In this section:
Overview
The Direct Routing Survivable Branch Appliance (SBA) is a Ribbon Communications SBC 1000/2000 offer accomplished through close cooperation with Microsoft®. The SBA allows Direct Routing telephony services to remain available to Teams clients during a connectivity outage with Microsoft® 365 Phone System.
Ribbon recommends upgrading the ASM to Windows Server 2019, which has a few benefits: it is still supported by Microsoft and will get vulnerability fixes. Microsoft ended general support for Windows Server 2012R2 and it may not provide fixes to vulnerabilities.
SBC 1000/2000 Direct Routing SBA offers Direct Routing call services to Teams clients
Direct Routing SBA - Quick Facts
Direct Routing SBA is available on SBC 1000/2000 Release 9.0.1 and later.
Contact your authorized Ribbon sales representative/partner for more information regarding approved SBC 1000/2000 Direct Routing SBA platforms and acquisition.
Direct Routing SBA Facts | Details |
---|---|
Platforms Supported | The Direct Routing SBA is available in select SBC 1000/2000 platforms that feature a late model Application Solution Module ;
|
How SBA is Offered | The Direct Routing SBA is offered in a physical appliance format; the SBA is not available within the SBC SWe Edge |
SBA Deployment | The Direct Routing SBA should be deployed on the same site as an SBC connected to a Direct Routing |
SBA Services | The following services are available to Teams clients from the SBA
|
Local Media/Media |
|
Prerequisites
Direct Routing
The Direct Routing SBA must have access to Azure AD, which must be created and enabled on Azure before SBA deployment.
NoteYou must have an Application (client) ID (appId) and an Application Secret (secret) from the Microsoft Azure portal to complete the deployment.
The Microsoft Teams Tenant should be configured for Direct Routing. Refer to https://docs.microsoft.com/en-us/microsoftteams/direct-routing-configure for more information;
The Microsoft Teams Tenant should be configured for Direct Routing SBA. Refer to: https://docs.microsoft.com/en-us/microsoftteams/direct-routing-landing-page.
Direct Routing SBA requires an Internet link to connect the Teams tenant.
Direct Routing SBA (capable of SBC 1000 or SBC 2000)
Hardware and License
Please confirm:
Licenses for the following features must be activated before deployment:
SIP sessions
Direct Routing SBA
SBC and SBC Communication service must be on Ribbon SBC Edge Portfolio Release 9.0.1.
Confirm that your ASM features a licensed Windows Server 2019 or 2012R2 License copy.
NoteRibbon recommends upgrading the ASM to Windows Server 2019, which has a few benefits: it is still supported by Microsoft and will get vulnerability fixes. Microsoft ended general support for Windows Server 2012R2 and it may not provide fixes to vulnerabilities.
Confirm that your ASM is loaded with the Office 365 Direct Routing SBA image.
Example of the Windows License and Office 365 Direct Routing SBA Image Type
Please take the following actions to convert a Lync 2013/Skype for Business 2015-related ASM to support the Direct Routing SBA:
Update the recovery partition using the abovementioned image: Updating the ASM Recovery Partition.
Reinitialize the ASM: Re-initializing the ASM.
Only apply an ASM_Teams_update.pkg once the SBA is fully deployed.
Name Resolution
Public or Private FQDN that point Direct Routing SBA IP. No Public IP is required for the Direct Routing SBA.
Direct Routing SBA should resolve SBC Public FQDN with an address it can access; this is completed automatically for the SBC that hosts the ASM.
If you use a Private FQDN for Direct Routing SBA:
The SBC must be configured to use the DNS hosting this Private zone.
You can not use a Public certificate for Direct Routing SBA, so Direct Routing SBA can not share the SBC Public certificate.
Encryption-Related Certificates
Microsoft requires an SHA256 certificate for Direct Routing SBA in order to establish a TLS connection with SBC. There are several options:
Shared SBC Public certificate (recommended). This is only possible if your SBC certificate is matching one of the following 2 options:
SBC Certificate is a Wildcard certificate
i.e., SBC Certificate Common Name "CN: *.mydomain.com" or SBC Certificate Subject Alternative Name "SAN: *.mydomain.com".
