nn47263-510 02.01 config sip survivability
TRANSCRIPT
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
1/86
Configuration SIP SurvivabilityAvaya Secure Router 2330/4134
10.3NN47263-510, 02.01
October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
2/86
2010 Avaya Inc.
All Rights Reserved.
Notice
While reasonable efforts have been made to ensure that theinformation in this document is complete and accurate at the time ofprinting, Avaya assumes no liability for any errors. Avaya reserves theright to make changes and corrections to the information in thisdocument without the obligation to notify any person or organization ofsuch changes.
Documentation disclaimerAvaya shall not be responsible for any modifications, additions, ordeletions to the original published version of this documentation unlesssuch modifications, additions, or deletions were performed by Avaya.End User agree to indemnify and hold harmless Avaya, Avaya's agents,servants and employees against all claims, lawsuits, demands and
judgments arising out of, or in connection with, subsequentmodifications, additions or deletions to this documentation, to theextent made by End User.
Link disclaimer
Avaya is not responsible for the contents or reliability of any linked Websites referenced within this site or documentation(s) provided by Avaya.
Avaya is not responsible for the accuracy of any information, statementor content provided on these sites and does not necessarily endorsethe products, services, or information described or offered within them.
Avaya does not guarantee that these links will work all the time and hasno control over the availability of the linked pages.
Warranty
Avaya provides a limited warranty on this product. Refer to your salesagreement to establish the terms of the limited warranty. In addition,
Avayas standard warranty language, as well as information regardingsupport for this product, while under warranty, is available to Avayacustomers and other parties through the Avaya Support Web site:http://www.avaya.com/support . Please note that if you acquired theproduct from an authorized Avaya reseller outside of the United Statesand Canada, the warranty is provided to you by said Avaya reseller andnot by Avaya.
Licenses
THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYAWEBSITE, HTTP://SUPPORT.AVAYA.COM/LICENSEINFO/ARE
APPLICABLE TO ANYONE WHO DOWNLOADS, USES AND/ORINSTALLS AVAYA SOFTWARE, PURCHASED FROM AVAYA INC.,
ANY AVAYA AFFILIATE, OR AN AUTHORIZED AVAYA RESELLER(AS APPLICABLE) UNDER A COMMERCIAL AGREEMENT WITH
AVAYA OR AN AUTHORIZED AVAYA RESELLER. UNLESSOTHERWISE AGREED TO BY AVAYA IN WRITING, AVAYA DOESNOT EXTEND THIS LICENSE IF THE SOFTWARE WAS OBTAINEDFROM ANYONE OTHER THAN AVAYA, AN AVAYA AFFILIATE OR AN
AVAYA AUTHORIZED RESELLER, AND AVAYA RESERVES THERIGHT TO TAKE LEGAL ACTION AGAINST YOU AND ANYONEELSE USING OR SELLING THE SOFTWARE WITHOUT A LICENSE.BY INSTALLING, DOWNLOADING OR USING THE SOFTWARE, OR
AUTHORIZING OTHERS TO DO SO, YOU, ON BEHALF OFYOURSELF AND THE ENTITY FOR WHOM YOU ARE INSTALLING,DOWNLOADING OR USING THE SOFTWARE (HEREINAFTERREFERRED TO INTERCHANGEABLY AS YOU AND END USER),
AGREE TO THESE TERMS AND CONDITIONS AND CREATE A
BINDING CONTRACT BETWEEN YOU AND AVAYA INC. OR THEAPPLICABLE AVAYA AFFILIATE (AVAYA).
Copyright
Except where expressly stated otherwise, no use should be made ofmaterials on this site, the Documentation(s) and Product(s) providedby Avaya. All content on this site, the documentation(s) and theproduct(s) provided by Avaya including the selection, arrangement anddesign of the content is owned either by Avaya or its licensors and is
protected by copyright and other intellectual property laws including thesui generis rights relating to the protection of databases. You may notmodify, copy, reproduce, republish, upload, post, transmit or distributein any way any content, in whole or in part, including any code andsoftware. Unauthorized reproduction, transmission, dissemination,storage, and or use without the express written consent of Avaya canbe a criminal, as well as a civil, offense under the applicable law.
Third-party components
Certain software programs or portions thereof included in the Productmay contain software distributed under third party agreements (ThirdParty Components), which may contain terms that expand or limit
rights to use certain portions of the Product (Third Party Terms).Information regarding distributed Linux OS source code (for thoseProducts that have distributed the Linux OS source code), andidentifying the copyright holders of the Third Party Components and theThird Party Terms that apply to them is available on the Avaya SupportWeb site: http://www.avaya.com/support/Copyright/.
