus to confirm the successful upgrade.

  7. Perform similar procedure for LSWU on Active.

Preparing for Upgrade (All Platforms)

Warning

Prior to performing a Live Software Upgrade (LSWU), verify if the system and the databases are in sync. The steps are included in WBA "Warning-14-00020748". To view the WBA, log on to the Support Portal and click the Announcements link from the menu bar. Enter the bulletin number (last eight numbers) in the search field and press Return.

Note

The SBC 7.2 release skips the SRV query if the flag in a DNS NAPTR response from the DNS server indicates to proceed with "A" record query as per RFC 2915/3403. This is a change in behavior from previous releases, where the SBC performed SRV queries irrespective of the "flag" setting returned by DNS Server.  If you use DNS NAPTR/SRV/A record query from SBC to determine peer transport address, ensure the DNS Server is configured to return ‘S’ flag to invoke an SRV query.

Note

In this release, LSWU infrastructure is added to the Platform Manager (PM), providing the ability to perform LSWU upgrades to later releases using the PM. However, this feature is not currently supported in 4.2.x releases and should not be used at this time.

Please read the following information and take necessary actions before starting your upgrade to this release.

Since the release 4.1.4, the cryptographic key pair used to sign and verify the package has been changed to enhance security. When installing/upgrading from all 4.0.x releases, all pre-4.1.4 releases (4.1.3 and earlier), and all pre-4.2.3 releases (4.2.2R00x and earlier), do one of the following, depending upon your upgrade method:

  • LSWU through CLI: Skip the integrity check during LSWU by using the CLI command below.

    During LSWU, use the integrityCheck skip option when upgrading from CLI:

    > request system serverAdmin <server> startSoftwareUpgrade integrityCheck skip package <package>
    Note

    Integrity check works as expected only when upgrades are started from 4.1.x releases (4.1.4R000 or later) or from 4.2.3R000 or later releases.

  • Upgrade through Platform Manager: If upgrading using Platform Manager, simply ignore the "Wrong Signature" warning message and continue the upgrade normally.
Note

Downgrading to any pre-5.0 release from this release requires a ConnexIP re-ISO installation. For more information, refer to:

 

Customer running 7.1 or 7.2 releases must check the eventLog configuration to confirm that the memusage log type has a server1 syslog configuration and if it is not present, they need to manually create before attempting to upgrade to the latest code.

The following command example output shows how to confirm with the server1 config is present for the memusage log type:

show configuration oam eventLog typeAdmin
typeAdmin packet {
 
state      enabled;   
fileCount   64;   
fileSize    10240;
filterLevel info; 
servers server1;
 }

 typeAdmin memusage {
 state enabled;
 }

Update the configuration with the following commands -
configure
 set oam eventLog typeAdmin memusage servers server1

Supported Live Software Upgrade (LSWU) Paths

 

The SBC Core supports Live Software Upgrade from releases listed in the table below:

 

Supported Upgrade Paths

V05.00.xxV05.01.xxV06.xxV07.xx
V05.00.00R000V05.01.00R000V06.00.00R000V07.00.00R000
V05.00.00R001V05.01.00F001V06.00.00R001V07.00.00F001
V05.00.00S102V05.01.00F002V06.00.00F001V07.00.00F002
V05.00.00S104V05.01.00F003V06.00.00F002V07.00.00F003
V05.00.00S200V05.01.00F004V06.00.00F003V07.00.00F004
V05.00.00S201V05.01.00F005V06.00.00F004V07.00.00F005
V05.00.00S202V05.01.00F006V06.00.00F005V07.00.00F006
V05.00.00S203

V05.01.00F007

V06.00.00F006V07.01.00R000
V05.00.00S204V05.01.00F008V06.00.00F007V07.01.00R001
V05.00.00F001V05.01.01F001V06.00.00F008V07.01.00R002
V05.00.00F002V05.01.01F002V06.00.00F009V07.01.00R003 
V05.00.00F003V05.01.01F003V06.00.00F010V07.01.00R004
V05.00.00F004V05.01.01F004V06.00.00F011V07.01.00F001
V05.00.01R000V05.01.01F005V06.00.00F012

V07.01.00F003

V05.00.01R001V05.01.01F006V06.00.00F013

V07.02.00R000

V05.00.01R002V05.01.00S608V06.00.00F014V07.02.00R002
V05.00.01S001V05.01.00S610V06.01.00F001V07.02.01R000
V05.00.01F001V05.01.00S611V06.01.00F002V07.02.01R001
V05.00.01F002V05.01.00S612V06.01.00F003V07.02.01R002
V05.00.01F003V05.01.00S613V06.01.00R000

V07.02.01R003

V05.00.02R000V05.01.00S614V06.01.00R001

V07.02.01R004

V05.00.02R001V05.01.00S617V06.01.00R002V07.02.01R005
V05.00.02A059V05.01.00S619V06.01.00R003V07.02.01R006
V05.00.02A061V05.01.00S620V06.01.00R004

V07.02.01R007

V05.00.02F001V05.01.00S621V06.01.00R005 

V07.02.01F001

V05.00.02F002V05.01.00S622V06.01.00R006V07.02.01F002
V05.00.02F003V05.01.01R000

V06.01.00R007

V07.02.01F003
V05.00.02F004V05.01.01R001V06.01.00R008V07.02.01F004
V05.00.02F005V05.01.02F001V06.01.00R009V07.02.01F005
V05.00.03R000V05.01.02F002V06.02.00R000V07.02.02R001
V05.00.03R001V05.01.02F003V06.02.01R000V07.02.02R002
V05.00.03R002V05.01.02F004V06.02.01R001V07.02.02F001
V05.00.03R003V05.01.02F005V06.02.01R002V07.02.03R000
V05.00.03F001V05.01.02F006V06.02.01F001 
V05.00.03F002V05.01.02F007V06.02.01F002 
V05.00.03F003

V05.01.02F008

V06.02.01F003 
V05.00.03F004V05.01.02F009V06.02.01F004 
V05.00.03F005V05.01.02S001V06.02.01F005 
V05.00.03F006V05.01.02R000V06.02.01F006 
V05.00.03F007V05.01.02R001

V06.02.01F007

 
V05.00.03F008V05.01.02R002

V06.02.01F008

 
V05.00.04F001V05.01.02R003

V06.02.01F009

 
V05.00.04R000V05.01.02R004

V06.02.02R000

 
V05.00.04R001V05.01.03R000

V06.02.02R001

 
V05.00.05F001V05.01.03F001

V06.02.02F001

 
V05.00.05F002V05.01.03F002

V06.02.02F002

 
V05.00.05F003V05.01.03F003

V06.02.02F003

 
V05.00.05F004V05.01.03F004

V06.02.02F004

 
V05.00.05F005V05.01.03F005

V06.02.02F005

 
V05.00.05F006V05.01.03F006

V06.02.02F006

 
V05.00.05F007V05.01.03F007

V06.02.02F007

 
V05.00.05F008V05.01.03F008

V06.02.02F008

 
V05.00.05R000V05.01.03F009

V06.02.02F009

 
V05.00.06R000 V05.01.03F010

V06.02.02F010

 
V05.00.06F001V05.01.04R000

V06.02.03R000

 
V05.00.06F002V05.01.04F001

V06.02.03F001

 
V05.00.06F003V05.01.04F002

V06.02.03F002

 
V05.00.06F004V05.01.04F003

V06.02.03F003

 
V05.00.06F005V05.01.04F004V06.02.03F004 
 V05.01.05R000V06.02.03F005 
 V05.01.05F001V06.02.04R000 
 V05.01.05F002V06.02.04F001 
 V05.01.05F003V06.02.04F002 
 V05.01.05F004  
 V05.01.05F005   
 V05.01.06R000  
 V05.01.06F001  

SBC v07.02.00F001 will not have an available LSWU path.

New Features

New Features in 07.02.03R001 Release

The following features are available in 07.02.03R001 Release.

SBX-94823 - Enhanced Local Redirection Support

Beginning in release 7.2.3R1, the SBC provides an Enhanced Local Redirection feature. In redirected call scenarios, this capability ensures that the SBC applies the same processing to the redirected INVITE message as it applied to the original egress INVITE message. This feature is controlled by a redirect flag called "Enhanced Local Redirection" which is included in the egress IP attributes of IP Signaling Profiles (IPSP). When you enable the Enhanced Local Redirection flag:

  • All headers sent in the original egress INVITE message are sent in the redirected INVITE message.
  • When constructing the redirected INVITE message and the the Contact header of the 3xx response contains headers: 
    • If the Contact contains additional types of headers, the SBC adds these headers to the redirected INVITE message. 
    • If the Contact includes the same type of header, the SBC gives precedence to the contents of the header in the Contact over the header in the original egress INVITE message. 
  • When performing crankback on redirect messages, the SBC uses the crankback profile attached to the ingress trunk group associated with the call. 
Note

You cannot enable the "Enhanced Local Redirection" flag in the IPSP if the "Force Requery For Redirection" redirect flag is enabled. These two types of handling are mutually exclusive.

 

For more information, refer to:

 

SBX-93269 - Support Embedded Headers in 3xx when Force ReQuery is Disabled

There is no longer a requirement to enable the "Force Requery For Redirection" redirect flag if you want to enable the "Honor Embedded Headers in 3xx" redirect flag. You can now enable the processing to honor embedded headers irrespective of the setting of the "Force Requery For Redirection" redirect flag.  

For more information, refer to:

Embedded Headers Support in 3xx Contact Headers

New Features in Previous Releases

For new features in previous releases, refer to:

 

Resolved Issues

Resolved Issues in 07.02.03R001 Release 

The following issues are resolved in this release:

Resolved Issues

 Issue IDSevProblem DescriptionResolution
1SBX-917372

The external PSX became active after a switch over, though it was the OOS prior to the switch over.

Impact: When changing multiple remote policy servers's mode together in one "commit", some of the server's operational stats in standby node might not be synced.

Root Cause: When one of the remote policy servers' mode was being changed from OOS to active, the standby node will not try to register with this server, and the iteration of all mode change servers will be stopped. This would cause the rest of the servers, whose operStats have not been changed, remain unchanged. Therefore, the operStats of these servers at standby node will be out of sync with the active node.

Steps to Replicate: 

  1. In a working HA, provision at least 3 working remote policy servers.
  2. While keeping the admin stat at enabled, only keep 1 of the servers' mode as active, and rest are out of service.
  3. Change those servers' mode, commit only after all set commands finished.
  4. Display the status using the 2 commands below:
    "show table system policyServer remoteServer"
    "show table system policyServer policyServerStatus"
  5. Perform a switchover
  6. Repeat step 4. The operStat would be different from step 4.
  7. Making call load, may be a load call rate, when Node A is active, and then when Node B is active. When Node B is active, You should see that policy request might still be sent to the remote server that you have already made OOS when Node A was active.

Platform/Feature: SBC

The code is modified to ensure that the standby node modifies the operStats for all remote servers requested by the CLI users, although remote servers are not registered even if the mode is being changed from OOS to active. As the result, the operStates at standby node will keep sync with the active node.
2SBX-948112

The SBC fails to route advance to the 13th route.

Impact: When the PSX has more than 10 routes configured and all routes in first policy response fail due to internal cause code, the call fails because the SBC does not handle more routes correctly.

Root Cause: When the PSX has more than 10 routes configured and all routes in first policy response fail due to internal cause code, the SBC's NRMA subsytem returns with an allocation failure.

Steps to Replicate:

  1. Configure more than 10 routes on the PSX.
  2. Force failure on first 10 routes due to internal error.
  3. Verify call gets established on routes in second policy response.

Platform/Feature: SBC

The code is modified to ensure the SBC handles more than 10 routes from PSX correctly.
3SBX-951141

The SBC IgnoreTransparency cannot be set on the EMA V6,7.2 and 8+.

Impact: The SBC IgnoreTransparency cannot be set on the EMA V6,7.2 and 8+

Root Cause: There was no check whether the "not" is applied to complete expression or not.

Steps to Replicate:

  1. Log on EMA.
  2. Navigate to All->profile->services->Transparency profile->sip Header.
  3. Select the transparency profile.
  4. Click on the New Sip Header.

After that, the "Ignore Transparency " field will be displayed.

Platform/Feature: SBC

The code is modified to check if "not" is applied to whole expression or not.
4SBX-94790 

The Backup/Restore file cannot be downloaded from the EMA, if its file name contains a dot.

Impact: The Backup/Restore file cannot be downloaded from the EMA, if its file name contains a dot (.)

Root Cause: In the downloadSavedConfig block, make an API call both the time (Running on the SBC, running on the EMS)

Steps to Replicate:

  1. Login into the EMA.
  2. Navigate to:
    Administration -> System Administration -> Backup/Restore
  3. Download the Backup file.

Platform/Feature: SBC: EMA

The code is modified for API calls depending on whether the EMA is running in the SBC or EMS.
5SBX-954702

The SBC was using the incorrect SIP signaling port for challenged Subscribe.

Impact: When the usePortRangeFlag is enabled, the SBC may use an incorrect SIP Signaling Port when handling a SUBSCRIBE request with Authorization header, in REGISTER - SUBSCRIBE scenarios when the initial SUBSCRIBE request is challenged.

Root Cause: When the usePortRangeFlag is enabled, the application software uses the wrong connection Id when sending the SUBSCRIBE request with Authorization header to the egress peer.

Steps to Replicate: Provision the SBC to support the CUCM (Cisco Unified Connection Manager).

Ingress zone / sipTrunkGroup:
set addressContext default zone ZONE2 sipTrunkGroup SBXSUS4_LABSIP1 signaling registration requireRegistration required
set addressContext default zone ZONE2 sipTrunkGroup SBXSUS4_LABSIP1 signaling usePortRangeFlag disabled
set addressContext default zone ZONE2 sipTrunkGroup SBXSUS4_LABSIP1 signaling psxRouteForSubscribe enabled
commit

Egress zone / sipTrunkGroup:
set addressContext default zone ZONE4 sipTrunkGroup SBXSUS4_LABSIP2 signaling registration requireRegistration none
set addressContext default zone ZONE4 sipTrunkGroup SBXSUS4_LABSIP2 signaling usePortRangeFlag enabled
set addressContext default zone ZONE4 sipTrunkGroup SBXSUS4_LABSIP2 signaling psxRouteForSubscribe disabled
commit

set profiles signaling ipSignalingProfile DEFAULT_SIP commonIpAttributes relayFlags dialogEventPackage enable
commit

Perform REGISTRATION

Perform challenged SUBSCRIBE

Platform/Feature: SBC

The code is modified to use the proper connection Id, when the usePortRangeFlag is enabled, and the SUBSCRIBE request with Authorization header is sent to the egress peer.
6SBX-959303

There is an unknown header transparency flag interaction with the tagging.

Impact: The STIR-SHAKEN related headers are duplicated when the STI service type is tagging and transparency is enabled.

Root Cause: This scenario was not handled when the STIR-SHAKEN was supported in 7.2.0.

Steps to Replicate: Repeat the test as mentioned in description.

