“SBC SIP中继配置”的版本间的差异

来自最权威最新完整开源SIP,语音通信,融合通信中文技术文档资料,提供详细的Asterisk Freepbx, FreeSBC, 免费会话边界控制器,网关,语音板卡,IPPBX,SBC配置资料-asterisk,freepbx,freesbc 用户手册 界面配置,呼叫路由,IVR, 网关对接,拨号规则,SIP 分机呼叫,pjsip, IVR, 录音, CDR, 队列呼叫,振铃组,CLI 命令中文资料手册
跳转至: 导航搜索
 
(未显示2个用户的5个中间版本)
第3行: 第3行:
 
The SIP trunking use case is typically when you place the SBC between the PBX and the ITSP. This same use case would apply when joining two ITSPs together. The SBC in this use case is really being used as the SIP demarcation point between the internal network and the external network. The SBC also provides greater interoperability between the two networks as well as security.  
 
The SIP trunking use case is typically when you place the SBC between the PBX and the ITSP. This same use case would apply when joining two ITSPs together. The SBC in this use case is really being used as the SIP demarcation point between the internal network and the external network. The SBC also provides greater interoperability between the two networks as well as security.  
  
http://wiki.sangoma.com/files/SBC-Setup-as-a-SIP-Trunk/Pic1.jpg
+
[[文件:SBC_SIP_trunking.png|800px]]
 
   
 
   
  
第20行: 第20行:
 
The SBC is acting as a SIP firewall in this case, where all the external SIP traffic passes through the SBC to the IPPBX. The SBC's DMZ IP address will either have 1-to-1 NAT setup or port forwarding from a fixed public IP address.
 
The SBC is acting as a SIP firewall in this case, where all the external SIP traffic passes through the SBC to the IPPBX. The SBC's DMZ IP address will either have 1-to-1 NAT setup or port forwarding from a fixed public IP address.
  
1. Network Setup  
+
;;;1. Network Setup  
  
 
a. Login to the SBC (Configuraiton > IP Settings > Network > IP)
 
a. Login to the SBC (Configuraiton > IP Settings > Network > IP)
第28行: 第28行:
 
c. Go to > IP tab > Add > Interface (eth0/eth1) >  for eth0 we have assigned the DMZ IP 10.10.4.106, and for eth1 we have assigned the LAN IP 192.168.1.20
 
c. Go to > IP tab > Add > Interface (eth0/eth1) >  for eth0 we have assigned the DMZ IP 10.10.4.106, and for eth1 we have assigned the LAN IP 192.168.1.20
  
http://wiki.sangoma.com/files/SBC-Setup-as-a-SIP-Trunk/Pic2_Network_Interface.jpg
+
[[文件:SBC_trunk_network_setup_1.png|800px]]
  
 
d. Next configure the default gateway and DNS servers.  
 
d. Next configure the default gateway and DNS servers.  
第34行: 第34行:
 
Note: The default gateway is in the DMZ network to ensure all traffic for the ITSP leaves from the DMZ public IP address. If this the default gateway is set to the LAN gateway this can introduce audio issues.  
 
Note: The default gateway is in the DMZ network to ensure all traffic for the ITSP leaves from the DMZ public IP address. If this the default gateway is set to the LAN gateway this can introduce audio issues.  
  
http://wiki.sangoma.com/files/SBC-Setup-as-a-SIP-Trunk/Pic3_IP_complete.jpg
+
[[文件:SBC_trunk_network_setup_2.png]]
  
 
e.Next detect the media interfaces by going to Configuration > IP Settings > Media Interfaces and clicking edit. On the next screen simply click save to do the detection.  
 
e.Next detect the media interfaces by going to Configuration > IP Settings > Media Interfaces and clicking edit. On the next screen simply click save to do the detection.  
  
http://wiki.sangoma.com/files/SBC-Setup-as-a-SIP-Trunk/Pic4-media_interface.jpg
+
[[文件:SBC_trunk_network_setup_3.png]]
 +
 
 
f. Then when the media interface is detected you will see the output below:
 
f. Then when the media interface is detected you will see the output below:
  
http://wiki.sangoma.com/files/SBC-Setup-as-a-SIP-Trunk/Pic5-media_interface_complete.jpg
+
[[文件:SBC_trunk_network_setup_4.png]]
  
+
;;;2. SIP Profile   
 
+
2. SIP Profile   
+
  
 
We will create the External SIP Profile using the DMZ IP address, and then the Internal SIP Profile using the LAN IP address.
 
