In this section:
This Best Practice applies to deployments in Microsoft Azure only and does not apply to on-premises deployments. For on-premises deployments, refer to Best Practice - Configuring SBC Edge for Microsoft Teams Phone System Direct Routing On-Premises Deployment.
This Best Practice details the configuration required for an
SIP trunk from a third-party provider (PSTN)
From the Azure public cloud, the
The
*Note: Media bypass support in Azure is a planned future feature; media bypass is available for on-premises deployments immediately.
Microsoft Teams Direct Routing Media Bypass is not supported when the SBC SWe Lite is hosted in Azure due to the lack of static NAT support.
Deploy the SBC SWe Lite in Azure Marketplace. Refer to: Running a SWe Lite via Microsoft Azure Marketplace.
Consult the Microsoft documentation for the Direct Routing interface configuration guidelines, including the RFC standards and the syntax of SIP messages.
Requirements for configuring the SBC Edge in support of Teams Direct Routing include:
The SBC FQDN must be from one of the Domain names registered in “Domains” of the Tenant. The table below lists Domain Name examples.
Do not use the *.onmicrosoft.com tenant for the domain name.
Users may be from any SIP domain registered for the tenant. For example, you can configure user user@SonusMS01.com with the SBC FQDN name sbc1.hybridvoice.org, as long as both names are registered for the tenant.
Verify the correct domain name is configured for the Tenant. The correct domain name is required for the SBC to pair with Microsoft Teams.
The following section details the requirements for ports, protocols and services for firewalls in the path of Direct Routing calls.
Firewall settings may be referenced and applied at any time before, during or after the SBC configuration, but the settings must be applied before Direct Routing services take affect.
Ribbon recommends the deployment of the SBC Edge product (including the SBC SWe Lite) behind a firewall, within the DMZ, regardless of the assignment of a public IP to the SBC in question. Refer to SBC Edge Security Hardening Checklist for more information about the SBC and firewalls.
SIP TLS: TCP 5061*
DNS: TCP 53
DNS: UDP 53
NTP: UDP 123
SIP TLS: TCP 5061
Media: UDP 49152-53247
The tables below represent ACL (Access Control List) examples that protect the SBC Edge; these attributes are automatically provisioned if the Teams-related Easy Configuration wizards are used (applies to the greenfield deployment scenario only).
** Depends of the Media Port paired configured in SBC
Configure the Firewall per Basic Firewall Settings for All Call Flows, and then apply the updates below.
The Teams Client IP address cannot be predicted. As a result, allow Any IP (0.0.0.0/0).
Media for SBC 1000: UDP 17586-21186**
Media for SBC 2000: UDP 19386-28386**
Media: UDP 50000-50019
If the device that handles the NAT between the Teams Client and SBC Public IP is performing PAT (
), verify that this device has the source port range of the Teams Client media or open all the ports from 1024 to 65535.The tables below represent ACL (Access Control List) examples that protect the SBC Edge; these ACL attributes are automatically provisioned if the Teams-related Easy Configuration wizards are used (applies to the greenfield deployment scenario only).
** Depends of the Media Port paired configured in SBC
Assign a Static Public IP address on the media interface in Azure for Microsoft Teams Direct Routing.
These instructions assume the SBC SWe Lite has been deployed in Azure Marketplace. Refer to Running a SWe Lite via Microsoft Azure Marketplace.
Click the desired VM to be used for Microsoft Teams Direct Routing.
Under Settings, click Networking to open the media interface.
Click on the network interface.
Under Settings, click IP Configuration.
From the Public IP address settings option, select Enabled.
From the Choose public IP address window, click Create new.
From the Create public IP address window and the Assignment options, select Static.
Run the Easy Configuration Wizard to deploy a Microsoft Teams Direct Routing scenario. Refer to the following configurations under Working with SBC Easy Configuration:
IP Routing must be customized in the SBC SWe Lite for Microsoft Teams Direct Routing in Azure. Two options are available for configuration:
When using multiple NICs on the SBC SWe Lite, Azure designates the first Network's Interface as the Primary Network Interface. Only the Primary Network Interface receives a network default gateway and routes via DHCP. To assign the Network Default Route on another Subnet, you must designate another Network's Interface as the Primary Network Interface.
To assign the network default route, refer to Change Azure Default Route.
Add a static route for the traffic to the following IP address and Mask: 52.112.0.0/14 (52.112.0.0/255.252.0.0).
For details on creating Static Routes, refer to Creating Entries in a Static IP Route Table.
Add the following Static Route using your media interface:
Destination IP: 52.112.0.0
Mask: 255.252.0.0
Gateway: 10.1.9.1
For details on IP Interfaces, refer to Managing Logical Interfaces
Ensure that all network interfaces are configured as follows:
DHCP Options to Use: IP Address and Default Route.
For details on Signaling Groups, refer to Creating and Modifying SIP Signaling Groups.
Before configuring Outbound NAT Traversal, obtain the Public IP address for your network (the Public IP address specified in the screen graphic is an example only).
Configure the Outbound Static NAT for all Signaling Groups that use an interface with a Public IP address (at the minimum for the Microsoft Teams Direct Routing Signaling Groups).
From the NAT Public IP (Signaling/Media) drop down list, enter the Public IP Address assigned on this media port (the Public IP used in the screen is an example only; use the Public IP for your network).
Hosting SBC in Microsoft Azure reduces the need for Direct Routing Media Bypass (Media Bypass in Azure is not recommended but will be supported in a future release). As a result, ICE Lite and RTCP Multiplexing must be disabled on the Teams Direct Routing Signaling Group, as follows:
Select the Signaling Group used for Microsoft Teams Direct Routing.
From the RTCP Multiplexing drop-down list, select Disable.
From the ICE Support drop down list, select Disabled.
Click OK.
Place a test call and verify the operation via Confirm the configuration. For troubleshooting steps, refer to Best Practice - Troubleshoot Issues with Microsoft Teams Direct Routing.