Platform/Feature: SBC

STIR-SHAKEN related headers are given higher precedence and ignored transparency for P-ORIGINATION-ID and P-ATTESTATION-INDICATOR headers when the STI service type is "tagging".
7SBX-961683

Generic Parameters are dropped when received in embedded From/To Headers.

Impact: Generic Parameters are dropped when received in embedded From/To Headers of the 3xx contact.

Root Cause: This issue was not handled from day one implementation.

Steps to Replicate:

  1. Send a Generic Parameter in an embedded From/To Header of 3xx contact.
  2. From/To header of Redirected Invite must have the generic parameter received in an embedded From/To headers of the 3xx contact.

Platform/Feature: SBC

The code is modified to handle the generic parameters received in embedded From/To headers of the 3xx contact.
8SBX-961172

The backup file is not getting uploaded from the EMA if the file name contains a dot (.).

Impact: The backup file is not getting uploaded from the EMA if the file name contains a dot (.).

Root Cause: Consider the extension as from the first dot to the end of the file name.

Steps to Replicate:

  1. Log into the EMA.
  2. Administartion->SystemAdministration->FileUpload
  3. Upload the files.

Platform/Feature: SBC: EMA

The code is modified to correct for allowed Extensions.
 

 

Resolved Issues in 07.02.03R000 Release 

The following issues are resolved in this release:

Resolved Issues

 Issue IDSevProblem DescriptionResolution
1SBX-924792

In the I-SBC, PKT Port redundancy support is not present in 7.2.2 release.

Impact: The SBC Release 7.2.2 is missing the PKT Port redundancy support, when it is listed as available.

Root Cause: In the I-SBC, the PKT Port redundancy support is added in the 8.x releases, but not present in the 7.2.2 release.

Steps to Replicate: Configure the pkt port redundancy, port the switchover to see the service continuity on PKT ports with redundancy enabled.

Platform/Feature: SBC

Back ported support is added in the 8.x to 7.2.2. releases.
2SBX-917231

Observing the CLI port SWO in the M-SBC is causing the MGMT link to go down.

Impact: On the CLI port, a switchover on packet interface has random connectivity loss for few seconds on other interfaces.

Root Cause: A bug in SWe_NP code was picking the incorrect NIF control blocks for standby ports causing intermittent signalling packet loss and a loss of ICMP packets resulting in connectivity failures. This happens specifically on high call loads, when workers are at 80% capacity.

Steps to Replicate:

  1. Bring up setup with port redundancy and perform multiple CLI switch over.
  2. Observe the link status of various ports.

Platform/Feature: SBC

The code is modified to correct NIF control blocks are chosen for standby ports.
3SBX-88061 / SBX-874043

Portfix SBX-87404: A reInvite is triggered before an ACK is verified. (Originated in release 6.2.4)

Impact: When the online validation (sessId and verId) is set to zero in 200OK, the SIPS fails to save the peer SDP.

Root Cause: When the o-line validation (sessId and verId) is set to zero in 200OK, the SIPS fails to save the peer SDP. This could trigger an unnecessary reInvite.

Steps to Replicate: Configure the SDP o-line version only. The SDP received in 200 Ok (multi codecs) for egress has a sessId and verId of zero. The SBC could send an unnecessary reInvite to the peer.

Platform/Feature: SBC

The code is modified so the peer SDP is saved properly.
4SBX-920372

Optional fax parameters are being parsed by the SBC and, as a result, the 200 Ok is being discarded.

Impact: The SBC returns a parser error (4xx) for unsupported t38 attributes.

Root Cause: When the unsupported t38 attributes are received, the SBC shows it as an error.

Steps to Replicate: When the Incoming call has unsupported t38 attributes, the SBC shows a reply 4xx (parsed error).

Platform/Feature: SBC

The code is modified so the SBC ignores the attributes and does not display an error message.
5SBX-912731

The EMA receives a Proxy error whenever an operation takes a long time to complete.

Impact: When the user navigates to a SIP trunk group or DM PM rule creation screen, there is no response from the UI and after approximately a 2 minute interval, "Proxy error" is shown to the user.

Root Cause: The EMA reads the DM PM Rule, DM PM Sub Rule and DM PM Criteria data from the CDB through the Netconf interface. With a large amount of data, there is a significant delay in rendering the UI. The request from the browser times out, resulting in a Proxy Error to the user.

Steps to Replicate:

1. Configure more than 25,000 DM PM Criterias and more than 25,000 DM PM Rules.
2. Navigate to a SiP Trunk Group Creation Screen or DM PM Rule creation screen.
3. The create screen does not load and after some time results in Proxy error.

Platform/Feature: SBC

Instead of a CDB, the EMA reads the data for DM PM Rule, DM PM Sub Rule and DM PM Criteria directly from the Oracle Database, reducing the delay to a larger extent in rendering the UI.

When the Copy Trunk Group operation is performed, it can take up to 3 minutes to complete the copy operations. The 3 minute delay is due to the EMA performing some additional operation compared to new TG creation.

6SBX-916823

The MS Teams scenario with ICE causes the RTCP port value discrepancy with X when the RTP is Y and when MUX is supported.

Impact: When the SBC sends out re-INVITE messages on a call leg supporting ICE, it can still include a=rtcp:<rtp port + 1> value in the SDP that is different to the previously agreed RTP/RTCP MUX setup with the remote end.

Root Cause: The SBC was not considering the SDP answer from the peer when setting the RTCP port value.

Steps to Replicate:

1. Send INVITE to SBX ingress with valid audio stream in SDP.

2. From the egress endpoint, respond to the INVITE with a 180 ringing and a 200 OK, and in both cases include valid SDP that has an RTP ICE candidate (no RTCP).

a=rtcp-mux

3. At the ingress endpoint, respond to a 200 OK with valid ACK.

4. From ingress endpoint, send a re-Invite that includes an existing audio stream and add a new video stream in SDP.

5. Complete the call signaling and then clear the call.

Platform/Feature: SBC: MS Teams

The code is modified to send a=rtcp:<rtp port> when sending re-INVITE messages for streams previously agreed to support muxed behaviour.
7SBX-89807 / SBX-864953

Portfix SBX-86495: Add a lightweight MPSTAT analysis as a warning to the user. (Originated in release 8.1.0)

Impact: The SBC had random timeouts/healthchecks due to the high %steal (in mpstat output).

Root Cause: There is no warning given when the %steal value is high.

Steps to Replicate: On a VM or cloud machine, manually add a value in the mpstat.log and then run the script.

Plaform/Feature: SBC

The code is modified to check if the system is running with high steal% value and showing a warning to the user.
8SBX-907583

The SIP level4 call trace filter must not be restricted by the maxTriggerCount.

Impact: Level 4 call traces are incorrectly restricted by the maxTriggerCount value.

Root Cause: The intention is that the level 4 traces runs all messages and not be restricted by the system wide trigger count. The count must only apply to per call level 1-3 traces.

Steps to Replicate:

  1. Configure a level 4 call trace.
  2. Configure the maxTriggerCount to a non-zero value.
  3. Change calls that are traced as well as subsequent calls – once maxTriggerCount calls have been made, not be traced.

Platform/Feature: SBC

The code is modified to ensure level 4 traces are unrestricted.
9SBX-92266 / SBX-881222

Portfix SBX-88122: The SBC failed to re-establish media session between the SBC and MS Teams Client after a call transfer initiated by Teams client has failed. (Originated in release 7.2.1)

Impact: In scenarios where MS Teams referred the call to another, the SBC started to play a RBT (ring back tone) and if the REFER failed due to the C-party not answering, the media is not established again between the A and B party.

Root Cause: The media resource used to play the RBT did not get freed up correctly when the REFER failed and this blocked the media flow from A to B being re-established.

Steps to Replicate: Make a call from PSTN to MS Teams, have MS Teams REFER the call to another user. Let the phone ring as C-party but do not answer it.

Platform/Feature: SBC

The code is modified to correctly free up the RBT resources so the A- to-B call can re-establish.
10SBX-908672

The Ssreq coredumped on the SYD SBC.

Impact: The ssreq server has a memory leak that may eat up virtual memory, when there is call load through the ssreq client.

Root Cause: The memory allocated for call data and call trace is not being deleted properly, leaving those memory blocks idle forever.

Steps to Replicate:

  1. Set up the SBC system with a light or heavy call load.
  2. Add a call load through ssreq client to the system, light traffic is enough.
  3. Use the top command to watch the memory growth.

Platform/Feature: SBC

The code is modified to remove the memory blocks promptly.
11SBX-91744 / SBX-914811

Portfix SBX-91481: The SamP cored. (Originated in release 6.2.4)

Impact: Under certain conditions, the SBC sends out a duplicate OPEN_ACK, causing the receiving GW to crash.

Root Cause: A bug in the GW Signaling code can cause a duplicate OPEN_ACKS to send when GW Signaling Links are bouncing.

Steps to Replicate: This problem is not reproducible.

Platform/Feature: SBC

The code is modified to only send out one OPEN_ACK per tcp/ip connection.
12SBX-91726 / SBX-878611

Portfix SBX-87861: While performing a port switchover, the SBC active performed a reboot and the Standby did not takeover the calls. (Originated in release 8.1.0)

Impact: An SWe_NP thread hang was observed on a packet port pull out.

Root Cause: A cable pull was calling a reset on an interface that may take more than 5s on a thread health check threshold, causing the thread to lock on reset.

Steps to Replicate:

  1. Bring up setup in port redundancy setup.
  2. Cable pull packet interface to trigger port switchover.

Platform/Feature: SBC

The code is modified to adjust the thread health check mechanism on a port reset.
13SBX-91585 / SBX-915102

Portfix SBX-91510: An ASAN global-buffer-overflow for the IPUtilGetIpAddressForPrefix. (Originated in release 8.1.0)

Impact: In the SBC, while validating whether the peer RTP address is trusted or not, the IP address is validated. While validating the IP Address, the prefix is passed along with the IP Address. The prefix length is passed as 128, irrespective of the IP Address version.

Root Cause: This issue was reported as part of the ASAN Testing on a PCR 8709 regression suite in the SBC lab.

Steps to Replicate: This issue was found while running a PCR 8709 regression test suite.

Platform/Feature: SBC

The code is modified by passing the correct prefix length and by checking the IP Address version (i.e. If IPV4, pass prefix length as 32. If IPV6, pass prefix length as 128).
14SBX-921372

The RTP is sent to RTCP after a monitor success indication.

Impact: The SBC learns the RTCP port number and uses that to send RTP packets to the end point when RTP monitoring is enabled.

Root Cause: When the RTP montoring is enabled for a call and the media stream sends RTCP packet within the number of packets for authorization, an Network Processor (NP) learns the RTCP packet and notifies the application about the sourceIP and sourcePort.

Steps to Replicate:

  1. Enable the RTP monitoring for a call.
  2. Send RTCP packet first and then RTP packets.
  3. The SBC may send to the learned RTP source port.

Platform/Feature: SBC

The SBC does not learn the RTCP packet when the RTP monitoring/x_cnt feature is enabled.
15SBX-91724 / SBX-910902

Portfix SBX-91090: PrsNP process core dump on standby of KVM-ISBC HA while doing an sbxrestart. (Originated in release 8.1.0)

Impact: There is rare potential of race in healthcheck implementation of SWe_NP. It can cause a false healthcheck failure of the SWe thread and a result in SWe_NP thread crash.

Root Cause: Read and write a healthcheck global variable occurred in non-atomic manner from two different cores.

Steps to Replicate: This is a rare occurrence that happens randomly on idle systems. The steps cannot be consistently reproduced.

Platform/Feature: SBC

The code is modified to make the healthcheck variable update as atomic.
16SBX-909463

Replace the cdb_get when processing status commands.

Impact: Multiple issues were reported where the process cored from healthcheck timeout. The application must not call out to the CONFD when processing the CLI status requests.

Root Cause: Application must not call out to CONFD when processing the CLI status request.

Steps to Replicate:

1. Configure IPSEC testbed.

2. Start to run some calls.

3. From CLI, issue the following commands: "show table addressContext <address context> ipsec ikeSaStatus" "show table addressContext <address context> ipsec ikeSaStatistics" "show table addressContext <address context> ipsec ipsecSaStatus" "show table addressContext <address context> ipsec ipsecSaStatistics" "show table addressContext <address context> ipsec systemStatistics"

Platform/Feature: SBC

The code IKE process code is modified to avoid calling out to CONFD when processing CLI status requests.
17SBX-920022

The DALSBX71A core dumped.

Impact: The SBC core dumped while processing a call with the call stack in 5.0.5R000 software.

Root Cause: NRMA has resources getting cleaned up in response to the ingress hanging up. At the same time, in response to egress received 183 Session Progress and 180 Ringing, the activate starts. In this race condition, the ipCktInfo is NULL and code illegally tries to access it and causes a core dump.

Steps to Replicate: No steps to replicate, only a code inspection was done to test the issue.

Platform/Feature: SBC

A null pointer check is put in place.
18SBX-908771

Failover from Node-A to Node-B.

Impact: Healthcheck failure while switching from nodeA to nodeB.

Root Cause: Functions that configure the DRBD subsystem are taking longer and causing a health check timeout.

Steps to Replicate: Switchover from Active to standby.

Platform/Feature: SBC

The code is modified to run DRBD setup commands in the background and unblock the caller immediately.
19SBX-92402 / SBX-912572

Portfix SBX-91257: No Ring back is heard during a blind transfer. (Originated in release 7.2.1)

Impact: The SBC was playing a ring back tone while processing REFER and transferring the call. However, the tone was not heard on the original call leg because MS Teams had put the original call on hold.

Root Cause: The code was intentionally not sending re-INVITE messages in this scenario.

Steps to Replicate: Run any MS Teams transfer call scenario.

Platform/Feature: SBC

The code is modified to send out a re-INVITE message to take the original call off hold so that it can hear the ring back tone being played.
20SBX-920912

Call Graphs are showing more calls after upgrade.

Impact: Stale calls may be found on a newly upgraded SBC if upgrading from a version older then 6.1.0 to a version higher.

Root Cause: As a result of changes that were made to the call ID in 6.1 code, any calls during the LSWU that existed prior to the upgrade and then were modified or terminated after the upgrade started will be left in a hung state.

The only way to clean up these calls is to use the following commands:

unhide debug
request sbx rtm debug command “cleanup <gcid>

Steps to Replicate:

1. Create an audit key greater than 31 by multiple switch over on a HA system or by using instrumented code.

2. The audit key will create GCID values using the high bits ( bit 30-31) of GCID value.

3. Setup SIP calls on the system.

4. Initiate the LSWU on standby and after standby is upgraded to newer version, all the established calls on active will be synced.

5. Start the LSWU on active.

6. At this point, standby will become Active.

7. Hang up calls that were established before standby became Active.

8. Issue "show table global callSummaryStatus" CLI command and for all those calls data will be Unavailable.

9. These calls will consume resources. To verify the issue, perform the same steps mentioned above. After upgrading to version with fix, after calls are hung, resources must be released and show table global callSummaryStatus command will not show any orphaned calls.

