3 Configuration Tab Operations

The Configuration tab on the Web GUI provides dialogs for the same configuration objects that you can access from the command line to configure the Oracle® Enterprise Session Border Controller (E-SBC). You may find the GUI easier to use than the command line.

The Web GUI provides the following configuration tools.
  • Basic mode—Displays a limited set of configuration objects. Basic mode is used for quick prototyping of an E-SBC deployment for proof of concept or testing purposes. It is not meant for production use. You must switch to Expert mode to access the full array of configuration objects.

    Note:

    After switching to Expert Mode, you can only return to Basic mode if you have not saved and activated any changes that you made. After saving and activating, you must reinstall the software to enter Basic Mode again.
  • Expert mode—Displays the complete list of the configuration objects. When you click an object on the list, the Web GUI displays the corresponding configuration dialog.
  • Wizards—Displays the following list of Wizards that lead you through selected configuration tasks. You can use the Wizards in Basic mode and Expert mode.

    This screen capture shows the list of available configuration wizards on the configuration tab.

  • Commands—Displays the following list of show commands that provide a view of the state of configuration on the E-SBC.

    This screen capture shows the list of available show commands on the configuration tab.

  • Configuration objects—Displays a list of the configuration objects either by category, like the ACLI, or in alphabetical order. Use the arrow control to expand each list to see all of the configuration objects and sub-objects.

    This screen capture shows the list of configuration object categories on the configuration tab.

Configuration States and Behavior

After you finish creating or modifying a configuration, you must save and activate the configuration before the Oracle® Enterprise Session Border Controller (E-SBC) saves the changes to the running configuration.

At any time, the following three versions of the configuration can exist on the E-SBC.
  • Editing. The editing configuration is the version that you are making changes to from the Web GUI. The editing version is stored in the E-SBC volatile memory. The editing version cannot survive a system reboot.
  • Saved. The saved configuration is the version of the editing configuration that the system copies into the non-volatile memory when you click Save on the Web GUI. Until you activate the saved configuration, the changes do not take effect on the E-SBC. The system does not load the saved, but not activated, configuration as the running configuration on reboot.
  • Running configuration. The running configuration is the configuration that the system is using. When you activate the saved configuration it becomes the running configuration. Most configuration changes can take effect upon activation. Some configuration changes require a system reboot. On reboot, the system loads the running configuration.
The process for saving and activating a configuration, includes the following steps.
  1. OK. All configuration dialogs display an OK button that saves changes to the editing memory. If you reboot before the next step, the E-SBC does not save the changes.
  2. Save. The Save button on the Web GUI toolbar verifies the configuration, displays errors, saves the current configuration to the last-saved configuration, and stores it on the E-SBC. The system displays any errors at the bottom of the Configuration page.
  3. Activate. After you finish making one or more configuration changes, OK and Save from the last configuration dialog that you need to edit at this time. The system displays the Confirmation dialog containing the Activate button. When you click Activate, the E-SBC activates all of the saved configuration changes and saves the new configuration to the running configuration. If you cancel the activation function, the E-SBC saves the configuration in a file and does not change the running configuration. You can continue to make changes to the configuration.

Configuration Error Messages

If you save a configuration that contains errors, the system displays the following error message: There were errors! Are you sure you want to activate the configuration?

The system displays a list of errors at the bottom the page. Click an error to go to the location in the configuration where the error occurred and edit the configuration as needed.

Configuration Wizards

The Wizards control in the navigation pane displays a list of Wizards, for performing selected configuration procedures for the Oracle® Enterprise Session Border Controller (E-SBC).

The Wizards help you perform the following tasks:

Set Boot Parameters Wizard

The Oracle® Enterprise Session Border Controller (E-SBC) requires you to enter the necessary parameters to boot the system in your deployment.

You can set the E-SBC boot parameters from the Set Boot Parameters Wizard on the Web GUI in either Basic mode or Expert mode.

  1. Access the Set Boot Parameters Wizard: Configuration, Wizards, Set Boot Parameters.
  2. In the Set Boot Parameters dialog, enter the following information:
  3. Click Complete.
    The system displays a success message.
  4. Click OK.
Configurable Boot Loader Flags
You may configure the following boot flags in the boot loader:
  • 0x04 - disables autoboot timeout (ap3820 and ap4500 only)
  • 0x08 - extend autoboot countdown timer to 15 seconds
  • 0x40 - use DHCP for wancom0 (VM Edition only)
  • 0x80 - network boot using TFTP instead of FTP

Set Entitlements Wizard

Use the Set Entitlements Wizard to enter the maximum number of sessions that your license allows.

  • Note the session limit number from your license.

You can launch the Set Entitlements Wizard on the Web GUI in either Basic mode or Expert mode.

  1. Access the Set Entitlements Wizard: Configuration, Wizards, Set Entitlements.
  2. In the Set Entitlements dialog, do the following:
  3. Click Complete.
    The system displays a success message.
  4. Click OK.

Set Initial Configuration Wizard

Use the Set Initial Configuration wizard to perform the initial configuration on an unconfigured system and to change the configuration on a configured system. During the configuration, you select the scope of configuration that you want to perform, define the boot parameters, opt to set a VLAN, and configure features such as High Availability (HA) and access to the Oracle Communications Session Delivery Manager (OC SDM). A valid license is required to run the Set Initial Configuration wizard.

Launch the Set Initial Configuration Wizard

  • Unconfigured system. The system launches the Web GUI Set Initial Configuration wizard upon the first logon. When the initial configuration is complete, the system saves the configuration, activates the configuration, and reboots. The system does not backup the initial configuration of an unconfigured system.
  • Configured system. From the Configuration tab on the Web GUI, click the Wizards button and click Set Initial Configuration. When the re-configuration is complete, the system saves a backup of the existing configuration, saves the new configuration, activates the new configuration, and reboots. The backup is stored in /code/bkups.
Before you can configure the E-SBC, the wizard requires you to make the following selections that determine which configuration parameters the wizard displays.

Note:

Unlike other E-SBCs, which provide 2 management interfaces and 2 media interfaces, the Acme Packet 1100 provides 1 management interface and 2 media interfaces. When configuring HA, the configuration dialogs for the Acme Packet 1100 differ from the other E-SBCs because you must create a second, virtual management interface. For creating the second management interface, the HA dialogs on the Acme Packet 1100 contain more attributes than the dialogs for the other E-SBCs. Regardless of the E-SBC model, the path through the Set Initial Configuration wizard to the HA dialogs is the same as described in this topic.
Configure the System

The system requires an initial configuration of attributes, such as modes and IP addresses, before it can function in the network.

Use the Set Initial Configuration Wizard to define the attributes for the system. The system displays the Set Initial Configuration Wizard upon the first logon.

  1. Logon to the Oracle® Enterprise Session Border Controller.
    The system displays the Set initial configuration wizard.
  2. Run the Set Initial Configuration Wizard, and click Complete.
    The system saves the configuration, activates the configuration, and re-boots.
  • Configure the system objects.
Reconfigure the System

You can reconfigure the system from the Web GUI.

Use the Set Initial Configuration Wizard to change the initial configuration on a configured system, for example, change attributes such as IP addresses and modes.

  1. Log on to the system.
  2. Access the Set Initial Configuration Wizard: Configuration, Wizards, Set Initial Configuration.
  3. Run the Set Initial Configuration Wizard and change the attributes, as needed.
  4. Click Complete.
    The system saves a backup of the existing configuration, saves the new configuration, activates the new configuration, and automatically re-boots.
  • (Optional) Reconfigure the system objects.

Set License Wizard

Use the Set License Wizard to enter the serial number for your license. You can use the Set License Wizard in Basic Mode and Expert Mode.

  • Obtain the license, which includes the serial number, for the feature that you want to add to the deployment. See "Obtain a License" in the ACLI Configuration Guide.

You need the license number for the following procedure.

  1. Access the Set License Wizard: Configuration, Wizards, Set License.
  2. In the Set License dialog, enter the license serial number in the Add license field.
  3. Click Complete.
    The system displays a success message.
  4. Click OK.

Set Login Banner Wizard

Use the Set Login Banner Wizard to add customized text to the log on page. You can use the Set Login Banner Wizard in Basic mode and Expert Mode.

You can customize the log on page by adding text to help the user. For example, Welcome to <company name> <business unit> <location> session border controller <device name>.

  1. Access the Set Login Banner Wizard: Configuration, Wizards, Set Login Banner.
  2. In the Set Login Banner dialog, enter the text that you want to display on the log on page.
  3. Click Complete.
    The system displays a success message.
  4. Click OK.

Set Time Zone Wizard

The system requires a setting for time zone.

You can set the system time from the Set Time Zone Wizard on the Web GUI. You can select a time zone or Coordinated Universal Time (UTC). You can use the Set Time Zone Wizard in Basic Mode and Expert Mode.

  1. Access the Set Time Zone Wizard: Configuration, Wizards, Set Time Zone.
  2. From the drop down list, select one of the following:
    • Time zone by locale
    • UTC
  3. Click Complete.
    The system displays a success message.
  4. Click OK.

Upgrade Software Wizard

You can upgrade the system software with the Upgrade Software Wizard on the Web GUI. You can use the Upgrade Software Wizard in Basic Mode and Expert Mode.

Use the Upgrade Software Wizard to perform the following tasks:

  • Check the system health before the upgrade
  • Download new software
  • Change boot parameters
  • Reboot the system

The system requires a reboot after the upgrade for the changes to take effect.

  1. Access the Upgrade Software Wizard: Wizards, Upgrade Software .
  2. (Optional) In the Upgrade Software dialog, click Verification, and do the following:
    • Click View Synchronization Health, and confirm that the system components are synchronized.
    • Click View Configuration Version, and note the Current Version and Running Version.
    • Click View Disk Usage, and confirm that the system has enough free space.
  3. In the Upgrade Software dialog, do the following:
  4. Click Complete.
    • If you did not select Reboot After Upload, the system displays a message stating that a reboot is required for the changes to take effect.
    • If you selected Reboot After Upload, the system displays a message stating that it is about to reboot.
  5. Click OK.
    The system performs the file transfer and any boot parameter changes. If you selected Reboot After Update, the system reboots.

Configuration in Basic Mode

The Oracle® Enterprise Session Border Controller (E-SBC) Web GUI displays both a Basic Mode and an Expert Mode for configuring the system. Basic Mode provides a subset of the Expert Mode configuration objects, and is intended for use as a quicker way to configure the E-SBC for proof-of-concept and testing purposes. Basic Mode provides only the minimum number of configuration objects required to get the system up and processing calls. After you are satisfied with system operations, you can switch to Expert Mode and continue to specify a more robust and customized configuration. The E-SBC preserves the settings that you applied in Basic Mode and displays them in the corresponding dialogs in Expert Mode along with the additional settings available in Expert Mode. Using Basic Mode is optional. You can configure the E-SBC from start to finish in Expert Mode.

Note:

After you switch to Expert Mode, you can only switch back to Basic Mode if you have not saved and activated in Expert Mode.

This screen capture shows the Basic Mode Configuration landing page.

Basic Mode configuration requires connecting the E-SBC to your network and setting the parameters for the operations that you want the E-SBC to perform. In Basic Mode, the Configuration tab displays a drop down list of possible devices that you can connect and a list of configuration objects. You can also group devices and establish one-way and two-way routes between each one and the E-SBC.

Connect to the Network

When you first click the Configuration tab in Basic Mode, the center pane displays the following list of "Devices" that you can connect to the E-SBC.

This screen capture shows the list of devices, which includes PBX, Trunk, Remote Workers, Recording Server, and SIP interface.

When you click a device, the GUI displays the corresponding configuration dialog. After you configure the device, click SIP Interface on the Devices list. The system prompts you specify whether you want the configured device on the Enterprise side or the Service Provider side of the E-SBC. When you complete the SIP Interface configuration, you can set one-way or two-way routes for traffic to and from the device to the E-SBC. You can also group devices.

Example 3-1 Set the Parameters

On the Configuration tab, the navigation panel lists all of the configuration objects that you need for the E-SBC in Basic Mode. Some objects, such as Set Entitlements, launch a configuration dialog directly because they are single-instance configurations. Such dialogs display a list of parameters that you can set. For example:

This screen capture shows an example of a single instance configuration dialog.

When you complete the configuration, the dialog closes and displays the landing page for the object.

Other configuration objects, such as TLS Profile, are multi-instance objects that launch a page that can display a list of the configured objects. Such objects display the Add button and a table for listing configurations. For example:

This screen capture shows the landing page for a multi instance configuration object.

When you click Add on such a page, the Web GUI launches the configuration dialog. For example:

This screen capture shows the TLS Profile configuration dialog, which is an example of a multi instance object.

When you OK the configuration dialog, the system returns to the Configuration object list page and adds the new configuration to the list. For example:

This screen capture shows an example of the list page for a multi instance object.

Repeat the process to add more configurations to the list.

Basic Mode Configuration Controls

In Basic mode, the Configuration page displays the following controls that lead to the listed configuration dialogs.

Branding Bar

The branding bar displays the following controls:

Navigation Pane

The Basic Mode navigation tree displays the configuration objects in the following groups.

Edit, Copy, and Delete Configurations

You can edit, copy, and delete one or more multi-instance configurations on the Oracle® Enterprise Session Border Controller (E-SBC) by way of the controls that the Web GUI displays on the Configuration tab. The edit and copy functions act only on a single instance of a configuration. The delete function can act on either a single instance or all instances.

Note:

You cannot copy or delete single-instance configurations. You can only edit them.

To edit, copy, or delete a single, multi-instance configuration, select the configuration and right-click. The Web GUI displays the Edit, Copy, and Delete menu.

This screen capture shows the right-clivk menu for the edit, copy, and delete opetations. It also shows Delete All in the tool bar at the top of the page.

  • When you click Delete, the system displays a confirmation dialog before performing the operation.
  • When you click either Copy or Edit, the GUI displays the corresponding configuration dialog.
To delete all configurations at the same time, use Delete All.

Caution:

Delete All does not act on a partial selection of the configurations. For example, if you select two of three configurations and click Delete All, the system deletes all three.

Settings Configuration

Use the Settings configuration to set the following parameters.

Logging Settings

You can configure the Oracle® Enterprise Session Border Controller (E-SBC) to generate Syslogs for system management and Process logs for debugging.

The E-SBC generates the following types of logs.

  • Syslogs conform to the standard used for logging servers and processes as defined in RFC 3164. In configuration, you specify the Syslog server.
  • Process logs are proprietary Oracle logs that the system generates on a per-task basis and are used mainly for debugging purposes. Because process logs are more data inclusive than Syslogs, their contents usually include Syslog log data. In configuration, you specify the log level.

Syslog and process log servers are both identified by an IPv4 address and port pair.

Configure Logging Settings

The Oracle® Enterprise Session Border Controller (E-SBC) generates SysLogs and process logs. You must configure the IP address for the SysLog server and the process log level for the process logs.

  • Note the IP address of the Syslog server.
  • Confirm that the system displays the Basic mode.

The Web GUI displays the logging configuration parameters on the Settings page. Use the following procedure to specify the Syslog server and to select a process log level.

  1. Access the Settings configuration object: Configuration, Settings.
  2. On the Settings page, click Logging Settings, and do the following:
  3. Click OK.
  4. Save and activate the configuration.
Simple Network Management Protocol

Simple Network Management Protocol (SNMP) supports the monitoring of devices attached to the network for conditions that might need administrative attention.

On the Oracle® Enterprise Session Border Controller (E-SBC), SNMP configuration is comprised of the following groups of system-wide settings.
  • SNMP Settings—Specifies the MIB contact information and enables event SNMP traps. See "Configure SNMP Settings."
  • SNMP Community—Specifies how certain E-SBC events are reported. See "Configure SNMP Community."
  • Trap Receiver—Specifies the trap receiver settings, including filters. See "Configure an SNMP Trap Receiver."
The system does not require you to configure these groups of settings for baseline E-SBC service. If you want to use network management systems to provide important monitoring and system health information, configure the settings.
Configure SNMP Settings

Simple Network Management Protocol (SNMP) is used to support the monitoring of devices attached to the network, such as the Oracle® Enterprise Session Border Controller (E-SBC), for conditions that warrant administrative attention.

  • Confirm that the system displays the Basic mode.

The Web GUI displays the SNMP settings configuration parameters on the Settings page. Use the following procedure to configure MIB settings and to enable SNMP for the E-SBC.

  1. Access the Settings configuration object: Configuration, Settings.
  2. In the Settings dialog, click SNMP Settings, and do the following:
  3. Click OK.
  4. Save the configuration.
SIP Settings

Session Initiation Protocol (SIP) is an IETF-defined signaling protocol widely used for controlling communication sessions such as voice and video calls over Internet Protocol (IP). You can use the protocol for creating, modifying, and terminating two-party (unicast) or multiparty (multicast) sessions. Sessions may consist of one or several media streams.

Dialog Transparency

Dialog transparency prevents the Oracle® Enterprise Session Border Controller (E-SBC) from generating a unique Call-ID and modifying dialog tags. With dialog transparency enabled, the E-SBC cannot generate a unique Call-ID and from modifying the dialog tags. The E-SBC passes what it receives. When a call made on one E-SBC is transferred to another UA and crosses a second E-SBC, the second E-SBC does not note the context of the original dialog, and the original call identifiers are preserved end to end. The signaling presented to each endpoint remains in the appropriate context regardless of how many times a call crosses through a E-SBC or how many E-SBCs a call crosses.

Without dialog transparency enabled, the E-SBC SIP B2BUA rewrites the Call-ID header and inserted dialog cookies into the From and To tags of all messages it processes. These dialog cookies are in the following format: SDxxxxxNN-. Using these cookies, the E-SBC can recognize the direction of a dialog. However, this behavior makes call transfers problematic because the Call-ID of one E-SBC might not be properly decoded by another E-SBC. The result is asymmetric header manipulation and unsuccessful call transfers.

IPv6 Reassembly and Fragmentation Support

As it does for IPv4, the E-SBC supports reassembly and fragmentation for large signaling packets when you enable IPV6 on the system.

The E-SBC takes incoming fragments and stores them until it receives the first fragment containing a Layer 4 header. With that header information, the E-SBC performs a look-up so it can forward the packets to its application layer. Then the packets are re-assembled at the applications layer. Media fragments are not reassembled and are forwarded to the egress interface instead.

On the egress side, the E-SBC takes large signaling messages and encodes them into fragment datagrams before it transmits them.

Oracle recommends that you send large SIP INVITE messages over TCP. If you want to modify that behavior, you can use the SIP interface’s option parameter max-udplength=xx for each SIP interface where you expect to receive large INVITE packets.

Other than enabling IPv6 on your E-SBC, there is no configuration for IPv6 reassembly and fragmentation support. It is enabled automatically.

Configure SIP Settings

Use the Settings button to access the SIP settings configuration section of the Settings page.

  • Confirm that the system displays the Basic mode.

Use the following procedure to configure global SIP settings and options.

  1. Access the Settings configuration object: Configuration, Settings.
  2. On the Settings page, click SIP Settings, and do the following.
  3. Click OK.
  4. Save the configuration.
  • Configure SIP Features.
Denial of Service Protection

The Oracle® Enterprise Session Border Controller (E-SBC) Denial of Service (DoS) protection functionality protects soft switches and gateways with overload protection, dynamic and static access control, and trusted device classification and separation in layers 3-5.

DoS protection prevents the E-SBC host processor from being overwhelmed by a targeted DoS attack from the following:

  • IP packets from an untrusted source, as defined by provisioned and dynamic ACLs
  • IP packets for unsupported and disabled protocols
  • Nonconforming and malformed packets to signaling ports
  • Volume-based attack of valid and invalid call requests, signaling messages, and so on.

The Server Edition and VM Edition support of DoS protection differs from the Oracle Hardware Platforms Edition due to the absence of Oracle network interface hardware. Consequently, DoS protection is implemented in software and consumes CPU cycles when responding to attacks.

The Server Edition and VM Edition handle media packet fragments differently, processing them in the data path rather than in the host application code. Protection against fragment attacks occurs because the system never keeps fragments for more than 5 milliseconds.

Configure Denial of Service Settings

Configure Denial of Service (DoS) settings to protect the Oracle® Enterprise Session Border Controller (E-SBC) from signal and media overload, while allowing legitimate, trusted devices to continue receiving service during an attack.

  • Plan the maximum number of packets per second that you want for trusted packets, un-trusted packets, and ARP packets.
  • Confirm that the system displays the Basic mode.

The Web GUI displays the denial of service configuration parameters on the Settings page. Use the following procedure to specify the settings that the system uses to calculate the trusted, untrusted, and ARP packets per second. Note that the configured rate is specified in packets per second, but the system measures the rate in packets per millisecond. For example, when the configured rate is 3200 packets per second, the actual measured rate is 3 packets per millisecond.

  1. Access the Settings configuration object: Configuration, Settings.
  2. On the Settings page, click Denial of Service Settings, and do the following.
  3. Click OK.
  4. Save the configuration.
Communication Monitoring Probe Settings

Palladion is the Oracle Communication Experience Manager.

The manager is powered by the Palladion Mediation Engine, a platform that collects SIP, DNS, ENUM, and protocol message traffic received from Palladion Probes. The mediation engine stores the traffic in an internal database, and analyzes aggregated data to provide comprehensive multi-level monitoring, troubleshooting, and interoperability information.

Palladion simplifies the operation of software-based Palladion probes by enabling the transmission of Internet Protocol Flow Information Export (IPFIX) data to one or more Palladion Mediation Engines, possibly on different sub-nets.