SBC Certificate has a SAN for Direct Routing SBA
i.e., SBC Certificate Common Name "CN: sbc.mydomain.com" and SBC Certificate Subject Alternative Name "SAN: sba.mydomain.com."
Use an existing Public or Private Certificate that covers Direct Routing SBA FQDN.
Create a new Public or Private Certificate that covers Direct Routing SBA FQDN. In this case, a Public or Private Certificate Authority must be ready to sign the certificate for Direct Routing SBA.
When using a private certificate for the SBA, please ensure that it meets these requirements:
The CN (Common Name or Subject) must contain the SBA FQDN.
The SAN (Subject Alternative Name) must also contain the SBA FQDN.
Firewall Protocols and Ports
Microsoft requires the following ports to be open on the firewall for the SBA server to communicate with the Teams client, the SBC, the NTP server, or Microsoft 365:
- Port 443
- Port 3443
- Port 4444
- Port 5061
- Port 8443
- UDP Port 123
- SRTP/UDP Port 5000 or higher
- SRTP/UDP Port 16384 or higher
- The firewall must also allow ICMP requests from the SBA to Microsoft, and ICMP replies from Microsoft to the SBA.
Microsoft reserves the right to update the port numbers. For more information, refer to: https://learn.microsoft.com/en-us/microsoftteams/direct-routing-survivable-branch-appliance.
The following table provides information on the ports and the associated devices.
Firewall Ports and Associated Devices
Protocol | From | To | Source Port | Destination Port |
---|---|---|---|---|
TCP | Teams Client | SBA | Any | 4444 |
TCP | Teams Client | SBA | Any | 3443 |
TCP | Teams Client | SBA | Any | 8443 |
SRTP/UDP | Teams Client | SBC | 5000 or higher | 16384 or higher (default)1 |
SRTP/UDP | SBC | Teams Client | 16384 or higher (default)1 | 5000 or higher |
TCP | SBA | SBC | Any | 5061 |
TCP | SBC | SBA | Any | 5061 |
UDP | SBA | NTP | UDP: Any | UDP: 123 |
HTTPS | SBA | Azure IP Range and Service | Any | 443 |
1 This port range is based on the settings of your SBC in Settings > Media > Media System Configuration > Port Range.
For more information on the firewall ports, refer to: https://learn.microsoft.com/en-us/microsoftteams/direct-routing-survivable-branch-appliance.
For more information on Azure IP Range and Service, refer to: https://www.microsoft.com/en-us/download/details.aspx?id=56519.
For information on troubleshooting the Direct Routing SBA, refer to Troubleshooting Direct Routing Survivable Branch Appliance.
Step 1: Configure SBC 1000/SBC 2000
Run Easy Configuration Wizard
Follow the instructions for your specific scenario; both are listed below:
SCENARIO 1: If your SBC is not yet configured to connected Direct Routing (Greenfield), follow this section: SBC is not yet configured to configured to connected Direct Routing (Greenfield)
SCENARIO 2: If your SBC is already configured to connected Direct Routing (Upgrade from Standalone Direct Routing), follow this section: SBC is already configured to connected Direct Routing (Upgrade from Standalone Direct Routing).
SBC Not Configured for Direct Routing ("Greenfield")
Direct Routing SBA is not capable of offering Local Media Optimization (LMO) features, such as:
Teams Downstream SBC operations
Teams Central SBC operations
Teams Central Proxy operations
OPTION 1: To connect Direct Routing with a SIP Trunk, refer to Configure SIP Trunk with Microsoft Teams.
In Step 2, set Configure Direct Routing SBA as True and enter the Direct Routing SBA FQDN.
OPTION 2: To connect Direct Routing with an ISDN PSTN, refer to Configure ISDN PSTN with Microsoft Teams.
In Step 2, set Configure Direct Routing SBA as True and enter the Direct Routing SBA FQDN.
After creating the new configuration, update the existing routing table to fork the call between the Signaling Group Direct Routing and Direct Routing SBA instead of Skype for Business.
SBC Already Connected to Direct Routing (Upgrade from Standalone Direct Routing)
Follow the steps on this page: Configure Single Leg Endpoint for Microsoft Teams. In Step 2, configure Configure Direct Routing SBA as True and enter the Direct Routing SBA FQDN.
Remap the call routing Direct Routing SBA Signaling Group:
In the WebUI, click the Settings tab.