Platform/Feature: SBC

The code is modified to prevent calls from being hung during an upgrade from versions older than 6.1.
21SBX-92274 / SBX-913321

The ipPeerCurrentStatistics and ipPeerIntervalStatistics are not working.

Impact: Getting the IP peer current statistics for individual IP peers was not working. The issue is reproduced when multiple IP peers are configured under the same zone.

Root Cause: Multiple IP Peers must be configured under same zone to reproduce this issue. When obtaining specific peer statistics, the peer name comparison within the same zone was missing.

Steps to Replicate: Configure multiple IP Peers under the same zone and then execute the command to obtain IP Peer Current/Interval statistics for a specific peer.

Platform/Feature: SBC

The code is modified by adding the comparison for IP peer specified in the CLI against the IP peer statistics list with other existing validations.
22SBX-91725 / SBX-909471

Portfix SBX-90947: The NP process core dumped while running a load on the HA setup.

Impact: A random SWe_NP crash occurs on a standby node while running a transcoded load.

Root Cause: RTCP resources are not managed properly by application layer on standby node. This causes a restart of already running timers on the SWe that causes a race and random crash.

Steps to Replicate:

  1. Run a large number of transcoded calls, on HA pair.
  2. Perform multiple swtichovers of SWE_NP coredump will be observed on standby node.

Platform/Feature: SBC

Maintain the state in the SWe_NP of running RTCP timers in the context block and guard the double start of timers.
23SBX-917383

When using the metaVariableDynamic, LinkDetection is not activated in the SBC.

Impact: If the LinkDetection interfaces are configured to use addresses specified in the systemMetaVariable dynamic table, those addresses are not properly read and the LinkDetection is not activated.

Root Cause: The addresses were not properly read from the metaVariableDynamic table.

Steps to Replicate:

1. Add new entries to the metavariableDynamic table.
2. Create an ipInterface with meta keys added to metaVariableDynamic table.
3. Configure the Link Detection on the ipInterface.
4. Check the Link Detection status.

Platform/Feature: SBC

The code is modified to properly read the addresses from the metaVariableDynamic table.
24SBX-920013

Memory leaks in the SIPSG.

Impact: While debugging a bug in a previous release (SCM crashed from segmentation fault fired from malloc()), memory leaks were found in the SIPSG related to subscription.

Root Cause: Observed through a source code inspection.

Steps to Replicate: Perform SIP regression tests.

Platform/Feature: SBC

The code is modified to free memory blocks properly.
25SBX-92430 / SBX-906542

Portfix SBX-90654: Unable to retrieve the parked call on MS Teams. (Originated in release 7.2.1)

Impact: The SBC was unable to retrieve a parked call. The call was not working correctly because the NRMA process had incorrectly swapped PSP information on the call legs.

Root Cause: This is a new call scenario being implemented for the MS Teams interop.

Steps to Replicate: Run a test call in the MS teams for call park and retrieve.

Platform/Feature: SBC: MS Teams

The code is modified to correctly process PSP information on the different call legs during parking and retrieving a call.
26SBX-92160 / SBX-919072

Portfix SBX-91907: The SBC fails to mount a cinder volume on first boot. (Originated in release 8.1.0)

Impact: The SBC fails to mount a cinder volume on first boot.

Root Cause: The bootcmd instruction to mount the volume was executed before the cinder volume was attached as part of instance creation. The cinder volume was not mounted on first boot and as a result, the SBC results in a failure.

Steps to Replicate: Launch the SBC instance with a cinder volume attached and ensure volume is mounted properly.

Platform/Feature: SBC

The code is modified to wait until the cinder volume is detected and then proceed with the mount.
27SBX-92414 / SBX-918202

Portfix SBX-91820: In crank back scenarios, the SBC is taring down the SRS call even before the CS call is torn down.(Originated in release 7.2.1)

Impact: The SBC was immediately disconnecting the SRS call after establishing the SIP Rec session with the next available SRS. The initial SRS responds with a failure 4xx response.

Root Cause: The SBC, after finding the next reachable SRS when the initial one has failed with 4xx response, creates a new SIP Rec Call Block data matching to new SRS. In the older version of the SIP Rec Call Block, the state machine was invoked with a incorrect event. The incorrect event in the state machine was causing the deletion of old SIP Rec Call Block along with deleting the new SIP Rec Call Block.

Steps to Replicate:

1. Create a SRS Group with three SRS Servers.
2. Configure the num streams to 2.
3. The SBC tries to send SRS Invite to first 2 SRS.
4. Send the 4xx response from the first SRS and 2xx response from the 2nd SRS.
6. After receiving the 4xx response, the SBC tries to send new INVITE to 3rd SRS.
7. Send a 2xx response from 3rd SRS.
8. At this step, after ACK towards 3rd SRS, SBC immediately sends BYE to 3rd SRS.

Platform/Feature: SBC

The code is modified to invoke the State machine with a proper event so that only the old SIP Rec Call Block data is removed and the new SIP Rec Call Block data is retained. This avoids immediate disconnection of new SIPREC Call that is established with the second SRS.
28SBX-910362

A DTMF transcoding caused the call to disconnect.

Impact: A certain percentage of the traffic (5%of the calls) are failing due to an incorrect DTMF payload being sent by BROADSOFT.

Root Cause: The SBC was expecting that for a single HD CODEC entry in the 200 OK ANSWER, the Peer/Endpoint must send a matching 16K DTMF payload as per the RFC standard. But the BROADSOFT server at the Egress side is non compliant and sending a 8K DTMF, which is causing the call disconnection.

Steps to Replicate:

1. Enable the DTMF either on both the legs and Different Transcode Flag.

2. Send the PCMU with DTMF 8K from Ingress leg.

3. From Egress side, send the PCMU without any DTMF.

4. Ensure that the call is transcoded.

Platform/Feature: SBC

The code is modified so the strict check is now relaxed and for single codec entry, the SBC does not match the DTMF clock with the codec clock frequency.
29SBX-919851

The SIP calls drop with vertical service code *65 after a minute.

Impact: The SBC is not able to send ACK to the Egress for call to connect.

Root Cause: A logical error when combined with multi features (e2eAck, e2eReInvite, and DLRBT).

Steps to Replicate:

  1. Configure the e2e Ack, e2e reInvite, and DLRBT.
  2. Egress response 183(sendrecv), 183(onhold), 180(no SDP), 200OK(sendrecv).
  3. Peer change the SDP in 18x/2xx response causing internal offer/answer.
  4. Ingress peer sends the reInvite right after ACK, causing internal state not able to send ACK out.

Platform/Feature: SBC

Correct logical errors when multi features e2e ack, e2e reIvnite, and DLRBT are enabled.
30SBX-915522

Q.850 reason header has a grammar issue.

Impact: Invalid format in the reason header in a SIP 500 message.

Root Cause: When the reason header transparency is enabled, a bug appears in the code.

Steps to Replicate: Enable the Reason header transparency along with ANM to CPG feature.

Platform/Feature: SBC

The code is modified so that even when transparency is enabled, the Reason header is sent out in the correct format.
31SBX-92658 / SBX-915993

Portfix SBX-91599: There was a ASAN stack-buffer-overflow on the address in the StrNCpyZ.

Impact: There is an array, which is being used with string specifier and is not null terminated, which causes the overflow problem.

Root Cause: A buffer overflow.

Steps to Replicate: The steps are not reproducible.

Platform/Feature: SBC

The log is removed to stop the buffer overflow.
32SBX-926601

The SBC failed over DEADLOCK detected and a ScmP core was generated as a result.

Impact: Access the NULL pointer in NRMA when deleting a tone profile.

Root Cause: The given targets name does not exist.

Steps to Replicate: Use CLI command to delete the non-existing announcement tone profile.

Platform/Feature: SBC

The code is modified to validate the return value from lookup function before accessing the value.
33SBX-921151

The SCMP coredump was related to ARS.

Impact: The SCM process may core dump when the SIP signaling port is out of service, and if calls are in progress and a SIP transaction timeout occurs.

Root Cause: If the SIP signaling port is out of service, and if calls are in progress and a SIP transaction timeout occurs.

Steps to Replicate: The steps cannot be replicated.

Platform/Feature: SBC

The code is modified to check that the SIP signaling port is in service when handling SIP transaction timeout events.
34SBX-926212

*BrmRedBresAlloc messages are overloading DBG logs.

Impact: BRM redundancy messages were filling up DBG logs.

Root Cause: Those were debug messages to help debug resource leaking issue.

Steps to Replicate: Use regression test only.

Platform/Feature: SBC

Downgraded the related BRM redundancy messages to INFO/Minor level to avoid overloading the DBG logs.
35SBX-919522

Oracle Java JDK vulnerabilities were observed for Nessus scans.

Impact: The Nessus Scan was reporting that embedded java in Oracle database has security vulnerabilities.

Root Cause: Oracle 12c has Java 1.6.0_75 embedded.

Steps to Replicate: Run a Nessus scan and the earlier vulnerability will go away.

Platform/Feature: SBC

Upgraded the Oracle 12c 12.1.0.2 embedded java to 1.7.0_221 using the patch provided by Oracle.
36SBX-915702

Calls from MS Teams may have an audio loss for 30 seconds and then switch-over.

Impact: If there is an SBC switch-over after the call is established, there can be a delay (for example, 30 seconds) when re-establishing the media from the PSTN to MS Teams.

Root Cause: The stored SSN value does not get updated before the SBC switch-over occurs, and it causes the SSN to jump backwards after a switch-over, which causes the one way audio issue until the SSN value increments past the previously set value.

Steps to Replicate: Perform a switch-over after the LRBT is played and check that there is no one way audio issue.

Platform/Feature: SBC: MS Teams

After the LRBT is played, the latest SSN value is sent to the standby SBC so it can correctly jump the SSN forward on a switch-over and the media flow continues without delay post switch-over.
37SBX-908752

The LSASBX71 switched over and causes both sides to core.

Impact: A bug in GW Signaling code can cause a core when GW Signaling Links are bouncing.

Root Cause: A bug in GW Signaling code can cause a core when GW Signaling Links are bouncing.

Steps to Replicate: The steps are not reproducible.

Platform/Feature: SBC

The GW Signaling code is modified to prevent a core.

38SBX-917501

Observed "SamProcess" core dump on an active box while running SIP-GW (cyclic) calls.

Impact: The SBC may core if the GW Signaling Port configuration is disabled while GW Signaling Link is up.

Root Cause: The core is caused by an attempted NULL pointer access.

Steps to Replicate: Disable the GW Sig Port while GW Sig Link is up.

Platform/Feature: SBC

The code is modified to check for NULL pointer to GW Signaling Port before attempting to access this pointer.
39SBX-917722

The application is generating "User Error: monitoring/0/101 PAM authentication succeeded" in .SEC file.

Impact: The SEC log records all successful PAM authentication, which is causing the disc to fill.

Root Cause: Due to constant value re-organization, successful PAM authentication has been mistakenly logged in to SEC log.

Steps to Replicate:

  1. Ensure that logs are configured at MAJOR level.
  2. Put a TLS load on the SBC.
  3. Many of the similar lines in the SEC log, as shown in the example below:

    154 07092019 155039.345656:1.01.00.56147.MAJOR .CHM: *User Error: monitoring/0/101 pam authentication succeeded via rest
     
  4. Apply the same procedure in a fix version SBC and those lines will not be seen.

Platform/Feature: SBC

The code is modified to exclude a successful case when logging in PAM authentication failures.
40SBX-923861

When running the 7.2.1R2 release, the SBC is responding with 'a=inactive' instead of 'a=sendrecv' in a 200OK SDP to late media re-invite, causing no audio.

Impact: It was not RFC compliant to send a=inactive to the late media re-INVITE after peer put the SBC on hold.

Root Cause: A missing requirement.

Steps to Replicate:

Step 1: Generate SIP scripts for a call flow.
Step 2: Setup 7.2.1 system without a fix.
Step 3: Run the call flow to see that the problem is observed.

Platform/Feature: SBC

The code is modified to send a=sendrecv to make it RFC compliant.
41SBX-933892

The MS Teams call flow when using hold/resume then transfer causes SCM crash.

Impact: When music on hold is used in the deployment and a call is put on hold/resumed and then transferred, the call is causing the SBC to coredump in the SCM process.

Root Cause: The SCM process was de-referencing a null pointer.

Steps to Replicate: Music on hold is used in the deployment and a call is put on hold/resume and then transferred.

Platform/Feature: SBC: MS Teams

The code is modified to validate the pointer as not null before trying to use it.
42SBX-92980 / SBX-924842

Portfix SBX-92484: The SBC is dropping the 2nd codec for a text stream when the sendOnlyPreferredCodec flag is enabled. (Originated in release 8.1.0).

Impact: The SBC was dropping the second payload for a text stream if the "Send Only Preferred Codec flag" was enabled and the offer answer contains both t140 and red as payloads for this stream.

Root Cause: The "Send Only Preferred Codec" flag's logic was applied even to a text stream that resulted in the SBC picking the first codec and dropping the other.

Steps to Replicate:

1. Bring up the setup for an A-B call.

2. Enable the flag t140 on both PSPs.

3. Enable the flag sendOnlyPreferredCodec on both IPSPs.

4. Send INVITE from A with both Audio and text media stream with 2 codecs for text(t140 & red).

5. Send 200 OK from B with both Audio and text media stream with 2 codecs for text(t140 & red). Both of the payload is received through the t140 and red is received and no payload is dropping.

Platform/Feature: SBC

The code is modified to exclude text stream from "Send Only Preferred Codec" logic.
43SBX-925802

The SIP Domain is missing in the FROM header after an upgrade.

Impact: The DM rule for the FROM Uri is not working.

Root Cause: Introduced in a previous release to treat the FROM Uri for theRewriteIdentity only.

Steps to Replicate: Configure the PSX for FROM Uri, and a SIP-SIP call. Verify the FROM header is picking up the DM rule of FROM Uri.

Platform/Feature: SBC

The code is modified to support the old behavior for allowing the FROM URI taking effect, even when RewriteIdentity is disabled
44SBX-929183

Inconsistent handling of the SDP in 200 OK on an egress SIP leg.

Impact: "Send Updated SDP in 200OK" was enabled and GW-GW call will fail when the 2xx response SDP is different from the previous 18x response.

Root Cause: The feature flag "Send Updated SDP in 200OK" is applicable for SIP-SIP call only.

Steps to Replicate: Turn on the flag, make a GW-GW call where the 200OK SDP is different from the previous 18x response.

Platform/Feature: SBC

Added logic to disable the feature even if configuration is enabled
45SBX-92470 

The SamP has a memory leak.

Impact: There is possible slow memory leak in the SAM process when running GW-GW calls.

Root Cause: GWFE is leaking a copy of the incoming PDU that was queued internally.

Steps to Replicate: The steps are not reproducible.

Platform/Feature: SBC

The code is modified to free the memory that was being leaked.
46SBX-922522

The SBC was sending an INVITE out for the first user only.