We will create the External SIP Profile using the DMZ IP address, and then the Internal SIP Profile using the LAN IP address.
  
a. Goto > Configuration > Signaling > SIP Profiles then click Add and name the SIP profile Internal.  
+
a. Goto > Configuration > Signaling > SIP Profiles then click Add and name the SIP profile Internal.
 +
 
 +
[[文件:SBC_sip_profile_1.png]]
  
 
b. Set the SIP IP Address to 192.168.1.20
 
b. Set the SIP IP Address to 192.168.1.20
 +
c. Enable SIP tracing. (Useful for debugging call issues)
  
http://wiki.sangoma.com/files/SBC-Setup-as-a-SIP-Trunk/Pic6-%20SIP%20Profile_Internal1.jpg
+
[[文件:SBC_sip_profile_2.png]]
 
+
c. Enable SIP tracing. (Useful for debugging call issues)
+
  
 
d. Do exactly the same procedure but for External SIP Profile
 
d. Do exactly the same procedure but for External SIP Profile
  
http://wiki.sangoma.com/files/SBC-Setup-as-a-SIP-Trunk/Pic7-%20SIP%20Profile_External1.jpg
+
[[文件:SBC_sip_profile_5.png]]
  
 
e. The only extra action that we need to ensure, is that the Authenticate Calls option is DISABLED if we don't have users registering TO or THROUGH the SBC.
 
e. The only extra action that we need to ensure, is that the Authenticate Calls option is DISABLED if we don't have users registering TO or THROUGH the SBC.
  
http://wiki.sangoma.com/files/SBC-Setup-as-a-SIP-Trunk/Pic8-%20SIP%20Profile_External2.jpg
+
[[文件:SBC_sip_profile_6.png|800px]]
  
  
  
3. SIP Trunks
+
;;;3. SIP Trunks
  
 
The next step would be to create SIP trunks.
 
The next step would be to create SIP trunks.
第88行: 第88行:
 
   
 
   
  
4. Call Routing
+
;;;4. Call Routing
  
 
a. The next step is the call routing. Goto > Configuration > Routing > Call Routing > Add > Name it: External (We name it exactly as a SIP PRofile, so it won't be confusing )
 
a. The next step is the call routing. Goto > Configuration > Routing > Call Routing > Add > Name it: External (We name it exactly as a SIP PRofile, so it won't be confusing )
第120行: 第120行:
 
        
 
        
  
5. Binding the Call Route to SIP Profile
+
;;;5. Binding the Call Route to SIP Profile
  
 
a. The next step would be to take the Dial Rule and bind it to SIP Profile. Goto > Configuration > Signaling > SIP Profiles > Internal > Modify > Edit
 
a. The next step would be to take the Dial Rule and bind it to SIP Profile. Goto > Configuration > Signaling > SIP Profiles > Internal > Modify > Edit
第136行: 第136行:
 
Customer can start making calls to test, and if everything is about right, he can enable more security features.
 
Customer can start making calls to test, and if everything is about right, he can enable more security features.
  
6. Enabling the Intrusion Detection
+
;;;6. Enabling the Intrusion Detection
 
If everything works well until this moment, we would proceed with enabling the Intrusion Detection.
 