Trademarks
The trademarks, logos and service marks (Marks) displayed in thissite, the documentation(s) and product(s) provided by Avaya are theregistered or unregistered Marks of Avaya, its affiliates, or other thirdparties. Users are not permitted to use such Marks without prior writtenconsent from Avaya or such third party which may own the Mark.Nothing contained in this site, the documentation(s) and product(s)should be construed as granting, by implication, estoppel, or otherwise,any license or right in and to the Marks without the express writtenpermission of Avaya or the applicable third party.
Avaya is a registered trademark of Avaya Inc.
All other trademarks are the property of their respective owners.
Downloading documents
For the most current versions of documentation, see the Avaya SupportWeb site: http://www.avaya.com/support
Contact Avaya Support
Avaya provides a telephone number for you to use to report problemsor to ask questions about your product. The support telephone numberis 1-800-242-2121 in the United States. For additional supporttelephone numbers, see the Avaya Web site: http://www.avaya.com/support
2 Configuration SIP Survivability October 2010
http://www.avaya.com/supporthttp://www.avaya.com/support/LicenseInfohttp://www.avaya.com/support/Copyright/http://www.avaya.com/supporthttp://www.avaya.com/supporthttp://www.avaya.com/supporthttp://www.avaya.com/supporthttp://www.avaya.com/supporthttp://www.avaya.com/supporthttp://www.avaya.com/support/Copyright/http://www.avaya.com/support/LicenseInfohttp://www.avaya.com/support -
7/24/2019 NN47263-510 02.01 Config SIP Survivability
3/86
Contents
Chapter 1: New in this release.................................................................................................7Features............................................................................................................................................................7
SSM digest authentication........................................................................................................................7
Chapter 2: Introduction.............................................................................................................9Navigation.........................................................................................................................................................9
Chapter 3: SIP Survivability fundamentals...........................................................................11Deployment scenarios.....................................................................................................................................11
Normal mode...................................................................................................................................................13
SIP REGISTER handling........................................................................................................................14
SIP Proxy functionality............................................................................................................................14
Call Admission Control functionality.......................................................................................................14
Survivable mode.............................................................................................................................................15
SIP REGISTER handling........................................................................................................................16
SIP Proxy functionality............................................................................................................................17
Persistence across reboots....................................................................................................................17NTML..............................................................................................................................................................17
SSM feature licensing.....................................................................................................................................18
SSM digest authentication..............................................................................................................................18
Supported SIP servers and endpoints............................................................................................................18
SIP server interoperability with SSM...............................................................................................................19
Avaya Aura.............................................................................................................................................19
Avaya CS 1000.......................................................................................................................................21
Avaya CS 2100.......................................................................................................................................23
Avaya SCS.............................................................................................................................................24
Chapter 4: SSM basic configuration......................................................................................25Prerequisites for SSM basic configuration......................................................................................................25
SSM basic configuration tasks........................................................................................................................25SSM operating in survivable mode only.................................................................................................25
SSM operating in normal or survivable mode.........................................................................................26
SSM basic configuration tasks navigation.......................................................................................................27
Binding an IP address for SSM.......................................................................................................................27
Enabling SSM.................................................................................................................................................28
Configuring the domain...................................................................................................................................29
Configuring keepalives for SIP survivability....................................................................................................29
Configuring the call admission control on an interface....................................................................................30
Configuring an exclusion pool for call admission control................................................................................31
Configuring the default gateway......................................................................................................................32
Chapter 5: SSM configuration examples...............................................................................33
Basic SSM configuration example..................................................................................................................33SSM configuration example with existing LAN infrastructure..........................................................................36
Chapter 6: SSM additional configuration..............................................................................39Navigation.......................................................................................................................................................39
Loading and storing the dial plan....................................................................................................................40
Configuring the SIP transport and ports..........................................................................................................41
Configuration SIP Survivability October 2010 3
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
4/86
Configuring user provisioning..........................................................................................................................41
Configuring digest authentication....................................................................................................................42
Configuring digest authentication user credentials.........................................................................................43
Configuring the SIP registrar for SIP survivability...........................................................................................44
Configuring the DNS timeout..........................................................................................................................45
Configuring service rejection...........................................................................................................................45
Configuring the SIP timer values.....................................................................................................................46Configuring session timers..............................................................................................................................47
Configuring the SIP header values.................................................................................................................48