Impact: The Native Forking fails to send out on 2nd route.

Root Cause: If an incoming call that has capital "CALL-ID", the SBC fails to find the parent incoming call.

Steps to Replicate: Configure the native forking feature, and incoming call has capital "CALL-ID".

Platform/Feature: SBC

The code is modified so the "CALL-ID" is case insensitive.
47SBX-925852

The SBC SWe is dropping packets on the pkt0.

Impact: The pkt0 interface stops pinging after a long time.

Root Cause: The SWe_NP code has a slow leak when it is in standby mode, causing the pkt0 to get exhausted after sufficiently long time.

Steps to Replicate: On a standby node, run a program/utility to send packet out of the interface.

Platform/Feature: SBC

Ensure all packets are freed that are read from the KNI devices in SWE_NP code.
48SBX-930562

The SBC failed to generate Enum lookup after updating the dynamic metaVariable.

Impact: The SBC failed to generate Enum lookup after updating the dynamic metaVariable

Root Cause: When the dynamic metaVariable updated for the sipSigPort, the trigger was missing for lwresdProfile and update of sipSigPort IP was not happening that causes the issue.

Steps to Replicate:

1.Configure the SBC for A-B call.
2.Create a dynamic metaVariable to add to sipSig port.
Example:

admin@vsbc1% show addressContext default zone ZONE_ING_V6 sipSigPort
sipSigPort 3 {
 ipInterfaceGroupName LIG_ING_V6;
 portNumber 5060;
 mode inService;
 state enabled;
 transportProtocolsAllowed sip-udp,sip-tcp;
 ipVarV6 lpl_ing;
}
[ok][2018-10-16 15:40:32]
[edit]
admin@vsbc1% q
[ok][2018-10-16 15:40:34]
admin@vsbc1> show table system metaVariableDynamic
CE NAME NAME VALUE
-----------------------------------------------------
vsbc1-10.34.195.109 lpl_egg fd00:10:6b50:5d20::c9
vsbc1-10.34.195.109 lpl_ing fd00:10:6b50:5d20::c7


3. Configure for an Enum call and run an Enum call make sure Enum over sipSigPort and observe an Enum call is successful over sipSigPort.
4. Update the dynanamic metaVaribale lpl_ing to fd00:10:6b50:5d20::ec and restart the SBC and try the call.
5. After updating the metaVaribale lpl_ing to fd00:10:6b50:5d20::ec, the Enum call must be successful.

Platform/Feature: SBC

The dynamic metaVariable trigger is added for lwresdProfile to update sipSigPort IP to fix the issue.
49SBX-933072

Configuring the multiple NNI profiles in a single commit does not work.

Impact:

The following tables are not read correctly by the SIP application, if multiple rows are changed in the same commit in the CLI:
E164 Profile
SIP Filter Profile
NNI Profile
Privacy Profile
PSX Script Profile
SIP Security Profile
SIP Param Filter Profile
SRVCC
STI Profile

Root Cause: There was a coding error.

Steps to Replicate:

  1. Configure two or more NNI profiles.
  2. Configure SIP trunk groups using each of the NNI profiles.
  3. When making SIP calls, the controls on only one of the NNI profiles (the one which is displayed first when running show command) are effective.

Platform/Feature: SBC

The code is modified to process multiple rows in a commit.
50SBX-920921

A possible memory leak in the Sam process.

Impact: The SAM process will leak memory in the case where a De-REGISTER is received and then within less than 30 seconds, another REGISTER in the same AOR is received. This will only happen if multiple contacts in the AOR flag is disabled.

Root Cause: The code does not free certain memory blocks.

Steps to Replicate:

  1. Multiple contacts per AOR flag will be disabled
  2. Do a Register for particular AOR and do a de-register.
  3. Within less than 30 secs, re-send the registration for same AOR so that SIPFE selects the same preferred slot which was used for registering the same AOR earlier. By registering multiple users with same time period, leak will be reproduced.

Platform/Feature: SBC

The code is modified to free the memory blocks.
51SBX-923873

The service instance messages for "Call_Hold" and "Call_Retrieve" are not generated in some GW-GW scenarios.

Impact: When a SIP-SBX-GW-GW-GSX-ISUP call is intercepted, if hold/retrieve is received from either side, the SBC does not send service instance messages to the LI server.

Root Cause: The SBC is not sending the service instance messages to the LI server.

Steps to Replicate:

1. Start the LI server.
2. Initiate the SIP-ISUP call with HOLD from egress.
3. Check LI server logs for service instance msg for hold and retrieve.

Platform/Feature: SBC

The code is modified to pass the Hold/Retrieve indications from one GW to other GW.
52SBX-930892

Admin credentials are visible to non-root users during PM login.

Impact: The credentials for admin were visible to linuxadmin.

Root Cause: Previously a shell was invoked by PHP and inside it pamValidator was called with credentials as arguments.

Steps to Replicate: Run the following in a session as linuxadmin while

  1. Apply pgrep -a pam; done.
  2. Log into PM now credentials should not be present in the output of the command.
30131 /usr/local/bin/pamValidator 30131 /usr/local/bin/pamValidator 30131
 /usr/local/bin/pamValidator 30131 /usr/local/bin/pamValidator 30131
 /usr/local/bin/pamValidator 30131 /usr/local/bin/pamValidator

Platform/Feature: SBC

The code is modified so pamValidator takes input from the ENV instead of cmdline arguments.
53SBX-912113

"X509_STORE_add_cert failed 0" when multiple certificates are created using the same certificate file.

Impact: "X509_STORE_add_cert failed 0" error log is continually logged onto .DBG from the standby (HW only) when a remote certificate is added that does not have a 'success' status.

Root Cause: The certificate does not properly exist in CLI, therefore the certificate cannot be properly read from CDB.

Steps to Replicate: Create multiple certificates using the same remote.

Platform/Feature: SBC

The timer used to import the certificate on the standby now checks the certificate status and successfully exits in cases where the certificate status is not a 'success'.
54SBX-932851

Observing a box reboot while the application is coming up as standby after a port-failure.

Impact: After a node switchover, the standby node may reboot while the application is coming up.

Root Cause: During a node switchover, when application comes up on standby node, the health monitoring for worker thread fails because of an incorrect evaluation of CPU cycles spent by the thread. A failure to health monitoring causes the standby node to reboot.

Steps to Replicate:

Execute node switchover with the following steps:
1) Bringing down all active ports.
2) Applying the appropriate CLI command.
3) Fail the application on the active node.

Platform/Feature: SBC

The code is modified so the health check monitoring for the worker thread is correct.
55SBX-933262

Receiving text populated as null in mediaStream2Codec and in callMediaStatus.

Impact: When audio and text media call is made, the mediaStream2Codec of text is being populated as null.

Root Cause: Text has been removed from a fix in a previous release, which has made "mediaStream2Codec" field not to populate for text media.

Steps to Replicate:

  1. Bring up the box with the latest SBC build that supports T.140 session.
  2. Enable the following CLI and attach to Ingress and Egress TG's.

    -set profiles media packetServiceProfile DEFAULT flags t140Call enable

     

  3. Send INVITE with Audio+T.140 sessions from UAC.
  4. Send 200 OK with Audio+T.140 sessions from UAS.
  5. Send BYE.

Platform/Feature: SBC

The code is modified to include the text stream to populate "mediaStream2Codec".
56SBX-931243

The SBC changes the format of P-Access-Network-Info header on the 18x and 200OK.

Impact: When transparency is enabled in the P-Access-Network-Info Egress and received by P-Access-Network-Info in the 18x, the message forwarded to the ingress has an incorrect syntax.

Root Cause: A logical error related to double quote string parameter was causing a syntax error to be sent out.

Steps to Replicate:

  1. On SIP-SIP call, enable the header P-Access-Network-Info transparency.
  2. Egress receives P-Access-Network-Info in 18x and forwards to the ingress with an incorrect syntax.

Platform/Feature: SBC

The code is modified to correct the logical error.
57SBX-93553 / SBX-934691

Portfix SBX-93469: The DFW1-CASBC-02 Box A had a SCMP coredump. (Originated in release 7.2.3)

Impact: The SBC cored when accessing Box A, switching over to Box B instead.

Root Cause: Enabling the SDP transparency and the directMediaAllow to show a simple 18x response from the peer may cause a core dump due to access from an invalid address.

Steps to Replicate: Disable either the SDP transparency or the directMediaAllow.

Platform/Feature: SBC

The code is modified to ensure it does not have access with an invalid address.
58SBX-921551

The SBC is releasing the call with 504 when the DLRB and Downstream Forking are enabled.

Impact: The SBC releasing the call with 504 when the DLRB and Downstream Forking are enabled.

Root Cause: The race condition is not handled properly. When first 180 message without SDP is received, the forking list and stored the message were updated. The second time the 180 message with SDP was received, the forking list and stored the 180 message were updated, but since RTP learning was applied earlier, it was not replicated again.

Steps to Replicate: Send the RTP before sending the 180 Ringing (CSeq: 961529 INVITE RSeq: 629928).

Platform/Feature: SBC

If RTP learning happens before the corresponding 18x message with SDP is received, save the SDP into a queue of possible SDPs to cut-thru for use while 200 OK is received.
59SBX-934762

Fix the double free scenario in NAT and in a multicast scenario.

Impact: There will be a random SWe_NP core dump when either NAT is enabled or the LI is enabled at peak loads.

Root Cause: There was double free of mbuf pointer, which can cause corruption.

Steps to Replicate: Run calls with the LI or NAT enabled at a peak load.

Platform/Feature: SBC

The code is modified to fix the double free of mbuf pointer.
60SBX-935661

The WALL Signaling PSBC10A01 cored.

Impact: When the MRF Modify is received, the MRFRM fsm state must be OA_ACTIVE. But in this issue, the state is leading to incorrect typecasting.

Root Cause: The defensive was checked.

Steps to Replicate: Run the MRF load.

Platform/Feature: SBC

When the MRFRM is in OA-NULL state, the call must not be in connected state.
61SBX-93325 / SBX-931752

Portfix SBX-93175: Receiving a null in the mediaStream2Codec and in the callMediaStatus. (Originated in release 8.1.0)

Impact: When a audio+ text media call is made, the mediaStream2Codec is being populated as null.

Root Cause: Text has been removed through a fix in a previous release, which has made "mediaStream2Codec" field to not populate for text media.

Steps to Replicate:

  1. Bring up the box with the latest SBC build that supports T.140 session.
  2. Enable the following CLI and attach to the Ingress and Egress TGs.

    -set profiles media packetServiceProfile DEFAULT flags t140Call enable

     

  3. Send INVITE with Audio+T.140 sessions from UAC.

  4. Send 200 OK with Audio+T.140 sessions from UAS.

  5. Send BYE.

Platform/Feature: SBC

The code is modified to include the text stream to populate "mediaStream2Codec".
62SBX-93551 / SBX-694123

Portfix SBX-69412: o= version was not incrementing. (Originated in release 6.0.0)

Impact: The SBC responds to an Update without an incremental SDP session version.

Root Cause: Enable the "Only Selected Codec in Session Refresh", peer answer the SDP in 18x, and send an Update with a different SDP. However, the SDP version did not increment.

Steps to Replicate: Enable the "Only Selected Codec in Session Refresh", peer answer the SDP in 18x, and send an Update with a different SDP.

Platform/Feature: SBC

The SBC responds to an UPDATE with a different SDP in a previous Invite. The SBC correctly increments the SDP version.
63SBX-93492 / SBX-907112

Portfix SBX-90711: ELT: Observed Negative accepted packets at the "request sbx xrm debug command acl\ -stat".

Impact: Observed a negative packet count for the ACL and aggregate ACL while running CLI commands.

Root Cause: We were using an incorrect format specifier. We were using %d to print an unsigned long instead of %u.

Steps to Replicate: Tested with pumping packets to specific ACL. The counters are working as expected.

Platform/Feature: SBC

Corrected the format specified usage.
64SBX-937142

Unable to configure more than 2 IPIFs into 1 IPIG.

Impact: Cannot create 4 IP Interfaces under a single IPIG in Yellowfin. As Yellowfin has a single NP, a port map needs to be created for all ports on the NP0.

Root Cause: During the Yellowfin development, creating 4 IP Interfaces in the same Interface groups was not evaluated correctly.

Steps to Replicate:

1. Attempt to create 4 interface groups under the same Interface group.
2. Associate it to other signalling elements such as sipSigPort to validate NP friendly checks.

Platform/Feature: SBC

Create a port map for packet ports pkt2 and pkt3 using the NP0.
65SBX-927803

'request SBC arm debug command' commands stop working after a switchover.

Impact: Request the SBC arm debug command help is not working when a switchover was made from active box to standby one.

Root Cause: Inside the ArmCsv.c, the CsvMgObjRegisterObject() was not enabled when "request sbx arm debug command help" is configured in Debug Mode.

Steps to Replicate:

1. Setup HA.
2. Start both the boxes.
3. Run "request system admin <SBC_NAME> switchover" to do a switchover.
4. Wait for full sync let standby box come as active.
5. Run "request SBX arm debug command help" on the new active SBC (former standby SBC).

Platform/Feature: SBC: CLI, confd

Enable the CsvMgObjRegisterObject(&armCsv->csvCb, "/sbx/arm/debug") function.
66SBX-932552

Unable to change the Source Port to any port on the EMA.

Impact: Unable to change the Source Port to any port on the EMA.

Root Cause: The source port attribute is validated as an integer instead of a Alpha Numeric.

Steps to Replicate:

  1. Successfully verified the loading of the EMA Application.
  2. Successfully changed the SourcePort number from 'any' to 'int' and 'int' to 'any'

Platform/Feature: SBC

The code is modified to validate source port as type Alpha Numeric instead of an integer.
67SBX-932872

The SBC was not responding to 483 for PRACK with the Max-Forwards=0 and rfc7332ValidateMaxForwards enabled.

Impact: If the SBC received a PRACK request with the Max-Forwards header value as zero, the SBC was not rejecting the request with 483 error response.

Root Cause: The part of code was missed from the code merge from 7.2 to main branch.

Steps to Replicate:

Test steps:
1. Send PRACK with Max-Forwards 0.
2. Verify the SBC is rejecting it with 483 Error response.

Platform/Feature: SBC

The code is modified to handle Max-Forward with 0.
68SBX-911542

There is a call failure due to a FQDN in the request URI.

Impact: When the SBC sends a query for SRV record to the external server and the Peer Domain in the reqURI is disabled, the SBC intermittently sends a FQDN in the request URI of egress INVITE. The correct behavior is to send an IP and address in reqURI of egress INVITE.

Without a fix, the SBC will send a FQDN in reqURI even when Peer Domain in reqURI is disabled.

Root Cause: The SBC does not use a formatted SIP message when the external query is made for finding the SRV record and a record is found in the cache. As a result, the SBC cannot apply the "Peer Domain in ReqURI" flag in the egress SIP message.