If everything works well until this moment, we would proceed with enabling the Intrusion Detection.
 
a. Goto > Configuration > Security > Intrusion Detection, and then check ON evertyhing as follows:
 
a. Goto > Configuration > Security > Intrusion Detection, and then check ON evertyhing as follows:
第147行: 第147行:
 
   
 
   
  
7. Firewall
+
;;;7. Firewall
  
 
a. The next thing that worth to check is the firewall. Goto > Configuration > Security > IP Firewall. We have SIP port, and some management ports added by default. RTP ports are absent. They will be added on the fly as the call goes.
 
a. The next thing that worth to check is the firewall. Goto > Configuration > Security > IP Firewall. We have SIP port, and some management ports added by default. RTP ports are absent. They will be added on the fly as the call goes.
  
 
http://wiki.sangoma.com/files/SBC-Setup-as-a-SIP-Trunk/pic23_firewall.jpg
 
http://wiki.sangoma.com/files/SBC-Setup-as-a-SIP-Trunk/pic23_firewall.jpg
 
 
   
 
   
 
b.Make sure that the SIP port and the RTP ports are forwarded in the router. To find out the range of the RTP ports, simply Goto > Configuration > Ip Settings > Media Interfaces, and as we can see the range is 10000-13999
 
b.Make sure that the SIP port and the RTP ports are forwarded in the router. To find out the range of the RTP ports, simply Goto > Configuration > Ip Settings > Media Interfaces, and as we can see the range is 10000-13999
第159行: 第158行:
 
        
 
        
  
8. Starting Services
+
;;;8. Starting Services
  
 
The configuration is complete. The last and only step is to start all the services in the SBC. Goto > Overview > Dashboard > Control Panel
 
The configuration is complete. The last and only step is to start all the services in the SBC. Goto > Overview > Dashboard > Control Panel
 
Then start all the relevant services: Vega Session Controller, Instrusion Detection, Intrusion Prevention, Firewall , Secure Shell.
 
Then start all the relevant services: Vega Session Controller, Instrusion Detection, Intrusion Prevention, Firewall , Secure Shell.

2018年5月14日 (一) 14:28的最新版本

SBC - SIP Trunking

The SIP trunking use case is typically when you place the SBC between the PBX and the ITSP. This same use case would apply when joining two ITSPs together. The SBC in this use case is really being used as the SIP demarcation point between the internal network and the external network. The SBC also provides greater interoperability between the two networks as well as security.

SBC SIP trunking.png


IP Addresses

IPPBX IP: 192.168.1.10

ITSP FQDN: sbc.sangoma.com

SBC LAN IP: 192.168.1.20

SBC DMZ IP: 10.10.4.106

SBC Public IP: 104.145.12.182

The SBC is acting as a SIP firewall in this case, where all the external SIP traffic passes through the SBC to the IPPBX. The SBC's DMZ IP address will either have 1-to-1 NAT setup or port forwarding from a fixed public IP address.

1. Network Setup

a. Login to the SBC (Configuraiton > IP Settings > Network > IP)

b. Set IP addresses of both eth0 and eth1.

c. Go to > IP tab > Add > Interface (eth0/eth1) > for eth0 we have assigned the DMZ IP 10.10.4.106, and for eth1 we have assigned the LAN IP 192.168.1.20

SBC trunk network setup 1.png

d. Next configure the default gateway and DNS servers.

Note: The default gateway is in the DMZ network to ensure all traffic for the ITSP leaves from the DMZ public IP address. If this the default gateway is set to the LAN gateway this can introduce audio issues.

SBC trunk network setup 2.png

e.Next detect the media interfaces by going to Configuration > IP Settings > Media Interfaces and clicking edit. On the next screen simply click save to do the detection.

SBC trunk network setup 3.png

f. Then when the media interface is detected you will see the output below:

SBC trunk network setup 4.png

2. SIP Profile

We will create the External SIP Profile using the DMZ IP address, and then the Internal SIP Profile using the LAN IP address.

a. Goto > Configuration > Signaling > SIP Profiles then click Add and name the SIP profile Internal.

SBC sip profile 1.png

b. Set the SIP IP Address to 192.168.1.20 c. Enable SIP tracing. (Useful for debugging call issues)

SBC sip profile 2.png

d. Do exactly the same procedure but for External SIP Profile

SBC sip profile 5.png

e. The only extra action that we need to ensure, is that the Authenticate Calls option is DISABLED if we don't have users registering TO or THROUGH the SBC.