Note:

The Palladion Communications Monitor Probe communicates over the media interface for signaling and Quality of Service (QoS) statistics using IPFIX. QoS reporting is done by way of Call Detail Records (CDR) accounting.
Configure Communication Monitoring Probe Settings

Use the following procedure to establish a connection between the Oracle® Enterprise Session Border Controller (E-SBC) and the Palladion Mediation Engine. The E-SBC exports protocol message traffic and data and the Palladion Mediation Engine collects the information.

  • Confirm that the network interface that you want to monitor is configured.
  • Confirm that the system displays the Basic mode.

The Web GUI displays the communication monitoring probe settings configuration parameters on the Settings page. Use the following procedure to enable ths function, and to specify the connection parameters.

  1. Access the Settings configuration object: Configuration, Settings.
  2. On the Settings page, click Communications Monitoring Probe Settings, and do the following:
  3. Click OK.
  4. Save the configuration.
High Availability Settings

You can deploy the Oracle® Enterprise Session Border Controller (E-SBC) in pairs to deliver High Availability (HA). Two E-SBCs operating in this way are called an HA node. Over the HA node, call state is shared, keeping sessions and calls from dropping in the event of a service disruption.

When two E-SBCs work together in an HA node, one operates in active mode and the other one operates in standby mode.

  • The active E-SBC checks itself for internal process and IP connectivity issues. If it detects that it is experiencing certain faults, it hands over its role as the active system to the standby E-SBC.
  • The standby E-SBC is the backup system, fully synchronized with the active E-SBC session status. The standby E-SBC monitors the status of the active system so that, if needed, it can assume the active role without the active system having to instruct it to do so. If the standby system takes over the active role, it notifies network management using an SNMP trap.

To produce seamless switch overs from one E-SBC to the other, the HA node uses shared virtual MAC and virtual IP addresses for the media interfaces in a way that is similar to Virtual Router Redundancy Protocol (VRRP). Sharing addresses eliminates the possibility that the MAC and IPv4 address set on one E-SBC in an HA node will be a single point of failure. The standbyE-SBC sends ARP requests using a utility IPv4 address and its hard-coded MAC addresses to obtain Layer 2 bindings.

When there is a switch over, the standby E-SBC issues gratuitous ARP messages using the virtual MAC address, establishing that MAC on another physical port within the Ethernet switch. To the upstream router, the MAC and IP are still alive, meaning that existing sessions continue uninterrupted.

In the HA node, the E-SBCs advertise their current state and health to one another in checkpointing messages so that each system is apprised of the other’s status. Using Oracle’s HA protocol, the E-SBCs communicate with UDP messages sent out and received on the interfaces carrying heartbeat traffic between the active and standby devices.

The standby E-SBC assumes the active role when:

  • It has not received a checkpoint message from the active E-SBC for a certain period of time.
  • It determines that the health score of the active E-SBC has decreased to an unacceptable level.
  • The active E-SBC relinquishes the active role.
Configure High Availability

To create a High Availability (HA) pair of Oracle® Enterprise Session Border Controllers (E-SBC), you must configure one E-SBC as the active and the other E-SBC as the standby.

  • Confirm that the system displays the Basic mode.

The Web GUI displays the HA configuration parameters on the Settings page. Use the following procedure to create an HA pair and to establish communication between the devices.

  1. Access the Settings configuration object: Configuration, Settings.
  2. On the Settings page, click High Availability Settings, and do the following:
  3. Click OK.
  4. Save the configuration.
High Availability on the Acme Packet 1100

The Acme Packet 1100 supports High Availability (HA), but the configuration differs from other Oracle® Enterprise Session Border Controllers (E-SBC) because there is only one management interface on this device.

Unlike other E-SBCs, which provide two management interfaces and two media interfaces, the Acme Packet 1100 provides 1 management interface and 2 media interfaces. For HA, you must create a second management interface object on the Acme Packet 1100 with wancom0 for the name and VLAN for the sub-port-id. You can configure only one management interface in an HA pair with these settings and the system does not support more than one HA interface with a VLAN tag.

Note:

The Acme Packet 1100 E-SBC does not support High Availability (HA) for any call using the Time Division Multiplexing (TDM) interface.
Configure the Active Acme Packet 1100 for HA

You can configure the Acme Packet 1100 primary for High Availability (HA) operations from the Web GUI by using the configuration tools in Basic mode.

  • Confirm that the Oracle® Enterprise Session Border Controller software is installed on two separate systems.

You must perform the following procedure on the active system before configuring the standby system for HA operations.

  1. Access Run Setup: Configuration, Wizards, Set Initial Configuration, Run Setup.
    The system displays the Set Initial Configuration dialog.
  2. In the Set Initial Configuration dialog, do the following:
  3. Click Complete.
    The system re-boots.

Configure the secondary for High Availability. See "Configure the Acme Packet 1100 Secondary for High Availability (HA) - GUI Basic."

Configure the Standby Acme Packet 1100 for HA

You can configure the Acme Packet 1100 standby for High Availability (HA) operations from the Web GUI by using the configuration tools in Basic mode.

  • Confirm that the Oracle® Enterprise Session Border Controller active is configured for HA operations.

When configuring the standby system, enter the same management interface VLAN that you entered for the primary system.

  1. Access Run Setup: Configuration, Wizards, Set Initial Configuration, Run Setup.
    The system displays the Set Initial Configuration dialog.
  2. In the Set Initial Configuration dialog, do the following:
  3. Click Complete
    The system re-boots.
Packet Capture Settings

You can configure the packet capture function on the Oracle® Enterprise Session Border Controller (E-SBC) to view packet traffic on your network. For example, you might want to confirm the network configuration or to perform troubleshooting.

During a packet capture session, the system creates a set of .pcap files in the /opt/traces directory. If the /opt/traces directory contains files when you run the packet-trace command, the system prompts you to either remove or keep the existing files before running the command. The following table describes the system behavior for both options.
Configure Packet Capture Settings

You can configure the Oracle® Enterprise Session Border Controller (E-SBC) to send packet captures to a designated receiver.

  • Note the IP address and network interface of the device that you want the E-SBC to send captured packets.
  • Confirm that the system displays the Basic mode.

Use the following procedure to enable the packet capture function and to specify where the E-SBC sends the captured packets.

  1. Access the Settings configuration object: Configuration, Settings.
  2. Under Packet Capture Settings, do the following:
  3. Click OK.
  4. Save the configuration.
Remote Site Survivability

The remote site survivability feature enables an Oracle® Enterprise Session Border Controller (E-SBC) that is deployed in a Remote Office/Branch Office (ROBO) site to detect the loss of communication over SIP-based telephony to the Enterprise’s core call processing Data Center.

When loss of communication is detected over the SIP service, the ROBO E-SBC dynamically switches into Survivable Mode, handling call processing locally and providing limited additional server functionality.

Note:

Remote Site Survivability supports SIP only. It does not support H.323 call signalling.

Remote Site Survivability:

  • Works with or without High Availability (HA).
  • Is configurable in real-time, with no reboot required to enable this feature.
  • Allows configuration by way of the E-SBC Web GUI.
  • Maintains Historical Recording (HDR) statistics about being in survivability mode, such as:
    • Whether or not the E-SBC is in survivable mode using the ACLI command, show health.
    • Length of time the E-SBC was in survivable mode (records the number of times and the amount of time in survivability mode).
    • Number of SIP messages handled in survivable mode.
    • Number of SIP users registered locally in survivable mode (both existing based on cache, and separately - new registrations).
Configure Remote Site Survivability

You must enable remote site survivability on the Oracle® Enterprise Session Border Controller (E-SBC) and set the parameters before the system can enter and exit survival mode.

  • Confirm that at least one session is configured.

The Web GUI displays the Survivability configuration parameters on the Settings page. Use the following procedure to enable remote site survivability, specify a triggering device, and optionally change the default settings.

  1. Access the Settings configuration object: Configuration, Settings.
  2. Under Survivability, do the following:

Devices Configuration

Use Devices to access the following configuration objects.

Add a PBX

You can perform the minimum configuration needed to connect a PBX to the Oracle® Enterprise Session Border Controller (E-SBC) from the Configuration tab in Basic mode.

  • Configure inbound and outbound translation rules.
  • Note any System Programming Language (SPL) options that you want to add.
  • Confirm that the system displays the Basic mode.

  1. Access the PBX configuration object: Configuration, Devices, Add, PBX.
    The system displays the Add PBX dialog.
  2. In the Add PBX dialog, do the following:
  3. Click OK.
  4. Save the configuration.
  • Configure the Trunk.
Add a Trunk

You can perform the minimum configuration needed to make connect a SIP Trunk to the Oracle® Enterprise Session Border Controller (E-SBC) from the Configuration tab in Basic mode.

  • Configure inbound and outbound translation rules.
  • Note any System Programming Language (SPL) options that you want to add.
  • Confirm that the system displays the Basic mode.
  1. Access the Trunk configuration object: Configuration, Devices, Add, Trunk.
    The system displays the Add SIP Trunk dialog.
  2. In the Add SIP Trunk dialog, do the following:
  3. Click OK.
  4. Save the configuration.
  • Configure optional network elements, such as Time Division Multiplexing (TDM), additional devices, a recording server, or remote workers.
  • Configure routing policies.
Add a Remote Worker

A remote worker is a device that you set up outside of your network, which you connect to the Oracle® Enterprise Session Border ControllerE-SBC) from the remote location.

  1. Access the Remote Worker configuration object: Configuration, Devices, Add, Remote Workers.
  2. In the Add Remote Worker dialog, do the following:
  3. Click OK.
  4. Save the configuration.
Add a SIP Device

  • Configure inbound and outbound translation rules.
  • Note any System Programming Language (SPL) options that you want to add.
  • Confirm that the system displays the Basic mode.
  1. Access the SIP Device configuration object: Configuration, Devices, Add, Device.
    The system displays the Add device dialog.
  2. In the Add device dialog, do the following:
  3. Click OK.
  4. Save the configuration.
  • Configure the Trunk.
Add a Session Recording Server

A session recording server is either a third-party call recorder or the Record and Store Server on the Oracle® Enterprise Session Border Controller (E-SBC) for recording the media transmitted in session between multiple user agents.

  1. Access the Session Recording Server configuration object: Configuration, Devices, Recording Server, Add.
  2. On the Add Session Recording Server page, do the following:
  3. Click OK.
  4. Save the configuration.
Configure a SIP Interface

You can add up to five SIP interfaces to both the Enterprise side and the Service Provider side of your Oracle® Enterprise Session Border Controller (E-SBC). You can associate a SIP interface with any configured network interface.

  • Create the TLS profile that you want to associate with each SIP interface that you configure.
  • Create the SDES profile that you want to associate with each SIP interface that you configure.
  • Configure the Session Recording Server that you want to associate with this each SIP interface that you configure.

Use the following procedure to configure a SIP interface for either the Enterprise side or the Service Provider side of the E-SBC. In the configuration process, you specify which side. Repeat the procedure for each additional SIP interface that you need.

The following list is a basic set of the available parameters. For the complete list of available parameters, see the ACLI Reference Guide. For more configuration instructions, see the ACLI Configuration Guide.

  1. Access the SIP Interface configuration object: Configuration, Devices, Add, SIP Interface.
    The Web GUI displays the Choose Side dialog.
  2. In the Choose Side dialog, click either Enterprise or Service Provider.
    The Web GUI displays the Add SIP Interface configuration page.
  3. In the Add SIP Interface configuration, do the following:

Management Configuration

Use the Management control to access the following configuration objects.

Configure Call Accounting

  • Confirm that the system displays the Basic mode.
  1. Access the Accounting configuration object: Configuration, Management, Accounting.
  2. In the Account Config dialog, do the following:
  3. Click OK.
  4. Save the configuration.
Configure SNMP Community

Configure a Simple Network Management Protocol (SNMP) community to support the monitoring of devices, such as the Oracle® Enterprise Session Border Controller (E-SBC), attached to the network for conditions that warrant administrative attention.

  • Confirm that SNMP is configured.
  • Note the IP addresses that you want for this community.

Use this procedure to group network devices and management stations, and to set the access rights for the community.

Note:

Only devices that support SNMPv1 and SNMPv2c protocol can use SNMP community strings. SNMPv3 uses username and password authentication, along with an encryption key.
  1. Access the SNMP Community configuration object: Configuration, Management, SNMP Community.
  2. On the SNMP community page, click Add, and do the following:
  3. Click Close.
  4. Save the configuration.
Configure an SNMP Trap Receiver

You can define one or more SNMP trap receivers on an Oracle® Enterprise Session Border Controller (E-SBC) for redundancy or to segregate alarms with different severity levels to individual trap receivers.

  • Confirm that SNMP is configured.
  • Note the names of users who are allowed to receive secure traps.

Oracle recommends that you configure each server with an NMS installed as a trap receiver on each ESBC managed by an NMS. When configuring the trap-receiver element for use with Network Management Systems, Oracle recommends setting the filter-level parameter to All.

  1. Access the Trap Receiver configuration object: Configuration, Management, Trap Receiver.
  2. On the Trap receiver page, click Add.
  3. On the Add trap receiver page, do the following.
  4. Click OK.
  5. Save the configuration.
Web Server Configuration

The Web server is a software application that helps to deliver Web content that you can access through the Internet. The Web server runs the Enterprise application called the Web GUI.

Every Web server has an IP address and sometimes a domain name. For example, if you enter the URL http://www.acmepacket.com/index.html in your browser, the browser sends a request to the Web server with domain name is acmepacket.com. The server fetches the page named index.html and sends it to the browser.

If you enter http://132.45.6.5, and this address has been configured by your Administrator to access the Web GUI, the server fetches the page and displays the Web GUI logon page to your browser.

Configure a Web Server

You can configure Transport Layer Security (TLS) on the Web Server to enhance security.

  • Confirm that at least one TLS profile exists.

Enable the Web server, specify connection to the Oracle® Enterprise Session Border Controller, and select a TLS profile.

  1. Access Web Server configuration object: Management, Web Server.
  2. On the Web Server Config page, do the following.
  3. Click OK.
  4. Save the configuration.

Network Configuration

Use the Network control to access the following configuration objects.

Host Routes

Host routes let you insert entries into the Oracle® Enterprise Session Border Controller (E-SBC) routing table. These routes affect traffic that originates at the E-SBC host process. Host routes are used primarily for steering management traffic to the correct network.

When traffic is destined for a network that is not explicitly defined on an E-SBC, the default gateway is used. If you try to route traffic to a specific destination that is not accessible through the default gateway, you need to add a host route. Host routes can be thought of as a default gateway override.

Certain SIP configurations require that the default gateway is located on a front media interface. In this scenario, if management applications are located on a network connected to a rear-interface network, you need to add a host route for management connectivity.

When source-based routing is used, the default gateway must exist on a front media interface. Host routes might be needed to reach management applications connected to a wancom port in this kind of situation.

Add a Host Route

You can configure the Oracle® Enterprise Session Border Controller (E-SBC) to steer management traffic to the correct network by inserting an entry in the routing table.

Use the following procedure to insert an entry into the E-SBC routing table.

  1. Access the Host Route configuration object: Configuration, Network, Host Route.
  2. On the Host Route page, click Add.
  3. In the Add Host Route dialog, do the following.
  4. Click OK to save the host route.
    The host route that you created displays in the Host Routes table.
  5. Click Close.
  6. Save the configuration.
Network Interface Configuration

The Network Interface configuration object specifies a logical network interface. In order to use a network port on a network interface, you must configure both the physical interface and the corresponding network interface configuration elements.

Add a Network Interface

Use the Network Interface configuration object to create and configure a logical network interface.

You can add a network interface from the Web GUI in either Basic mode or Expert mode. If the network interface does not use VLANs tagging, ensure that the sub-port ID field is set to 0, the default value. When you set VLAN tags on a network interface, the valid sub-port ID value can range from 1-4096. The Network Interface object is a multiple instance configuration element. The combination of the name field and the sub-port ID field must be unique in order to identify a discrete network interface. Except where noted, you can use an IPv6 IP address in any parameter in the following procedure.

  1. Access the Network Interface configuration object: Configuration, Network, Network Interface.
  2. In the Network Interface dialog, click Add.
  3. In the Add Network Interface dialog, do the following:
  4. Click OK.
  5. Save the configuration

Others Configuration

Use the Other control to access the following multi-instance configuration objects.

Configure Media Profile

You can configure one or more media profiles for the Oracle® Enterprise Session Border Controller to use as a rules for sending and receiving media over the network.

In the following procedure, you can configure:
  • One media profile for a particular SIP SDP encoding, such as G729, by providing a unique name to identify the profile for the particular encoding type.
  • Multiple media profiles for the same SIP SDP encoding by adding a sub-name to the configuration. The system uses the sub-name plus the profile name as the unique identifier.
  1. Access the Media Profile configuration object: Others, Media profile.
  2. On the Media Profile page, do the following.
  3. Click OK.
  4. Save the configuration.
Configure Translation Rules

You can configure the Oracle® Enterprise Session Border Controller (E-SBC) to use number translation to change a layer 5 endpoint name according to prescribed rules. For example, to add or to remove a 1 or a + from a phone number sent from or addressed to a device. Use the translation-rules element to create unique sets of translation rules to apply to calling and called party numbers.

In the following procedure, you set the translation type, define the string to add or delete, and set the character position (index) where the add, delete, or replace occurs in the string. The index starts at 0, immediately before the leftmost character, and increases by 1 for every position to the right. Use the $ character to specify the last position in a string.

  1. Access the Translation Rules configuration object: Configuration, Others, Translation rules.
  2. On the Translation rules page, click Add, and do the following:
  3. Click OK.
  4. Save the configuration.
Configure SIP Features

Use the SIP Feature configuration object to define how the Oracle® Enterprise Session Border Controller (E-SBC) handles option tags in the SIP Supported header, Require header, and the Proxy Require header.

You can specify whether a SIP feature is applied to a specific realm or globally across all realms. You can also specify the treatment for an option based upon whether is appears in an inbound or outbound packet. You need to configure option tag handling in the SIP feature element only when you want a treatment other than the default.

  1. Access the SIP Features configuration object: Configuration, Others, Sip Features.
  2. On the Sip Feature page, do the following:
  3. Click OK.
  4. Save the configuration.
SIP Manipulations

SIP header manipulation allows you to add, delete, or modify SIP message attributes on the Oracle® Enterprise Session Border Controller (E-SBC). For example, SIP headers and SIP header elements.

The most common reason for manipulating SIP headers and SIP header elements is to fix an incompatibility problem between two SIP endpoints. For example, Softswitch - PSTN incompatibility or a SIP messaging problem between two different IP PBX platforms in a multi-site deployment where calls between the platforms are unsuccessful due to problems in the SIP messaging.

To enable the SIP header manipulation, create rule sets in which you specify header manipulation rules and, optionally, header element manipulation rules. SIP header elements are the sub-parts of the header, such as the header value, the header parameter, the URI parameter, and so on, excluding the header name. You can specify the actions that you want the system to perform for each header element.

After creating the header manipulation rule set, apply it to a session agent or SIP interface as "inbound" or "outbound."

SIP Header Manipulation Configuration

Configuring SIP manipulations from the Web GUI is a multi-faceted process performed through a series of nested dialogs that differ depending on the particular header and header element that you want to manipulate. It is not practical to document the entire SIP manipulations configuration process in one procedure. The documentation begins with the "Configure SIP Manipulation", topic where you can set the global parameters, if that is all you need. The documentation continues with procedures for each particular header and header element that you can manipulate. Each of those topics includes the global settings, so you can set or modify them there, as well.

header and header element that you can manipulate include the following:
  • Configure MIME Rule—includes the mime-header-rule element.
  • Configure MIME ISUP Rule—includes the mime-header-rule and isup-param-rule elements.
  • Configure MIME SDP Rule—includes the mime-header-rule, sdp-session-rule, and the sdp-media-rule.

When you finish configuring SIP manipulations, apply the rules to a session agent or SIP interface as "inbound" or "outbound."

SIP Manipulations Rules Attributes and Values Reference

Refer to the following table for information about the attributes that you can configure for SIP manipulation rules.

Attributes Values and Descriptions
Action
  • add—Adds a new header, if that header does not exist.
  • delete—Deletes the header, if it exists.
  • find-replace-all—Finds all matching headers and replaces with the header you specified for “Split” and "Join."
  • log—Logs the header.
  • manipulate—Manipulates the elements of this header to the element rules configured.
  • monitor—Monitors the header.
  • store—Stores the header.
  • none—(default) No action is taken.
  • reject—Rejects the header.
  • sip-manip—Manipulates the SIP elements of this header to the element rules configured.

Default: None.

Comparison type
  • boolean—Header is compared to header rule and must match exactly or it is rejected.
  • case-insensitive—Header is compared to header rule regardless of the case of the header.
  • case-sensitive—(default) Header is compared to the header rule and case must be exactly the same or it is rejected.
  • pattern-rule—Header is compared to the header rule and the pattern must be exactly the same or it is rejected.
  • refer-case-insensitive—Header is compared to the header rule regardless of the case in a REFER message.
  • refer-case-sensitive—Header is compared to the header rule and the case must be exactly the same as in the REFER message or it is rejected.

Default: Case-sensitive.