From the left navigation pane, under Signaling Groups, select the Office 365 Direct Routing SBA SIP Signaling Group.
Modify the Call Routing Table to select the Microsoft Teams Direct Routing call routing table previously used on your device.
Enable Forking to Direct Routing Server:
From the left navigation pane, select Call Routing > Call Routing Table. Select the From SIP Trunk call routing table.
Select the existing entry with First Signaling Group set to Teams Direct Routing.
Set the Fork Call to Yes.
Click Apply.
Add a call route entry for Direct Routing SBA:
From the left navigation page, select Call Routing > Call Routing Table.
Select From the SIP Trunk table.
Click the (
).Configure the parameters as shown below. Leave all other parameters as default.
Click OK.
Parameter
Value
Description
To Office 365 Direct Routing SBA
Number/Name Transformation Table
From SIP Trunk: Passthrough
Destination Signaling Groups
Office 365 Direct Routing SBA
Delete unused resources:
From the left navigation pane, select Signaling Groups.
Delete the SIP Signaling Group called Teams Direct Routing that the last Easy Config Wizard has created.
Signaling Group AccuracyIf you receive an error that a route entry uses this resource, you may have attempted to delete the wrong Signaling Group.
From the left panel, select Call Routing > Call Routing Table and delete the Call Routing Table From Microsoft Teams Direct Routing created by the most recent use of the Easy Configuration Wizard.
SIP Signaling Group ErrorIf you receive an error that the SIP_SG entry is using this resource, you may have attempted to delete the wrong Call Routing Table.
Migration from Lync 2013 SBA/Skype for Business 2015 SBA to Office 365 Direct RoutingAfter creating the new configuration, update the existing routing table to fork the call between the Signaling Group Direct Routing and Direct Routing SBA instead of Skype for Business.
Step 2: Configure Sharing Trusted Certificate Authority Information
These steps are required only if the Direct Routing SBA does not share the SBC Public certificate.
The Trusted Certificate Authority information associated with the SBC and the Direct Routing SBA must be shared within the platform.
Export the SBC's Certificate Authority Information to the Direct Routing SBA:
In the WebUI, click the Tasks tab.
Under the SBC Easy Setup, select Certificates.
Select the certificate from the Trusted CAs tab and click Export Trusted CA Certificate.
Save the file on your PC. Repeat steps 3 and 4 for each CA certificate in the table. (These are the SBC CA Certificate used later per Import SBC CA in Direct Routing SBA.)
Import the Direct Routing SBA's Certificate Authority Information to the SBC:
Export the Root and Intermediate Certificate of the Certificate Authority (Public or Private) that as/will generate the Direct Routing SBA certificate.
In the WebUI, click the Tasks tab.
Under SBC Easy Setup, select Certificates.
From the Trusted CAs tab, select Import Trusted CA Certificate.
Select the correct format (Copy and Paste or File Upload) and click OK. Repeat steps 4 and 5 for each CA certificate.
Step 3: Re-initialize the ASM on the Teams SBA Image
Re-initializing the ASM on the Teams SBA Image restores the ASM to an unconfigured state. Follow the steps in Re-initializing the ASM and return to Step 4.
Step 4: Install SBC COMMs
To ensure the SBC 1000/2000 can communicate with the ASM, install the latest SBC Communication Service. Following the steps in Upgrading the SBC Communication Service Version , return to Step 5.
Step 5: Setup the Office 365 Direct Routing SBA
Setting up the Office 365 Direct Routing SBA consists of four steps. See below for each step.
- ASM Configuration
- Generate CSR
- Manage Certificates
- Configure Office 365 Direct Routing SBA
Configure ASM for Direct Routing SBA
Login to the WebUI of the SBC Edge Portfolio.
Navigate to Tasks > Office 365 Direct Routing SBA > Setup.
Click the ASM Config tab and configure/verify your ASM's network and IP settings.
From the Remote Desktop Enabled drop-down list, select Yes (to enable Remote Desktop) or No (to disable Remote Desktop). The recommended setting is No).
From the Windows Firewall Enabled drop-down list, select Yes (to enable Windows Firewall) or No (to disable Windows Firewall). The recommended setting is Yes).