SBC sip profile 6.png


3. SIP Trunks

The next step would be to create SIP trunks. a. The first Trunk would be facing the ITSP, and therefore we'd call it ITSP. b. Goto > Configuration > Signaling > SIP Trunks > Add > name it: ITSP c. Then assuming that we do not register to the ITSP:

Pic9-%20SIP%20Trunk_External_noreg.jpg

d. In case that we do register to the ITSP, then we'd set up this as follows: Pic9-%20SIP%20Trunk_External_reg.jpg

e. Then we'd need to create a second SIP Trunk that would face the PBX, so we name it - PBX f. Goto > Configuration > Signaling > SIP Trunks > Add > name it: PBX

Pic10-%20SIP%20Trunk_Internal.jpg And this is the complete status that shows both SIP Trunks:

pic11-sip_trunk_finish.jpg


4. Call Routing

a. The next step is the call routing. Goto > Configuration > Routing > Call Routing > Add > Name it: External (We name it exactly as a SIP PRofile, so it won't be confusing ) b. The first rule that we want to add is the Security rule, so me make sure that the call is coming only from the ITSP c. In addition we'd need to know the IP of the ITSP. If we don't know the IP, we can simply obtain it by using the "nslookup" command in the CMD. (Example: nslookup sangoma.com, shows us 50.56.194.118)

pic12-%20Dial%20Plan_External_1.jpg Then after the Submit, the dial rule would look like:

pic12-%20Dial%20Plan_External_2.jpg d. The next rule would be to route the call from ITSP to the PBX. So we add a new rule:

pic13-%20Dial%20Plan_External_3.jpg

    NOTE: In some cases the REFER handling is required. Please review the folowing tutorial: NSC-SIP-Refer-Handling

This is the complete picture after we done with the External dial rules:

pic14-%20Dial%20Plan_External_fianl.jpg e. Then we'd need to create a dial rule for the other direction. Goto > Configuration > Routing > Call Routing > Add > Name it: Internal f. To simplify the process, we can copy the content of the rule from the External, as follows:

pic15-%20Dial%20plan_internal_1.jpg g. We change the name from External to Internal and mak a copy from External, because it's very similatr logic. Then we only change the IPs

pic16-%20Dial%20plan_internal_2.jpg h. And then we change the Bridge to Trunk destination from PBX, to the ITSP:

pic17-%20Dial%20plan_internal_3.jpg


5. Binding the Call Route to SIP Profile

a. The next step would be to take the Dial Rule and bind it to SIP Profile. Goto > Configuration > Signaling > SIP Profiles > Internal > Modify > Edit

pic18_binding_sip_profile.jpg

b. Then we just change the Routing Plan dropdown section to Internal pic19_binding_sip_profile_2.jpg

c. Then repeat the exact same procedure for the External.

pic20_binding_sip_profile_3.jpg

At this point the SBC is pretty much configured. Customer can start making calls to test, and if everything is about right, he can enable more security features.

6. Enabling the Intrusion Detection

If everything works well until this moment, we would proceed with enabling the Intrusion Detection. a. Goto > Configuration > Security > Intrusion Detection, and then check ON evertyhing as follows:

pic21_intrusion_detection_1.jpg

b. Then you go to Overview > Dashboard > Control Panel > Configure and Apply all the Configuration.

pic22_Apply%20Config.jpg


7. Firewall

a. The next thing that worth to check is the firewall. Goto > Configuration > Security > IP Firewall. We have SIP port, and some management ports added by default. RTP ports are absent. They will be added on the fly as the call goes.

pic23_firewall.jpg

b.Make sure that the SIP port and the RTP ports are forwarded in the router. To find out the range of the RTP ports, simply Goto > Configuration > Ip Settings > Media Interfaces, and as we can see the range is 10000-13999 pic24_firewall_rtp_ports.jpg


8. Starting Services

The configuration is complete. The last and only step is to start all the services in the SBC. Goto > Overview > Dashboard > Control Panel Then start all the relevant services: Vega Session Controller, Instrusion Detection, Intrusion Prevention, Firewall , Secure Shell.