Month: January 2022

Part 2: Checking the resulting VM and Accessing the Web Interface of the SBC

On Azure Admin Portal, to access the resulting VM network settings by going to Virtual machine Name > Networking

When you check the networking of the resulting VM, you will see the two network interfaces of the VM

One dedicated to the Management of SBC. And the other is for Signaling and Media traffic

Signaling Network Interface

Below is an image that shows the details of the Signaling network interface (the first interface)

Notice that the Inbound port rules include only the ports of HTTP and HTTPS (also ports to be used by Azure)

Signaling and Media Interface

Click on the interface of Signaling and Media traffic to view its details

The below shows the details of the Signaling and Media interface

Below, I am copying the public IP address for this interface so that I can use it to access the web interface of the SBC

About Accessing the Web Interface

Ideally, to manage the SBC, you will be connected to the SBC VM Web Interface through the IP address of the management interface.

Probably you will connect a machine to the management subnet. Or you will connect the management interface to your usual Azure management network

Note:

Note that although both interfaces have a public IP assigned to them, only the public IP address of the second interface (Signaling and Media Interface) is accessible over the internet. That is because only the second interface (Signaling and Media Interface) is routed to the internet.

To simplify our configuration, I will keep the HTTPS port to the second interface (Signaling and Media Interface) opened and I will access the SBC Web Interface through its public IP

Accessing the Web Interface of SBC

In the browser of your computer, access the public IP of the Signaling and Media Interface

Once you pass the certificate warning, you will get the web interface as shown below

(The public certificate is not yet installed)

Logging On to The Web Interface

Click on the “Enter” button

You will access the login page

Type the User Name and Password you have specified while creating the VM (We have specify them on the “SBC SWe Lite settings” tab)

The credentials are correct, you will be asked to put a different password and to confirm it

Click on the “Apply” button

It will show you a message indicating that the password got changed

It will take you back again to login page

Type the User Name and the new Password and Login

Below is the Web Interface after logging on

Part 1: Creating a Ribbon SBC SWe Lite VM using Quick Launch Template from Azure Marketplace

In this article, I am showing how to create a Ribbon SBC SWe Lite VM on the Azure cloud and make it ready to be integrated with Teams Direct Routing

I am selecting the “Quick Launch” Template of Ribbon SBC SWe Lite from the marketplace

Such setup can be used for production or just simply to learn, test, and practice configuring a Teams Direct Routing with SBC

It might not be feasible to purchase a hardware SBC and to have public IP setup with correct firewall settings just for learning or practicing.

With Azure, you can have it configured with minimum cost and you can even use the Azure pay as you go option or even use the Azure trial to reduce the cost.

The installation will continue to full work until the trial is finished (I think the trial ends within 1 month).

You can contact a Ribbon distributor to purchase permeant licenses if you like to keep using your setup.

Below are the steps to do the deployment.

Selecting the VM from Azure Market Place

Access your Azure Admin Portal

Click on the search bar

In the search bar, search for Ribbon SBC SWe Lite. For example, type “sbc swe”

You will have types of VM Templates available in the Marketplace:

  • SBC SWe Lite
  • SBC SWe Lite Quick Launch

We will use “SBC SWe Lite Quick Launch” Template because it is designed to deploy SWe SBC Lite with the recommended configuration and is suitable for Teams Direct Routing (things like 2 Network Interfaces with the correct range of ports opened)

This will start wizard-like steps to collect the information needed to build the VM

Creating The VM And Selecting the Options

Click on the “Create” button

This will take you to the Basics tab

Basics Tab

The subscription will be automatically selected

If you select an existing Resource Group with resources inside it, it will give you an error

It requires its own Resource Group

For my case, I am creating a new Resource Group to be used for the SBC and named it SBCResourceGroup

Under Region, select the region where you want the VM to be created within

Type the name to be used as a Virtual Machine name inside Azure
Specify the Required # of simultaneous calls (to tell you the truth, I couldn’t find the purpose of this parameter tell this moment)

Virtual Machine Settings Tab

On Virtual Machine Settings, I kept the default settings

Networking Settings Tab

I kept the default settings (where it will create a new virtual network with two subnets)

Each of the two subnets is going to be connected to a network interface of the VM

  • Management subnet (connected to Management interface)
  • Signaling & Media subnet (connected to Signaling & Media interface)

(This way, the VM will be automatically created with the recommended configuration by Ribbon)

Note:

You can select your own existing virtual network and select the subnets to be used

SBC SWe Lite Settings Tab

On the SBC SWe Lite Settings tab, specify the username and the password for the VM

The username cannot be a revers word such as admin

Follow the correct password policy

On the SBC SWe Lite Settings tab, I have typed a temporary hostname and a temporary domain name for the VM. I am planning to change these settings later inside the configuration of the SBC after the deployment is completed.

