Installation and Start-Up
After you have completed the hardware installation procedures outlined in the the relevant Hardware Installation Guide, you are ready to establish a connection to your Oracle® Enterprise Session Border Controller. Then you can load the software image you want to use and establish basic operating parameters.
Hardware Installation Process
Installing the Oracle® Enterprise Session Border Controller hardware in a rack requires the following process.
Connecting to Your Oracle® Enterprise Session Border Controller
You can connect to your Oracle® Enterprise Session Border Controller either through a direct console connection, or by creating a remote SSH session. Both of these access methods provide you with the full range of configuration, monitoring, and management options.
Note:
By default, SSH and SFTP connections to your Oracle® Enterprise Session Border Controller are enabled.Create a Console Connection
Using a serial connection, you can connect your laptop or PC directly to the Acme Packet hardware. If you use a laptop, you must take appropriate steps to ensure grounding.
One end of the cable plugs into your terminal, and the other end plugs into the RJ-45 Console port on the NIU (or management ports area on the Acme Packet 6300).
To make a console connection to your hardware:
SSH Remote Connections
Connect to the Oracle® Enterprise Session Border Controller (Enterprise SBC) using SSH. The Enterprise SBC supports five concurrent SSH and SFTP sessions. Only one SSH session may be in configuration mode at a time.
To SSH to your Enterprise SBC, you need to know the IP address of its administrative interface (wancom0/eth0). The wancom0/eth0 IP address of your Enterprise SBC is found by checking the IP Address value in the boot parameters or visible from the front panel display.
You can manage incoming SSH connections from the ACLI:
- SSH service is enabled by default.
- To view the users who are currently logged into the system, use the ACLI show users command. You can see the ID, timestamp, connection source, and privilege level for active connections.
- From Superuser mode in the ACLI, you can terminate the connections of other users in order to free up connections. Use the kill <sftp | ssh | web> command with the corresponding connection ID.
- If you reboot your Enterprise SBC from a SSH session, you lose IP access and therefore your connection.
There are two ways to use SSH to connect to the Enterprise SBC. Either connect via SSH without specifying users and SSH user passwords, or initiate the SSH connection using custom SSH credentials.
Note:
Old SSH and SFTP clients that use weak ciphers may not be able to connect to the Enterprise SBC. If a verbose connection log shows the server and client cannot agree on a cipher, upgrade your client.Accessing the System Via User and Admin Accounts
You may access the Oracle® Enterprise Session Border Controller via SSH connection without specifying users and SSH user passwords.
- Open your SSH client (with an open source client, etc.).
- At the prompt in the SSH client, type the
ssh command, a Space, the IPv4 address of your
Oracle® Enterprise Session Border Controller, and then press Enter.
The SSH client prompts you for a password before connecting to the Oracle® Enterprise Session Border Controller. Enter the Oracle® Enterprise Session Border Controller’s User mode password. After it is authenticated, an SSH session is initiated and you can continue with tasks in User mode or enable Superuser mode.
Manage SSH Keys
Use the ssh-key command to manage SSH keys for the Enterprise SBC.
Add an SSH Authorized Key
To authenticate to the Enterprise SBC using public key authentication rather than a password, use the ssh-key command with the authorized-key import argument.
Export an Authorized Key
To export a previously imported SSH public key, use the ssh-key command with the authorized-key export argument.
Delete an Authorized Key
To delete a previously imported SSH public key, use the ssh-key command with the authorized-key delete argument.
Add an SSH Known Host Key
For the Enterprise SBC to authenticate over SSH to an SFTP server, the public key of the SFTP server needs to be imported into the known_hosts file of the Enterprise SBC.
Delete an SSH Known Hosts Key
Delete expired SSH keys from the known_hosts file of the Enterprise SBC.
Add a Certificate Authority Key
When authenticating with certificates, clients send certificates to establish their identity and authorization. The public key of the Certificate Authority (CA) used for signing these client certificates must be imported into the Enterprise SBC.
Delete a Certificate Authority Key
To delete a previously imported Certificate Authority (CA) key, use the ssh-key command with the ca-key delete argument.
Revoke a User Key
To revoke access to a specific user whose public key was signed by your CA key, import the user's public key into the revocation list.
Unrevoke a Revoked User Key
If a user key is added to the revocation list, that user will not be able to authenticate to the Enterprise SBC. To delete a key from the revocation list, use the ssh-key command with the ca-user-revoke delete argument.
Configure SSH Ciphers
The ssh-config configuration element controls which ciphers the Enterprise SBC offers during SSH session negotiation when the Enterprise SBC acts as an SSH server. The ciphers offered when the Enterprise SBC acts as an SSH client are not configurable.
Each command takes an argument which is either a single word or a
comma-separated list within double quotes. Type ?
to see the available
algorithms for this release.
System Boot
When your Oracle® Enterprise Session Border Controller boots, the following information about the tasks and settings for the system appear in your terminal window.
- System boot parameters
- From what location the software image is being loaded: an external device or internal flash memory
- Requisite tasks that the system is starting
- Log information: established levels and where logs are being sent
- Any errors that might occur during the loading process
After the loading process is complete, the ACLI login prompt appears.