Format
  • ascii-string - A character-encoding scheme that represents text (128 ASCII codes, 7 bits).
  • binary-ascii - An encoding scheme where each byte of an ASCII character is used. Can use up to 256 bit patterns .
  • hex-ascii - An encoding scheme that uses a string of numbers (no spaces) to represent each ASCII character.
Header name The name of the header to which the rule applies. Case-sensitive.
Match value The value that you want to match against the element value for an action to be performed.
Match val type The type of value to match to the match-field entry for the action to be performed.
  • any—(default) Element value in the SIP message is compared with the match-value field entry. If the match-value field is empty, all values are considered a match.
  • fqdn—Element value in the SIP message must be a valid FQDN to be compared to the match-value field entry. If the match-value field is empty, any valid FQDN is considered a match. If the element value is not a valid FQDN, it is not considered a match.
  • ip—Element value in the SIP message must be a valid IP address to be compared to the match-value field entry. If the match-value field is empty, any valid IP address is considered a match. If the element value is not a valid IP address, it is not considered a match.
Media type (SDP descriptor for SDP media rule)
  • m—Media name and transport address
  • i—Media title
  • c—Connection information (optional when configured at the session level)
  • b—Zero or more bandwidth information lines
  • k—Encryption key
  • a—Zero or more media attribute lines
  • t—The session time is active
  • r—Zero or more repeat times
Methods SIP method names to which you want to apply the header rule. For example, INVITE, ACK, BYE. When this field is empty, the system applies the MIME rule to all methods. Default: Blank.
Mime header The parameter name to which the rule applies. The parameter name depends on the element name you entered. For uri-param, uri-user-param, and header-param it is the parameter name to be added, replaced, or deleted. For all other types, it serves to identify the element rule and any name can be used. Alpha-numeric characters. Default: blank.
Msg type
  • any—(default) Requests, replies, and out-of-dialog messages
  • out-of-dialog—Out of dialog messages only.
  • reply—Reply messages only
  • request—Request messages only

Default: Any.

Name The name you want to use for the rule. Default: Blank.
New value The value for a new element or replacement value for an existing element. You can enter an expression that includes a combination of absolute values, pre-defined parameters, and operators.
  • Absolute values—Use double quotes for clarity. You must escape all double quotes and back slashes that are part of an absolute value, and enclose the absolute value in double quotes.
  • Pre-defined values.—Pre-defined parameters always start with a $. For valid values, see the Pre-defined Parameters table.
  • Operators parameters—For valid values, see the Operators table.
The following table describes the pre-defined parameters.
Pre-defined Parameter Description
$ORIGINAL Original value of the element is used.
$LOCAL_IP IP address of the SIP interface on which the message was received for inbound manipulation; or sent on for outbound manipulation.
$REMOTE_IP IP address the message was received from for inbound manipulation; or being sent to for outbound manipulation.
$REMOTE_VIA_HOST Host from the top Via header of the message is used.
$TRUNK_GROUP Trunk group is used.
$TRUNK_GROUP_CONTEXT Trunk group context is used.
The following table describes the Operators.
Operator Description
+ Append the value to the end. For example:

acme”+”packet

generates acmepacket

+^ Prepends the value. For example:

acme”+^”packet

generates packetacme

- Subtract at the end. For example:

112311”-”11

generates 1123

-^ Subtract at the beginning. For example:

112311”-^”11

generates 2311

Parameter name The parameter name to which the rule applies. The parameter name depends on the element name you entered. For uri-param, uri-user-param, and header-param it is the parameter name to be added, replaced, or deleted. For all other types, it serves to identify the element rule and any name can be used. Alpha-numeric characters. Default: Blank.
Type The type of element on which to perform the action. Default: Blank.
  • header-param—Perform the action on the parameter portion of the header.
  • header-param-name—Perform the action on the header parameter name.
  • header-value—Perform the action on the header value.
  • mime—Perform the action on Multipurpose Internet Mail Extensions (MIME).
  • reason-phrase—Perform the action on reason phrases.
  • status-code—Perform the action on status codes.
  • teluri-param—Perform the action on a SIP telephone Uniform Resource Identifier (URI).
  • uri-display—Perform the action on the display of the SIP URI.
  • uri-header—Perform the action on a header included in a request constructed from the URI.
  • uri-header-name—Perform the action on a SIP URI header name.
  • uri-host—Perform the action on a Host portion of the SIP URI.
  • uri-param—Perform the action on the parameter included in the SIP URI.
  • uri-param-name—Perform the action on the name parameter of the SIP URI.
  • uri-phone-number-only—Perform the action on a SIP URI phone number only.
  • uri-port—Perform the action on the port number portion of the SIP URI.
  • uri-user—Perform the action on the user portion of the SIP URI.
  • uri-user-only—Perform the action on the user portion only of the SIP URI.
  • uri-user-param—Perform the action on the user parameter of the SIP URI.
Type (SDP descriptor for SDP line rule)
  • v—Protocol version
  • o—Originator and session identifier
  • s—Session name
  • i—Session information
  • u—URI of description
  • e—Email address
  • p—Phone number
  • c—Connection information (not required when included in all media)
  • b—Zero or more bandwidth information lines or one or more time descriptions("t=" and "r=" lines)
  • z—Time zone adjustments
  • k—Encryption key
  • a—Zero or more session attribute lines or zero or more media descriptions
  • t—Time the session is active
  • r—Zero or more repeat times
Configure SIP Manipulation

When you need to modify specific components of a SIP message, configure a SIP manipulation rule. For example, you might need to resolve protocol differences between vendors. You can configure rules for SIP headers and for the sub-elements within the headers.

To begin, configure the Name, Description, (Optional) Split Headers, and (Optional) Join Headers attributes. When you reach the "Cfg Rules" section, click Add and select the header rule that you want to create. For further instructions, refer to the topics noted in the Cfg rules "Instructions" cell in the following table.

  1. Access the SIP Manipulation configuration object: Configuration, Others, SIP Manipulation.
  2. In the SIP manipulation dialog, do the following.
  3. Click OK.
  4. Save the configuration.
  • Apply the rules to a session agent or SIP interface as "inbound" or "outbound."
Configure a SIP Manipulation Header Rule

You can configure SIP header rules and element rules on the Oracle® Enterprise Session Border Controller (E-SBC) from the "CfgRules" section of the "SIP Manipulations" page.

In the following procedure, you set the SIP Header Manipulation, Header Rule, and Element Rule parameters.

  1. Access the SIP Manipulation configuration object.
    Configuration, System Administration, SIP Manipulation.
  2. On the SIP Manipulation configuration page, do one of the following:
    1. Select and existing SIP manipulation configuration from the table, right-click, and click Edit. (Subsequent SIP manipulation pages use "Modify" in the title.)
    2. Click Add. (Subsequent SIP manipulation pages use "Add" in the title.)
  3. On the Add or Modify SIP Manipulation page, do one of the following.
    1. If you chose Add, you must enter a name for this SIP Manipulation. (You can optionally complete the Description, Split Headers, and Join Headers parameters, at this time. See "Configure SIP Manipulation.") Proceed to the next step.
    2. If you chose to edit an existing configuration, proceed to the next step.
  4. On the Add or Modify SIP Manipulation page under Cgf Rules, click Add and click header-rule.
  5. On the Add SIP Manipulation / Header Rule page, do the following.
  6. Click Back.
    The system displays the Modify SIP Manipulation page.
  7. Click Back.
    The system displays the SIP Manipulation page.
  8. Save the configuration.
Configure a MIME Rule

You can configure Multi-Purpose Internet Mail Extensions (MIME) header rules and element rules on the Oracle® Enterprise Session Border Controller (E-SBC) from the "CfgRules" section of the "SIP Manipulations" page.

In the following procedure, you set the SIP Header Manipulation, MIME Rule, and MIME Header Rule parameters.

  1. Access the SIP Manipulation configuration object.
    Configuration, System Administration, SIP Manipulation.
  2. On the SIP Manipulation configuration page, do one of the following:
    1. Select and existing SIP manipulation configuration from the table, right-click, and click Edit. (Subsequent SIP manipulation pages use "Modify" in the title.)
    2. Click Add. (Subsequent SIP manipulation pages use "Add" in the title.)
  3. On the Add or Modify SIP Manipulation page, do one of the following.
    1. If you chose Add, you must enter a name for this SIP Manipulation. (You can optionally complete the Description, Split Headers, and Join Headers parameters, at this time. See "Configure SIP Manipulation.") Proceed to the next step.
    2. If you chose to edit an existing configuration, proceed to the next step.
  4. On the Add or Modify SIP Manipulation page under Cfg Rules, click Add and click mime-rule.
  5. On the Add or Modify SIP Manipulation / Mime Rule page, do the following.
  6. Click Back.
    The system displays the Add or Modify SIP Manipulation page.
  7. Click Back.
    The system displays the SIP Manipulation page.
  8. Save the configuration.
Configure a MIME ISUP Rule

You can configure Multi-Purpose Internet Mail Extensions (MIME) header rules and element rules on the Oracle® Enterprise Session Border Controller (E-SBC) from the "CfgRules" section of the "SIP Manipulations" page.

In the following procedure, you set the SIP Header Manipulation, MIME ISUP Rule, MIME Header Rule, and ISUP Param Rule parameters.

  1. Access the SIP Manipulation configuration object.
    Configuration, System Administration, SIP Manipulation.
  2. On the SIP Manipulation configuration page, do one of the following:
    1. Select and existing SIP manipulation configuration from the table, right-click, and click Edit. (Subsequent SIP manipulation pages use "Modify" in the title.)
    2. Click Add. (Subsequent SIP manipulation pages use "Add" in the title.)
  3. On the Add or Modify SIP Manipulation page, do one of the following.
    1. If you chose Add, you must enter a name for this SIP Manipulation. (You can optionally complete the Description, Split Headers, and Join Headers parameters, at this time. See "Configure SIP Manipulation.") Proceed to the next step.
    2. If you chose to edit an existing configuration, proceed to the next step.
  4. On the Add or Modify SIP Manipulation page under Cfg Rules, click Add and click mime-header-rule.
  5. On the Add or Modify SIP Manipulation / Mime ISUP Rule page, do the following.
  6. Click Back.
    The system displays the Add or Modify SIP Manipulation page.
  7. Click Back.
    The system displays the SIP Manipulation page.
  8. Save the configuration.
Configure a MIME SDP Rule

You can configure Multi-Purpose Internet Mail Extensions (MIME) header rules and element rules on the Oracle® Enterprise Session Border Controller (E-SBC) from the "CfgRules" section of the "SIP Manipulations" page.

In the following procedure, you set the SIP Header Manipulation, MIME SDP Rule, MIME Header Rule, SDP Session Rule, and SDP Media Rule parameters.

  1. Access the SIP Manipulation configuration object.
    Configuration, System Administration, SIP Manipulation.
  2. On the SIP Manipulation configuration page, do one of the following:
    1. Select and existing SIP manipulation configuration from the table, right-click, and click Edit. (Subsequent SIP manipulation pages use "Modify" in the title.)
    2. Click Add. (Subsequent SIP manipulation pages use "Add" in the title.)
  3. On the Add or Modify SIP Manipulation page, do one of the following.
    1. If you chose Add, you must enter a name for this SIP Manipulation. (You can optionally complete the Description, Split Headers, and Join Headers parameters, at this time. See "Configure SIP Manipulation.") Proceed to the next step.
    2. If you chose to edit an existing configuration, proceed to the next step.
  4. On the Add or Modify SIP Manipulation page under Cfg Rules, click Add and click mime-sdp-rule.
  5. In the Add or Modify SIP Manipulation / MIME SDP Rule page, do the following.
  6. Click Back.
    The system displays the Add or Modify SIP Manipulation page.
  7. Click Back.
    The system displays the SIP Manipulation page.
  8. Save the configuration.
Add an SPL

Add an SPL plug-in, which is a customized script, to quickly implement a feature on the Oracle® Enterprise Session Border Controller (E-SBC). The SPL plug-in augments running the software image on the E-SBC, and provides new features when you need them without having to upgrade the software.

  • Confirm the name and location of the SPL plug-in that you want to add.

Use the following procedure to integrate an Oracle-signed plug-in with the E-SBC operating system. Note that the E-SBC) does not load an unsigned SPL or one with invalid signatures.

  1. Access the SPL configuration object: Configuration, Other, SPL.
  2. In the SPL Config dialog, do the following:
  3. Click OK.
  4. Save the configuration.

SBC Configuration

Use the SBC control to access the following configuration objects. See the documentation specified in the following list for explanations of these configuration objects and how to set their parameters.

Security Configuration

Use the Security control to access the following configuration objects. See the documentation specified in the following list for explanations of these configuration objects and how to set their parameters.

Expert Mode Configuration

Expert mode offers more configuration objects than Basic mode, which offers a limited set of configuration objects and is generally used only for proof of concept and testing purposes. Use Expert mode to see all of the features and settings available to help you fully customize the Oracle® Enterprise Session Border Controller (E-SBC) to your requirements.

The Expert mode configuration workspace displays a list of configuration objects and elements in the navigation pane. You can display them in either tree view (categorical) or list view (alphabetical) by way of Preferences from the User menu. When you click an object in navigation pane, the corresponding configuration dialog displays in the center pane.

This screen capture shows the whole Configuration tab page, with navigation on the left in tree format and in alphabetical format in the center.

Caution:

The Web GUI does not indicate required parameters or display an error message for those that contain no value. You may be able to save a configuration with a missing required value because the E-SBC ignores the parameter when it is not configured. The end result is a faulty configuration. Use the verify control that displays in every configuration dialog to validate the configuration.

Expert Mode Configuration Controls

The Oracle® Enterprise Session Border Controller (E-SBC) Web GUI provides the following tools for working with configurations. Some tools are located in the navigation pane and others are located at the top of the center pane.

The Configuration Tab Display

The following screen capture shows the locations of all of the Configuration tab controls.

This screen capture shows all of the controls in their locations on the configuration page.

Controls in the Navigation Pane

The navigation pane displays links to Configuration Wizards and Show Commands. (Descriptions are listed in the center pane.) The Wizards help you specify certain parts of the configuration and the Commands show you information about the configuration of the system.

This screen capture shows the list of configuration wizards and provides their descriptions

This screen capture shows the list of show commands and provides their descriptions

Controls in the Center Pane

The controls located at the top of the center pane on a configuration page help you manage configuration objects.

This screen capture shows the controls located at the top of the center pane on any configuration pane. The are described in the following table.

Controls for Multi-Instance Objects

The controls located at the top of a list of multi-instance objects help you manage the objects on the list. The following screen capture shows the controls.

This screen capture shows the controls located at the top of the center pane on any multi-instance list. The are described in the following table.

Using Tag Fields

The Oracle® Enterprise Session Border Controller provides a configuration element data field referred to as a tag. You enter information into the tag field for descriptive and grouping purposes. You can establish your own criteria for labeling configuration elements with these tags. Tag fields have no operational effect on signaling services.

The following configuration objects display the Tags text field:

  • Agents
  • Users
  • Routes

You can enter any text that you want into the field and you can apply as many tags to a configuration object as needed. You can filter the element list searches using tags as a means of organizing these objects. Applicable element list search fields include a down arrow that exposes a tag drop-down list, from which you select the tag on which to filter the list. Tags have no operational function other than supporting this kind of filtering.

Edit, Copy, and Delete Configurations

You can edit, copy, and delete multi-instance configurations by way of the controls that the Web GUI displays on each multi-instance configuration page. The edit and copy functions act only on a single instance of a configuration. The delete function can act on either a single instance or all instances.

To edit, copy, or delete a single multi-instance configuration, select the configuration and right-click. The Web GUI displays the edit, copy and delete menu.

This screen capture shows the right-clivk menu for the edit, copy, and delete opetations. It also shows Delete All in the tool bar at the top of the page.

When you click Delete, the system displays a confirmation dialog before performing the operation. When you click either Copy or Edit, the GUI displays the configuration dialog.

To delete all configurations at the same time, use Delete All.

Caution:

You cannot select several instances and delete only those. The system deletes them all, regardless of how many you select. For example, if you select two of three configurations and click Delete All, the system deletes all three.

Media Manager Configuration

Use the Media Manager configuration object to define the settings for the media steering functions performed by the Oracle® Enterprise Session Border Controller (E-SBC), including timer limits, logging, and trust levels.

You can configure the following Media Manager objects from the Configuration tab on the Web GUI. See the documentation specified in the following list for explanations of these configuration objects and how to set their parameters.

Codec Policy Configuration

Codec policies describe how to manipulate SDP messages as they cross the Oracle® Enterprise Session Border Controller (E-SBC). The E-SBC bases its decision to transcode a call on codec policy configuration and the SDP. Each codec policy specifies a set of rules to be used for determining which codecs are retained or removed, and how they are ordered within SDP.

When configuring transcoding, you create a codec policy and associate the policy to a realm. In the codec policy, you specify:

  • Which codecs to allow and which codecs to deny within a realm.
  • Which codecs to add to the SDP m= lines for an egress realm.
  • The preferred order of codecs shown in an SDP m= line.
  • The packetization time to enforce within a realm for transrating.
Add a Codec Policy

You can create policies to specify how the Oracle® Enterprise Session Border Controller (E-SBC) manipulates SDP offers before passing the INVITE to the end point. For example, you might want to strip or re-order codecs when the originating device sends a particular codec that the end point does not support or prefer. Or, you might want to add codecs for transcoding. To simplify SIP end point management, the E-SBC can apply global codec policy enforcement to all end points.

Use the codec-policy configuration element to specify how the E-SBC handles codecs, and which codecs you want to allow.

  1. Access the Codec Policy configuration object: Configuration, Media Manager, Codec Policy.
  2. On the Add Codec Policy page, do the following:
  3. Save and activate the configuration.
Configure DNS ALG Constraints

You can limit throughput bound for DNS ALG by using the DNS ALG Constraints configuration element. The system performs message throttling on request messages, and the responses are automatically throttled because DNS-ALG is transaction stateful. The system displays a list of configured DNS ALG Constraints in the DNS Config dialog, which allows you to create constraint profiles and apply them to multiple DNS configuration objects.

This procedure requires you to enter rate and time constraints, which you might want to determine in advance. Note that 0 (zero) means unlimited.

  1. Access the DNS ALG Constraints configuration object: Configuration, Media Manager, DNS ALG Constraints.
  2. On the DNS ALG Constraints page, click Add.
  3. On the Add DNS ALG Constraints page, do the following:
  4. Click OK.
  5. Save the configuration.
  • Apply the constraint to a DNS configuration.
Configure DNS

Use the DNS Config element to configure the DNS ALG service.

  • Configure a DNS ALG constraint, if you want to apply one to this DNS configuration.
  • Configure a server realm, if you want to add server DNS attributes.

Configure DNS for Application Gateway Service (ALG) per client, per realm.

  1. Access the DNS Config configuration object: Configuration, Media Manager, DNS Config.
  2. On the Add DNS Config page, to the following:
  3. Click OK.
  4. Click OK.
  5. Click OK.
  6. Save the configuration.
Configure ICE Profile

Interactive Connectivity Establishment - Session Traversal Utility for NAT (ICE STUN lite mode) enables a Advanced Media Termination client to perform connectivity checks, and can provide several STUN servers to the browser. ICE STUN support requires configuring an ICE Profile under Realm Config, where you define the STUN behavior.

  • Confirm that the realm to which you want to apply this profile exists.
Use the following steps to create an ICE Profile.
  1. Access the ICE Profile configuration object: Configuration, Media Manager, ICE Profile.
  2. In the Add ICE Profile dialog, do the following:
  3. Click OK.
  • Set the ICE Profile parameter in Realm Config. See "Configure Advanced Media Termination in realm-config."
Configure Media Manager

Use the Media Manager element to define parameters used in the media steering functions performed by the Oracle® Enterprise Session Border Controller, including the flow timers.

  1. Access the Media Manager configuration object: Configuration, Media Manager, Media Manager.
  2. On the Media Manager page, do the following:
  3. Click OK.
  4. Save the configuration.
Generate an RTCP Receiver Report

When you want to generate a Real-Time Transport Control Protocol (RTCP) Receiver Report separately from the default Sender-Receiver Report (RFC 3550), for example to encapsulate the receiver statistics differently, add the xcode-gratuitous-rtcp-report-generation option in the media-manager configuration. After you add the option and reboot the system, the E-SBC runs RTCP Receiver Reports for all media sessions that generate RTCP from DSPs.

When you add the xcode-gratuitous-rtcp-report-generation option, be sure to type the + character before the option. The + character appends the new option to the realm configuration's options list. Without the + character, the system overwrites any previously configured options.

  1. Access the Media Manager configuration object: Configuration, Media Manager, Media Manager.
  2. Go to the Options parameter, and do the following.
    1. Click Add.
    2. In the Add dialog, enter + xcode-gratuitous-rtcp-report-generation.
    3. Click OK.
  3. Save and activate the configuration.
  4. Reboot the system.
Configure Media Policy

Use the Media Policy element to configure the Type of Service (TOS) and Differentiated Services (DiffServ) values that define a type or class of service. Apply the media policy to one or more realms.

In the following procedure, you can enter any of the media types defined by the Internet Assigned Numbers Authority (IANA). For example, audio, example, image, message, model, multi-part, text, and video. You can enter any of the sub-media types defined by the IANA for a specific media type. For example, for the Image media type, you can use the sub-type jpeg. (image/jpeg)

  1. Access the Media Policy configuration object: Configuration , Media Manager, Media Policy.
  2. On the Media Policy page, click Add.
  3. On the Add Media Policy page, do the following:
  4. Click OK.
  5. Save the configuration.
Configure a Realm

Use the Realm Config element to configure a realm for the Oracle® Enterprise Session Border Controller (E-SBC).

  • Configure a physical interface.
  • Configure a network interface.
  • If you use Quality of Service (QoS), confirm that QoS is enabled on the E-SBC.

Note:

In Advanced mode, in a table that contains the Realm ID column, you can click a cell in the column to view the realm configuration.
  1. Access the Realm Config configuration object: Configuration, Media Manager, Realm Config, Add.
  2. In the Realm Config object, do the following:
  3. Save the configuration.
Configure a Steering Pool

Use the steering-pool element to define sets of ports used to steer media flows through the Oracle® Enterprise Session Border Controller to provide packet steering to ensure a level of quality or a routing path.

  • Configure and name the network interface to which you want to steer media.

In the following procedure, the combination of IP address, start port, and realm ID, must be unique.