Configuring SSM user licensing......................................................................................................................49
Configuring SSM congestion control...............................................................................................................50
Displaying the SIP survivability CAC configuration.........................................................................................52
Displaying the SIP survivability feature configuration.....................................................................................52
Displaying the SIP survivability dial plan filenames........................................................................................52
Displaying the SIP survivability licensed user capacity...................................................................................52
Displaying the SIP survivability protocol header configuration........................................................................53
Displaying the SIP survivability registered users............................................................................................53
Displaying the SIP survivability registrar parameters......................................................................................53
Displaying the SIP survivability session timer configuration...........................................................................53
Displaying the SSM server configuration........................................................................................................54Displaying the SIP survivability feature status................................................................................................54
Displaying the survivability SIP server statistics.............................................................................................54
Displaying the SIP survivability subscribers....................................................................................................55
Flushing the SSM database............................................................................................................................55
Clearing the SIP survivability feature statistics...............................................................................................55
Debug procedures...........................................................................................................................................55
Debugging with SIP message dump trace.............................................................................................56
Debugging with module trace.................................................................................................................56
Debugging with error trace.....................................................................................................................57
Chapter 7: Number Translation Markup Language..............................................................59Terminology and XML basics..........................................................................................................................59
Translation language.......................................................................................................................................60NTML interpreter....................................................................................................................................60
Nodes in the NTML language.................................................................................................................61
Translation node.....................................................................................................................................62
Switch nodes..........................................................................................................................................63
Action nodes...........................................................................................................................................68
Route nodes...........................................................................................................................................73
Exit node.................................................................................................................................................74
Chapter 8: SSM configuration example with NTML.............................................................75Basic SSM configuration example with NTML................................................................................................75
Chapter 9: Additional NTML examples..................................................................................77
Navigation.......................................................................................................................................................77NTML with default route..................................................................................................................................77
Route selection based on number in Req-uri header......................................................................................77
Exact match routing rule.........................................................................................................................78
Routing rule based on number of digits..................................................................................................78
Routing rule based on prefix and variable length...................................................................................79
Routing rule based on prefix and fixed length........................................................................................79
4 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
5/86
Routing rule based on range of numbers...............................................................................................79
Routing rule based on more than one criterion......................................................................................80
Route selection based on number in From header.........................................................................................81
Route selection based on number in To header..............................................................................................81
Route selection based on user-name in Req-uri header.................................................................................82
Route selection based on domain in Req-uri header......................................................................................82
Route Selection based on previous hop address............................................................................................83Translation of Request URI number................................................................................................................83
Inserting numbers...................................................................................................................................84
Dropping numbers..................................................................................................................................84
Replacing numbers.................................................................................................................................84
Translation based on mixed criterion......................................................................................................85
Configuration SIP Survivability October 2010 5
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
6/86
6 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
7/86
Chapter 1: New in this release
The following section details what is new inAvaya Secure Router 2330/4134 Configuration SIP
Survivability(NN47263-510) for Release 10.3.
Features
See the following sections for information about supported features:
SSM digest authentication
SSM supports digest authentication for subscribers in backup mode. For more information,
see the following sections:
SSM digest authenticationon page 18
Configuring digest authenticationon page 42
Configuring digest authentication user credentialson page 43
Configuration SIP Survivability October 2010 7
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
8/86
New in this release
8 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
9/86
Chapter 2: Introduction
This document provides information you need to configure the SIP Survivability feature.
Navigation
SIP Survivability fundamentalson page 11
SSM basic configurationon page 25
SSM configuration exampleson page 33
SSM additional configurationon page 39
Number Translation Markup Languageon page 59
SSM configuration example with NTMLon page 75
Additional NTML exampleson page 77
Configuration SIP Survivability October 2010 9
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
10/86
Introduction
10 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
11/86
Chapter 3: SIP Survivability fundamentals
In a centralized SIP server architecture, the remote branches make use of the call processing resourcesavailable at a central location, generally located at the corporate headquarters. The SIP survivabilityfeature enhances the feature set of the Avaya Secure Router 4134 (SR4134) and Avaya Secure Router2330 (SR2330) by providing business continuity to the branch office in the event of a SIP server failureor of a WAN connection outage to the corporate headquarters. With this feature, employees at the branchoffice can continue to use SIP phones to place and receive intra-site calls and make calls over the PSTN,including 911 calls, after a SIP server or WAN connection failure.