Steps to Replicate:

  1. Use the following configurations on the PSX:
    1. Set the IP PEER as FQDN abc.com instead of IP address.
    2. Enable "noPortNumber5060" on the IPSP (This is for done for NAPTR, SRV query)
    3. Disable "Peer Domain in the reqURI " on IPSP (This is done to ensure FQDN is not sent in egress INVITE's reqURI)
  2. Use External DNS server.
    1. Configure SRV record and A record on the external DNS server with different Time To Live values.
  3. Run high number of calls.
  4. With fix, the SBC is sending IP and Port for all the calls since Peer Domain in ReqURI is disabled.

Platform/Feature: SBC

The code is modified to have the SBC use the saved formatted SIP message when the external DNS query is made for SRV record and a record is fetched from the cache. This allows the SBC to apply the "Peer Domain in ReqURI" flag in the egress SIP message.
69SBX-933121

The SBC Memory has High alerts.

Impact: When the Local Ring back tone is configured on the SBC and egress endpoint sends a 183 Session Progress with SDP followed by a 180 Ringing, the ScmProcess does not free up memory allocated even after call is completed. Without a fix, the ScmProcess will leak memory.

Root Cause: When the Local Ring back tone is configured on the SBC and egress endpoint sends a 183 Session Progress with SDP followed by a 180 Ringing, the ScmProcess does not free up memory allocated even after call is completed.

Steps to Replicate: Run a call load with the Local Ring back tone configured and monitor the virtual memory usage of the ScmProcess.

With a fix, the virtual memory of ScmProcess must not be high after all calls have been disconnected.

Platform/Feature: SBC

The code is modified to ensure the memory allocated for packet service profile structure is freed when no longer required.
70SBX-918991

SBCv6 Unexpected 183 (CPG) sending - out of PER6608 spec.

Impact: Early cut through may not work for trusted configured RTP Servers on system restart.

Root Cause: The system restores the SIP service group data before the RTP Server data which is incorrect.

Steps to Replicate:

Provisioned the rtpServerTable (OLIVER_RTP_SRV_TBL), and associated it which the egress sipTrunkGroup SBXSUS9_LABSIP2
(as shown below):

admin@sbxsus9> show configuration details addressContext default rtpServerTable OLIVER_RTP_SRV_TBL
rtpServer 10.8.20.75 32;

admin@sbxsus9> show configuration details addressContext default zone ZONE4 sipTrunkGroup SBXSUS9_LABSIP2 media earlyMedia
method rtpServerTable;
rtpServerTableName OLIVER_RTP_SRV_TBL;
forkingBehaviour lastReceivedSdp;

Platform/Feature: SBC

Fixed the ordering of the initialization procedure to restore the RTP server profile configuration data before restoring the SIP service group data.
71SBX-93562 / SBX-933552

Portfix SBX-93355: P-Charge-Info header not relayed by the SBC in out-of-dialog MESSAGE request even though the transparency setting is enabled.

Impact: P-Charge-Info Header is not relayed transparently for OOD Message even though Transparency profile is enabled for P-Charge-Info.

Root Cause: P-Charge-Info Header is dropped in case of relay framework.

Steps to Replicate: Run the message OOD which has P-Charge-Info Header in the incoming Message and Transparency is enabled for that header.

Platform/Feature: SBC

P-Charge-Info Header is copied in case of relay framework.
72SBX-926111

Outbound call Failing with 488.

Impact: Transcode call, after 40 onhold/offhold, call fail.

Root Cause: Internal process Nrma TransactionId did not reset properly after wraparound (12 bits limit). As resulted, it is sending the same transactionId for allocating DRM resources for both Ingress and Egress legs.

DRM reject due to duplicated transactionId.

Steps to Replicate: sip-sip call with transcoding. Call fail after 40 onhold/offhold.

Platform/Feature: SBC

 Properly reset the TransactionId when it reach 12 bit limit.
73SBX-941412

Call Transfer call to PSTN gets failed second time ,when MOH is played in the initial call.

Impact: After multiple holds and resumes, if the first call transfer fails due to reject by transfer target then the transferee and transferer are reconnected successfully. For any subsequent call transfer, the SBC is rejecting the call transfer request.

Root Cause: Since, the first call transfer failed, the SBC tries to reconnect the original call. As part of this, the original call is not moving to the stable state. So, any call transfer request in such state is getting rejected by the SBC.

Steps to Replicate:

1.TEAMS to PSTN1 call
2.TEAMS hold and resume the call
3.TEAMS transfer call to PSTN2
4.PSTN2 rejects the call
5.TEAMS resume the call and transfer again to PSTN2

Platform/Feature: SBC

Added missing code to move the original call state to the stable state during re-connection.
74SBX-934752

IngressIpPrefix data deleted when removing SMM from TG.

Impact: IngressIpPrefix data deleted when removing SMM from TG

Root Cause: When deleting SMM Profile, code is there to delete ipPrefix data as well

Steps to Replicate: Remove a SMM rule from the TG in the EMA it also deletes the ingressIpPrefix metadata causing ingress calls to fail.

Platform/Feature: SBC

Added checks not to delete ipPrefix data when we delete the SMM Profile.
75SBX-93394 / SBX-925543

Portfix SBX-92554: TTY is not enabled for EVRC and EVRCB in the H/W SBC.

Impact: TTY was not enabled for transcoded calls of EVRC and EVRCB codec in the SBC 52x0 and SBC7000 and SBC54xx.

Root Cause: TTY was disabled for unknown reasons.

Steps to Replicate:

  1. Setup EVRC/EVRCB<=>g711 call.
  2. Send media with TTY characters from G711 side.
  3. Observe the PCAP of EVRC/B. TTY has special code points in the EVRC/B. Before the fix, TTY signals were encoded as EVRC codec media. With the fix, you will observe TTY special code points in PCAP.

Platform/Feature: SBC

Enable the TTY. There is no API/CLI to enable TTY.
76SBX-936013

MS Teams Call Park has an intermittent failure.

Impact: In a Microsoft Teams environment, Microsoft has a bug in the client code that can randomly cause messages to be sent out of sequence. For example, when trying to transfer calls, Microsoft can send REFER and then INVITE with a=inactive afterwards. The out of sequence message processing was causing processing issues on the SBC and the call did not complete.

Root Cause: Microsoft agrees that their message sending is broken and are working on a fix.

Steps to Replicate: Repeatedly run Microsoft Teams Call Park scenarios. The problem is not always reproducible and is possibly dependent on the Microsoft server and location of the associated client.

Platform/Feature: SBC: MS Teams

The code is modified to be more defensive against the out of sequence messaging, such as:
1) Reject the INVITE with 491 if REFER is being processed on a call leg.
2) Reject the REFER if the SBC has an outstanding INVITE waiting to be sent.

77SBX-93532 / SBX-934732

Portfix SBX-93473: The SBC is core dumping when the diversionHistoryInfoInterworking flag is enabled in the egress IPSP.

Impact: When the interworking diverts Diversion Headers to History Info for Japan NNI, on a call where ingress SIP performs an INVITE/UPDATE due to preconditions, the SBC core dumps.

Root Cause: The cause is from a code bug.

Steps to Replicate: Make an SIP-SIP call where ingress side has preconditions, such that INVITE/UPDATE sequence is needed. The received INVITE will contain Diversion headers. Egress side is configured with an NNI profile attached to the trunk group with historyInfoInterworking enabled.

Platform/Feature: SBC

The code is modified to no longer core dump.
78SBX-93608 / SBX-917872

Portfix SBX-91787: Debian vulnerabilities are observed for Nessus scans. (Originated in release 7.2.2)

Impact: Nessus scan display vulnerabilities.

Root Cause: Many packages are out of date, which can cause vulnerability.

Steps to Replicate: Run Nessus scan.

Platform/Feature: SBC

Packages and kernels are updated to fix this issue.
79SBX-940622

Unexpected INFO was received.

Impact: DTMF inter-working from RFC 2833 to SIP INFO was not generating signal event packets and only signal-update are coming on the SWe.

Root Cause: On the SWe, due to endian mismatch from low level platforms to SIP applications, the signal event was not raised.

Steps to Replicate: Enable the DTMF inter-working and send the 2833 media from one-leg, observe the SIP signal, signal-update events on the other leg.

Platform/Feature: SBC

The code is modified so that the signal event is generated correctly.
80SBX-90831 / SBX-898602

Portfix SBX-89860: There is no bit-exactness across warp for Mode 8. (Originated in release 8.1.0).

Impact: In the case of GPU AMRWB 23.85kbps, there is no bit-exactness in the output across warps even though the same input is fed to all the warps.

Root Cause: The size of one of the scratch buffers was incorrectly used in a macro. The macro eventually led to memory corruption.

Steps to Replicate: The issue was found in the standalone test and cannot be executed outside development.

Platform/Feature: SBC

The code is modified by rectifying the size in the macro.
81SBX-90816 / SBX-903122

Portfix SBX-90312: ASAN: Heap-buffer-overflow on the address in SipFeGetCseqType. (Originated in release 8.1.0).

Impact: This issue was found during ASAN regression testing. While processing the CSEQ header, the code was reading off the end of allocated memory block.

Root Cause: The code was expecting the CSEQ string to be null terminated and it was not.

Steps to Replicate: This issue is only seen with the engineering ASAN build.

Platform/Feature: SBC

The code is updated to correctly handle the case where the CSEQ is not null terminated.
82SBX-940531

The P-SBC Openstack installation fails with an OAM node and core dumps.

Impact: Upgrade fails if any of the SNMP trap targets are 32 characters in length.

Root Cause: Right sized buffer was allocated to fetch data from the database but passed incorrect length field to database API. In the case where the field being fetched has max allowed length, the API fails because the API verifies that there is not enough room to terminate the field with NULL.

Steps to Replicate:

  1. Create SNMP trap target of 32 character long.
  2. Attempt to upgrade.
  3. The upgrade will fail.
  4. Perform upgrade with the fix, and the upgrade will succeed.

Platform/Feature: SBC

The code is modified to add the correct buffer length to configuration database APIs.
83SBX-939033

Large SIP messages in TRC are divided into several syslog messages to the rsyslog server.

Impact: TRC PDU's are broken into multiple syslog messages.

Root Cause: There was a limit to the message size of ~1.8K and TRC messages beyond that would be split into multiple syslog messages.

Steps to Replicate:

  1. Reproduce the issue.
  2. Generate TRC files (size>1800) and transfer to remote syslog server.
  3. Single TRC is broken into multiple syslog messages.

Platform/Feature: SBC

The code is modified to transfer a complete TRC PDU as one syslog message.
84SBX-935482

When the transfer call is not answered from PSTN, MS TEAMS client is unable to resume the existing call.

Impact: In a Microsoft Teams call flow where the call gets transferred and the C-party has sent back a 180 without the SDP, which triggers the SBC to play RBT and then C-party sends 183 with SDP and finally rejects with a 6xx, it can result in the SBC internally getting into a bad state. This results in the SBC not being able to resume the call and the call getting released.

Root Cause: The resource management in the SBC was getting confused on the packet service profile for the various call legs that lead to the call being released.

Steps to Replicate:

1.TEAMS to PSTN1 call.
2.TEAMS transfer call to PSTN2.
3.PSTN2 does not answer the call.
4.TEAMS resume the call and transfer again to PSTN2.

Platform/Feature: SBC

The code is modified to correctly manage the packet service profile and other call leg information so it can correctly handle the transfer rejection from C-party.
85SBX-939932

The Quality of Announcement tone played by the SBC is bad.

Impact: Bad Announcement quality.

Root Cause: A software bug in DSP was resetting the first sample of every announcement frame to zero.

Steps to Replicate:

1. The set-up requires the SBC and the PSX. A PSX script is implemented, which has information about what announcement to play and DTMF digits that need to be entered to switch to the second stage of the call.
2. Client makes a call to the SBC. In the first dip, the SBC plays the announcement configured in the script and waits for DTMF digits to be entered.
3. A route is present in the PSX for DTMF digits entered.
4. After entering digits, the PSX now goes for second dip for the new digits entered and returns a route to the SBC.
5. With this route, the SBC calls Egress end point
6. Monitor the announcement quality played at step #2.

Platform/Feature: SBC

The code is modified to not remove the first sample.
86SBX-907522

The ASAN creates a global-buffer-overflow on the address in s_finish.

Impact: This issue was found during ASAN regression testing.

The coding was reading from invalid memory block during the process of a CDB transaction completion event.

Root Cause: The code was looking for CDB worker socket that matched with the CDB transaction completion event and in a case where the worker socket did not exist,the code was reading off the end of an array.

Steps to Replicate: Run the SVT test suite using a ASAN specific build.

Platform/Feature: SBC

The code is modified to ensure it does not read off the end of the worker socket array to prevent the problem.
87SBX-922832

Transport the attribute populated twice in the RURI of INVITE request towards the peer, when the To header transparency is enabled.

Impact: A call directed to the registered endpoint has duplicated the URI parameters in the RURI.

Root Cause: Introduced in a previous release.

Steps to Replicate: Configure the TO header transparency. Endpoint registered with contact has multiple RUI parameters. Server makes a call to the endpoint. The SBC sends out an Invite with a duplicated URI parameters.

Platform/Feature: SBC

The code is modified to avoid duplicated RUL parameters in the RURI.
88SBX-932622

The SBC generates a RTCP goodbye to ingress after the 200 OK.

Impact: When Downstream forking is enabled and the Early Media Response is set to "last received SDP", when the call gets answered the resource chain will be re-built and the RTCP BYE will be generated.

Root Cause: Root cause lies in feature completed in a previous release. The feature required that if the ingress peer does not have 100 rel support, and egress gets multiple 18xs, then the transcode is forced even though pass through is possible to support codec change.

Steps to Replicate: Enable Downstream Forking and forking response as anything except the first prov response.

PSPs are setup to perform a transcode only.

Platform/Feature: SBC

The code is modified according to the following:
1. Downstream forking is enabled.
2. Early media behavior - non FIRST PROV RESP.
3. One forking dialogue.
4. No SDP is sent in 2xx if the 18x reliable.

89SBX-931032

There is no relay of an UPDATE with the SDP when the media mode has changed and when the DRBT is configured.

Impact: When the Downstream Forking and DLRBT is enabled, an UPDATE received from the ingress are not going out to egress (UPDATE received after the media cut-thru has happened because of receipt of RTP from egress).

Root Cause: If it is marked as OA_COMPLETE, the updates received are sent to the other leg if that other leg is 100rel/PRACK supported. This issue was caused due to some legs not being marked as OA_COMPLETE due to an incomplete implementation.

Steps to Replicate: Set Downstream Forking and DLRBT as enabled.

Platform/Feature: SBC

The code is modified to mark OA_COMPLETE in all instances where the parallelRingPsp is being appended with the new SDP's received in 18x's.
90SBX-937651

CS04A01 lost communication with the CM04A04. Post-recovery, other M-SBCs cannot talk to the CM04A04.

Impact: The IPv6 address becomes unreachable in standby port cable pull scenarios.

