These instructions apply to the SBC 1000/2000 and SBC SWe Edge.
Overview
TheStep 1: Review Prerequisites/Guidelines
Prerequisites
- SBC 1000/2000 Release 9.0.2 or later, or
- SBC SWe Edge Release 11.0 or later
Guidelines
- Any pair of gateways being monitored will be considered a primary/backup route pair. No other static route should use either of these gateways.
- Only IPv4 will be supported; IPv6 cannot be configured for link monitoring.
- This feature supports SBC 1000 v2 version, SBC 2000 and SBC SWe Edge.
It is assumed that management traffic utilizes an interface on a private network.
Step 2: Install SBC Edge
These instructions assume the SBC 1000/2000 or SBC SWe Edge is installed and running. If the product is not installed, refer to the links below.
Table
Installation RequirementsProduct | Installation |
---|---|
SBC SWe Edge | On KVM: Installing SBC SWe Edge on KVM Hypervisor On VMware ESXi: Installing SBC SWe Edge on VMware ESXi On Hyper-V: Installing SBC SWe Edge on Microsoft Hyper-V |
SBC 1000 | Installing the SBC 1000 Hardware |
SBC 2000 |
Step 3: Configure SBC Edge
For Internet Resiliency (Default Backup Route), the following components need to be configured in the
Access WebUI
- Access the WebUI.
- Configure the components detailed below.
Configure Network Interfaces
Configure Network Interfaces as follows:
- In the left navigation pane, go to Node Interfaces > Logical Interfaces.
Configure two network interfaces connected to ISP A and ISP B. For details on configuring Logical Interfaces, refer to: Configuring and Modifying Logical Interfaces.
Default Routes
This step is to create two routes: primary (primary ISP) and secondary (secondary ISP). The ability to add a secondary route is enabled provided both the primary and backup routes are configured with different metric values. The route with the lowest metric value is the highest priority and will always be considered the primary default route.
Create the default routes as follows:
- In the left navigation pane, go to Protocols > IP > Default Routes.
- Create two routes. For details on configuring Default Routes, refer to: Managing Static IP Route Tables.
- Assign Metric Value of 1 to the Gateway associated with ISP A - Primary.
Assign Metric Value of 2 to the Gateway associated with ISP B - Backup.
Link Monitors
Create three Link Monitor Entries, one for each default gateway and one for the Monitored Host:
- In the left navigation pane, go to Protocols > Network Monitoring > Link Monitors.
Create Link Monitors. For details on configuring Link Monitors, refer to: Managing Link Monitor Configuration Tables.
Set the Link Monitor Type to Backup Default Route.
SIP Server Tables
For additional details for connecting the SBC Edge to Microsoft Teams refer to: Connect SBC Edge to Microsoft Teams Direct Routing.
The solution requires two identically configured SIP Server tables pointing to Microsoft Phone System. One table will be used for Primary and one for Backup connection to Microsoft.
- In the left navigation pane, go to SIP > SIP Server Tables.
Create two identical SIP Server tables pointing to the Microsoft Phone System. For details on configuring SIP Server Tables, refer to: Managing SIP Server Tables.
Signaling Groups
Two signaling groups are required to connect the SBC Edge with Microsoft Teams: Microsoft Teams Primary and Microsoft Teams Backup.
Create the two SIP Signaling Groups as follows:
- In the left navigation pane, go to Signaling Groups.
Create two SIP Signaling Groups pointing to the Microsoft Phone System. For details on configuring SIP Signaling Groups, refer to Managing SIP Signaling Groups.
- Associate the Microsoft Teams Primary Signaling Group with the Network Interface connected to ISP A.
Associate the Microsoft Teams Backup Signaling Group with the Network Interface connected to ISP B.
Call Routing
This step verifies the Call Routing table entry responsible for routing calls to Microsoft Teams is configured with the two destination Signaling Groups (Microsoft Teams Primary and Microsoft Teams Backup).
Verify the Call Routing entries as follows:
- In the left navigation pane, go to Call Routing.
Ensure the Call Routing Table entry responsible for routing calls to Microsoft Teams is configured with two Destination Signaling Groups (Teams Primary and Teams Backup). For details on configuring Call Routing Tables, refer to Managing Call Routing Tables.
Step 4: Configure Microsoft Teams
The following elements require configuration for Internet Resiliency (Backup Default Route) in the SBC Edge and Microsoft Teams.
Session Border Controllers
The solution requires two Session Border Controllers (SBCs) entries configured on Microsoft Phone System. Use the following specifications for configuration:
SBC1 needs to be associated with the Public IP address assigned to the SBC Edge by ISP A and SBC2 needs to be associated with the Public IP address assigned to the SBC Edge by ISP B.