  1. Access the Steering Pool configuration object: Configuration, Media Manager, Steering Pool.
  2. On the Steering Pool page, do the following:
  3. Save the configuration.
Configure TCP Media Profile

The TCP Media Profile defines media operations in a realm. You can create multiple TCP Media Profiles, for example, to assign to different realms.

  1. Access the TCP Media Profile configuration object: Configuration, Media Manager, TCP Media Profile, Add.
  2. On the Add TCP media profile page, enter a Name for this profile. Required before you can proceed.
  3. Under Profile List, click Add.
  4. On the Add TCP media profile / profile entry page, do the following:
    Media type Set the media type subject to this profile. Default: message. Keep the default value for MSRP operations.
    Transport Protocol Set the Transport Layer Protocol (TLS) that you want for this profile. Use either TCP/MSRP to specify unsecured TCP traffic or TCP/TLS/MSRP to specify secured and encrypted TLS traffic.
    Listen Port Set the TCP port to use for incoming B2BUA MSRP connections. Range: 0-65535. Default: 0, which tells the B2BUA to choose the port from the steering pool of the realm associated with this profile.
    Preferred Setup Role Set the value the B2BUA uses for the a=setup attribute when negotiating the setup role. Valid values: Active (Allows the B2BUA to create an outgoing connection.) | Passive. Default: Passive (Allows the B2BUA to accept an incoming connection.) Oracle recommends Passive.
    TLS Profile If you set TCP/TLS/MSRP for transport-protocol, select a TLS profile that specifies cryptographic resources available to support TLS operations.
    Require Fingerprint If you set TCP/TLS/MSRP for transport-protocol, enable TLS fingerprint for endpoint authentication using the certificate fingerprint methodology defined in RFC 4572 Connection-Oriented Media Transport over the Transport Layer Security (TLS) Protocol in the Session Description Protocol (SDP).. Valid values: enabled | disabled. Default: disabled.
    MSRP CEMA Support Specify whether or not the SBC negotiates support for the CEMA extension (RFC6714) for TCP or TLS connections to and from the realm associated with the current TCP media profile. Enable the CEMA extension to enable the SBC to exchange MSRP traffic through middleboxes that anchor the media, but do not touch the SDP a:path attribute. Valid values: enabled | disabled. Default: disabled.
    MSRP Sessmatch Specify whether or not the SBC validates the MSRP To-Path header based only on the session-id field and MSRP transport type of the MSRP URI (and not also on the IP address and port number in the authority part of the MSRP URI). Sessmatch enables the SBC to exchange MSRP traffic through Middleboxes that anchor the media and also adjust the SDP a=path attribute. Valid values: enabled | disabled. Default: disabled.
    MSRP Message Size Enforce Specify one element in a whitelist of allowed MSRP media types. Media types not included on the whitelist will be removed from the SDP a=accept-types attribute of the SDP offers. A "*" indicates that all MSRP media types are allowed. When left empty, it indicates that no media types filtering is performed. Valid value: MsrpMediaTypeList.
    MSRP Message Size Specify the maximum size (in bytes) that MSRP is allowed to negotiate for the messages. It represents the maximum limit for the SDP a=max-size attribute, for the "size" token of the SDP a=file-selector attribute and MSRP Byte-range header. A value of 0 indicates that no maximum limit is enforced. Valid values: 0-4,000. Default: 0.
    MSRP Message Size File Specify whether MSRP messages exceeding the negotiated size are rejected, respectively whether MRSP file transfers will be aborted when the negotiated size is exceeded. A value of 0 indicates that no maximum limit is enforced. Valid values: 0-4G. Default: 0.
    MSRP Types Whitelist Specify a list of registered MSRP media types (RFC4975) supported for the ingress realm.
  5. Click OK.
  6. Click Back.
  7. (Optional) Repeat the preceding steps to configure another tcp-media-profile.
  8. Save the configuration.
Advanced Media Termination Support

The Oracle® Enterprise Session Border Controller (E-SBC) supports VoIP calls through the browser-based, real-time communication known as Advanced Media Termination. Using W3C and IETF standards, Advanced Media Termination supports cross-browser video calls and data transfers, such as browser-based VoIP telephony and video streaming. Advanced Media Termination allows users to make and receive calls from within a web browser, relieving the need to install a soft phone application. With Advanced Media Termination, the E-SBC can enable users to communicate concurrently with one or more peers through various browsers and devices to stream voice and data communications in real-time through a variety of web applications. Advanced Media Termination also supports communications through end-user clients such as mobile phones and SIP User Agents.

Advanced Media Termination supports clients
  • connected to networks with different throughput capabilities.
  • on variable media quality networks (wireless).
  • on fire-walled networks that don't allow UDP.
  • on networks with NAT or IPv4 translation devices using any type of mapping and filtering behaviors (RFC 4787).

Supported Advanced Media Termination Services

The E-SBC supports the following services and functions for Advanced Media Termination:
  • ICE-STUN (Lite mode) - Interactive Connectivity Establishment - Session Traversal Utility for NAT (ICE-STUN) enables an Advanced Media Termination client to perform connectivity checks. Use ICE to provide several STUN servers to the browser by way of the application. ICE processing chooses which candidate to address. Other benefits include support for IPv4, load balancing, and redundancy. ICE STUN support requires configuring an ICE Profile and specifying the profile in Realm Config. See "Configure ICE Profile" and "Configure Advanced Media Termination in Realm Config."
  • RTP-RTCP multiplexing - Enables Real-Time Protocol (RTP) and Real-Time Control Protocol (RTCP) packets to use the same media port numbers. RTP is used for real-time multimedia applications, such as internet audio and video streaming, VoIP, and video conferencing. RTCP is used to monitor data transmission statistics and QoS, and helps to synchronize multiple streams. RTP-RTCP support requires enabling RTCP Mux in Realm Config. See "Configure Advanced Media Termination in Realm Config."
  • DTLS-SRTP - Datagram Transport Layer Security (DTLS) provides integrated key and association management for secure data transfer for point-to-point media sessions. DTLS is especially optimized for use with Secure Real Time Protocol (SRTP), where it enables a Advanced Media Termination client to establish keys for SRTP and Secure Real Time Control Protocol (SRTCP). DTLS-SRTP support requires configuring a DTLS SRTP Profile under Media Security, and specifying the profile in the Realm Config. See "Configure DTLS SRTP Profile" and "Configure Advanced Media Termination in realm-config."
  • SIP services including codec renegotiation, late media, early media, PACK interworking, attended and unattended call transfer, call forking, music on hold, transcoding, and High Availability.

Supported Protocols

The E-SBC supports the following protocols for Advanced Media Termination.
  • IPv4 for signaling and media
  • UDP-RTP and UDP-RTCP on media

Supported Codecs

The E-SBC supports the following codecs for Advanced Media Termination.
  • Silk, OPUS, G.729, and G.711
Advanced Media Termination Configuration Process

To configure Advanced Media Termination for theOracle® Enterprise Session Border Controller, access the Security and Media Manager configuration objects to create the necessary profiles and associations. For RTCP Multiplexing support, you need only to enable it in the target realm. Advanced Media Termination is configurable in real-time. The system does not require a reboot.

  • Confirm that the realm you want to configure for Advanced Media Termination exists.
  • Confirm that the TLS profile that you want to specify in the DTLS SRTP Profile exists.
The process for configuring Advanced Media Termination includes the following tasks:
  1. In Security: Configure DTLS SRTP Profile, where you define the key exchange and DTLS handshake, the role the SBC negotiates when offered alternatives, and the crypto suites to use. See "Configure DTLS SRTP Profile."
  2. In Media Manger:
    1. Configure ICE Profile, where you define STUN behavior. See "Configure ice-profile."
    2. Configure Realm Config, where you specify the DTLS SRTP Profile, the ICE Profile, and enable RTCp Mux. See "Configure Advanced Media Termination in Realm Config."
Configure DTLS SRTP Profile

To provide Datagram Transport Layer Security-Secure Real Time Control Protocol (DTLS-SRTP) Advanced Media Termination services on the SBC, you must create a DTLS SRTP Profile. This profile defines the key exchange and DTLS handshake on a media session, the role the SBC negotiates when offered alternatives, and the crypto suites to use. After you create this profile, enter its name in the DTLS SRTP Profile parameter in the Realm Config.

  1. Access the DTLS SRTP Profile configuration object: Configuration, Security, Media Security, DTLS SRTP Profile, Add.
  2. Do the following:
  3. Save the configuration.
  • Specify this DTLS SRTP Profile in the Realm Config.
Configure ICE Profile

Interactive Connectivity Establishment - Session Traversal Utility for NAT (ICE STUN lite mode) enables a Advanced Media Termination client to perform connectivity checks, and can provide several STUN servers to the browser. ICE STUN support requires configuring an ICE Profile under Realm Config, where you define the STUN behavior.

  • Confirm that the realm to which you want to apply this profile exists.
Use the following steps to create an ICE Profile.
  1. Access the ICE Profile configuration object: Configuration, Media Manager, ICE Profile.
  2. In the Add ICE Profile dialog, do the following:
  3. Click OK.
  • Set the ICE Profile parameter in Realm Config. See "Configure Advanced Media Termination in realm-config."
Configure Advanced Media Termination in Realm Config

To support Advanced Media Termination functionality, the Oracle® Enterprise Session Border Controller (E-SBC) requires setting the parameters for RTCP Mux, DTLS SRTP Profile, and ICE Profile in Realm Config.

  • Confirm that the realm exists that you want to configure for Advanced Media Termination operations.
  • Confirm that the DTLS SRTP Profile and the ICE Profile exist.
  1. Access the Realm Config configuration object: Configuration, Media Manager, Realm Config, Add.
  2. Do the following:
  3. Save the configuration.
Advanced Media Termination Troubleshooting

The Oracle® Enterprise Session Border Controller (E-SBC) provides Session Traversal Utility for NAT (STUN) and Datagram Transport Layer Security (DTLS) tracing.

To set STUN and DTLS tracing, go to Media Manager, Media Manager and set Options to "stun-trace dtls-trace". The E-SBC stores the STUN and DTLS traces in the Advanced Media Termination.log file.

Debug logs: log.sipd, log.mbcd, sipmsg.log, Advanced Media Termination.log

Security Configuration

The Oracle® Enterprise Session Border Controller (E-SBC) can provide security for VoIP and other multi-media services. E-SBC security includes access control, DoS attack, and overload protection to help secure service and protect the network infrastructure. E-SBC security lets legitimate users place a call during attack conditions, while protecting the service itself.

E-SBC security includes the numerous features and architecture designs of the Net-SAFE framework. Net-SAFE is a requirements framework for the components required to provide protection for the E-SBC, the service provider's infrastructure equipment (proxies, gateways, call agents, application servers, and so on), and the service itself.

You can configure the following Security objects from the Configuration tab on the Web GUI. See the documentation specified in the following list for explanations of these configuration objects and how to set their parameters.
Audit Logs

The Oracle® Enterprise Session Border Controller (E-SBC) can record user actions in audit logs by way of the Web GUI. The audit logs record the creation, modification, and deletion of all user-accessible configuration elements, as well as attempted access to critical security data such as public keys. For each logged event, the system provides the associated user-id, date, time, event type, and success or failure data.

You can configure the system to record audit log information in either verbose mode or brief mode. Verbose mode captures the system configuration after every change, and displays both the previous settings and the new settings in addition to the event details. Brief mode displays only the event details. Although you can specify the recording mode, you cannot specify which actions the system records. The following list describes the actions that the system records.

The system writes audit log events in Comma Separated Values (CSV) lists in the following format:

{TimeStamp,
src-user@address:port,Category,EventType,Result,Resource,Prev,
Detail}

The following list describes each value written to an audit log event.

As the E-SBC records audit log data, users with admin privileges can read, copy, and download that information from the Web GUI. No one can delete or edit the original log. You can View, Refresh, and Download audit logs by way of the System tab. Go to Audit Log under File Management.

You can configure the system to transfer audit log files to an SFTP server by way of secure FTP push, when conditions satisfy one of the following specifications.
  • The specified amount of time since the last transfer elapsed.
  • The size of the audit log reached the specified threshold. (Measured in Megabytes)
  • The size of the audit log reached the specified percentage of the allocated storage space.

The E-SBC transfers the audit logs to a designated directory on the target SFTP server. The audit log file is stored on the target SFTP server with a filename in the following format: audit<timestamp>. The timestamp is a 12-digit string the YYYYMMDDHHMM format.

Use the following process to configure transferring audit logs to an SFTP server.
  1. Configure secure FTP push. See "Secure FTP Push Configuration."
  2. Configure audit logging. See "Configure Audit Logging."
Secure FTP Push Configuration

You can configure the Oracle® Enterprise Session Border Controller (E-SBC) to securely send audit log files to an SFTP push receiver for storage. Configure secure FTP push before you configure audit logging.

You can configure the Oracle® Enterprise Session Border Controller (E-SBC) to log on to a push receiver using one of the following authentication methods to create a secure connection.
Password
Configure a username and password, and leave the public-key parameter blank. Note that you must also import the host key from the SFTP server to the E-SBC for this type of authentication.
Public key
Set the public-key parameter to a configured public key record name including an account username, and configure the SFTP server with the public key pair from the E-SBC.

It is also common for the SFTP server to run the Linux operating system. For Linux, the command ssh-keygen-e creates the public key that you need to import to the E-SBC. The ssh-keygen-e command sequence requires you to specify the file export type, as follows.

[linux-vpn-1 ~]# ssh-keygen -e
Enter file in which the key is (/root/.ssh/id_rsa/): /etc/ssh/ssh_host_rsa_key.pub

If you cannot access the SFTP server directly, but you can access it from another Linux host, use the ssh-keyscan command to get the key. An example command line follows.

root@server:~$ssh-keyscan -t dsa sftp.server.com
Configure Secure FTP Push with Public Key Authentication

For increased security when sending files from the Oracle® Enterprise Session Border Controller (E-SBC) to an SFTP server, you can choose authentication by public key exchange rather than by password. To use a public key exchange, you must configure public key profiles on both devices and import the key from each device into the other.

The following list of tasks shows the process for configuring authentication by public key between the E-SBC and an SFTP server. For each step in the process, see the corresponding topic for detailed instructions.

  1. Generate an RSA public key on the E-SBC. See "Generate an RSA Public Key."
  2. Create a DSA public key on the SFTP server. See "Generate a DSA Public Key."
  3. Import the DSA public key from the SFTP server into the E-SBC using the known-host option in the Import Key dialog. See "Import a DSA Public Key."
  4. Add the RSA public key to the authorized_keys file in the .ssh directory on the SFTP server. See "Copy the RSA Public Key to the SFTP Server."
Generate an RSA Public Key

Add a public key profile on the Oracle® Enterprise Session Border Controller (E-SBC) and generate an RSA key. You will later import the RSA key into the SFTP server to enable authentication by way of public key exchange with the E-SBC.

  1. Access the Public Key configuration object: Configuration, Security, Public key.
  2. On the Public Key page, click Add.
  3. In the Add Public Key dialog, do the following:
  4. Click OK to create the public key profile.
    The system displays the Public Key list box including the new profile.
  5. Save and activate the configuration.
  6. Select the newly created profile, and click Generate key.
    The E-SBC displays the key in the Generate Key text box for you to copy to the SFTP server.
  7. Save the configuration.
  • Generate a DSA public key.
Generate a DSA Public Key

Generate and save a DSA public key on the SFTP server. You will later import the DSA key into the Oracle® Enterprise Session Border Controller (E-SBC) to enable authentication by way of public key exchange with the SFTP server.

  1. Run the following command on the SFTP server:

    ssh-keygen -e -f /etc/ssh/ssh_host_dsa_key.pub | tee sftp_host_dsa_key.pub

  2. Save the key to the authorized_keys file in the .ssh directory on the SFTP server.
  • Import the DSA key into the E-SBC.
Import a DSA Public Key

Import a DSA public key from the SFTP server into the Oracle® Enterprise Session Border Controller (E-SBC).

  • Generate and save a DSA public key on the SFTP server.

Perform the following procedure on the E-SBC and select "known-host" for type.

  1. Access the SSH file system on the SFTP server by way of a terminal emulation program.
  2. On the SFTP server, copy the base64 encoded public file. Be sure to include the Begin and End markers, as specified by RFC 4716 The Secure Shell (SSH) Public Key File Format.

    For OpenSSH implementations host files are generally found at /etc/ssh/ssh_host_dsa_key.pub, or /etc/ssh/sss_host_rsa.pub. Other SSH implementations can differ.

  3. On the E-SBC, click Configuration, Security, Public Key.
  4. On the Public key page, click Import key, and do the following.
  5. Click Import.
    The E-SBC imports the key and makes it available for configuration as the public key on an external device.

Copy the RSA public key to the SFTP server.

Copy the RSA Public Key to the SFTP Server

Copy the RSA public key from the from the Oracle® Enterprise Session Border Controller (E-SBC) to the authorized_keys file in the .ssh directory on the SFTP server.

  • Confirm that the .ssh directory exists on the SFTP server.
  • Confirm the following permissions: Chmod 700 for .ssh and Chmod 600 for authorized_keys.

When adding the RSA key to the authorized_keys file, ensure that no spaces occur inside the key. Insert one space between the ssh-rsa prefix and the key. Insert one space between the key and the suffix. For example, ssh-rsa <key> root@1.1.1.1.

  1. Access the SSH file system on a configured SFTP server with a terminal emulation program.
  2. Copy the RSA key to the SFTP server, using a text editor such as vi or emacs, and paste the RSA key to the end of the authorized_keys file.
Configure Audit Logging

The Oracle® Enterprise Session Border Controller (E-SBC) provides a means of tracking user actions through Audit Logs. You can specify how the system records audit log information, and where to send the logs for archiving. You can configure the system to record in either brief or verbose mode. Verbose mode captures the system configuration after every change, and displays both the previous and new settings in addition to the event details. Brief mode displays only the event details.

  • Configure one or more push receivers to receive the audit logs. See the documentation for the receiver.
  • If you want to use public keys for authentication between the E-SBC and the push receiver, configure public key profiles on both devices before configuring audit logging. See "Configure Secure File Transfer with Public Keys."
  1. Access the Audit Logging configuration object: Configuration, Security, Security, Admin-Security, Audit Logging.
  2. On the Audit Logging page, do the following:
  3. Click OK.
  4. Save the configuration.
Configure Login Timeouts

The single instance SSH Config configuration element specifies SSH re-keying thresholds.

Use the following procedure to set the SSH and TCP timeout values.
  1. Access the SSH Config configuration object: Configuration, Security, Admin Security, SSH Config.
  2. In SSH Config, do the following:
  3. Save the configuration.
TACACS+ Authentication

The Web GUI supports TACACS+ authentication.

TACACS+ provides access control for routers, network access servers, and other networked computing devices by way of one or more centralized servers. The Oracle® Enterprise Session Border Controller (E-SBC), supports TACACS+ authentication and limited accounting services. For accounting services support, the E-SBC supports only authentication success and failure. The E-SBC does not support TACACS+ authentication.

Add TACACS+ Authentication and Servers

To configure Terminal Access Controller Access-Control System Plus (TACACS+), you enable TACACS+ client services and specify one or more TACACS+ servers.

  1. Access the Login Config configuration object: Configuration, Security, Admin Security, Login Config.
  2. On the Authentication page, do the following:
  3. Click OK.
  4. Save the configuration.
Security Settings

Security configuration from the web GUI consists of creating the building blocks used to establish TLS-secured paths for signaling traffic.

The process includes the following steps.
  1. Configure Certificate Records.
  2. Configure TLS Profiles, which utilize your certificate records.
  3. Apply TLS Profiles to SIP Interfaces.

The Certificate Records and TLS Profile configurations are located under Security on the Configuration page. Apply TLS profiles to SIP interfaces in the SIP Interface configuration under Session Router.

Certificate Configuration Process

You can perform the following certificate management tasks from the Web GUI in either Basic Mode or Advanced Mode. The process for configuring certificates on the Oracle® Enterprise Session Border Controller (E-SBC) includes the following steps:

  1. Configure a Certificate Record on the E-SBC. See Add a Certificate Record.
  2. Generate a Certificate request by the E-SBC. See Generate a Certificate Request.
  3. Import a Certificate into the E-SBC. See Import a Certificate.
  4. Reboot the system.
Create a Certificate Record

Use the certificate-record element to add certificate records to the Oracle® Enterprise Session Border Controller (E-SBC).

A certificate record represents either the end-entity or the Certificate Authority (CA) certificate on the E-SBC. When you configure a certificate for the E-SBC, the name that you enter must be the same as the name that you use to generate a certificate request. If configuring for an end stations CA certificate for mutual authentication, the certificate name must be the same name used during the import procedure.
  • If this certificate record is used to present an end-entity certificate, associate a private key with this certificate record by using a certificate request.
  • If this certificate record is created to hold a CA certificate or certificate in pkcs12 format, a private key is not required.
  1. Access the Certificate Record configuration object: Configuration, Security, Certificate Record, Add.
  2. On the Certificate record page, click Add.
  3. On the Add certificate record page, do the following:
  4. Click OK.
  5. Save the configuration.
  • Create TLS profiles, using the certificate records to further define the encryption behavior and to provide an entity that you can apply to a SIP interface.
Generate a Certificate Request

Use the Certificate Record configuration object to select a certificate record and generate a certificate request.

  • Confirm that the certificate record exists.

To get a certificate authorized by a Certificate Authority (CA), you must generate a certificate request from the certificate record on the device and send it to the CA.

  1. Access the Certificates configuration object.
    Configuration, System Administration, Security, Certificates.
  2. Select the certificate record for the device.
  3. Click Generate.
    The system creates the request and displays it in a dialog.
  4. Copy the information from the dialog and send it to your CA as a text file.
  • When the CA replies with the certificate, import the certificate to the device with the corresponding certificate record.
Import a Certificate

Use the Certificate Record configuration object to import a certificate into the Oracle® Enterprise Session Border Controller (E-SBC).