Root Cause: The SWe code was not handling saving the multicast mac address list and re-applying it on the hardware port during a link up/down event for standby ports.

Steps to Replicate:

  1. Bring down any standby port by cable pull on host.
  2. Configure a new IPv6 address on that PKT port.
  3. Re-insert the cable for same standby port.
  4. Do a port switchover by plugging out active physical port's cable so that the standby becomes active for same port.
  5. Ping the new configured IP from in step 2 from outside. The ping will result in a failure.

Platform/Feature: SBC

The code is modified to handle the programming of multicast MAC list for standby ports properly.
91SBX-923422

Call diagnostics were not working through EMA.

Impact: Call diagnostics fails due to errors in EMA.

Root Cause: Call diagnostics fails due to the STDERR for CP commands in dumpCommonFunction.

Steps to Replicate:

  1. Open EMA-> Troubleshooting and run call diagnostics.
  2. Save the call diagnostics.
  3. Call diagnostics are saved successfully.

Platform/Feature: SBC

The code is modified by redirecting stderr to /dev/null.
92SBX-91196 / SBX-859382

Portfix SBX-85938: The SMM tears down the Operation on Early dialog, and the SBC sends CANCEL before completing the 18x transaction. (Originated in release 8.1.0)

Impact: The SMM tears down the Operation on Early dialog, and the SBC sends CANCEL before completing the 18x transaction.

Root Cause: In case of End2End, PRACK is enabled and SMMTearDownFunctionality was not working as expected.

Steps to Replicate:

1.Tested the call by triggering an SMM teardown functionality in Invite, the SBC tear downs the call as per the call flow.
2. Tested the call by triggering an SMM teardown in 180 response where PRACK is mandatory, the SBC tear downs the call by initiating a SMM Teardown as per the call flow (after PRACK-200ok is complete).
3.Tested the call by triggering a SMM Teardown in 200 OK of PRACK.
4.Tested the call by triggering a SMM Teardown in 200 OK of Invite.

Platform/Feature: SBC

The code is modified to make the SMM Teardown functionality to initiate and not to take any action if the 18x/PRACK transaction is pending and enedtoendprack is enabled. Once the response of PRACK is received/sent based on the call flow, the teardown is initiated based on the SMMTearDown action state.
93SBX-927782

The Edit route action taking a long time to complete.

Impact: The Edit Route action was taking long time and failing.

Root Cause: Use of special characters, such as # in destination National field, can cause the failure of the Edit route action.

Steps to Replicate:

  1. Create Route with special character in Destination National.
  2. Select the Route that is created in Special Character.
  3. Edit Form must be load.

Platform/Feature: SBC

A few more special characters to support Destination National field in the Edit route are allowed.

NOTE: The following special characters are not supported: & = , \.

94SBX-93959 / SBX-933662

Portfix SBX-93366: The SBC is not able to update a transcode from a pass thru call.

Impact: The SBC is not able to update a transcodec call after a pass thru call.

Root Cause: In this issue, it is changing from the pass thru to transcode because the sendOnlyPreferredCodec was enabled in the IPSP and in ModifyReq(Ans Side new PSP), it is taking RxPT of old PSP.

Steps to Replicate: Tested the call by sending PCMU/G729/PCMA in the 183 call is working as expected.

Platform/Feature: SBC

In the NrmaSelectCodecEntryFromPspForXcode() function, adding a condition to overwrite the PT only if it is a valid RxPT(old psp).
95SBX-94171 / SBX-941151

Portfix SBX-94115: The I/O scheduler was incorrectly configured after upgrade.

Impact: Kernel scheduling issues are causing intermittent issues, including lost pings across the HA interface. The lost pings induce a split brain and subsequent split brain recovery. Transient calls are lost during the split brain and recovery, and depending on call flow, stable calls may be lost as well.

Root Cause: The I/O scheduler is being reverted from 'deadline' to 'noop' due the upgrade due to a bug in the upgrade script.

Steps to Replicate: After upgrade to 6.2.x or 7.x, verify the scheduler with the following command:

cat /sys/block/sda/queue/scheduler

The output must show brackets around deadline to indicate it is in use, for example:

[root@SBX24-154a log]# cat /sys/block/sda/queue/scheduler
noop [deadline] cfq

Platform/Feature: SBC

The code is modified to properly specify the I/O scheduler.
96SBX-943131

There is a core dump during an A to B tandem call in (GSX)SIP-gw-gw-SIP(SBX) when the egress IP Signaling Profile is not configured.

Impact: The GSX-SIP-Gw-Gw-SIP-SBX has a core dump in the SBC if the egress Signaling Profile is not attached.

Root Cause: The issue was found by providing a fix to another issue, not through attempting a call with no egress signaling profile attached.

Steps to Replicate: Make an A to B call using the GSX-SIP-Gw-Gw-SIP-SBX and on the egress TG in the PSX. Do not attach the egress Signaling Profile. These steps will result in a core dump.

Platform/Feature: SBC

The code is modified to create a zeroed out IPSP and pass it for the system to act on instead of NULL the PTR. When the code looks for specific IPSP flags, none of the flags are enabled, but there is active memory.
97SBX-941183

EMA CLI script import stays "In Progress" if the script contains a special character.

Impact: EMA CLI script import stays "In Progress" if the script contains a special character.

Root Cause: Non printable characters are present in the error message.

Steps to Replicate:

  1. Log into EMA Application.
  2. Click on Administration->System Administration->File upload->Add the files to queue.
  3. Select the CLI file that you want import.
  4. Click on "Upload All files".

Platform/Feature: SBC

Remove Non printable characters from the error message.
98SBX-940892

SAM crash on standby SBC (SIPFE stby).

Impact: The standby SBC may core when IpPeer deletes or creates the same structure in a different zone.

Root Cause: When using the IpPeer delete, the function will fail to remove the internal data structure from the hashtable. Later on, the IpPeer will create a new structure again in a different zone, it fails to insert a new data structure into the hashtable and deletes the new data structure.

There was a logical error that still has access to the new data structure after free.

Steps to Replicate: Create an IpPeer from one zone. Delete it and create the same IpPeer in a different zone.

Platform/Feature: SBC

The code is modified to fix the initial IpPeer delete issue and ensure not the new data structure is not accessed if it is already freed.
99SBX-94667 / SBX-945802

Portfix SBX-94580: The GWSG is missing a svcGrp entry for the TG while a few duplicate entries in the srvcGrpTbl. (Originated in release 6.2.2).

Impact: Duplicate entries shown in the GWSG service group table.

Root Cause: The root problem is that the create GWSG does not validate the TG name. Currently, the GWSG only goes through the srvcGrpTbl[] and finds the first empty slot’s index. If the new index != original entry’s index, the NamedInsert() will insert SUCCESS and set duplicate entry at the new location in the table, otherwise the NamedInsert() will return FAILURE and the duplicated entry will be freed.

On the standby node, when it is coming up, the GWSG restores all GWSG_SRVC_GRP_STR from the CDB. Once configuration restore is done, the active node will start to sync over all the GWSG_SRVC_GRP_STR, which caused the standby node to have duplicate entries.

Steps to Replicate: Refer to /sonus/sw/Specs/TSBX-94580.txt.

Platform/Feature: SBC: GW-GW

The code is modified to validate if the specified name is already in the table before creating a new one.
100SBX-93562 / SBX-933552

Portfix SBX-93355: P-Charge-Info header was not relayed by the SBC in a out-of-dialog MESSAGE request, even though the transparency setting is enabled.

Impact: The P-Charge-Info Header is not relayed transparently for the OOD Message, even though the Transparency profile is enabled for P-Charge-Info.

Root Cause: The P-Charge-Info Header is dropped, in case of the relay framework.

Steps to Replicate: Run the message OOD that has the P-Charge-Info Header in the incoming Message and Transparency is enabled for that header.

Platform/Feature: SBC

The P-Charge-Info Header is copied in case of a relay framework.
101SBX-943203

The SBC application is resulting in a failure after switchover.

Impact: The SBC results in a failure due to being unable to mount the DRBD post switchover.

Root Cause: Post switchover, the DRBD mount failed as one of the DRBD setup command was being run in the background, but this command needs to complete execution before mounting the DRBD.

Steps to Replicate: Bring up the SBC and perform a switchover. Verify that the switchover is successful and the SBC application comes up fine on both nodes.

Platform/Feature: SBC

The code is modified to run the DRBD command in foreground and then mount the DRBD.

102SBX-94552 / SBX-766693

Portfix SBX-76669: With the sipOod set to unlimited, MAJOR errors are displayed in DBG log.

Impact: With the sipOod set to unlimited, MAJOR errors are displayed in DBG log.

Root Cause: If the sipOod licensedMaxRateLimit is set to UNLIMITED, it was generating a TRAP and MAJOR level logging that is incorrect. 

Steps to Replicate:

Make a OOD call and no MAJOR logs be visible, as presented in the example below:

152 12242018 083916.769675:1.01.00.00493.MAJOR .SIPFE: threshold reached notification for OOD message Rate. Active OOD rate 1 and OOD Rate Limit is 0
152 12242018 083916.769675:1.01.00.00493.MAJOR .SIPFE: threshold reached notification for OOD message Rate. Active OOD rate 1 and OOD Rate Limit is 0

Platform/Feature: SBC: Application, FM/Traps and Alarms

Instead of assigning a value 0 to the variable, the value is assigned to a INTMAX.
103SBX-93931 / SBX-937991

Portfix SBX-93799: A SCM process coredump was observed when the sipParamFilterProfile is configured.

Impact: This issue is a result of a bug in a previous release (Configuring multiple JJ9030 profiles in a single commit does not work) fix.

Root Cause: Reading the Profile XML tag from the confd when the confd iterator is not pointed to a profile.

Steps to Replicate:

Configure the sipParamFilterProfile as shown below:
1. Set the profiles services sipParamFilterProfile as a Test sipHeader to require action passthru all.
2. The SBC will generate SYS_ERROR when the confd iterator is not pointed to the profile.

Platform/Feature: SBC

The code is modified to read XML tag from the confd when the confd iterator is pointed to the profile.
104SBX-871192

The SAM Process may core.

Impact: The SAM Process cored due to a deadlock occurring in the SIPCM.

Root Cause: In one thread, the SSL_CTX_add_session() was trying to do cache cleanup and in another thread the SipCmOpenSSLSSessinCacheCleanup() was trying to do cache cleanup at the same time. If the cache entries exceed 20480, then the SSL_CTX_add_session() will start clearing old cache entries. At the same time, the SipCmOpenSSLSSessinCacheCleanup() is also removing entries from entries from cache. This resulted in deadlock.

Steps to Replicate: The steps cannot be replicated.

Platform/Feature: SBC

The code is modified to invoke SipCmOpenSSLSSessinCacheCleanup() only in standby mode.
105SBX-94146 / SBX-930923

Portfix SBX-93092: The npLogRotate (np log rotation) must occur on the basis of a log file size.

Impact: A New SWe_NP log used to be created everyday and used to get rotated after 10 log files. The rotation allowed very limited timeframe for SWe_NP debug log capturing.

Root Cause: The setting in npLogRotate was causing the issue.

Steps to Replicate: Analyse the SWe_NP debug logs.

Platform/Feature: SBC

Create a new SWe_NP log file when a previous file has exceeded certain size (i.e 50M) and not on a daily basis.
106SBX-91727 / SBX-914252

Portfix SBX-91425: Low MOS score on the ingress leg when both legs are recorded with LI.

Impact: Random packets losses are observed, when the called and calling number are set as LI during transcoded calls.

Root Cause: An uninitialized field of structure that is used to hold the incoming packet from DSP in SWe_NP was causing this behavior of a random packet drop.

Steps to Replicate:

  1. Setup was called and calling number as LI.
  2. Run the transcoded call.

Platform/Feature: SBC

Initialize the field correctly.
107SBX-942552

Updated the kernel configuration file that was not installed after the LSWU.

Impact: After the LSWU, the kernel configuration and grub menu is not updated properly as mentioned in the description.

Root Cause: Missing the kernel configuration and an invalid grub menu.

Steps to Replicate: Perform the LSWU and verify the grub menu and kernel configuration file in /boot.

Platform/Feature: SBC

Updated the grub menu and copied the kernel configuration after the LSWU.
108SBX-92346 / SBX-907222

Portfix SBX-90722: There was an inconsistency in generating the sonusSbxTrunkGroupOutOfResourcesNotification2 trap.

Impact: There was an inconsistency in the sonusSbxTrunkGroupOutOfResourcesNotification2 trap generation using the MTRG CAC.

Root Cause: Once the CAC resource usage reaches 100%, the SBC internally marks the congested flag and generates sonusSbxTrunkGroupOutOfResourcesNotification2 trap. During a call release, if the available/free CAC resource reaches above 15%, the SBC must disable the congestion flag. However, the SBC failed to disable/reset internal the congestion flag once the free resource reaches above 15% due to the failed generated trap. (This issue occurs only when the TG's cac callLimit is set to unlimited).

Steps to Replicate:

Procedure:
1. Run 10 calls.
2. Disconnect 2 calls.
3. Run another 2 calls.
4. Disconnect 2 calls.
5. Run another 2 calls.

Expected Result:
1. Trap must be generated when receiving the 10th call.
2. A disconnected call must be successful.
3. When receiving the 2nd call, trap must be generated.
4. Call disconnect must be successful.
5. When receiving the 2nd call, trap must be generated.

Platform/Feature: SBC

The code is modified to reset internal congestion flag when the CAC free resource reaches above 15%.
109SBX-922433

Upgrade failed from 7.1R0 to 8.1R0.

Impact: An upgrade failed between 7.1R0 to 8.1R0.

Root Cause: A mandatory node /eventLog{memusage}/servers{server1} is not created with an upgrade code.

Steps to Replicate: The steps cannot be replicated.

Platform/Feature: SBC

The code is modified to create a /eventLog{memusage}/servers{server1}.
110SBX-91729 / SBX-914672

Portfix SBX-91467: The SBC fails to populate statistics in the callCurrentStatistics under zone for the trunkgroup towards MRF. (Originated in release 8.1.0)

Impact: The SBC fails to populate statistics in the callCurrentStatistics under zone for the trunkgroup towards MRF.

Root Cause: There was code missing to populate statistics in the callCurrentStatistics under zone for the trunkgroup towards MRF

Steps to Replicate:

1) UAC sends an Invite with the PCMU.
2) UAS sends 180 Ringing without the SDP.
3) UAS sends 200 OK with the PCMA.
4) SBC sends an Invite with the m1=PCMU m2=PCMA towards the MRF.
5) MRF responds with 200 OK with m1=PCMU and m2=PCMA.
6) A PCMU-PCMA transcoded call is established.
7) Check the trunkgroupStatus for the TG towards MRF.
8) Check the callCurrentStatistics for the TG towards MRF.