The two entries cannot share the same SIP signaling port. For example, use port 5061 to configure SBC1 and port 5062 to configure SBC2.
Ensure the SIP Signaling Group Listening Ports in the SBC Edge are configured to match the Microsoft Phone System SIP Signaling ports. For details on SIP Signaling Groups, refer to Managing SIP Signaling Groups.
Voice Route
Ensure that both SBC1 and SBC2 are enrolled in the Microsoft Teams voice route that is used to reach the SBC Edge.
Step 4: Verify System Failover for Internet Resiliency
Use the following procedure to verify the Internet Resiliency (Default Backup Route) configuration has been successfully created.
- Ensure that both Primary and Backup network connection paths are available via Link Monitor Table (under Service Status). For how to view the Link Monitor table, refer to Managing Link Monitor Configuration Tables.
- Verify that outgoing and incoming calls are working as follows:
- Make a call from the SIP Client to a Microsoft Teams user.
- Verify voice transmission in both directions.
- Disconnect the call. Ensure the connection is terminated on both clients
- Repeat the steps in reverse direction – Microsoft Teams user to the SIP Client.
- Terminate the Primary network connection by disabling the network interface or unplugging the network cable.
- Allow the system to fail over to Backup Connection.
- Verify that both outgoing and incoming calls are working. Refer to step 2.
- Restore network connectivity on the primary path.
Perform manual system switch back to Primary Gateway (from the Link Monitor table, click Switch Back to Primary Gateway).
For detailed instructions on using the Switch Back to Primary Gateway option, refer to Creating and Modifying Link Monitor Configuration Table Entries.
- Verify that both outgoing and incoming calls are working. Refer to Step 2.
Step 6: Switch Back to Primary Gateway - What to Expect Next
For a Failover to the Default Backup Gateway, the system automatically reconfigures the Default Gateway from the Primary to the Backup whenever the network failure on the Primary Link is detected. The gateway change triggers the Primary Microsoft Teams Signaling Group to go Down and the backup Microsoft Teams Signaling Group to became Active.
Manual Switch Back to Primary Signaling Group
The system will not make any automatic network configuration changes when the Primary Microsoft Teams Signaling Group Link is restored. The backup Microsoft Team Signaling Group will continue to be used until the Gateway change is manually initiated or the secondary route also fails. Initiate the Gateway change from the Web UI as follows:
- Access Protocols > Network Monitoring > Link Monitors.
- Click Switch Back To Primary Gateway.
These instructions apply to the SBC 1000/2000 and SBC SWe Edge.
Overview
TheStep 1: Review Prerequisites/Guidelines
Prerequisites
- SBC 1000/2000 Release 9.0.2 or later, or
- SBC SWe Edge Release 11.0 or later
Guidelines
- Any pair of gateways being monitored will be considered a primary/backup route pair. No other static route should use either of these gateways.
- Only IPv4 will be supported; IPv6 cannot be configured for link monitoring.
- This feature supports SBC 1000 v2 version, SBC 2000 and SBC SWe Edge.
It is assumed that management traffic utilizes an interface on a private network.
Step 2: Install SBC Edge
These instructions assume the SBC 1000/2000 or SBC SWe Edge is installed and running. If the product is not installed, refer to the links below.
Table
Installation RequirementsProduct | Installation |
---|---|
SBC SWe Edge | On KVM: Installing SBC SWe Edge on KVM Hypervisor On VMware ESXi: Installing SBC SWe Edge on VMware ESXi On Hyper-V: Installing SBC SWe Edge on Microsoft Hyper-V |
SBC 1000 | Installing the SBC 1000 Hardware |
SBC 2000 |
Step 3: Configure SBC Edge
For Internet Resiliency (Default Backup Route), the following components need to be configured in the
Access WebUI
- Access the WebUI.
- Configure the components detailed below.
Configure Network Interfaces
Configure Network Interfaces as follows:
- In the left navigation pane, go to Node Interfaces > Logical Interfaces.
Configure two network interfaces connected to ISP A and ISP B. For details on configuring Logical Interfaces, refer to: Configuring and Modifying Logical Interfaces.
Default Routes
This step is to create two routes: primary (primary ISP) and secondary (secondary ISP). The ability to add a secondary route is enabled provided both the primary and backup routes are configured with different metric values. The route with the lowest metric value is the highest priority and will always be considered the primary default route.
Create the default routes as follows:
- In the left navigation pane, go to Protocols > IP > Default Routes.
- Create two routes. For details on configuring Default Routes, refer to: Managing Static IP Route Tables.
- Assign Metric Value of 1 to the Gateway associated with ISP A - Primary.
Assign Metric Value of 2 to the Gateway associated with ISP B - Backup.
Link Monitors
Create three Link Monitor Entries, one for each default gateway and one for the Monitored Host:
- In the left navigation pane, go to Protocols > Network Monitoring > Link Monitors.