From the Proxy Enabled drop-down list, select Yes (enables use of the Proxy Server on the ASM) or No (disables Proxy Server).
Configure/verify the Network and IP settings of your ASM.
Click Apply.
Generate CSR
These steps are required only if you need to create a new Public or Private Certificate that covers Direct Routing SBA FQDN.
Login to the WebUI of the SBC Edge Portfolio.
Navigate to Tasks > Office 365 Direct Routing SBA > Setup.
Click the Generate CSR tab.
Generate the CSR as shown below. To ensure that a valid CSR is created for Direct Routing SBA usage, see the certificate requirements.
Copy the CSR from the lower pane of the Generate CSR page and save it as a .txt file.
After the Certificate Authority signs the CSR, you receive the PKCS7 Certificate file.
Manage Certificates
Import SBC CA in Direct Routing SBA
These steps are required only if Direct Routing SBA does not share the SBC Public certificate.
Login to the WebUI of the SBC Edge Portfolio.
Navigate to Tasks > Office 365 Direct Routing SBA > Setup.
Click the Manage Certificate tab.
Click the Action drop-down list and select Import X.509 Signed Certificate.
Paste the SBC CA certificate in the window and click OK.
Import Direct Routing SBA Certificate
Ensure you import the Root and Intermediate certificate before importing the SBA certificate. To import these certificates, follow the instructions below for Import X.509 Signed Certificate.
Login to the WebUI of the SBC Edge Portfolio.
Navigate to Tasks > Office 365 Direct Routing SBA > Setup.
Click the Manage Certificate tab.
Click the Action drop-down list and select one of the following options:
Import X.509 Signed Certificate. This option is used if you generate a Certificate Request (CSR), which is the initial deployment. Paste the certificate in the window and click OK.
Import PKCS12 Certificate and Key. This option imports a certificate you created. Enter the password, select the file (certificate) to import, and click OK.
Proceed with the next step.
Configure Office 365 Direct Routing SBA
Login to the WebUI of the SBC Edge Portfolio.
Navigate to Tasks > Office 365 Direct Routing SBA > Setup.
Click the Configure Office 365 Direct Routing SBA tab.
Configure the information appropriately for your Direct Routing SBA:
SBA FQDN. Must match the FQDN used to define this Direct Routing SBA in the Teams tenant item Teams Survivable Branch Appliance (New-CsTeamsSurvivableBranchAppliance).
SBC FQDN. Must match the FQDN used to define the SBC that hosts this Direct Routing SBA in the Teams tenant item Online PSTN Gateway (New-CsOnlinePSTNGateway).
Create Azure AD Application. Enables creating new Azure AD Application credentials for this Direct Routing SBA.
If you have already created Azure AD Application credentials, select No and enter the credentials in Application ID and Application Secret.
If you have not previously created the Azure AD Application credentials (or are unsure what this means), select Yes and enter the credentials in Azure Administrator Account Name and Azure Administrator Account Password.
Azure Administrator Account ConsiderationsThis Azure Administrator Account account needs a Global Administrator, an Application Administrator, or a Cloud Application Administrator role.
Enter a Teams Tenant ID. To locate this information, refer to https://docs.microsoft.com/en-us/onedrive/find-your-office-365-tenant-id.
Click Apply.
Step 6: Install Teams SBA Package for ASM
Install the Teams SBA latest package, ASM_Teams_xxxx-xx-xx.pkg (e.g., ASM_Teams_2021-01-18.pkg). Follow the instructions for Installing an ASM Package.
Ensure the latest Cumulative Updates are installed on the SBA. For information, refer to Installing Cumulative Updates for the SBA.
Step 7: Configure Deployments with Additional SBCs (if required)
This step is necessary only for networks with more than one SBC on a Branch Office.
Enable Remote Desktop on the ASM. Refer to: Enabling and Disabling Remote Desktop on the ASM.
Connect the ASM using Remote Desktop Protocol.
As an administrator, open the file C:\Windows\System32\drivers\etc\hosts
Add an entry for all the SBCs on the same Branch Office. The entry must contain the SBC Public FQDN and the Private IP Direct Routing SBA uses to reach this SBC.
Save and close the file.
Step 8: Test the Direct Routing SBA
Complete the following steps to confirm the configuration.