Platform/Feature: SBC

The code is modified to increment the callCurrentStatistics on the MRF legs.
111SBX-92473 / SBX-915082

Portfix SBX-91508: The ASAN frees SipSgClearOtherForkedCalls. (Originated in release 8.1.0)

Impact: As part of the Call Forking testing, the SBC sends multiple requests as part of forking. When one of the forked leg answers the call, the SBC tries to clear the other forked calls. While clearing/releasing the call, some of the elements in the CCB forked structure are accessed/set even after the structure is freed.

Root Cause: This issue was reported as a part of the ASAN Testing on Call Forking regression suite in the SBC lab.

Steps to Replicate: This issue was reported as part of Call Forking feature with regression testing.

Platform/Feature: SBC

The code is modified to release the CCB forked structure at the end (after all the elements in the structure are accessed/set with the correct values).
112SBX-918932

The NOA fields for the redirecting number and the original called number are not supported in the SBC.

Impact: The NOA fields for redirecting number and original called number are not supported in X2 interception in the Service Instance messages and the Signaling Start messages.

Root Cause:

The following message types were never supported for NOA on the SBC:

Service Instance messages:
Calling Party Number
Called Party Number
Redirected From Party Number
Redirected To Party Number

Signaling Start messages:
Calling Party Number
Called Party Number
Last Redirecting Party
Original Called Party

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

A new CLI is added to support this feature.

set addressContext default intercept callDataChannel <cdc_name> 
noaParamSupport enabled/disabled

 

113SBX-93767 / SBX-934903

Portfix SBX-93490: The SBC duplicates the supported header in the outgoing OPTIONS.

Impact: The SBC duplicates the supported header in the outgoing OPTIONS.

Example:
Supported: timer,100rel,199,precondition,replaces,gruu
Supported: timer,100rel,199,precondition,replaces,gruu

Root Cause: When the gruu parameter was present, there was a logical issue in software that adds one additional Supported Header.

Steps to Replicate: For the Registered Endpoint, an OPTIONS message coming with supported Header having gruu parameter will cause this issue.

Platform/Feature: SBC

The code is modified so a duplicate entry is created for the supported Header.
114SBX-93687 / SBX-935722

Portfix SBX-93572: There was a LeakSanitizer in the NrmaSessDescClone.

Impact: There was a memory Leak while running the NrmaSessDescClone. Fax transmissions cannot be performed with T.38 relay mode, when the trunk group is configured as T.38FallbackToG711 and uses voice codec in the G.711-REGR.

Root Cause: As part of Additional offer creation, memory is getting added for session attributes and is not getting freed.

Steps to Replicate: Fax transmissions cannot be performed with T.38 relay mode, when the trunk group is configured as T.38FallbackToG711 and use a voice codec in the G.711-REGR.

Platform/Feature: SBC

Allocated memory is freed.
115SBX-93536 / SBX-934112

Portfix SBX-93411: The ASAN global-buffer-overflow on the address in __interceptor_vsnprintf.

Impact: This is an ASAN issue regarding the buffer overflow.

Root Cause: Boundary conditions are missing, leading to a buffer overflow.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The code is modified to add additional boundary conditions.
116SBX-92794 / SBX-922682

Portfix SBX-92268: The SBC fails to tear down a call towards the UAS until the 200 OK Invite timeout occurs when the MRF responds with a 3xx message.

Impact: The SBC fails to tear down a call towards the UAS until the 200 OK Invite timeout occurs when the MRF responds with a 3xx message.

Root Cause: The handling missing when the SBC receives a 3xx from the MRF server.

Steps to Replicate:

1) SBC must tear down a call towards the UAS upon receiving a 3xx from the MRF.

2) SBC must not wait for a 200 OK Invite timeout.

Platform/Feature: SBC

Disconnect the call immediately when the SBC receives a 3xx message from the MRF server.
117SBX-92336 / SBX-914462

Portfix SBX-91446: Observing a MAJOR logs flood related to SipSgRedundDeleteMrfCbData during the SSBC SWO. (Originated in release 8.1.0)

Impact: Changing to INFO from MAJOR.

Root Cause: Logs listed as INFO were kept as MAJOR.

Steps to Replicate:

  1. Initiate 1000 cps of load with 60 CHT.
  2. Once the calls are stable, initiate the SSBC SWO.

Platform/Feature: SBC

The code is modified to change unwanted MAJOR logs as INFO.
118SBX-91172 / SBX-908442

Portfix SBX-90844: The SBC must not add the 100 rel for the 180 Ringing without the SDP. (Originated in release 8.1.0)

Impact: The SBC must not add Require:100 rel for 180 Ringing when the other leg does not receive the provided E2E PRACK and the Dialog-Transparency are enabled.

Root Cause: The design was changed in between to handle 18x and PRACK leg specific.

Steps to Replicate:

  1. Enable the dialogTransparency on both egress and ingress leg.
  2. Enable the transcoderFreeTransparency flag on PSP.
  3. Enable the 'downstreamForkingSupport' flag on the egress leg.
  4. Keep the value of 'forkingBehavior' as 'lastProvResponse' in early media on Egress leg.
  5. Enable the preconditions flag on both TG. 6) Enable sdpAttributesSelectiveRelay on both TG.

Replication procedure -

  1. From the UAC, send an initial INVITE with Require header Require: 100rel
  2. From the UAS, send forked 18x with dialog d1.
  3. From the UAS, send 2nd forked 18x with dialog d2 and UPDATE from UAC for dialog d1 at the same time.
  4. Send the 3rd dialog 18x from UAS and 2nd dialog update from UAC at the same time.
  5. Send a 180 Ringing from UAS without sdp for dialog D1.

Platform/Feature: SBC

The code is modified so that the SBTM needs to relay behaviour for non-reliable 18x when the E2E PRACK and Dialog-Transparency are enabled.
119SBX-92881 / SBX-876072

Portfix SBX-87607: The SBC is unable to tear down the leg towards the MRF when the Malformed packet in a 200 OK is received with a 1 m line in the SDP from the MRF.

Impact: The SBC is unable to tear down the leg towards the MRF when the Malformed packet in a 200 OK is received with a 1 m line in the SDP from the MRF.

Root Cause: The handling is missing when the Malformed packet in a 200 OK is received with a 1 m line in the SDP from the MRF.

Steps to Replicate:

  1. USER A sends an INVITE with AMR.
  2. The SBC sends an INVITE to USER B.
  3. USER B responds with a 200 OK with EVRC codec in the SDP.
  4. The SBC sends an INVITE towards an MRF.
  5. MRF responds with a 200 OK with a 1 m line in the SDP.
  6. The SBC sends a BYE towards USER B and a 488 towards USER A.
  7. The SBC tear down the legs towards USER A and USER B, but unable to tear down the leg towards MRF.

Platform/Feature: SBC

Tear down the call when the Malformed packet in a 200 OK is received with the 1 m line in a SDP from the MRF.
120SBX-919873

Multiple 'CONFD_NOTIF_USER_SESSION' logs were in the app.latest.

Impact: Notification messages are printed in the logs.

Root Cause: Session logs are logged as MAJOR.

Steps to Replicate:

  1. Set the logs to Major.
  2. Log into the CLI.
  3. Check the logs and ensure session logs are not printed.

Platform/Feature: SBC

The code is modified to change session logs to DEBUG logs.
 

 

Known Issues

Known Issues in 07.02.02R000 to 07.02.03R001

There are no known issues in this release. 

Known Issues in 07.02.01R002 

The following issue exists in this release:

Known Issues

Issue IDSevProblem DescriptionImpact/Workaround
SBX-877402

LI call not working when standby MSBC is upgraded.

Platform/Feature: SBC

Impact: Interception of LI calls fail during upgrade (for instance, when the setup has S-SBC and the M-SBC running on different versions). The impact is only for in-service upgrade. No impact with respect to LI calls, when the VNF is brought down and re-created for upgrade..

Workaround: No workaround available.

Known Issues in 07.02.01F001 and 07.02.1F002 Releases

There are no known issues in these releases.

Known Issues in 07.02.01R001 Release 

The following issue exists in this release:

Known Issues

Issue IDSevProblem DescriptionImpact/Workaround
SBX-880031

 If there are any PRACK drops and call fails, a memory leak occurs.

Platform/Feature: SBC

Impact: In the rare case where a PRACK for 18x is dropped and the call eventually fails, a small leak of SCM memory can occur.

Workaround: No workaround available.

Known Issues in 07.02.01R000 Release 

The following issues exist in this release:

Known Issues

Issue IDSevProblem DescriptionImpact/Workaround
SBX-85825 2

When a headend cluster configuration is pushed, the Standby SBC reboots and hangs without getting the Configuration.

When a Standby SBC is rebooted, it transitions to registered online then later unregistered offline. This also happens in #1, Standby reboot after Configuration is pushed.

Platform/Feature: SBC Core: EMA

Impact: When a headend cluster configuration is pushed, Standby SBC fails to download the configuration and so fails to come up properly.

Workaround: To resolve the above issue, the fill rate and bucket size needs to be increased in lca.py script and the Standby SBC system needs to be rebooted so that it can download the configuration again.

SBX-863542

CallMedia and CallDetailstatus do not show in the EMA during the load run.

Platform/Feature: SBC Core: EMA

Impact: Call details Status and Call Media Status are intermittently not visible in the EMA.

Workaround: Call details status and Call Media status can be viewed from CLI.

SBX-852282

Observed M-SBC reboot and PrsProcess crash during 30000 NP based tones playing.

Platform/Feature: SBC Cloud

Impact: Under load with 30,000 simultaneous NP tones playing M-SBC switches over. M-SBC system confirmed to perform fine up to 28,000 simultaneous NP tones.

Workaround: No workaround available.

Known Issues in 07.02.00R002 Release 

The following issues exist in this release:

Known Issues

Issue IDSevProblem DescriptionImpact/Workaround
SBX-850713

The SBC did not like the <4K size INVITE PDU since the maxPduSizeValue = 6K.

Platform/Feature: SBC

Impact: A PDU of a size less than 6K is rejected with 400 Bad Request, when maxPduSizeValue is set to 6K.

Workaround: Increase the maxPduSizeValue to 15k.

SBX-770542

An LSWU Upgrade from 7.0 to 7.1 failed.

Platform/Feature: SBC 5000/7000 Series: Application

Impact: While upgrading from pre-7.1 releases to 7.1 and 7.2 releases, if the SNMP trap targets are setup with <space> in the name field then the upgrade fails. This affects all the platforms (SBC 5xxx/7xxx/SWe).

Workaround: Prior to the upgrade, the user must check and delete/replace any trap targets that are setup with <space> in the name.

SBX-86003

1

While UPDATE is pending and a subsequent 18x is received on Egress, the SBC includes SDP in the subsequent 18x on Ingress.

Platform/Feature: SBC Core: SIP Application

Impact: The peer may reject the call.

Workaround: No workaround available.

SBX-860942

Call fail after onhold and offhold.

Platform/Feature: SBC Core: SIP Application

 

Impact: A call onhold/offhold before being connected by Update may fail.

Workaround: Enable E2E Update.

 

SBX-858592

A race condition occurs under a 3x load scenario where MRF is configured as FQDN and none of the MRF server responds.

Platform/Feature: SBC: DSBC

Impact: The SCM process may core dump.

Workaround: No workaround available.



Known Issues in 07.02.00R001 Release 

The following issues exist in this release:

Known Issues

Issue IDSevProblem DescriptionImpact/Workaround
SBX-760662

The SBC is discarding media packets when the SBC is monitoring and media packets are received from IPV6 terminated peer.

Platform/Feature: SBC CE: Application

Impact:

The RTP monitoring feature will not work for IPv6 terminated peers, and therefore the following behavior will be observed.

  1. If The SBC is in tone playing state and expecting media cut through after successful monitoring, the SBC will continue the tone play even though the expected RTP packet count is received, which is discarded by the SBC because of this issue.
  2. If the SBC does not have conditions for delayed tone play, is not in tone playing state and is expecting media cut through after successful monitoring, the SBC will discard media packets because of this issue.
  3. If the SBC has conditions for delayed tone play, is not in tone playing state, and is expecting media cut through after successful monitoring, the SBC will discard media packets because of this issue and therefore the delayed tone play starts because of the monitoring failure.

Workaround: no workaround for IPv6, but the same feature works for IPv4.

SBX-850713

The SBC did not like the <4K size INVITE PDU since the maxPduSizeValue = 6K.

Platform/Feature: SBC

Impact: A PDU of a size less than 6K is rejected with 400 Bad Request, when maxPduSizeValue is set to 6K.

Workaround: Increase the maxPduSizeValue to 15k.

SBX-770542

An LSWU Upgrade from 7.0 to 7.1 failed.

Platform/Feature: SBC 5000/7000 Series: Application

Impact: While upgrading from pre-7.1 releases to 7.1 and 7.2 releases, if the SNMP trap targets are setup with <space> in the name field then the upgrade fails. This affects all the platforms (SBC 5xxx/7xxx/SWe).

Workaround: Prior to the upgrade, the user must check and delete/replace any trap targets that are setup with <space> in the name.

 

Known Issues in 07.02.00R000 Release

The following issues exist in this release:

Known Issues

Issue ID

Sev

Problem Description

Impact/Workaround

SBX-74179

 

1

Cannot ping the G/W from the V6 interface alternatively when Alt_IP's are configured in X710 NIC card server.

Platform/Feature: SBC CE: Application, Platform

Impact: IPv6 with X710 NIC cards in SRIOV mode will not work as multicast packets will be dropped by the PF.

Workaround:

Set the trust mode to "on" for all the VFs on the computes.

ip link set dev <PF name> VF <vf id> trust on

This needs to be done for all computes and all created VFs (this change is not persistent across reboots). This will allow Multicast promiscous mode to work.

Otherwise, add a static neighbor table entry on the remote servers connecting to the SBC using the following command:

ip -6 neigh add <IPv6 address> lladdr <link-layer address> dev <device>

SBX-73218

 

 1

The S-SBC is unable to register 1M endpoints with 1000 RPS and is having a 180 second refresh Register with RHEL 7.5, RHOSP 13 (Queens) setup.

Platform/Feature: SBC CE: Application

Impact: Virtual ports intermittently stop responding on compute node running on RHOSP 13 (Queens) under certain conditions. Specifically, at 1000 RPS with refresh registration interval at 180 seconds, virtual ports stop responding after reaching 500K registrations. This issue is not seen when the refresh registration interval is configured as 200 seconds and above

Workaround: Use SR-IOV ports only when using RHOSP 13 (Queens) release.

SBX-73943

 

2

The SBC does not add all codecs when Update is received with updated SDP from egress and sends 200 OK for Update with all supported codecs towards egress, the SBC is playing tone.

Platform/Feature: SBC Core: Application

Impact: The call signaling and media work properly, but media clipping can occur if the final cut-thru codec received from UAS is different from the codec that is being used for playing tone. 

Workaround: No workaround available.

SBX-74945

 4

Unable to commit pkt and sip-sig config with single commit command. An error message is thrown when the commit command is given.

Platform/Feature: SBC Core: CLI

Impact: Commit cannot be issued in for all set commands until the ipInterfacegroup is committed.