Create Link Monitors. For details on configuring Link Monitors, refer to: Managing Link Monitor Configuration Tables.
Set the Link Monitor Type to Backup Default Route.
SIP Server Tables
For additional details for connecting the SBC Edge to Microsoft Teams refer to: Connect SBC Edge to Microsoft Teams Direct Routing.
The solution requires two identically configured SIP Server tables pointing to Microsoft Phone System. One table will be used for Primary and one for Backup connection to Microsoft.
- In the left navigation pane, go to SIP > SIP Server Tables.
Create two identical SIP Server tables pointing to the Microsoft Phone System. For details on configuring SIP Server Tables, refer to: Managing SIP Server Tables.
Signaling Groups
Two signaling groups are required to connect the SBC Edge with Microsoft Teams: Microsoft Teams Primary and Microsoft Teams Backup.
Create the two SIP Signaling Groups as follows:
- In the left navigation pane, go to Signaling Groups.
Create two SIP Signaling Groups pointing to the Microsoft Phone System. For details on configuring SIP Signaling Groups, refer to Managing SIP Signaling Groups.
- Associate the Microsoft Teams Primary Signaling Group with the Network Interface connected to ISP A.
Associate the Microsoft Teams Backup Signaling Group with the Network Interface connected to ISP B.
Call Routing
This step verifies the Call Routing table entry responsible for routing calls to Microsoft Teams is configured with the two destination Signaling Groups (Microsoft Teams Primary and Microsoft Teams Backup).
Verify the Call Routing entries as follows:
- In the left navigation pane, go to Call Routing.
Ensure the Call Routing Table entry responsible for routing calls to Microsoft Teams is configured with two Destination Signaling Groups (Teams Primary and Teams Backup). For details on configuring Call Routing Tables, refer to Managing Call Routing Tables.
Step 4: Configure Microsoft Teams
The following elements require configuration for Internet Resiliency (Backup Default Route) in the SBC Edge and Microsoft Teams.
Session Border Controllers
The solution requires two Session Border Controllers (SBCs) entries configured on Microsoft Phone System. Use the following specifications for configuration:
SBC1 needs to be associated with the Public IP address assigned to the SBC Edge by ISP A and SBC2 needs to be associated with the Public IP address assigned to the SBC Edge by ISP B.
The two entries cannot share the same SIP signaling port. For example, use port 5061 to configure SBC1 and port 5062 to configure SBC2.
Ensure the SIP Signaling Group Listening Ports in the SBC Edge are configured to match the Microsoft Phone System SIP Signaling ports. For details on SIP Signaling Groups, refer to Managing SIP Signaling Groups.
Voice Route
Ensure that both SBC1 and SBC2 are enrolled in the Microsoft Teams voice route that is used to reach the SBC Edge.
Step 4: Verify System Failover for Internet Resiliency
Use the following procedure to verify the Internet Resiliency (Default Backup Route) configuration has been successfully created.
- Ensure that both Primary and Backup network connection paths are available via Link Monitor Table (under Service Status). For how to view the Link Monitor table, refer to Managing Link Monitor Configuration Tables.
- Verify that outgoing and incoming calls are working as follows:
- Make a call from the SIP Client to a Microsoft Teams user.
- Verify voice transmission in both directions.
- Disconnect the call. Ensure the connection is terminated on both clients
- Repeat the steps in reverse direction – Microsoft Teams user to the SIP Client.
- Terminate the Primary network connection by disabling the network interface or unplugging the network cable.
- Allow the system to fail over to Backup Connection.
- Verify that both outgoing and incoming calls are working. Refer to step 2.
- Restore network connectivity on the primary path.
Perform manual system switch back to Primary Gateway (from the Link Monitor table, click Switch Back to Primary Gateway).
For detailed instructions on using the Switch Back to Primary Gateway option, refer to Creating and Modifying Link Monitor Configuration Table Entries.
- Verify that both outgoing and incoming calls are working. Refer to Step 2.
Step 6: Switch Back to Primary Gateway - What to Expect Next
For a Failover to the Default Backup Gateway, the system automatically reconfigures the Default Gateway from the Primary to the Backup whenever the network failure on the Primary Link is detected. The gateway change triggers the Primary Microsoft Teams Signaling Group to go Down and the backup Microsoft Teams Signaling Group to became Active.
Manual Switch Back to Primary Signaling Group
The system will not make any automatic network configuration changes when the Primary Microsoft Teams Signaling Group Link is restored. The backup Microsoft Team Signaling Group will continue to be used until the Gateway change is manually initiated or the secondary route also fails. Initiate the Gateway change from the Web UI as follows:
- Access Protocols > Network Monitoring > Link Monitors.
- Click Switch Back To Primary Gateway.