Import Direct Routing SBA Certificate Authority
Navigate to Tasks > Office 365 Direct Routing SBA > Certificate.
Ensure the Certificate Chain is reported as valid.
If the page reports Missing Root or Intermediate CA, return to the Setup / Manage Certificate tab, select Import X.509 Signed Certificate and import all the root and trusted certificates that generate the Certificate of the Direct Routing SBA. Once completed, return to the Certificate tab and ensure the Certificate Chain is reported as valid.
Confirm SBA Status
Login to the WebUI of the SBC Edge Portfolio.
Navigate to Tasks > Application Solution Module > Operational Status.
Confirm the Office 365 Direct Routing SBA Service:
Service Status is reported as Running
Service Information is reported as ready
Confirm SIP Option
The signaling groups configured for the Microsoft Teams Direct Routing SBA include counters for SIP request and response messages related to incoming and outgoing options. As the SBC 1000/2000 operates with Microsoft Teams Direct Routing SBA, the message counters show increasing numbers. Ensure the message counts and investigate potential sources of related integration issues as follows:
In the WebUI, click the Settings tab.
In the left navigation pane, click Signaling Groups.
From the signaling group configured for Microsoft Teams Direct Routing SBA, click Counters.
Check for an increasing message count in Outgoing Options.
Check for an increasing message count in Incoming 2xx.
If not, Ensure the Sip Server Entry for the Direct Routing SBA matches the cases of the Certificate CN or SAN used by the Direct Routing SBA.
- If you just completed the deployment of SBA, a restart of the SBA service may be required before you see the 200 OK increasing message count.
Check for an increasing message count in Incoming Options.
Check the message count in Outgoing 2xx. If the number increases, the changes you made during validation have resolved the integration issue(s).
Confirm Teams Client Connection to SBA
Login to the WebUI of the SBC Edge Portfolio.
Navigate to Tasks > Office 365™ Direct Routing SBA >Teams Client Connected.
Confirm that your Teams client is reported.
Confirm Teams Client Can Run in Offline Mode
- Remove the Internet link between the Branch Office and the Microsoft Teams cloud.
Open the Teams client. A banner is displayed, which indicates that the Teams client will ONLY use the SBA to make/receive calls when offline.
For information on troubleshooting the Direct Routing SBA, refer to Troubleshooting Direct Routing Survivable Branch Appliance.
Step 9: Place Test Call
Complete the following steps to place a test call:
In the WebUI, click the Diagnostics tab.
In the left navigation pane, click Test a Call.
Configure the parameters for test calls as follows:
Parameter
Value
Destination Number
Type a telephone number assigned to a Teams user.
Origination/Calling Number
Type a telephone number assigned to a Local (SIP Trunk or PSTN) user.
Call Routing Table
Select the routing table that handles the calls from Local resources (From PSTN or SIP Trunk).
Click OK; the call should ring the Teams Client.
If the test call does not ring, the Teams client:
Check that the SBC IP routing is configured correctly.
Check whether you can place a call from Teams to the SBC.
If the call does not reach the SBC, then complete the following:
Confirm that the firewall is configured correctly to allow incoming SIP TLS messages.
Confirm that the federated IP addresses are correctly configured.
If the call is Anonymous, refer to Configuring SBC Edge for Select Microsoft Teams Direct Routing Related Migration Scenarios for more details.
If the call from the SBC to Teams does not connect due to a SIP 488 "Not Acceptable Here" coming from Teams with the reason "IceCandidatesAbsent," disable Media Bypass on Teams or enable ICE Lite on the SBC. For details, refer to Configuring SBC Edge for Select Microsoft Teams Direct Routing Related Migration Scenarios.
Step 10: Access Logs
Login to the WebUI of the SBC Edge Portfolio.
Navigate to Diagnostics> Teams Direct Routing > SBA logs.
.
Use the table on the same page to view or Download the Direct Routing SBA log files.
Step 11: Restart Services
Login to the WebUI of the SBC Edge Portfolio.
Navigate to Tasks > Office 365 Direct Routing SBA > Start/stop Services.
Select Stop Service in Teams Server as the Service Name from the Service Action drop-down list, and click OK.
Wait for the action to complete.
From the Service Action drop-down list, select Start Service; in Service Name, select Teams Server, and click OK.
Wait for the action to succeed.