Workaround: Commit should be issued for ipInterfacegroup first and then commit for the remaining set commands can be executed.

SBX-73660

 

 2

Unable to view TRAPS under Fault Management in Cloud-ISBC (Openstack Nova Platform) in EMS.

Platform/Feature: SBC CE: Application, EMA/EMS

Impact: EMS will not be able to identify the trap since the source IP address is packet interface.

Workaround: Add a static route to EMS from the SBC through management interface.

SBX-725132

Memory congestion was observed when executing around 64K calls in the 32GB SWe system.

Platform/Feature: SBC SWe: SIP-Peering

ImpactOn a SWe system with 32GB 32vCPU, the SBC is only able to scale up to 60K calls instead of 64K, due to per call memory increase.

Workaround: No workaround available.

SBX-713032

Observing 503 response for more time post port SWO in S-SBC.

Platform/Feature: SBC CE: Application

Impact: The load is 1000cps/120K calls. After doing port SWO on S-SBC, SBX rejects calls with a 503 response for 86 seconds. Later SBX again responds with 503 responses for approx 36 seconds. After that, it stabilizes.

Workaround: No workaround available.

SBX-727362

The SBC is not able to handle 150 Sa/Sec IPsec load on the Yellowfin Platform.

Platform/Feature: SBC 5000/7000 Series: SIP

Impact: If the rate for IPsec SA setup using IKE is increased beyond 60 SA/s, errors are seen.

Workaround: No workaround available.

SBX-72652

 

2

The PSBC observing system is in continuous iRTT congestion during the overload test.

Platform/Feature: SBC CE: Application

Impact: IRTT congestion is observed continuously for the 15 mins duration of 3x overload. There is no congestion during normal 1x load. This is 1000cps/120K in DSBC (PSBC).

Workaround: No workaround available.

SBX-745462

The SBC failed to generate Enum lookup after updating the dynamic metaVariable.

Platform/Feature: SBC CE: Application

Impact: Enum lookup fails to generate if the meta variable related to sipSigPort (used for the Enum lookup) is dynamically updated.

Example:

Before updating sipSigPort with new dynamic metaVariable:

admin@vsbc1% show global servers lwresdProfile

lwresdProfile DEFAULT {

    description          DEFAULT;

    enumDomainNameLabel  DEFAULT_ZONE_LABEL;

    enableLwresdLog      disable;

    type                 signalingIp;

    addressContext       default;

    eDnsGlobalBufferSize 4096;

    eDnsMonitorInterval  120;

    zone                 ZONE_ING_V6;

    sipSigPort           3;

    ipInterfaceGroupName LIG_ING_V6;

}

admin@vsbc1% show addressContext default zone ZONE_ING_V6 sipSigPort

sipSigPort 3 {

    ipInterfaceGroupName      LIG_ING_V6;

    portNumber                5060;

    mode                      inService;

    state                     enabled;

    transportProtocolsAllowed sip-udp,sip-tcp;

    ipVarV6                   IF2.IPV6;

}

[root@VSBCSYSTEM-vsbc1 linuxadmin]# lsof -ni:5060

COMMAND     PID       USER   FD   TYPE  DEVICE SIZE/OFF NODE NAME

CE_2N_Com 32059 sonusadmin  110u  IPv6 3716854      0t0  UDP [fd00:10:6b50:5d20::c9]:sip

CE_2N_Com 32059 sonusadmin  111u  IPv6 3716855      0t0  TCP [fd00:10:6b50:5d20::c9]:sip (LISTEN)

CE_2N_Com 32059 sonusadmin  112u  IPv6 3716856      0t0  UDP [fd00:10:6b50:5d20::a9]:sip

CE_2N_Com 32059 sonusadmin  113u  IPv6 3716857      0t0  TCP [fd00:10:6b50:5d20::a9]:sip (LISTEN) 

ENUM query is successful from sipSigport (fd00:10:6b50:5d20::a9)

After updating sipSigport to new dynamic metaVariable:

admin@vsbc1> show table system metaVariableDynamic

CE NAME              NAME     VALUE                 

-----------------------------------------------------

vsbc1-10.34.195.109  lpl_egg  fd00:10:6b50:5d20::c9 

vsbc1-10.34.195.109  lpl_ing  fd00:10:6b50:5d20::c7 

admin@vsbc1% show addressContext default zone ZONE_ING_V6 sipSigPort

sipSigPort 3 {

    ipInterfaceGroupName      LIG_ING_V6;

    portNumber                5060;

    mode                      inService;

    state                     enabled;

    transportProtocolsAllowed sip-udp,sip-tcp;

    ipVarV6                   lpl_ing;

}

[root@VSBCSYSTEM-vsbc1 linuxadmin]# lsof -ni:5060

COMMAND     PID       USER   FD   TYPE  DEVICE SIZE/OFF NODE NAME

CE_2N_Com 32059 sonusadmin  110u  IPv6 3716854      0t0  UDP [fd00:10:6b50:5d20::c9]:sip

CE_2N_Com 32059 sonusadmin  111u  IPv6 3716855      0t0  TCP [fd00:10:6b50:5d20::c9]:sip (LISTEN)

CE_2N_Com 32059 sonusadmin  112u  IPv6 3716856      0t0  UDP [fd00:10:6b50:5d20::c7]:sip

CE_2N_Com 32059 sonusadmin  113u  IPv6 3716857      0t0  TCP [fd00:10:6b50:5d20::c7]:sip (LISTEN)

ENUM query is not picking new sipSigport (fd00:10:6b50:5d20::c7) updated with dynamic metaVariable


Workaround: Do not update the metavvariable associated with a sipSigPort if Enum is being used.

Example:

Don't update the sipSigport to new metaVariable

admin@vsbc1% show addressContext default zone ZONE_ING_V6 sipSigPort

sipsigPort 3 {

    ipInterfaceGroupName      LIG_ING_V6;

    portNumber                5060;

    mode                      inService;

    state                     enabled;

    transportProtocolsAllowed sip-udp,sip-tcp

    ipVarV6                   IF2.IPV6;

}

SBX-756092

The SBC VM is failing to join back the cluster post switchover after healing (Recreate_destroy) N:1 MSBC VM.

Platform/Feature: SBC CE: Install/Upgrade(Platform)

 Impact: The Ribbon VNF Manager provides functionality to manually heal a VM within an  orchestrated VNF.  There are a number of options for healing provided, including a Recreate_destroy option.  There is an issue if the Recreate_destroy is executed on a VM that has DHCP enabled on its interfaces.  In this case, the VM is provided new IP addresses, causing that VM to be unable to re-join in the cluster.

Workaround: There is no workaround that is not service impacting.  Do not execute the Recreate_destroy option on a VM that has DHCP enabled.

SBX-742692

The IPv6/v4 Interface update with a new dynamic meta Variable is not deleting the old IP address.

Platform/Feature: SBC CE: Application

Impact: The old IP address is not getting deleted when the ipInterfaceGroup is updated with new dynamic meta variable.

Example:

Before updating ipInterfaceGroup with dynamic metaVariable:

admin@vsbc1> show table system metaVariable | match IF2.IPV6

vsbc1-10.34.195.109  IF2.IPV6      fd00:10:6b50:5d20::a9 

admin@vsbc1% show addressContext default ipInterfaceGroup LIG_ING_V6

ipInterface PKT_ING_V6 {

    ceName      SSBCACTIVE;

    portName    pkt0;

    mode        inService;

    state       enabled;

    ipVarV6     IF2.IPV6;

    prefixVarV6 IF2.PrefixV6;

    vlanTagVar  IF2.VlanId;

}

pkt0.609  Link encap:Ethernet  HWaddr fa:16:3e:ee:70:92 

          inet6 addr: fd00:10:6b50:5d20::a9/60 Scope:Global

          inet6 addr: fe80::f816:3eff:feee:7092/64 Scope:Link

          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1

          RX packets:8954 errors:0 dropped:0 overruns:0 frame:0

          TX packets:9060 errors:0 dropped:0 overruns:0 carrier:0

          collisions:0 txqueuelen:0

          RX bytes:780288 (762.0 KiB)  TX bytes:902476 (881.3 KiB)                                                          

Creating dynamic metaVariable:

admin@vsbc1> show table system metaVariableDynamic

CE NAME              NAME  VALUE                 

--------------------------------------------------

vsbc1-10.34.195.109  lpl   fd00:10:6b50:5d20::cf 

vsbc1-10.34.195.110  lpl   fd00:10:6b50:5d20::ff 

[ok][2018-11-13 07:11:41]

After updating ipInterfaceGroup with dynamic metaVariable (lpl) old IP (IF2.IPV6) is not deleted from interface

admin@vsbc1% show addressContext default ipInterfaceGroup LIG_ING_V6

ipInterface PKT_ING_V6 {

    ceName      SSBCACTIVE;

    portName    pkt0;

    mode        inService;

    state       enabled;

    ipVarV6     lpl;

    prefixVarV6 IF2.PrefixV6;

    vlanTagVar  IF2.VlanId;

}

pkt0.609  Link encap:Ethernet  HWaddr fa:16:3e:ee:70:92 

          inet6 addr: fd00:10:6b50:5d20::a9/60 Scope:Global

          inet6 addr: fe80::f816:3eff:feee:7092/64 Scope:Link

          inet6 addr: fd00:10:6b50:5d20::cf/128 Scope:Global

          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1

          RX packets:9093 errors:0 dropped:0 overruns:0 frame:0

          TX packets:9209 errors:0 dropped:0 overruns:0 carrier:0

          collisions:0 txqueuelen:0

          RX bytes:792396 (773.8 KiB)  TX bytes:917382 (895.8 KiB)

 

Workaround: To change an addressContext ipInterfaceGroup to use a different ipVarV6 you must delete the ipInterfaceGroup and recreate it.

Example:

Delete the interface group:

 delete addressContext default ipInterfaceGroup LIG_ING_V6

Create interface group with new dynamic metaVariable:

admin@vsbc1% show addressContext default ipInterfaceGroup LIG_ING_V6

ipInterface PKT_ING_V6 {

    ceName      SSBCACTIVE;

    portName    pkt0;

    mode        inService;

    state       enabled;

    ipVarV6     lpl;

    prefixVarV6 IF2.PrefixV6;

    vlanTagVar  IF2.VlanId;

}

pkt0.609  Link encap:Ethernet  HWaddr fa:16:3e:ee:70:92 

          inet6 addr: fd00:10:6b50:5d20::cf/60 Scope:Global

          inet6 addr: fe80::f816:3eff:feee:7092/64 Scope:Link

          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1

          RX packets:9093 errors:0 dropped:0 overruns:0 frame:0

          TX packets:9209 errors:0 dropped:0 overruns:0 carrier:0

          collisions:0 txqueuelen:0

          RX bytes:792396 (773.8 KiB)  TX bytes:917382 (895.8 KiB)

 Note: Similar procedure for IPV4.

SBX-758473

The RTCP port is not transparently passed in Direct Media.

Platform/Feature: SBC Core: Application

Impact: In case of a Direct Media call, the SBC will add an RTCP port in the outgoing INVITE SDP, when RTCP is enabled on Egress PSP and the RTCP port was not received in the incoming INVITE SDP.

Workaround: Disable RTCP flag on Egress PSP.

set profiles media packetServiceProfile PSP_DM_DTLS rtcpOptions rtcp disabled


Known Limitations

The following limitations exist in this release:

  1. Due to a known EMA GUI issue, it can take up to 10 minutes to process each SMM rule when provisioning SMM on the SBC using the EMA. This will be fixed in a future release.

  2. The Access Control List (ACL) is not installed to configure SNMP traps for accepting traffic. A dynamic ACL is added to configure SNMP traps. An ACL must be installed for SNMP traps for accepting traffic.
  3. The physical NIC connectivity must be in active state at the hypervisor level before starting the SWe instance on the SBC SWe platforms. In case of SWe instance with SR-IOV interfaces, manual restart of the SWe instance is required if physical NIC connectivity goes down while the instance is in progress.
  4. The HA interface must not be configured with link localaddress or subnet.  

  5. The Antitrombone feature is not supported on the D-SBC.
  6. EMS identifies the nodes based on the VNFC-ID. While instantiating SBC/PSX cloud nodes, ensure that you use a unique VNFC-ID only. If you reuse an existing VNFC-ID, EMS treats this as a re-registration request and overwrites the existing data on the cloud node.
  7. While configuring the SBC SWe Cloud instances, the CLIs commits successfully even if any metaVariable provided is incorrect. The SBC SWe Cloud instance cannot validate the CLIs, as the CDB configuration file is stored in the SBC Configurator and is shared among all the other SBC SWe Cloud instances in the cluster.
  8. Editing IP Interface is not reflected in the if configuration (ifConfig). This behavior is observed only on the S-SBC when action is set to "dryup" mode on the IP Interface. The IP address changes are not updated in the kernel and will not be displayed when ifconfig linux command is executed. In case of S-SBC, if the ipInterface configuration needs to be modified and if the action is set to "dryup" in ipInterface configuration, it must be set to "force" before disabling the ipInterface and making any changes.
  9. A LSWU on an SBC 7000 should only be performed when the total number of active calls on the system is below 18,000. If the criteria is not met, a double failure during the upgrade may occur thereby losing all active calls. If such a failure occurs, both active and standby SBC services will go down.  Contact Ribbon Support immediately.

The VLAN tagged SRIOV packet interfaces are unable to ping endpoint Gateway IPs in the VMware platform because of an issue with VMWare.

Performing Heat Stack Update when userdata is Updated with SSH Keys

When upgrading SBC SWe cloud instances to release 7.2, you must update your Heat template userdata section to include mandatory SSH key information. An issue in OpenStack requires that you use the stack-update process rather than re-launch after updating the template, which leads to a new UUID for the instance. As a result, you must regenerate and apply new license bundles to the upgraded instances during the upgrade.

Refer to Upgrading M-SBCs in an N:1 Redundancy Group for the relevant procedure. 

Restricted Functionality with SBC

The following functionalities are not supported with SBC Microservices:

  1. SRTP
  2. Far end NAT traversal
  3. DTMF inter-working
  4. RTCP termination for pass-through calls
  5. Direct Media and Antitrombone
  6. NICE, SIP-REC
  7. Rx, Rf interfaces
  8. Multimedia - MSRP, BFCP  
  9. Fax detection
  10. ICE/STUN
  11. SIP REFER
  12. SIP REPLACE
  13. Two stage calls

  14. H323 support
  15. GW signaling support
  16. Network Licensing Limitations

After switchover during grace period, when the new standby SBC comes up and establishes itself as standby, there is a short period (a few minutes) when the standby is synchronized for normal operation, but the new standby has not yet completed establishing its licensing state using the grace license information. If there is a second SBC switchover during that window, the new active SBC (which became active before completing license state synchronization) will lose calls until it re-acquires the grace licenses.

For configuring Network Wide Licensing, refer to Configuring Network Wide Licensing on D-SBC. This procedure is common for D-SBC and SBC.

  • No labels