Use this procedure to import either a device certificate or an end-station CA certificate for a mutual authentication deployment. You must import the certificate to the corresponding certificate record for the E-SBC. End-station CA certificates may or may not need to be imported against a pre-configured certificate record.

  1. Access the Certificates configuration object.
    Configuration, System Administration, Security, Certificates.
  2. Select the certificate record for the device.
  3. Click Import.
    The system displays a dialog from which you can import the certificate.
  4. Select one of the following format types from the Format drop down list:
    • pkcs7
    • x509
    • Try-all. The system tries all possible formats until it can import the certificate.
  5. Browse to the certificate file, and select the certificate to import.
  6. Click Import.
    TheE-SBC imports the certificate.
  7. Reboot the system.
  • Apply the corresponding certificate record to the intended SIP interface.
SDES Configuration for a Media Stream
Configuring a Session Description Protocol Security Descriptions (SDES) profile for a media stream is a way to negotiate the key for Secure Real-time Transport Protocol (SRTP). The SDES profile provides confidentiality, message authentication, and replay protection for RTP media and control traffic. SDES profile configuration on the Oracle® Enterprise Session Border Controller (E-SBC) includes the following steps.
  1. Create at least one SDES profile that specifies the parameter values to negotiate during the offer-answer exchange.
  2. Create at least one Media Security Policy that specifies the key exchange protocols and protocol specific profiles.
  3. Assign the appropriate Media Security Policy to the appropriate realm.
  4. Create an interface-specific security policy that enables the E-SBC to identify inbound and outbound media streams treated as SRTP and SRTCP.
Configure an SDES Profile

A Session Description Protocol Security Descriptions (SDES) profile specifies the parameter values offered or accepted during SDES negotiation.

In the following procedure, use the Key and Salt parameters to generate the synchronous key used to encrypt and decrypt SRTP/SRTCP traffic originated by theOracle® Enterprise Session Border Controller (E-SBC). The E-SBC passes these concatenated values to the remote SRTP peer. Upon reception, the remote peer inputs the key and salt values to the negotiated encryption algorithm (AES in the current implementation), and derives the key required to decrypt SRTP/SRTCP traffic received from the E-SBC. The key parameter provides the basic keying material, while the salt (a bit string) provides the randomsess/entropy required by the encryption algorithm.

  1. Access the SDES Profile configuration object: Configuration, Security, Media Security, SDES Profile, Add.
  2. In SDES Profile, do the following:
  3. Save the configuration.
Configure DTLS SRTP Profile

To provide Datagram Transport Layer Security-Secure Real Time Control Protocol (DTLS-SRTP) Advanced Media Termination services on the SBC, you must create a DTLS SRTP Profile. This profile defines the key exchange and DTLS handshake on a media session, the role the SBC negotiates when offered alternatives, and the crypto suites to use. After you create this profile, enter its name in the DTLS SRTP Profile parameter in the Realm Config.

  1. Access the DTLS SRTP Profile configuration object: Configuration, Security, Media Security, DTLS SRTP Profile, Add.
  2. Do the following:
  3. Save the configuration.
  • Specify this DTLS SRTP Profile in the Realm Config.
TLS Profile Configuration

The Transport Layer Security (TLS) profile specifies the information required to run SIP over TLS.

TLS is a cryptographic protocol that provides communication security over the Internet. TLS encrypts the segments of network connections at the Application layer for the Transport layer, using asymmetric cryptography for key exchange, symmetric encryption for confidentiality and message authentication codes for message integrity.

Create a TLS profile, using your certificate records, to further define the encryption behavior and create the configuration element that you apply to the SIP interface. You can configure an end entity certificate and a trusted Certification Authority (CA) certificate for a TLS policy. CA certificates are issued by a CA to itself or to a second CA for the purpose of creating a defined relationship between the two entities. A certificate that is issued by a CA to itself is referred to as a trusted root certificate, because it is intended to establish a point of ultimate trust for a CA hierarchy. Once the trusted root has been established, it can be used to authorize subordinate CAs to issue certificates on its behalf.

Suite B and Cipher List Support

The Oracle® Enterprise Session Border Controller (E-SBC) supports full control of selecting the ciphers that you want to use for Transport Layer Security (TLS). The system defaults to DEFAULT for the Cipher List parameter in the TLS Profile configuration. Oracle recommends that you delete ALL and add only the particular ciphers that you want, choosing the most secure ciphers for your deployment.

To support Suite B, the E-SBC certificate-record configuration includes the following parameters:
  • Key Algor—Public key algorithm. Supports RSA and ECDSA. Default: RSA Security. You must select ECDSA to support suite B.
  • ECDSA Key Size—ECDSA key size. Supports p256 and p384.

Configure the list of ciphers that you want to use from the Cipher List element in the TLS Profile configuration. The system provides a drop-down list of all supported ciphers. One-by-one, you can add as many ciphers as your deployment requires.

This image is a screen capture of the list of ciphers you can add to the TLS profile by way of the cipher list drop down list. You can select individual ciphers, all ciphers, or none.

TLS Cipher Updates

Note the following changes to the DEFAULT cipher list.

Oracle recommends the following ciphers, and includes them in the DEFAULT cipher list:
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
  • TLS_RSA_WITH_AES_256_CBC_SHA256
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
The following ciphers have been added and included in the DEFAULT cipher list in CZ810m1p6:
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
Oracle supports the following ciphers, but does not include them in the DEFAULT cipher list:
  • TLS_RSA_WITH_AES_256_GCM_SHA384
  • TLS_RSA_WITH_AES_128_GCM_SHA256
  • TLS_RSA_WITH_AES_128_CBC_SHA
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA
Oracle supports the following ciphers for debugging purposes only:
  • TLS_RSA_WITH_NULL_SHA256 (debug only)
  • TLS_RSA_WITH_NULL_SHA (debug only)
  • TLS_RSA_WITH_NULL_MD5 (debug only)
Oracle supports the following ciphers, but considers them not secure. They are not included in the DEFAULT cipher-list, but they are included when you set the cipher-list attribute to ALL. Note that they trigger verify-config error messages.
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA
  • TLS_RSA_WITH_AES_256_CBC_SHA
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA

To configure TLS ciphers, use the cipher-list attribute in the tls-profile configuration element.

WARNING:

When you set tls-version to either tlsv1 or tlsv11 and you want to use ciphers that Oracle considers not secure, you must manually add them to the cipher-list attribute.
Securing Communications Between the E-SBC and SDM with TLS

You can use the Transport Layer Security (TLS) protocol to secure the communications link between the Oracle® Enterprise Session Border Controller (E-SBC) and the Oracle Communications Session Delivery Manager (SDM). Note that the systems use Acme Control Protocol (ACP) for this messaging.

To configure the E-SBC to use TLS for this ACP messaging:
  1. Configure a TLS profile. The tls-profile object is located under security, where you add certificates, select cipher lists, and specify the TLS version for each profile.
  2. Configure system-config element's acp-tls-profile parameter to specify this TLS profile.
The acp-tls-profile parameter is empty by default, which means that ACP over TLS is disabled. When ACP over TLS is disabled, the SDM establishes a TCP connection with the E-SBC. When the acp-tls-profile parameter specifies a valid TLS profile, the E-SBC negotiates a TLS connection with SDM.

Note:

This feature requires SDM version 8.1 and above.
Add a TLS Profile

Use the TLS Profile configuration to specify the parameters for running SIP over Transport Layer Security (TLS).

  • Add one or more certificate records to the Oracle® Enterprise Session Border Controller that you need for this profile.

Create a TLS profile, using your certificate records, to further define encryption behavior and create the configuration element that you apply to the SIP interface. You can configure an end-entity certificate and a trusted Certification Authority (CA) certificate for a TLS profile.

  1. Access the TLS Profile configuration object: Configuration, Security, TLS Profile, Add.
  2. On the Add TLS profile page, do the following:
  3. Click OK.
  4. Save the configuration.
TLS Session Caching

Transport Layer Security (TLS) session caching allows the Oracle® Enterprise Session Border Controller to cache key information for TLS connections, and to set the length of time that the information is cached.

When TLS session caching is not enabled, the Oracle® Enterprise Session Border Controller and a TLS client perform the handshake portion of the authentication sequence in which they exchange a shared secret and encryption keys are generated. One result of the successful handshake is the creation of a unique session identifier. When an established TLS connection is torn down and the client wants to reinstate it, this entire process is repeated. Because the process is resource-intensive, you can enable TLS session caching to avoid repeating the handshake process for previously authenticated clients to preserve valuable Oracle® Enterprise Session Border Controller resources.

When TLS session caching is enabled on the Oracle® Enterprise Session Border Controller, a previously authenticated client can request re-connection using the unique session identifier from the previous session. The Oracle® Enterprise Session Border Controller checks its cache, finds the session identifier, and reinstates the client. This process reduces the handshake to three messages, which preserves system resources.

If the client offers an invalid session identifier, for example, one that the Oracle® Enterprise Session Border Controller has never seen or one that has been deleted from its cache, the system does not allow the re-connection. The system negotiates the connection as a new connection.

Configure TLS Global Session Caching

Use the TLS Global element to enable Session Caching to allow the Oracle® Enterprise Session Border Controller (E-SBC) to cache the session identifier for possible re-connection with a former client.

  • Configure a TLS profile.

Session caching is a global setting for all TLS operations on the E-SBC. You must enable session caching and set the session cache timeout. Note that the number 0 disables session cache timeout. When the session cache timeout is disabled, cache entries never age and they remain until you delete them. RFC 2246, the TLS Protocol Version 1.0, recommends setting session cache timeout to the maximum of 24 hours.

  1. Access the TLD Global Configuration object: Configuration, Configuration, Security, TLS Global.
  2. On the Add TLS global page, do the following:
  3. Click OK.
  4. Save the configuration.
Configure an SPL Plugin

Use the SPL Config element to configure the parameters for integrating System Programming Language (SPL) plug-in extensions with the Oracle® Enterprise Session Border Controller (E-SBC).

  • Confirm that the SPL engine is installed on the E-SBC.
  • Plan the order in which you configure multiple SPL plug-ins because the E-SBC executes the SPL plug-ins in the order of configuration.

Note:

The E-SBC includes all SPL plug-ins, except for Comfort Noise Generation. You must manually upload the Comfort Noise Generation SPL plug-in to the E-SBC performing the following procedure.
  1. Access the SPL Config configuration object: Configuration, System, SPL Config.
  2. On the SPL Config page, do the following:
  3. Click OK.
  4. Save the configuration.
  • Execute the SPL plug-in file.
  • Synchronize the SPL across HA pairs.

Session Router Configuration

You can configure the following Session Router objects from the Configuration tab on the Web GUI. See the documentation specified in the following list for explanations of these configuration objects and how to set their parameters.

Configure Access Control

Use the access-control configuration element to manually create an Access Control List (ACL) for the host path in the Oracle® Enterprise Session Border Controller.

  1. From the Web GUI, click Configuration, Session Router, Access Control.
  2. In the Add Access Control dialog, and do the following:
  3. Click OK.
  4. Save the configuration.
Dynamic ACL for the HTTP-ALG

The dynamic Access Control List (ACL) option for HTTP-Application Layer Gateway (ALG) provides Distributed Denial of Service (DDoS) attack protection for the HTTP port.

When you enable the dynamic ACL option, the system sets the trust level for static flow for the public listening socket defined in HTTP ALG, Public to Untrusted. Each listening socket creates and manages its ACL list, which allows the listening socket to keep track of the number of received and invalid messages, the number of connections per endpoint, and so on. You can configure a different setting for each HTTP ALG object.

Dynamic ACL for each endpoint is triggered by Session Initialization Protocol (SIP) registration messages. Upon receiving a SIP registration message, the SIP agent creates a dynamic ACL entry for the endpoint. If the 200 OK response is received, the ACL is promoted, allowing the HTTP message to go through the security domain. If SIP registration is unsuccessful, the ACL entry is removed and HTTP ingress messages are blocked from the endpoint. The ACL entry is removed upon incomplete registration renewal or telephone disconnect.

The following example describes the criteria and associated configuration item that result in a denied or allowed connection for both low and medium control levels.

Criteria Associated Configuration Item Action
Exceed total number of connections for allowed HTTP ALG, max-incoming-conns Connection denied
Exceed total connections per peer HTTP ALG, per-src-ip-mas-incoming-conns Connection denied
ACL not promoted Dynamically set on SIP registration Connection denied
Exceed maximum number of packets/sec Realm Config, maximum-signal-threshold Connection denied and peer is promoted
Exceed maximum number of error packets Realm Config, invalid-signal-threshold Connection denied and peer is promoted

Oracle recommends setting Realm Config, Access Control Level to Medium.

If a peer is promoted to Trusted, the system performs DDoS checks on max number of packets/sec and Max Number of Error Packets allowed.

Demotions depend on the Ream Config, Access Control Trust Level setting for the realm. For more information on Realm Config settings, see the ACLI Configuration Guide.

If you want to configure different ACL settings for SIP traffic and for HTTP-ALG traffic, you must configure a realm for each type of traffic.

Enable Dynamic ACL for the HTTP ALG

The Dynamic Access Control List (ACL) for HTTP Application Layer Gateway (ALG) option, which provides Distributed Denial of Service (DDoS) attack protection for the HTTP port, is an option that you must enable.

  • Confirm that the session manager is mapped to the Oracle® Enterprise Session Border Controller.

Two ACL entires are required for each registered telephone, where one entry is used for SIP traffic and one is used for HTTP-ALG traffic.

Note:

Enabling dynamic access control for HTTP-ALG traffic reduces the number of available dynamic ACL entries on the session border controller, which may reduce the number of concurrent trusted endpoints that the system can support.
  1. From the Web GUI, on the Configuration tab, click Configuration, Session Router, HTTP ALG.
  2. Click Add.
    The system displays the Add HTTP ALG page.
  3. In the Add HTTP ALG dialog, do the following:
  4. Click OK.
  5. Save the configuration.
Dynamic Access Control List Settings for the HTTP Application Layer Gateway
You can set the following parameters for the realm specified in HTTP ALG, Public, Realm ID.
  • Access Control Trust Level
  • Invalid Signal Threshold
  • Maximum Signal Threshold
  • Untrusted Signal Threshold
  • Deny Period

For more information on Realm Config settings, see the ACLI Configuration Guide.

Accounting Configuration

The Oracle® Enterprise Session Border Controller (E-SBC) supports RADIUS, an accounting, authentication, and authorization (AAA) system. RADIUS servers are responsible for receiving user connection requests, authenticating users, and returning all configuration information necessary for the client to deliver service to the user.

You can configure the E-SBC to send call accounting information to one or more RADIUS servers. This information can help you to see usage and Quality of Service (QoS) metrics, monitor traffic, and even troubleshoot your system.

For information about how to configure the E-SBC for RADIUS accounting, refer to the Oracle Communications Session Border Controller Accounting Guide. The Accounting Guide contains all RADIUS information, as well as information about:

  • Accounting for SIP and H.323
  • Local CDR storage on the E-SBC, including CSV file format settings
  • Ability to send CDRs via FTP to a RADIUS sever (the FTP push feature)
  • Per-realm accounting control
  • Configurable intermediate period
  • RADIUS CDR redundancy
  • RADIUS CDR content control
Configure Call Accounting

Use the Account Config object to set the destination parameters for accounting messages.

  1. From the Web GUI, click Configuration, Account Config.
  2. In the Account Config dialog, do the following:
  3. Save the configuration.
Configure RADIUS Call Accounting

You can configure the Oracle® Enterprise Session Border Controller (E-SBC) to send call accounting information to one or more RADIUS servers. This information can help you to see usage and Quality of Service (QoS) metrics, to monitor traffic, and to troubleshoot the system.

To set the RADIUS call accounting parameters, use the Account Config Object to specify where and when you want the system to send accounting messages, and the strategy for selecting account servers. Use the following procedure to configure the minimum settings required for RADIUS call accounting.

  1. From the Web GUI, click Configuration, Session Router, Account Config.
  2. In the Account Config dialog do the following:
  3. Click OK.
  4. Save the configuration.
Configure H.323 Global Settings

Configuring H.323 signaling for theOracle® Enterprise Session Border Controller (E-SBC) requires setting global parameters and parameters for each interface. The global parameters govern how the E-SBC performs general H.323 operations. The E-SBC applies the global settings to all interfaces that you configure to use H.323. For example, you can turn H.323 support on and off for the entire E-SBC, using the global settings. Use the following procedure to configure the global H.323 parameters.

  • Configure the basic parameters for physical interfaces, network interfaces, global system parameters, SNMP, trap receiver, accounting support, and any holiday information that you need.
  • Decide how you want to configure realms and routing, including the use of session agents and session agent groups, to support H.323 operations.
  • Determine the settings that you want to use for the attributes in this procedure.
  • Know the names of any Options that you want to add. See "H.323 Signaling Services" in theACLI Configuration Guide for descriptions.
  1. Access the H.323 Config configuration object:
    Configuration, Session Router, H323, H323 Config.
  2. On the H323 Config page, do the following:
  3. Save the configuration.
Session Manager Mapping
The Oracle® Enterprise Session Border Controller (E-SBC) supports mapping between multiple session managers and multiple SBCs. Such mapping allows the SBC to work in a redundant network configuration where you can map:
  • The primary session manager to the primary SBC IP address
  • One or more redundant session managers to one or more redundant SBCs

To map a redundant session manager to a redundant SBC, map the private IP address of the redundant session manager to the public SIP IP address configured in HTTP-ALG, Public on the SBC. For instructions, see "Map a Session Manager to a Session Border Controller."

Map a Session Manager to a Session Border Controller

You can map one or more session managers to an Oracle® Enterprise Session Border Controller (E-SBC) to provide redundancy and load balancing.

  • Note the private realm and IP address of the session manager and the public realm and SIP interface IP address of the session border controller that you want to map.

Map the private IP address of the session manager to the public SIP interface IP address of the E-SBC.

  1. Access HTTP ALG: Configuration, Session Router, HTTP ALG.
  2. On the HTTP ALG page, click Add and do the following:
  3. Click OK.
    The system lists the new map on the HTTP ALG page.
  4. Save the configuration.
Configure IWF

You must enable and configure the Oracle® Enterprise Session Border Controller to perform Inter-Working Function (IWF) operations.

  • Configure SIP, including SIP interfaces, SIP ports, SIP NAT, if needed, and SIP features
  • Configure H.323 configuration, including H.323 global and H.323 interface configurations
  • Configure local policy and local policy attributes
  • Configure media profiles
  • Configure session agents and, if needed, session groups

In the following procedure, the system provides dialogs where you can either select existing media profiles and options or add new ones.

  1. From the Web GUI, click Configuration, Session Router, IWF Config.
  2. On the IWF Config page, do the following:
  3. Click OK.
  4. Save the configuration.
Configure LDAP

The Oracle® Enterprise Session Border Controller (E-SBC) uses Lightweight Directory Access Protocol (LDAP) for interaction between an LDAP client and an LDAP server. Use the LDAP Config object in Advanced mode to create and enable an LDAP configuration on the E-SBC.

  • Confirm that one or more authentication modes exist.
  • Confirm that one or more Transport Layer Security (TLS) profiles exist.

In the following procedure, you configure the LDAP server, filters, security, and local policy. Note that you can use multiple LDAP Config configurations that reference the same LDAP server within different Local Policy Policy Attributes to allow for multiple LDAP queries to the same LDAP server.

  1. From the Web GUI, click Configuration, Session Router, LDAP Config.
  2. On the LDAP config page, click Add.
  3. On the Add LDAP config page, do the following:
  4. Click OK.
  5. Save the configuration.
Configure Local Policy

Configure local policy and local policy attributes for session routing based on the next hop parameter.

Use the local-policy element to configure where signaling messages are routed and forwarded.

For the Policy priority parameter, the priority hierarchy from lowest to highest is none, normal, non-urgent, urgent, emergency. None means no priority. Each higher priority handles sessions at its level plus the sessions in the priorities above it. For example, non-urgent also handles sessions for urgent and emergency.

  1. From the Web GUI, click Configuration, Session Router, Local Policy.
  2. On the Local Policy page, do the following:
  3. Click OK.
  4. Save the configuration.
Add a Local Response Map

Configuring cause and reason mapping for SIP to SIP calls requires a local response map. The entries in the map generate the SIP response and Q850 cause code value for particular error scenarios.

  • If you plan to add a Reason header, enable the function in the global SIP configuration.

You can customize the SIP status SIP reason for a local error. For example, the default 503 message for the error that the Oracle® Enterprise Session Border Controller (E-SBC) sends when the licensed session capacity is reached is "503 licensed session capacity reached". You can customize the number for this error message in the SIP Status field, and you can customize the reason in the SIP Reason field. Select licensed-session-capacity-reached from the Local Error list and you can add custom text about the error to the SIP header.

.

Repeat the following procedure to create as many local response map entries as you need.

  1. Access the Local Response Map configuration object: Configuration, Session Router, Local Response Map, Add.
  2. In the Local response map entries configuration, do the following.
  3. Click OK.
  4. Save the configuration.
Configure Local Routing

Use the local-routing-config element to specify route tables that the Oracle® Enterprise Session Border Controller (E-SBC) uses to direct calls to the next hop and to map an E.164 telephone number to a SIP URI, locally.

  1. From the Web GUI, click Configuration, Session Router, Local Routing Config.
  2. On the Local Routing Config page, click Add.
  3. On the Local Routing Config page, do the following:
  4. Click OK.
  5. Save the configuration.
Configure a Session Agent

You can enable and configure constraints that the Oracle® Enterprise Session Border Controller (E-SBC) applies to regulate session activity with the session agent.

