In this section:
This document describes how to resolve integration issues that can occur with the Microsoft Teams Direct Routing interface for connecting the Ribbon SBC Edge 1000/2000 to Microsoft Teams.
Overview
Microsoft Teams Direct Routing allows a direct connection between a supported, customer-provided SBC and the Microsoft Cloud in which services are provided to Teams calling clients. Microsoft has certified the SBC 1000/2000 for use with Teams Direct Routing. Perform the steps that follow to identify and investigate integration issues.
The signaling groups configured for Microsoft Teams Direct Routing include counters for SIP request and response messages related to incoming and outoing options. As the SBC Edge 1000/2000 operates with Microsoft Teams Direct Routing, these message counters show increasing numbers. Complete the following steps to check the message counts and investigate potential sources of related integration issues.
Confirm the FQDN used in the SIP Profile > FQDN in the Contact Header field resolves to the SBC public IP address.
For Microsoft Teams, the Signaling Group facing the Teams server must be configured as SBC Edge FQDN or Static (if there is more than one signaling group connected to Teams Direct Routing). The FQDN in Contact Header should be the same FQDN used in Office 365 Tenant Online Gateway. If the IP Address of the SBC is configured in the Contact Header instead of the FQDN of the SBC, a Forbidden message is received.
Check the message count in Outgoing 2xx. If the number is increasing, changes you made during validation have resolved the integration issue(s).
Complete the following steps to place a test call:
In the left navigation pane, click Test a Call.
Configure the parameters for test calls as in the following table:
Click OK; the call should ring the Teams Client
If the test call does not ring the Teams client:
Check that the SBC IP routing is properly configured.
Confirm that the firewall is properly configured to allow incoming SIP TLS messages.
Confirm that the federated IP addresses are properly configured.
Resolution: The EDGE browser did not have Admin Access to the MIC.
Steps To Fix:
Admin access is required to access the Privacy settings. Contact your IT administrator if you need help to get Admin privileges.
Under Choose which apps can access your microphone, turn on or off the individual settings for apps and services.
Verify that the Outbound NAT is enabled and configured with the proper IP address:
When ForwardPAI is enabled on the Tenant CsOnlinePSTNGateway, Microsoft adds a PAI and Privacy SIP header on the outbound call to the SBC. RFC 3325 defined the 'id' value for the Privacy header, which is used to request the network remove the P-Asserted-Identity header field.
Different behavior may be required, as follows:
For ISDN: Add a transformation table entry to set the Calling Presentation "Allowed", otherwise the called party sees the calling number as anonymous.
If Early Media is enabled, disable Early Media on the Teams Direct Routing SIP Signaling Group. This is a known Direct Routing issue until a fix is provided from Microsoft.
If call forwarding is failing, use the following SBC releases:
Microsoft Teams does not properly support a=sendonly in the Re-INVITE SDP for hold. If the local SIP endpoint uses a=sendonly, use the following SMM:
Create the following SIP Message Rule Table:
In this table, create the following entry:
Assign the newly created SIP Message Rule Table to the Outbound Message Manipulation in the Teams SIP Signaling Group.
Modified: for 8.1.5
You should verify that your Teams client display the Location under the Teams settings. Go to Teams Client > Settings > Calls > Scroll down to the bottom of the menu. You should see the Emergency Address Location.
On the laptop running the Teams Client:
Access http://www.myipaddress.com/what-is-my-ip-address/ and take note of the Teams Client Public IP address.
Start a Command terminal, type the following command, and take note of the Teams Client internal IPv4 Address and Subnet Mask.
ipconfig
Verify the Teams Public IP address displayed earlier is listed. Type the following Office 365 Powershell command:
Get-CsTenantTrustedIPAddress
Verify the internal IPv4 Address and Subnet Mask displayed earlier is listed. Type the following Office 365 Powershell command:
Get-CsOnlineLisSubnet
For a Teams client located inside the corporate network: Place a call to the Carrier access on the Downstream SBC. If the call has media optimization, the Proxy SBC's Monitor screen displays DA; this indicates the media is direct between the Teams client and the Downstream SBC (see below). If the Proxy SBC's Monitor screen displays B, the Proxy SBC proxies the media and the media is not optimized.
Modified: for 8.1.5
If the Location is not properly set:
Start a Command terminal, type the following command, and take note of the Teams Client internal IPv4 Address and Subnet Mask.
ipconfig
Connect Office 365 Tenant via Powershell.
Verify the Public IP address displayed earlier is listed when you type the following Office 365 Powershell command:
Get-CsTenantTrustedIPAddress
Verify the internal IPv4 Address and Subnet Mask displayed earlier is listed when you type the following Office 365 Powershell command:
Get-CsTenantNetworkSite