Review + create Tab

On the last tab “Review + create”. It will validate your settings and will show you “Validation Passed” if everything is acceptable to create the VM

It will also show you the summary of the settings that you

I had to scroll down to check all the settings

If all the settings are acceptable, click on the “Create” button. This will start the deployment of the VM.

Step by Step Walkthrough Creating an Ribbon SBC SWe Lite VM on Azure and fully Deploying it with Teams Direct Routing

In the following series of articles, I will demonstrate how I have created a fully working Ribbon SBC VM (SBC SWe Lite) on Azure. I will also show how to integrate it with Teams Direct Routing and SIP Trunk

Such setup can be used to fully test and practice:

  • Configuring Teams Direct Routing with Ribbon SBC
  • Configuring Ribbon SBC
  • Integrating a SIP Trunk with Ribbon SBC

Also can be used to demonstrate a proof of concept

Or you can even use it as a production. It is a fully working setup

Some of the advantages of such a setup:

  • You don’t need to have a hardware SBC
  • You don’t need to have your own Public IP to have integration with Direct Routing
  • You don’t need to set up a firewall and other network equipment
  • You can easily have integration with any SIP Trunk

The following are the links to the articles:

Part 1: Creating a Ribbon SBC SWe Lite VM using Quick Launch Template from Azure Marketplace – Jay’s Lab (jayslab.online)

Part 2: Checking the resulting VM and Accessing the Web Interface of the SBC – Jay’s Lab (jayslab.online)

Part 3: Adding a Domain to Microsoft 365 – Jay’s Lab (jayslab.online)

Part 4: Adding A User Account to The Domain That Will Be Used for the SBC – Jay’s Lab (jayslab.online)

Part 5: Connecting the SBC SWe Lite to Teams Direct Routing – Jay’s Lab (jayslab.online)

Part 6: Changing the Host Name and Domain Name of SBC – Jay’s Lab (jayslab.online)

Part 7: Installing Certificates on the SBC – Jay’s Lab (jayslab.online)

Part 8: Running Easy Config Wizard – Jay’s Lab (jayslab.online)

Part 9: Teams Direct Routing Call Routing – Jay’s Lab (jayslab.online)

Part 10: Enable users for Direct Routing, voice, and voicemail – Jay’s Lab (jayslab.online)

Part 11: Testing Outgoing and Incoming Calls – Jay’s Lab (jayslab.online)

Microsoft Teams Direct Routing – sip-all FQDNs will not be supported starting June 1st, 2022

sip-all.pstnhub.microsoft.com FQDNs will not be valid anymore

Microsoft has sent a message to its customers alerting that sip-all.pstnhub.microsoft.com FQDNs cannot be used anymore in SBC configuration for Teams Direct Routing (starting from the 1st of March) and it should be removed. Instead, all SBCs should be configured to communicate with the subnets (52.112.0.0/14 and 52.120.0.0/14).

This can be found clearly on the link:

Filipp Seljanko on LinkedIn: #microsoft #directrouting #microsoftteams | 12 comments

This is reflected in Microsoft documentation:

Plan Direct Routing – Microsoft Teams | Microsoft Docs

There is no mention of sip-all.pstnhub.microsoft.com anymore. It is replaced with subnets (52.112.0.0/14 and 52.120.0.0/14).

On Ribbon SBC Edge (SBC 1000, SBC 2000, and SBC SWe. Lite)

On the Ribbon SBC Edge family of SBCs (SBC 1000, SBC 2000, and SBC SWe. Lite), you need to change the Federated IP/FQDN as follows:

  1. Go to Settings Tab. On the left pane, expand Signaling Groups. Select Direct Routing Signaling Group (it is named by the wizard (ScenarioName: Teams Direct Routing)

  2. This will show the details of the Signaling Group on the right pane

  3. Scroll down the details until you reach Federated IP/FQDN

  4. Select the check box next to sip-all.pstnhub.microsoft.com and click on the red X to delete this entry
  5. Click on the green + to add (IP/FQDN 52.112.0.0 with the mask 255.252.0.0) and then click on OK. With the same method add (IP/FQDN 52.120.0.0 with the mask 255.252.0.0)

  6. On the details of the Signaling Group, click on the “Apply” button

    I assume this will be reflected in the “Easy Config Wizard” in the future versions of the firmware of the SBCs.