Configure the following before you configure a session agent.

  • Media profile
  • Out Translation ID
  • Local Response Maps
  • Codec Policy
  • Session Recording Server
  • TLS Profile
  • SIP Header Manipulation IDs
  • LDAP
  • One or more target groups
  • SIP recursion policy

In the following procedure, some constraints affect session agent groups and SIP proxies outside of, and at the edge of the network. For example, the maximum sessions and maximum outbound sessions constraints do not apply to core routing proxies because they are transaction statefull, rather than session statefull. Other constraints, such as maximum burst rate, burst rate window, maximum sustained rate, and sustained rate apply to core routing proxies.

  • From the Web GUI, click Configuration, Session Router, Session Agent.
  • On the session-agent page, click Add, and do the following:
  • Click OK.
  • Save the configuration.
SIP hold-refer-reinvite

When SIP hold-refer-reinvite is enabled for REFER with Replaces, the system queues the outgoing Invite populated from the received REFER based on the dialog state.

In a deployment where a call goes through the Oracle® Enterprise Session Border Controller (E-SBC) before going to an Interactive Voice Response (IVR) server, the E-SBC proxies the intermediate reinvite that the IVR sends to the transfer target. If the intermediate reinvite is in either the pending state or the established state when the IVR initiates the transfer to the transfer target, the E-SBC terminates the call prematurely. The hold-refer-reinvite option allows the E-SBC to queue the Out Going INVITE from the received REFER request when the previously proxied reinvite request is in either the pending state or the established state. The result is a successful call.

Enable the SIP hold-refer-reinvite option from the ACLI command line or the Web GUI in Advanced mode.

Enable Hold Refer Reinvite

The SIP Hold Refer Reinvite parameter for REFER with Replaces is a parameter that you enable to prevent premature call termination in a deployment where calls are proxied by the Oracle® Enterprise Session Border Controller.

  • Confirm that Refer Reinvite is added to realm/SA/SipInterface options.
  • Confirm that Refer Call Transfer is enabled on Realm/SA/SipInterface
  • Confirm that the session agent on which you want to enable Hold Refer Reinvite is configured.

To enable Hold Refer Reinvite, select a configured session agent and enable the parameter on the selected agent.

  1. From the Web GUI, click Configuration, Ssession Router, Session Agent.
  2. On the Session Agent page, select the agent and click Edit.
  3. On the Session Agent page, select Hold Refer Invite.
  4. Click OK.
  5. Save the configuration.
  • Enable the Hold Refer Invite parameter in the Realm configuration.
  • Enable the Hold Refer Invite parameter in the Session Agent configuration.
Configure a Session Group

Use the Session Group element to define a signaling endpoint configured to apply traffic shaping attributes and information about next hops and previous hops.

  1. From the Web GUI, click Configuration , Session Router, Session Group.
  2. On the Add Session Group page, click Add, and do the following:
  3. Click OK.
  4. Save the configuration.
Configure Session Recording Group

The Oracle® Enterprise Session Border Controller (E-SBC) uses the Session Recording Group attribute under session-router to define a collection of session recording servers.

  • Enable the SIP Session Recording licence. See "Getting Started."
  • Configure multiple session recording servers. See "Session Recording Server Attribute."
  • Determine the load balancing strategy that you want the E-SBC to use. See "Load Balancing."

In the configuration, you list the session recording servers that you want in the group, select a load balancing strategy, and set the number of simultaneous SIP dialogs.

  1. Access the Session Recording Group configuration object: Configuration, Session Router, Session Recording Group, Add.
  2. In the Session Recording Group dialog, do the following:
  3. Click OK.
  4. Save the configuration.
  5. Save the configuration.
Configure Advanced Logging

From the Configuration tab, define SIP Advanced Logging and Advanced Log Condition. The criteria that you configure re-maps the message logging and modifies the system configuration. You must save and activate these changes to the configuration.

When configuring multiple SIP Advanced Logging configurations, note the following.
  • The system evaluates each configuration individually in an OR relationship.
  • The system evaluates all conditions and they must all match in an AND relationship.
  1. From the Web GUI, go to Configuration, Session Router, SIP Advanced Logging, and click Add.
  2. On the SIP Advanced Logging page, do the following:
  3. Save the configuration.
Disable Advanced Logging

From the Configuration tab, clear the advanced logging settings.

  1. From the Web GUI, go to Configuration, Session Router, SIP Advanced Logging.
  2. On the SIP Advanced Logging page, clear all of the settings.
  3. Save the configuration.
Configure Advanced Logging

From the Configuration tab, define SIP Advanced Logging and Advanced Log Condition. The criteria that you configure re-maps the message logging and modifies the system configuration. You must save and activate these changes to the configuration.

When configuring multiple SIP Advanced Logging configurations, note the following.
  • The system evaluates each configuration individually in an OR relationship.
  • The system evaluates all conditions and they must all match in an AND relationship.
  1. From the Web GUI, go to Configuration, Session Router, SIP Advanced Logging, and click Add.
  2. On the SIP Advanced Logging page, do the following:
  3. Save the configuration.
Configure SIP

Use the sip-config element to define parameters for communications between the Session Initiation Protocol (SIP) and the Oracle® Enterprise Session Border Controller (E-SBC).

  • Configure at least one home realm, egress realm, and transcoding realm.
  1. Access the SIP Config configuration object: Configuration, Session Router, SIP Config.
  2. On the SIP Config page, do the following:
  3. Click OK.
  4. Save the configuration.
Configure Pooled Transcoding

You must configure a transcoding realm and transcoding agents on the Access Session Border Controller, when used in a pooled transcoding deployment model. Set the parameters as part of the global SIP configuration.

  • Configure a realm as the separate realm for the public SIP interface for exclusive communication with the Transcoding Session Border Controller (T-SBC) in a pooled transcoding deployment
  • Configure one or more agents
  • Configure SIP
  • Configure the Access Session Border Controller (A-SBC)
  • Configure the Transcoding Session Border Controller (T-SBC)
  1. Access the SIP Config configuration object: Configuration, Session Router, SIP Config.
  2. On the SIP Config page, do the following.
  3. Click OK.
  4. Save the configuration.
Configure SIP Feature

Use the Sip Feature element to define how the Oracle® Enterprise Session Border Controller (E-SBC) handles option tags in the SIP Supported header, Require header, and the Proxy Require header.

You can specify whether a SIP feature is applied to a specific realm or globally across all realms. You can also specify the treatment for an option based upon whether is appears in an inbound or outbound packet. You need to configure option tag handling in the SIP feature element only when you want a treatment other than the default.

  1. From the Web GUI, click Configuration, Session Router, SIP Feature.
  2. On the SIP Feature page, do the following:
  3. Click OK.
  4. Save the configuration.
Configure SIP Interface

Use the SIP Interface object to define SIP signaling.

  • Confirm that a TLS profile exists.
  • Confirm that rules exist for inbound and outbound SIP manipulation.

Configure a SIP Interface for each network or realm to which you want to connect the Oracle® Enterprise Session Border Controller. The following list is a basic set of the available parameters. For the complete list of available parameters, see the ACLI Reference Guide. For more configuration instructions, see the ACLI Configuration Guide.

  1. From the Web GUI, click Configuration, Session Router, SIP Interface.
  2. On the SIP Interface page, click Add, and do the following:
  3. Click OK.
  4. Save the configuration.
Configure SIP Manipulation

When you need to modify specific components of a SIP message, configure a SIP manipulation rule. For example, you might need to resolve protocol differences between vendors. You can configure rules for SIP headers and for the sub-elements within the headers.

Use the SIP Manipulationelement to add, modify, delete, split, and join SIP headers and to specify SIP header rules. To begin, configure the Name, Description, (Optional) Split Headers, and (Optional) Join Headers attributes. When you reach the "CFG Rules" section, click Add and select the header rule that you want to create. For further instructions, refer to the topics noted in the CFG rules "Instructions" cell in the following table.

  1. From the Web GUI, click Configuration, Session Router, SIP Manipulation.
  2. In the SIP manipulation dialog, click Add, and do the following:
  3. When you finish configuring SIP manipulations, and the system returns you to the SIP manipulation page, save and activate the configuration.
  • Apply the rules to a session agent or SIP interface as "inbound" or "outbound."
Configure a MIME ISUP Rule

You can configure Multi-Purpose Internet Mail Extensions (MIME) header rules and element rules on the Oracle® Enterprise Session Border Controller (E-SBC) from the "CfgRules" section of the "SIP Manipulations" page.

In the following procedure, you set the SIP Header Manipulation, MIME ISUP Rule, MIME Header Rule, and ISUP Param Rule parameters.

  1. Access the SIP Manipulation configuration object.
    Configuration, System Administration, SIP Manipulation.
  2. On the SIP Manipulation configuration page, do one of the following:
    1. Select and existing SIP manipulation configuration from the table, right-click, and click Edit. (Subsequent SIP manipulation pages use "Modify" in the title.)
    2. Click Add. (Subsequent SIP manipulation pages use "Add" in the title.)
  3. On the Add or Modify SIP Manipulation page, do one of the following.
    1. If you chose Add, you must enter a name for this SIP Manipulation. (You can optionally complete the Description, Split Headers, and Join Headers parameters, at this time. See "Configure SIP Manipulation.") Proceed to the next step.
    2. If you chose to edit an existing configuration, proceed to the next step.
  4. On the Add or Modify SIP Manipulation page under Cfg Rules, click Add and click mime-header-rule.
  5. On the Add or Modify SIP Manipulation / Mime ISUP Rule page, do the following.
  6. Click Back.
    The system displays the Add or Modify SIP Manipulation page.
  7. Click Back.
    The system displays the SIP Manipulation page.
  8. Save the configuration.
Configure a MIME SDP Rule

You can configure Multi-Purpose Internet Mail Extensions (MIME) header rules and element rules on the Oracle® Enterprise Session Border Controller (E-SBC) from the "CfgRules" section of the "SIP Manipulations" page.

In the following procedure, you set the SIP Header Manipulation, MIME SDP Rule, MIME Header Rule, SDP Session Rule, and SDP Media Rule parameters.

  1. Access the SIP Manipulation configuration object.
    Configuration, System Administration, SIP Manipulation.
  2. On the SIP Manipulation configuration page, do one of the following:
    1. Select and existing SIP manipulation configuration from the table, right-click, and click Edit. (Subsequent SIP manipulation pages use "Modify" in the title.)
    2. Click Add. (Subsequent SIP manipulation pages use "Add" in the title.)
  3. On the Add or Modify SIP Manipulation page, do one of the following.
    1. If you chose Add, you must enter a name for this SIP Manipulation. (You can optionally complete the Description, Split Headers, and Join Headers parameters, at this time. See "Configure SIP Manipulation.") Proceed to the next step.
    2. If you chose to edit an existing configuration, proceed to the next step.
  4. On the Add or Modify SIP Manipulation page under Cfg Rules, click Add and click mime-sdp-rule.
  5. In the Add or Modify SIP Manipulation / MIME SDP Rule page, do the following.
  6. Click Back.
    The system displays the Add or Modify SIP Manipulation page.
  7. Click Back.
    The system displays the SIP Manipulation page.
  8. Save the configuration.
Configure a SIP Manipulation Header Rule

You can configure SIP header rules and element rules on the Oracle® Enterprise Session Border Controller (E-SBC) from the "CfgRules" section of the "SIP Manipulations" page.

In the following procedure, you set the SIP Header Manipulation, Header Rule, and Element Rule parameters.

  1. Access the SIP Manipulation configuration object.
    Configuration, System Administration, SIP Manipulation.
  2. On the SIP Manipulation configuration page, do one of the following:
    1. Select and existing SIP manipulation configuration from the table, right-click, and click Edit. (Subsequent SIP manipulation pages use "Modify" in the title.)
    2. Click Add. (Subsequent SIP manipulation pages use "Add" in the title.)
  3. On the Add or Modify SIP Manipulation page, do one of the following.
    1. If you chose Add, you must enter a name for this SIP Manipulation. (You can optionally complete the Description, Split Headers, and Join Headers parameters, at this time. See "Configure SIP Manipulation.") Proceed to the next step.
    2. If you chose to edit an existing configuration, proceed to the next step.
  4. On the Add or Modify SIP Manipulation page under Cgf Rules, click Add and click header-rule.
  5. On the Add SIP Manipulation / Header Rule page, do the following.
  6. Click Back.
    The system displays the Modify SIP Manipulation page.
  7. Click Back.
    The system displays the SIP Manipulation page.
  8. Save the configuration.
Configure a MIME Rule

You can configure Multi-Purpose Internet Mail Extensions (MIME) header rules and element rules on the Oracle® Enterprise Session Border Controller (E-SBC) from the "CfgRules" section of the "SIP Manipulations" page.

In the following procedure, you set the SIP Header Manipulation, MIME Rule, and MIME Header Rule parameters.

  1. Access the SIP Manipulation configuration object.
    Configuration, System Administration, SIP Manipulation.
  2. On the SIP Manipulation configuration page, do one of the following:
    1. Select and existing SIP manipulation configuration from the table, right-click, and click Edit. (Subsequent SIP manipulation pages use "Modify" in the title.)
    2. Click Add. (Subsequent SIP manipulation pages use "Add" in the title.)
  3. On the Add or Modify SIP Manipulation page, do one of the following.
    1. If you chose Add, you must enter a name for this SIP Manipulation. (You can optionally complete the Description, Split Headers, and Join Headers parameters, at this time. See "Configure SIP Manipulation.") Proceed to the next step.
    2. If you chose to edit an existing configuration, proceed to the next step.
  4. On the Add or Modify SIP Manipulation page under Cfg Rules, click Add and click mime-rule.
  5. On the Add or Modify SIP Manipulation / Mime Rule page, do the following.
  6. Click Back.
    The system displays the Add or Modify SIP Manipulation page.
  7. Click Back.
    The system displays the SIP Manipulation page.
  8. Save the configuration.
Configure SIP Monitoring

Use the SIP Monitoring object to configure SIP Monitor and Trace features and to set filters for SIP monitoring.

  • Confirm that a Session Agent, a realm, or both are configured, or you must set filtering on a global basis for Monitor and Trace to occur.

You must configure the sip-monitoring object to enable filtering. The only required setting is State, which enables sip-monitoring. You can optionally monitor all filters or you can specify one or more filters to monitor. You can specify a time for short session duration monitoring and you can select interesting events to monitor.

Note:

Interesting Events are always enabled on a global-basis on the Oracle® Enterprise Session Border Controller.
  1. From the Web GUI, click Configuration, Session Router, SIP Monitoring.
  2. On the SIP Monitoring page, do the following:
  3. Click OK.
  4. Save the configuration.
Surrogate Registration

The Oracle® Enterprise Session Border Controller surrogate registration feature lets the Oracle® Enterprise Session Border Controller explicitly register on behalf of a Internet Protocol Private Branch Exchange (IP-PBX). After you configure a surrogate agent, the Oracle® Enterprise Session Border Controller periodically generates a REGISTER request and authenticates itself using a locally configured username and password, with the Oracle® Enterprise Session Border Controller as the contact address. Surrogate registration also manages the routing of class from the IP-PBX to the core and from the core to the IP-PBX.

Configure Surrogate Registration

Surrogate registration allows the Oracle® Enterprise Session Border Controller (E-SBC) to explicitly register on behalf of an Internet Protocol Private Branch Exchange (IP-PBX). Surrogate registration also manages the routing of calls from the IP-PBX and from the core to the IP-PBX. The E-SBC uses the configuration information of the surrogate agent that corresponds to a specific IP-PBX to send REGISTER requests. You can configure the number of requests to send.

Configure a surrogate agent for each IP-PBX proxy that you want the E-SBC to register.

Note:

To view all surrogate agent configuration parameters, enter a ? at the Surrogate Agent prompt.
  1. From the Web GUI, click Configuration, Session Router, Surrogate Agent.
  2. On the Add Surrogate Agent page, click Add, and do the following:
  3. Click OK.
  4. Save the configuration.
  • Add the surrogate agent as a session-agent under session-router.
Remote Site Survivability Configuration

You must enable remote site survivability on the Oracle® Enterprise Session Border Controller (E-SBC) and set the ping method for the session agent before the E-SBC can perform remote site survivability operations.

The process for configuring remote site survivability includes the following procedures.
  1. Enable remote site survivability mode on the E-SBC.
  2. Configure a ping method for the session agent to use to determine when the E-SBC is not responding.

Note:

The system does not require a reboot after activating or modifying remote site survivability.
Configure Remote Site Survivability

You must enable remote site survivability on the Oracle® Enterprise Session Border Controller (E-SBC) and set the parameters before the system can enter and exit survival mode.

  • Configure at least one Session Agent.
  1. From the Web GUI, click Configuration, Session Router, Session Router, Survivability.
  2. On the Add Survivability page, do the following:
  3. Click OK.
  4. Save and activate the configuration.
  • Configure a ping method on the Session Agent. See "Configure a Session Agent."
Configure Translation Rules

You can configure the Oracle® Enterprise Session Border Controller (E-SBC) to use number translation to change a layer 5 endpoint name according to prescribed rules. For example, to add or to remove a 1 or a + from a phone number sent from or addressed to a device. Use the Translation Rules object to create unique sets of translation rules to apply to calling and called party numbers.

In the following procedure, you set the translation type, define the string to add or delete, and set the character position (index) where the add, delete, or replace occurs in the string. The index starts at 0, immediately before the leftmost character, and increases by 1 for every position to the right. Use the $ character to specify the last position in a string.

  1. From the Web GUI, click Configuration, Session Router, Translation Rules.
  2. On the Translation rules page, do the following:
  3. Click OK.
  4. Save the configuration.

System Configuration

You can configure the following System objects from the Configuration tab on the Web GUI. See the documentation specified in the following list for explanations of these configuration objects and how to set their parameters.

Telephony Fraud Protection

You can use the Oracle® Enterprise Session Border Controller (E-SBC) to protect against fraudulent calls by enabling Telephony Fraud Protection and creating lists of phone numbers to block, allow, redirect, and rate limit calls. The lists reside together in a single source-file that you create and manage. The source-file can contain any combination of the list types and it can reside on either the E-SBC or in Session Delivery Manager (SDM) because you can manage Telephony Fraud Protection from either one. The following information explains using Telephony Fraud Protection on the E-SBC. See the Oracle Communications Session Element Manager User Guide for the Enterprise Edge and Core Plug-in for managing Telephony Fraud Protection from SDM.

Fraud Protection List Types and Uses

The E-SBC supports the following types of lists for protecting against fraudulent calls.

Blacklist—Use the blacklist to specify a fraudulent call based on the destination phone number or URI. You can add a known fraudulent destination to the blacklist by prefix or by fixed number. When the E-SBC receives a call to an entry on the blacklist, the system rejects the call according to the SIP response code that you specify. When the system determines a match and blocks a call, the default response is "403 Forbidden." You can set another SIP response code from the standard list of responses defined in RFC3261 by way of the Local Response Map configuration and the local error Fraud Protection Reject Call setting.

White List—Use the white list to manage any exception to the blacklist. Suppose you choose to block a prefix such as +49 555 123 by way of the blacklist. This also blocks calls to individual numbers starting with this prefix, such as +49 555 123 666. If you add a prefix or individual number to the white list, the system allows calls to the specified prefix and number. Continuing with the example, if you add +49 555 123 6 to the white list, the system allows calls to +49 555 123 666, which was blocked by the blacklist entry of +49 555 123.

Redirect List—Use the redirect list to send a fraudulent call to an Interactive Voice Response (IVR) system, or to a different route. For example, you can intercept and redirect a call going to a revenue-share fraud target in a foreign country to an end point that defeats the fraud. Or, you might want to redirect subscribers dialing a particular number and URI to an announcement to make them aware that an account is compromised and tell them what they should do. You can use an external server to provide such an announcement or you can use the E-SBC media playback function.

Rate Limit List—Use rate limiting to limit the loss of money, performance, and availability that an attack might cause. While local ordinances may not allow you to completely block or suppress communication, you may want to reduce the impact of a disruption with rate limiting until a network engineer can analyze an attack and plan remediation. For example, you might want time to find the origin of an attack or to add attackers to a blacklist. Note that rate limiting may not function immediately after a High Availability switch over because the newly active system must re-calculate the call rate before it can apply rate limiting.

Configuration

The process for using Telephony Fraud Protection includes the following steps:
  1. Enable Telephony Fraud Protection
  2. Specify the source of fraud protection management
  3. Create the file that contains the list of phone numbers to manage
  4. Activate the fraud protection file

You can create the fraud protection phone number list on the File Management page on the Web GUI, or you can create it externally in XML and upload it to the E-SBC. Save the file to /code/fpe/<filename>. In the Web GUI User Guide, see "Configure Telephony Fraud Protection," "Create a Telephony Fraud Protection File," and "Telephony Fraud Protection File Activation." If you want to create the fraud protection file externally, see "Fraud Protection XML Source File Example."

You can enable Telephony Fraud Protection from either the Web GUI or from the ACLI command line, but you cannot manage fraud protection from the ACLI. You must use the Web GUI for management, and only in Expert Mode.

Telephony Fraud Protection is included in the advanced license.

Administration

When you configure the E-SBC to manage Telephony Fraud Protection, the system applies the following behavior:
  • An Administrator with privileges can Refresh, Add, and Upload an unselected file, and Edit, Download, and Delete a selected file.
  • An Administrator with no privileges can only view the fraud protection file.
To view fraud protection data:
  • From the ACLI, use the show commands to view fraud protection statistics. See "Telephony Fraud Protection Show Commands."
  • From the Web GUI, use the Show Summary, Show Blacklist, Show White List, Show Call Redirect List, and Show Rate Limit Widgets.

Note:

The Telephony Fraud Protection feature does not affect emergency calls or block any calls while you are loading entries.

High Availability

Telephony Fraud Protection supports High Availability (HA).
  • When the E-SBC manages the Telephony Fraud Protection file—Use the Synchronize File <filename> command to copy the Telephony Fraud Protection file to the standby after an HA switch over.
  • When the Enterprise Telephony Fraud Manager in SDM manages the Telephony Fraud Protection file—After an HA switch over, the newly active E-SBC sends the RESYNC command to the Fraud Manager on SDM, requesting the latest file. SDM responds with the name and location of the file, which the E-SBC downloads from SDM.
  • Note that after a switch over, rate limiting may not take effect immediately because the new Active system needs time to recalculate the call rate before it can apply rate limiting.

Telephony Fraud Protection Management from SDM

If you prefer to manage Telephony Fraud Protection from the Enterprise Fraud Manager in SDM, rather than from the E-SBC, store the fraud protection list in a file named sbc_fpe_entries.xml (case sensitive) in SDM. You can edit the file in SDM, which will notify the E-SBC afterwards to download the file to its /code/fpe directory. When the E-SBC is part of an HA pair, the Active partner automatically pushes the updated file to the Standby partner. In the event of an unsuccessful download, the system raises an SNMP alarm. Should the connection to SDM ever go down, the system also raises an SNMP alarm and sends a trap. When the connection gets re-established, the alarm and trap clear, and the E-SBC sends a RESYNC command to SDM.

Unsupported Functions

Telephony Fraud Protection for the E-SBC does not support the following:

  • IPv6
  • H.323
  • InterWorking Function (IWF)
  • Comm Monitior
Telephony Fraud Protection Target Matching Rules
When matching a call to an entry on a telephony fraud protection list, the Oracle® Enterprise Session Border Controller (E-SBC) performs the matching only on the ingress leg of the initial INVITE. In the initial INVITE, the E-SBC uses the From, To, and User-Agent headers for matching. Because you can place a phone number on multiple types of fraud prevention lists in the same source file, the E-SBC uses the following evaluation hierarchy to determine which number takes precedence:
  1. Longest match—The most specific entry takes precedence. For example, when 555-123-4000 is blacklisted and 555-123-* is white listed, the system blocks the call from 555-123-4000 because it is the longest match.
  2. Destination—When the system detects matches in both the SIP From header and the SIP To header, the match for the To header takes precedence.
  3. URI—When the system detects matches in both the USER and Host parts of a SIP URI, the match for the USER part takes precedence.
  4. SIP User-Agent header—Lowest priority. When nothing else matches, and there is a match for the User-Agent field, the E-SBC acts as instructed.
  5. Multiple instances—When the system detects multiple instances of the same match length, or when the target resides in multiple lists, the system uses the following order of precedence:

    1. White list—Entries on the white list take precedence with no restrictions. For example, when 555-123-4567 is on both the blacklist and the white list, the system allows this call because the number is on the white list.

    2. Blacklist

    3. Redirect

    4. Rate limiting

Note:

The telephony fraud protection feature does not affect emergency calls.

The telephony fraud protection feature uses source or destination IP, source or destination name or phone number, and caller user-agent to identify a caller. The system enforces the following rules for formatting entries on a fraud protection list:

Hostname

Format: Enter the exact IP address or FQDN.

User name

Format: Enter the exact user name. For example: joe.user or joe_user.

User-Agent-Header

The User-Agent header text in the INVITE message from the first call leg. This text usually contains the brand and firmware version of the SIP device making the call. For example, sipcli/v1.8, Asterisk PBX 1.6.026-FONCORE-r78.

Format: Enter the exact text.

Phone Number

Format: Enter the exact number or a partial number using the following characters to increase the scope of the matches.

Telephony Fraud Protection File Activation

After you create, edit, or upload the telephony fraud protection file, you must activate the file before the Oracle® Enterprise Session Border Controller (E-SBC) can use it as the source of the fraud protection lists. The system recognizes only one file at a time as the active file.

The first time you configure the E-SBC to manage fraud protection, the system activates the file when you save and activate the configuration. After the initial configuration, the system does not automatically refresh the fraud protection file when you save and activate other configuration changes on the E-SBC. You must upload a new file or edit the existing file and activate it to update the file. The exception occurs when you specify a new file name in the fraud protection configuration and coincidentally make changes to other configurations, and then save and activate all of the changes at the same time.

After the initial configuration, use the following methods to activate the fraud protection file.

  • New File—After you create or upload a new file, go to Fraud Protection configuration, enter the name of the new file, and click Save. The system prompts for activation upon a successful Save. Note that you can decline the inline activation and manually activate the file later. For example, you might want to edit an uploaded file before activation.
  • Overwrite File—When you upload a file with the same name as the existing file, the system prompts for activation upon upload.
  • Edit File—When you edit the existing file directly from the Web GUI, the system prompts for activation after you save the edits.
  • Refresh File—When you want to use the ACLI to refresh the fraud protection file, send the file to the E-SBC and use the notify fped refresh command. The name of the file that you refresh must match the name of the file specified in the configuration.

Note:

The system displays an alert on the Notifications menu to remind you that the fraud protection file needs activation.
Telephony Fraud Protection File Management

When you want to edit the telephony fraud protection file managed by the Oracle® Enterprise Session Border Controller (E-SBC), use the Web GUI. You cannot manage the fraud protection file from the ACLI. When another device manages the file, you can edit the file on the device and upload the file to the E-SBC or you can upload the file to the E-SBC and perform edits prior to activation.

A user with Admin privileges can work with the fraud protection file, while a user with no Admin privileges can only view the file. The Web GUI supports fraud protection file management only in the Expert mode.

From the System tab, the File Management page displays the Fraud Protection Table object. The Fraud Protection Table displays the list of fraud protection files on the E-SBCand management controls, as shown in the following illustration.

This image is a screen capture of the fraud proteciton file management table page. Here you can select fraud protection table as the file type. You can refresh, add, edit, upload, download, and delete items in the list on this page.

A privileged Admin can Refresh the display, Add a new file, and Upload a file. Upon selecting a file, the Admin can Edit, Download, and Delete a file.

File Activation

The first time you configure the E-SBC to manage fraud protection, the system activates the file when you save and activate the configuration.

Note:

After the initial configuration, the system does not refresh the fraud protection file until you specify a new file name in the fraud protection configuration or upload a new version of the existing file.

File Upload from an External Source

When you want to use a fraud protection file from another source, you can upload the file to the E-SBC. The system puts the file into the /code/fpe directory. The system supports only the .gz, .gzip, and .xml file extensions for a fraud protection file. The Upload File dialog provides the option to activate the fraud protection file upon upload when the uploaded file name matches the configured file name, as shown in the following illustration.

This image is a screen capture of the fraud protection file upload dialog. You enter a file name or browse to the file lcoation. The dialog displays a check box that you can select if you want to activate the file after the upload.

You can activate the file upon upload, or at a later time. For example, you might not activate the file upon upload because you want to edit the entries before activation. If you do not select the option to activate the file now, you must manually activate the file before the system can use the file. When the name of the uploaded file differs from the one specified in the configuration, the Upload dialog does not display the option to activate the file because the system cannot use the file until you specify the file name in the fraud protection configuration and activate the configuration.

File Creation

When you want to create a new fraud protection file on the E-SBC, use the Add control on the File Management page to launch the following dialog.

This image is a screen capture of the add fraud proteciton table dialog. Here you enter the name and extension of the file that you want to add. The dialog displays a check box that you can select to compress the file.

After you enter the file name and click OK, the system adds the new file to the list of Fraud Protection Tables on the File Management page. To make the new file the source file for Fraud Protection, you must specify the file name in the fraud protection configuration and activate the configuration.

List Maintenance

When you want to edit a fraud protection list, select the file on the File Management page, right-click, and click Edit.

This image is a screen capture example of the fraud protection table, showing the editing controls you use to maintain the lists..

On the Modify Fraud Protection Table page, click the Add arrow, and select a file type from the drop-down list.

img/fraud-protect-file-types-list.png

The Web GUI displays the corresponding dialog for editing.

Telephony Fraud Protection Data Types and Formats

Use the information in the following tables when you create or edit a fraud protection list in the Add Fraud Protection Entry and Modify Fraud Protection Entry dialogs.

Data Type Descriptions

The following table describes the data types listed in the Type drop-down list.

Match Value Formats

The following table describes the formats required for the data types.

Caution:

The use of encoding characters is especially susceptible to creating overlapping dial pattern matches that can result in unexpected behavior.
Create a Telephony Fraud Protection File

When you want to use the Oracle® Enterprise Session Border Controller (E-SBC) to manage telephony fraud protection, the system requires a specified file to use as the source of the fraud protection lists. When you do not want to upload a file from elsewhere, you can create a new file on the E-SBC. You can create more files now or anytime after configuring fraud protection, but the system uses only the file named in the Fraud Protection configuration as the source file. Note that you cannot create a fraud protection file by way of the ACLI. You must use the Web GUI.

  • Confirm that the system displays the Expert mode.

Use the following procedure to create a new fraud protection file on the E-SBC, either before or after enabling fraud protection. See "Telephony Fraud Protection Data Types and Formats" for more information about the selections and formats for Type and Match Value.

  1. Access the File Management configuration object: Configuration, System, File Management..
  2. On the File Management page, select Fraud Protection Table from the File Management list.
  3. Click Add.
  4. In the Add Fraud Protection table dialog, do the following:
  5. Click OK.
    The system displays the Fraud Protection Entry page.
  6. Click Add, select a list type to add to the file, and do the following according to the list type:
  7. Click OK.
  8. (Optional) Repeat steps 6 and 7 to add more entries.
  9. Click Verify.
    The system checks for valid entries in the configuration fields and saves a successful configuration.
  10. Click Save.
  11. Click Close.
    The Web GUI displays the Fraud Protection Table.
  • When fraud protection is not configured, see "Configure Telephony Fraud Protection - GUI."
  • When fraud protection is configured, see "Activate a New Telephony Fraud Protection File -GUI."
Upload a Telephony Fraud Protection File

When you want to use a telephony fraud protection file from another source, you can upload the file to the Oracle® Enterprise Session Border Controller (E-SBC) by way of the Web GUI. You cannot upload the file by way of the ACLI.

  • Confirm that the file to upload uses one of the following file extensions: .gz, .gzip, or .xml.
  • Log on to the Web GUI directly to the Expert mode. (The system does not allow this procedure when you log on to Basic mode and switch to Expert mode.)

When you upload a fraud protection file, the system puts the file into the /code/fpe directory. The Upload File dialog provides the option to activate the fraud protection file immediately after the upload, or at a later time. For example, you might defer activation because you want to edit the uploaded file before it becomes the active file.

  1. Access the File Management configuration object: System, File Management.
  2. On the File Management page, select Fraud Protection Table from the list.
  3. Select a file, and click Upload.
  4. In the Upload file dialog, click Choose filedo the following:
  5. Click Upload, and select the file.
  6. Click Open.
  7. Click Upload.
    The Web GUI displays the file in the Fraud Protection table.
  • When fraud protection is not configured, see "Configure Telephony Fraud Protection - GUI."
  • When fraud protection is configured, see "Activate a New Telephony Fraud Protection File - GUI."
Configure Telephony Fraud Protection

The telephony fraud protection feature requires configuration, which you can perform from the Oracle® Enterprise Session Border Controller (E-SBC) Web GUI by way of Fraud Protection listed under System on the Configuration tab.

  • Confirm that you own the Advanced license.
  • Add or upload at least one telephony fraud protection file to the E-SBC.
  • Note the name of the telephony fraud protection file that you want to use.
  • Login to Expert Mode directly. (The system does not allow this procedure when you login to Basic mode and switch to Expert Mode.)

Use this procedure to enable telephony fraud protection management on the E-SBC. You must also specify the fraud protection file name and activate the configuration. You cannot specify multiple fraud protection files because the system recognizes only one file as the active source file.

Note:

The first time you configure the E-SBC to manage fraud protection, the system activates the file when you save and activate the configuration. After the initial configuration, the system does not refresh the fraud protection file when you save and activate other configuration changes on the E-SBC. The exception occurs when you specify a new file name in the fraud protection configuration, make changes to other configurations, and save and activate all of the changes at one time.
  1. Access the Fraud Protection configuration object: Configuration, System, Fraud Protection.
  2. On the Fraud Protection page, do the following:
  3. Click OK.
  4. Save the configuration.
Activate a New Telephony Fraud Protection File

When you create or upload a new telephony fraud protection file, you must activate the file before the system can use it as the source of the fraud protection lists. A new file is a file with a different name than one already in the system.

  • Create or upload the new file.
  • Note the name of the file that you want to activate.
  • Confirm that the system displays the Expert Mode. You can activate a fraud protection file from the Web GUI only in Expert Mode.

In the following procedure, the Local Mode establishes the Oracle® Enterprise Session Border Controller (E-SBC) as the source of fraud protection management.

  1. Access the Fraud Protection configuration object: Configuration, System, Fraud Protection.
  2. On the Fraud Protection page, do the following:
  3. Click OK.
  4. Save the configuration.
Edit a Telephony Fraud Protection File

When you want to edit a telephony fraud protection file on the Oracle® Enterprise Session Border Controller (E-SBC), use the Web GUI. You cannot edit a telephony fraud protection file from the ACLI.

To edit a fraud protection file, go to the Web GUI and select a file from the list on the File Management page. When you click Edit, the system displays the fraud protection lists in the file. Select a list type and click Edit. The system displays the corresponding dialog for editing the selected type of list. See "Telephony Fraud Protection Data Types and Formats" for more information about the selections and formats for Type and Match Value.

You can use this procedure to edit any fraud protection file, but the system cannot use the file unless it is the file named in the activated configuration. The following procedure assumes editing the configured file.

  1. Access the File Management configuration object: System, File Management.
  2. On the File Management page, select Fraud Protection Table from the list.
  3. Select a file, right-click, and click Edit.
  4. Select a list type, and click Edit.
    The system displays the corresponding dialog for editing that type of list.
  5. Do the following according to the list type:
  6. Click OK.
  7. (Optional) Click Verify.
    The system checks for valid entries in the configuration fields.
  8. Click OK.
  9. Click Save.
  10. Click OK.
  11. Click Close.
  12. Go to Configuration, System, System, Fraud Protection, Fraud Protection, and Save and Activate the configuration.
    The system uses the edited file as the fraud protection source file.
Configure a Host Route

Use the Host Routes object to insert entries into the Oracle® Enterprise Session Border Controller routing table to steer management traffic to the correct network.

  • Confirm that the gateway for this host route is defined as a gateway for an existing network interface.
  • Confirm that the system displays the Expert mode.

In the following procedure, note that no two host-route elements can use the same "dest network" address.

  1. Access the Host Route configuration object: Configuration, System, Host Route.
  2. On the Host Route page, click Add.
  3. On the Add host route page, do the following:
  4. Click
  5. Save the configuration.
Configure the Network Interface

You must configure the network interface of the Oracle® Enterprise Session Border Controller (E-SBC) to communicate with the physical interface and the network.

  • Confirm that the physical interface is configured. For more information, see "Physical Interface Configuration."
  • Confirm that the system displays the Advanced mode.

Use the Network Interface object to configure the parameters for the network interface, which specifies a logical network interface over which you can configure one or more application SIP interfaces. Note that the E-SBC supports only one network interface.

  1. Access the Network Interface configuration object: Configuration, Objects, System, Network Interface.
  2. On the Network Interface page, click Add, and do the following:
  3. Click OK.
  4. Save the configuration.
  • For High Availability (HA), configure redundancy. See "Redundancy Configuration" and "Configure Redundancy."
Configure NTP

Use the NTP Config element to associate the Network Time Protocol (NTP) server with theOracle® Enterprise Session Border Controller (E-SBC).

Use the following procedure to configure synchronization of the NTP server with the E-SBC.

  1. Access the NTP Config configuration object: Configuration, System, NTP Config.
  2. On the NTP Config page, do the following:
  3. Click OK.
  4. Save the configuration.
Configure the Physical Interface

You must configure the physical interface of the Oracle® Enterprise Session Border Controller to connect to the network.

Use the phy-interface object to configure the physical interface for control, media, and maintenance operations. Perform this procedure for each operation type, which you will select in step 4.

  1. Access the Phy Interface configuration object: Configuration, System, Phy Interface.
  2. On the Phy Iinterface page, click Add, and do the following:
  3. Click OK.
  4. Save the configuration.
  • Configure the Network Interface. See "Configure the Network Interface."
High Availability

High Availability (HA) is a network configuration used to ensure that planned and unplanned outages do not disrupt service. In an HA configuration, Oracle® Enterprise Session Border Controllers (E-SBC) are deployed in a pair to deliver continuous high availability for interactive communication services. Two E-SBCs operating in this way are called an HA node. The HA node design ensures that no stable call is dropped in the event of an outage.

In an HA node, one E-SBC operates in the active mode and the other E-SBCoperates in the standby mode.

  • Active. The active member of the HA node is the system actively processing signal and media traffic. The active member continuously monitors itself for internal processes and IP connectivity health. If the active member detects a condition that can interrupt or degrade service, it hands over its role as the active member of the HA node to the standby member.
  • Standby. The standby member of the HA node is the backup system. The standby member is fully synchronized with the active member's session status, but it does not actively process signal and media traffic. The standby member monitors the status of the active member and it can assume the active role without the active system having to instruct it to do so. When the standby system assumes the active role, it notifies network management using an SNMP trap.

The E-SBC establishes active and standby roles in the following ways.

  • If an E-SBC boots up and is alone in the network, it is automatically the active system. If you pair a second E-SBC with the first one to form an HA node, the second system automatically establishes itself as the standby.
  • If both E-SBCs in the HA node boot up at the same time, they negotiate with each other for the active role. If both systems have perfect health, then the E-SBC with the lowest HA rear interface IPv4 address becomes the active E-SBC. The E-SBC with the higher HA rear interface IPv4 address becomes the standby E-SBC.

If the rear physical link between the twoE-SBCs is unresponsive during boot up or operation, both will attempt to become the active E-SBC. In this circumstance, processing does not work properly.

The standby E-SBC assumes the active role when:
  • it does not receive a checkpoint message from the active E-SBC for a certain period of time.
  • it determines that the active E-SBC health score declined to an unacceptable level.
  • the active E-SBC relinquishes the active role.

To produce a seamless switch over from one E-SBC to the other, the HA node members share their virtual MAC and virtual IP addresses for the media interfaces in a way that is similar to Virtual Router Redundancy Protocol (VRRP). Sharing these addresses eliminates the possibility that the MAC address and the IPv4 address set on one E-SBC in an HA node will be a single point of failure. Within the HA node, the E-SBCs advertise their current state and health to one another in checkpointing messages to apprise each one of the other one's status. Using the Oracle HA protocol, the E-SBCs communicate with UDP messages sent out and received on the rear interfaces. During a switch over, the standby E-SBC sends out an ARP request using the virtual MAC address to establish that MAC address on another physical port within the Ethernet switch. To the upstream router, the MAC address and IP address are still alive. Existing sessions continue uninterrupted.

Configure the Acme Packet 1100 for HA

The details in the procedures for configuring High Availability (HA) on the Acme Packet 1100 differ from configuring HA for other models of the Oracle® Enterprise Session Border Controller because the Acme Packet 1100 has a single management interface and it shares the wancom0 port for HA operations.

Use the following Expert Mode procedures to configure the Acme Packet 1100 for HA operations. You must perform the physical interface configuration twice. One configuration sets the Management operations the other configuration sets the Media operations.

  1. Configure the physical interface for management. See "Configure the Physical Interface."
  2. Configure the physical interface for media. See "Configure the Physical Interface."
  3. Configure the network interface with addresses for the Primary and Secondary devices. See "Configure the Network Interface."
  4. Configure the peers for redundancy. See "Configure Redundancy."
Configure Redundancy

Use the Redundancy Config element to configure the parameters to support redundancy for a High Availability (HA) pair of Oracle® Enterprise Session Border Controller (E-SBC) devices.

  • Confirm that the physical interface for Control, the physical interface for Media, and the Network interface on the primaryE-SBC are configured for HA pairing.

Perform this procedure to configure redundancy for High Availability (HA) pairing of the primary E-SBC and the secondary E-SBC.

  1. Access the Redundancy Config configuration object: Configuration, System, Redundancy Config.
  2. On the Redundancy Config page, do the following:
  3. Click OK.
  4. Save the configuration.
SNMP Trap Receiver

A trap receiver is an application used to receive, log, and view SNMP traps for monitoring the Oracle® Enterprise Session Border Controller (E-SBC).

An SNMP trap is the notification sent from a network device, such as an E-SBC, that declares a change in service. You can define one or more trap receivers on an E-SBC for redundancy or to segregate alarms with different severity levels to individual trap receivers. Each server on which an NMS is installed should be configured as a trap receiver on each E-SBC managed by an NMS.

You can select a filter level threshold that indicates the severity level at which a trap is sent to the trap receiver. The following table maps Syslog and SNMP alarms to trap receiver filter levels.

Filter Level Syslog Severity Level (SNMP) Alarm Severity Level
All Emergency (1)

Critical (2)

Major (3)

Minor (4)

Warning (5)

Notice (6)

Info (7)

Trace (8)

Debug (9)

Emergency

Critical

Major

Minor

Warning

Critical Emergency (1)

Critical (2)

Emergency

Critical

Major Emergency (1)

Critical (2)

Major (3)

Emergency

Critical

Major

Minor Emergency (1)

Critical (2)

Major (3)

Minor (4)

Emergency

Critical

Major

Minor

When configuring the trap-receiver element for use with Network Management Systems, Oracle recommends setting the filter-level parameter to All.

Configure an SNMP Trap Receiver

You can define one or more SNMP trap receivers on an Oracle® Enterprise Session Border Controller (E-SBC) for redundancy or to segregate and send alarms with different severity levels to individual trap receivers.

  • Confirm that SNMP is configured.
  • Note the names of users who are allowed to receive secure traps.

Oracle recommends that you configure each server with an NMS installed as a trap receiver on each E-SBC managed by an NMS. When configuring the trap-receiver element for use with Network Management Systems, Oracle recommends setting the filter-level parameter to All.

  1. Access the Trap Receiver configuration object: Configuration, System, Trap Receiver.
  2. On the Trap Receiver page, click Add, and do the following:
  3. Click OK.
  4. Save the configuration.
SNMP Community

A Simple Network Management Protocol (SNMP) community is a grouping of network devices and management stations used to define where information is sent and accepted. An SNMP device or agent might belong to more than one SNMP community. SNMP communities provide a type of password protection for viewing and setting management information within a community.

An SNMP community is a string used as a password by the SNMP manager to communicate with the SNMP agent. The SNMP community string allows access to statistics of other devices. The access is used to support the monitoring of devices attached to the network for conditions that warrant administrative attention. When an SNMP community is configured, the Oracle® Enterprise Session Border Controller (E-SBC) sends the community string along with all SNMP requests.

A community name value can also be used as a password to provide authentication, thereby limiting the NMS that has access to an E-SBC. With this field, the SNMP agent provides trivial authentication based on the community name that is exchanged in plain text SNMP messages. For example, public.

SNMP communities also include access level settings, which are used to define the access rights associated with a specific SNMP community. You can define two types of access level on the E-SBC, which are read-only and read-write. You can define multiple SNMP communities on an E-SBC to segregate access modes per community and NMS host. The access level determines the permissions that other NMS hosts can wield over this (E-SBC).
  • Read-only. Allows GET requests. (Default)
  • Read/Write. Allows both GET and SET requests.

IPv4 addresses that are valid within this SNMP community correspond with the IPv4 address of NMS applications that monitor or configure this E-SBC. Include the IPv4 addresses of each server on which an NMS is installed.

Only devices that support SNMPv1 and SNMPv2c protocol can use SNMP community strings. SNMPv3 uses username and password authentication, along with an encryption key.

Configure SNMP Community

Configure a Simple Network Management Protocol (SNMP) community to support the monitoring of devices, such as the Oracle® Enterprise Session Border Controller (E-SBC), attached to the network for conditions that warrant administrative attention.

  • Confirm that SNMP is configured.
  • Note the IP addresses that you want for this community.

Use this procedure to group network devices and management stations, and to set the access rights for the community. If you want to narrow the scope of the this community, use the Network Addresses option to specify one or more subnets. See "Subnet Ranges for SNMP Community" for more information.

Note:

Only devices that support SNMPv1 and SNMPv2c protocol can use SNMP community strings. SNMPv3 uses username and password authentication, along with an encryption key.
  1. Access the SNMP Community configuration object: System, SNMP community.
  2. On the SNMP Community page, click Add, and do the following:
  3. Click OK.
  4. Save the configuration.
Configure Subnet Ranges in SNMP Community

The SNMP system can dynamically originate SNMP GET requests from any host among a wide range of IP addresses. Due to the distributed nature of a typical network, the SNMP GET request may come from any IP address on an /8 netblock. It is not feasible to add all 16,777,216 possible IP addresses, one-by-one, to the SNMP Community configuration. The solution for the Oracle® Enterprise Session Border Controller (E-SBC) is to allow subnet ranges in the SNMP Community configuration. In this way, the (E-SBC) can accept SNMP GET requests from any host in the specified subnet.

You can configure the subnet range from the ACLI and the Web GUI by way of the IP Addresses parameter in the SNMP Community configuration object.

The IP Addresses parameter accepts subnet addresses in address prefix format (<Net_addr>/<Net_mask>), for example, 10.0.0.0/24. For an exact match, omit the number of bits, for example, 10.196.0.0. For multiple entries, use the parenthesis separated by comma format, for example, (172.16.0.0/16,192.168.4.0/24).

Configure System Config

The System Config configuration object contains attributes and sub-objects that you use to configure system-level operations for the Oracle® Enterprise Session Border Controller (E-SBC).

  1. Access the System Config configuration object: Configuration, System, System Config.
  2. In the System Config object, do the following:
  3. Save the configuration.
Time Division Multiplexing

Oracle® designed the Time Division Multiplexing (TDM) functionality for companies planning to migrate from TDM to SIP trunks by using a hybrid TDM-SIP infrastructure, rather than adopting VoIP-SIP as their sole means of voice communications. The TDM interface on the Oracle® Enterprise Session Border Controller (E-SBC) provides switchover for egress audio calls, when the primary SIP trunk becomes unavailable. You can use TDM with legacy PBXs and other TDM devices.

  • Only the Acme Packet 1100 and the Acme Packet 3900 platforms support TDM, which requires the optional TDM card.
  • TDM supports bidirectional calls as well as unidirectional calls.
  • TDM operations require you to configure TDM Config and TDM Profile, as well as local policies for inbound and outbound traffic.
  • The software upgrade procedure supports the TDM configuration.
  • Options for the Acme Packet 1100 and the Acme Packet 3900 platforms include Calling-Line Identification Presentation (CLIP) and Connected-Line Identification Presentation (COLP).
  • Options for the Acme Packet 1100 platform include the four-port Primary Rate Interface (PRI), the Euro ISDN Basic Rate Interface (BRI), and the Foreign Exchange Office-Foreign Exchange Subscriber (FXO-FXS) card.

Interface Requirements

PRI—Digium1TE133F single-port or Digium 1TE435BF four-port card.

BRI—Digium 1B433LF four-port card

FXS—Digium 1A8B04F eight-port card, green module (ports 1-4)

FXO—Diguim 1A8B04F eight-port card, red module (ports 5-8)

Notes

When you deploy either the Acme Packet 1100 or the Acme Packet 3900 in a High Availability (HA) pair, the active system cannot replicate calls between SIP and TDM to the standby system.

The Acme Packet 1100 does not support HA for the PRI, BRI, and FXO-FXS interfaces.

Time Division Multiplexing Configuration

To perform Time Division Multiplexing (TDM) operations on the Oracle® Enterprise Session Border Controller (E-SBC), you must enable TDM, specify the parameters for the interface in use, run the TDM configuration wizard, and create local policies for routing TDM traffic.

TDM configuration requires the following process:
  1. Configure the TDM Config element and its corresponding sub-elements. The TDM Config element, located under System, contains the parameters that are common to all TDM configurations. The sub-elements contain the particular parameters for the interface that the system detects in use on the E-SBC. The system displays the sub-elements, as follows:
    • When the E-SBC detects either the Primary Rate Interface (PRI) or the Basic Rate Interface (BRI) interface, TDM Config displays the TDM Profile sub-element with the parameters that correspond to the interface. See "Primary Rate Interface Support" and "Basic Rate Interface Support."
    • When the E-SBC detects the Analog interface, TDM Config displays both the FXO Profile and the FXS Profile sub-elements with the parameters that correspond to the interface. See "Foreign Exchange Office-Foreign Exchange Subscriber Support."
  2. Run the TDM configuration wizard to complete the configuration. The wizard creates the realm, SIP interface, steering pools, and other necessary configuration elements including the network interface and the phy-interface for SIP call routing. With SRTP enabled (default), the wizard also creates the Media Sec Policy object, enables the Secured Network attribute for the SIP Interface object, and configures the Media Sec Policy attribute for Realm Config. You can run the wizard from either the Web GUI (Set TDM Configuration) or the ACLI (Setup TDM).

    The E-SBC requires running the TDM configuration wizard only after the initial TDM configuration. The system does not require you to run the wizard after you make changes to the existing configuration.

    Note:

    When the Oracle Session Delivery Manager (SDM) manages the E-SBC, you configure TDM from the SDM and you do not need to run the TDM configuration wizard. See "Time Division Multiplexing (TDM) Settings on the Session Delivery Manager (SDM)" for the required settings.
  3. Configure the local policy for routing traffic through the TDM interface. For unidirectional TDM call routing, the system requires a local policy only for the call direction that you want. For example, inbound-only or outbound-only. For bi-directional TDM call routing, create both inbound and outbound local policies. See "Local Policy Configuration for Time Division Multiplexing."
You can configure TDM from the following locations:
  • ACLI—Use the TDM Config, TDM Profile, FXO Profile, and FXS Profile elements located under System.
  • Web GUI—Basic mode. Double-click the TDM icon in the network diagram to display the TDM configuration dialog.
  • Web GUI—Expert mode. Use the TDM Config, TDM Profile, FXO Profile, and FXS Profile elements located under System.
  • Session Delivery Manager (SDM)—Launch the Web GUI from SDM and use the TDM Config, TDM Profile, FXO Profile, and FXS Profile elements located under system.
Incoming Call Pattern Guidelines

When you configure either the Primary Rate Interface (PRI) or Basic Rate Interface (BRI) interface for Time Division Multiplexing (TDM), you can set a list of extension numbers and match patterns for routing incoming calls. You can specify exact matches as well as patterns that route to a range of destinations.

For example, suppose that a company with 300 employees deploys the Oracle® Enterprise Session Border Controller (E-SBC) and connects to the PSTN network by way of an ISDN interface. The company allocates 300 extension numbers: numbers 7100 - 7399 for employee desk phones, and number 70 for the reception desk so that it is easy to remember.

The service provider assigns the prefix 49331200 to the company, so the reception desk PSTN number becomes 4933120070 and the employee numbers become 493312007100, 493312007101-493312007399.

The incoming pattern in this example will match either the reception desk number or one of the other extensions. When the match is successful, the received number is complete and the call setup can proceed. You can configure TDM to match the reception desk number as a whole: "4933120070," and to match any of the other extensions through a single pattern: "_493312007[1-3]XX". To put these rules together, set the incoming-pattern parameter to the following value: "4933120070|_493312007[1-3]XX".

In match patterns, separate single extension numbers with the vertical bar (|) character. Start a match pattern with the underscore (_) character before the first number of the pattern. Do not use the underscore with an exact match. Type the exact match, starting with the first number because an exact match does not use an extension pattern. Note the meaning of the following characters:

X matches any digit from 0-9

Z matches any digit from 1-9

N matches any digit from 2-9

[1237-9] matches any digit in the brackets (in this example, 1,2,3,7,8,9).

. wildcard, matches one or more characters

! wildcard, matches zero or more characters immediately

Configure the Single-Port Primary Rate Interface

The Acme Packet 1100 and the Acme Packet 3900 support the single-port ISDN Primary Rate Interface (PRI). To configure the PRI interface, you must set the parameters in tdm-config and tdm-profile under system. After you create the configuration, you must run either the Set TDM Configuration wizard from the Web GUI or the setup tdm command from the ACLI to complete the configuration.

  • Confirm the presence of the single-port PRI interface on the Acme Packet 1100.

Note that because the single-port interface supports only one profile, you can set either pri_cpe (Customer Premises Equipment) or pri_net (Network) for signaling. The setting you choose depends on the setting at the other end of the connection. Set this configuration to the opposite of the other end. For example, when the setting at the other end is pri_net, set pri_cpe in this configuration.

Note:

The system requires the four-port interface to support profiles for both pri_cpe and pri_net.
  1. Access the TDM Config configuration object: Configuration, System, TDM Config.
  2. In TDM Config, set the following:
  3. In tdm-profile, set the following:
  4. Click OK.
  5. Click OK.
  6. Save the configuration.
  • Run the TDM configuration wizard.
  • Configure the inbound and outbound TDM local policies.
Configure the Four-Port Primary Rate Interface

The Acme Packet 1100 and the Acme Packet 3900 support the four-port ISDN Primary Rate Interface (PRI) for carrying multiple Digital Signal 0 (DS0) voice and data transmissions between the network and an endpoint. To configure the PRI interface, you must set the parameters in tdm-config and tdm-profile under system. After you create the configuration, you must run either the Set TDM Configuration wizard from the Web GUI or the setup tdm command from the ACLI to complete the configuration.

  • Confirm the presence of the four-port PRI.
  • Plan the number of TDM profiles that you want. (You can add or delete profiles later, if your needs change.)

When the Oracle® Enterprise Session Border Controller (E-SBC) detects the PRI interface interface, it displays the corresponding configuration parameters. In the PRI configuration, the line mode that you specify dictates certain corresponding settings. You can set either t1 or e1 for line-mode, but note that each one requires certain uniquely compatible settings. For example, when you specify the t1 line mode you must specify esf for the framing-value. Do not specify an e1 value for the t1 line mode or a t1 value for the e1 line mode. The following procedure shows the specific t1 and e1 settings, where required.

  1. Access the TDM Config configuration object: Configuration, System, TDM Config.
  2. In TDM Config, set the following:
  3. In tdm-profile, set the following:
  4. Click OK.
  5. Click OK.
  6. Save the configuration.
  • Run the TDM configuration wizard.
  • Configure the inbound and outbound TDM local policies.
Configure the Basic Rate Interface

To configure the Basic Rate Interface (BRI) card, you must set the parameters in TDM Config and TDM Profile under System. Note that the system supports coexisting profiles for both bri_cpe (Customer Premises Equipment) and bri_net (Network). After you create the configuration, you must run either the Set TDM Configuration wizard from the Web GUI or the Setup TDM command from the ACLI to complete the configuration.

  • Confirm the presence of the BRI interface on the Acme Packet 1100.
  • Plan the number of TDM profiles that you want. (You can add or delete profiles later, if your needs change.)

When the Oracle® Enterprise Session Border Controller (E-SBC) detects the BRI interface, it displays the corresponding parameters and inserts certain values that you cannot change.

  1. Access the TDM Config configuration object: Configuration, System, TDM Config.
  2. In TDM Config, set the following:
  3. In tdm-profile, do the following:
  4. Click OK.
  5. Click OK.
  6. Save the configuration.
  • Run the TDM configuration wizard.
  • Configure the inbound and outbound TDM local policies.
Configure Inbound TDM Policy

Time Division Multiplexing (TDM) operations require policies for directing traffic to and from the TDM realm. In the following procedure, you specify the attributes for inbound TDM traffic.

  • Configure TDM.

For the Policy priority parameter, the priority hierarchy from lowest to highest is none, normal, non-urgent, urgent, emergency. None means no priority. Each higher priority handles sessions at its level plus the sessions in the priorities above it. For example, non-urgent also handles sessions for urgent and emergency.

In the following procedure, the to-address and from-address can match the caller and called phone number or you can use any of the valid values noted. Note that you must use tdmRealm, which is case sensitive, for source-realm.

  1. Access the Local Policy configuration object: Configuration, Session Router, Local Policy, Add.
  2. On the Local policy page, click Add.
  3. On the Add local policy page, set the following:
  4. Click OK.
  5. Save the configuration.
  • If your deployment requires an outbound TDM local policy, see "Configure the Outbound TDM Policy."
Configure the Outbound TDM Policy

Time Division Multiplexing (TDM) operations require policies for directing traffic to and from the TDM realm. In the following procedure, you specify the attributes for outbound TDM traffic.

For the Policy priority parameter, the priority hierarchy from lowest to highest is none, normal, non-urgent, urgent, emergency. None means no priority. Each higher priority handles sessions at its level plus the sessions in the priorities above it. For example, non-urgent also handles sessions for urgent and emergency.

For the next-hop parameter in policy-attributes, use the name of the tdm-profile that you want associate with this policy.

  1. Access the Local Policy configuration object: Configuration, Session Router, Local Policy, Add.
  2. On the Add local policy page, set the following:
  3. Click OK.
  4. Save the configuration.
  • If your deployment requires an inbound TDM local policy, see "Configure the Inbound TDM Policy."
Configure Outbound Local Policy with TDM Backup

To complete the Time Division Multiplexing (TDM) configuration for redundancy, you must configure the TDM local routing policy.

  • Confirm that a TDM configuration exists.
  • Confirm that a policy exists for the realm.

To configure TDM for backup, add the tdm profile as a second attribute to the local policy.

  1. Access the Local Policy configuration object: Configuration, Session Router, Local Policy, Add.
  2. On the Add local policy page, under Policy attributes, click Add.
  3. On the Add Local Policy / policy attribute page, select tdm:<profilename> from the Next Hop drop down list.
  4. Click OK.
  5. Save the configuration.
  6. Save the configuration.
Add an FXO-FXS Profile

When your deployment requires Foreign Exchange Office-Foreign Exchange Subscriber (FXO-FXS) profiles, you can add up to four profiles each to support different attributes at different endpoints. For example, you might create profiles based on user name, department, location, and so on. You can create FXO profiles only, FSO profiles only, or both. To configure the FXO-FXS profiles, go to TDM Config under System, and create the profiles that you need.

  • Requires the FXO-FXS interface

The configuration process includes configuring TDM Config and a corresponding FXO Profile or FXS Profile.

  1. Access the TDM Config configuration object: Configuration, System, TDM Config.
  2. In TDM Config, set the following:
  3. For each FXO Profile and FXS Profile that you want to create, set the following:
  4. Click OK.
  5. Click OK
  6. Save the configuration.
  • Run the TDM Configuration Wizard.
  • Configure the inbound and outbound TDM local policies.
Perform FXO Port Tuning

Tuning the Foreign Exchange Office (FXO) ports can help the echo canceller to work more efficiently. The setup fxotune run command creates the fxotune configuration file, which contains the script that fine tunes the Digium Asterisk Hardware Device Interface (DAHDI) FXO channels, and restarts the system. The tuning takes place during the restart. After FXO tuning, the system saves the result in a configuration file that is automatically applied after each subsequent restart. No additional user action is necessary.

  • Configure one or more FXO profiles and activate the configuration.

Note that the following procedure requires a system restart, which can take longer than usual due to the tuning process.

  1. From the command line, type setup fxotune run.
  2. Restart the E-SBC.
Reset the FXO Port Tuning Defaults

If you ever want to reset the setup fxotune run boot parameter, use the setup fxotune reset command. The command resets the boot parameter for setup fxotune run to the default tuning values and removes the fxotune configuration file.

Note that the following procedure requires a system restart.

  1. From the command line, type setup fxotune reset.
  2. Restart the E-SBC.
Configure Fax Transcoding for the Acme Packet 1100

The system requires two codec policies, two local policies, and two realms to support fax transcoding.

  • Before you begin, configure one realm that points to the Internet and one realm that points to the Time Division Multiplexing (TDM) interface.

For example, suppose you name the internet-facing codec policy "Remote" and you name the TDM-facing codec policy "TDM." Use the following guidelines for configuration:

Codec policies
  • In the "Remote" codec-policy, set allow-codecs to T.38 PCMU PCMA and set add-codecs-on-egress to T.38OFD.
  • In the "TDM" codec-policy, set allow-codecs to PCMU PCMA and set add-codecs-on-egress to G711FB.
Local Policies
  • In the "Remote" local-policy, set source-realm to remote.
  • In the "TDM" local-policy, set source-realm to tdmRealm.
Realms
  • In the "Remote" realm-config, set identifier to remote, set the codec-policy type, and set codec-manip-in-realm to enabled.
  • In the "TDM" realm-config, set identifier to tdmRealm, set the codec-policy type, and set codec-manip-in-realm to enabled.
Configure Overlap Dialing for Call Routing

When you enable overlap dialing and set the incoming match pattern, the Oracle® Enterprise Session Border Controller (E-SBC) can work with the information in the SETUP message to successfully route calls through the Primary Rate Interface (PRI) and Basic Rate Interface (BRI) in a Time Division Multiplexing (TDM ) deployment.

  • Plan the match patterns that you want for incoming calls. See "Incoming Call Patterns Guidelines" for rules and syntax.
  • Confirm that the TDM Profile that you want to enable for overlap dialing exists.

Note:

If the TDM Profile that you want does not exist, you can set the Overlap Dial and Incoming Pattern parameters when you create the profile. The following procedure assumes the profile already exists.

Access TDM Config and use the TDM Profile sub-element to set the OverlapDial and Incoming Pattern parameters.

  1. Access the TDM Config configuration object: Configuration, System, TDM Config.
  2. Select the TDM profile that you want.
  3. Set the Overlap Dial parameter to Incoming.
  4. Set a list of extension numbers or match patterns for the Incoming Pattern parameter.

    Separate single extension numbers with the vertical bar (|) character. A pattern starts with the underscore (_) character. In an extension pattern, note the meaning of the following characters:

    X matches any digit from 0-9

    Z matches any digit from 1-9

    N matches any digit from 2-9

    [1237-9] matches any digit in the brackets (in this example, 1,2,3,7,8,9).

    . wildcard matches one or more characters

    ! wildcard matches zero or more characters immediately

    Syntax examples:
    Suppose the main number is 800-555-1234, one key extension is number 80, and the range of other extensions is from 8100-8399.
    • Match the exact number including the extension: 800555123480
    • Match the extension in a range: _80055512348[1-3]XX
    • Match the exact number including the extension or match an extension in a range: 800555123480|_80055512348[1-3]XX
  5. Save the configuration.
Web Server Configuration

The Web server is a software application that helps to deliver Web content that you can access through the Internet. The Web server runs the Enterprise application called the Web GUI.

Every Web server has an IP address and sometimes a domain name. For example, if you enter the URL http://www.acmepacket.com/index.html in your browser, the browser sends a request to the Web server with domain name is acmepacket.com. The server fetches the page named index.html and sends it to the browser.

If you enter http://132.45.6.5, and this address has been configured by your Administrator to access the Web GUI, the server fetches the page and displays the Web GUI logon page to your browser.

Configure a Web Server

Use the Web Server configuration object to enable the Web server and to specify how you want it to communicate with the Oracle® Enterprise Session Border Controller.

  1. Access the Web Server configuration object: Configuration, System, Web Server.
  2. On the Add Web Server Config page, do the following.
  3. Click OK.
  4. Save the configuration.