The SIP survivability module (SSM) is a software-only subsystem on the SR2330/4134 that provides SIPsurvivability capabilities. The SSM operates as a SIP Back to Back User Agent (B2BUA) that can backup a central SIP server by providing basic call services to connected endpoints at the branch if the WANconnection to the central SIP server fails.
SSM is a licensable feature. A 25-user SSM license is included for free with the installed PVIM card onthe SR2330/4134.
Deployment scenarios
You can deploy SIP Survivability in a Remote Branch Office network deployment.
Configuration SIP Survivability October 2010 11
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
12/86
Figure 1: Remote Branch Office network
A Remote Branch Office (RBO) makes use of the VoIP infrastructure deployed at a centralcorporate location. During normal operation when the WAN is up and running, all calls (intra-RBO, inter-RBO, PSTN) are routed through the central infrastructure deployed at theheadquarters. In Normal mode, the SSM acts as a proxy server, forwarding outgoing calls tothe SIP server for call routing, and forwarding incoming calls to the branch SIP endpoints.
When the central SIP server or WAN connection goes down, the Secure Router enterssurvivable mode and the SSM handles intra-RBO and PSTN calls. Inter-RBO VoIP calls cannotbe handled because the central infrastructure is not reachable. However, Inter-RBO calls canstill be made if they are routable using PSTN trunks.
The following figure shows a variation on the RBO network example in which the Secure Routeris installed in an existing branch LAN and therefore does not require routing capabilities. Inthis case, all SIP Phones are connected on the existing LAN infrastructure and the SecureRouter connects to the LAN through a single Ethernet connection. The SIP Media Gatewayprovides connections to FXS phones and to PSTN trunks, and the SSM provides survivabilitycapabilities for the SIP Phones.
SIP Survivability fundamentals
12 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
13/86
Figure 2: SSM with existing LAN infrastructure in Remote Branch Office network
The SR2330/4134 SSM operates in two modes Normal mode and Survivable mode.
In normal mode, the SSM functions as an outbound proxy and proxies all SIP messagesinitiated from the SIP phones and the SIP Media Gateway to the SIP Server located in thehead office.
In survivable mode, the SSM supports SIP server functionality to provide basic call features tothe SIP endpoints at the branch, and also supports local registrar functionality to storeregistrations. Survivable mode is also called backup mode as the SSM functions as a backupserver to the central SIP server in this mode.
The SSM can monitor the availability of the central SIP server in both modes using a keepalivemechanism and this information can be used to switch between the modes. SSM can be forcedto remain in survivable mode by not configuring this keepalive mechanism.
The SSM modes are explained in detail in the following sections.
Normal mode
For the proper functioning of SSM in Normal mode, you must configure the outbound proxy onthe SIP Phones to point to the SSM. In this case, when the SIP Phones send SIP messagesto the central SIP server, they forward the requests through the SSM.
Normal mode
Configuration SIP Survivability October 2010 13
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
14/86
SIP REGISTER handling
In normal mode, the SSM proxies REGISTER messages (including new registrations, re-
registrations, and de-registrations) received from SIP endpoints (SIP Phones or SR2330/4134
FXS ports) to the pre-configured central SIP server. SSM modifies the Contact headers in theREGISTER messages to point to SSM bind IP address before forwarding the REGISTER to
the central SIP server to ensure that incoming calls are routed through the SSM.
On receiving a successful response (200OK) to a proxied registration message, the SSM
stores registered contacts locally in an in-memory database along with the expiration time seen
in the response to a proxied registration message. It also adds the subscriber information,
namely the registered subscribers AOR, into its information database. This feature allows for
addition of subscriber data dynamically, without having a need to pre-provision subscriber
information.
The SSM updates the registration expiry interval if re-registration is successful and removes
the registration entries from its local database if the de-registration is successful. The SSMRegistrar keeps track of the registration expiry and removes the entries from its database once
they expire.
The SSM ensures that the number of contacts for a given AOR never exceeds the configured
max-contactsvalue for the AOR. If a new registration request for an AOR exceeds the
maximum allowed contacts for that AOR, SSM rejects the request with a 4xx response.
SIP Proxy functionality
The SSM behaves as an outbound proxy and forwards all calls to the central SIP server. SSM
supports proxying of all types of SIP messages REGISTER, INVITE, REFER, SUBSCRIBE/
NOTIFY, UPDATE, INFO, PRACK as well as all types of SIP responses 1xx (with or without
100 rel where xx is not 00), 2xx, 3xx, 4xx, 5xx, 6xx. Both UDP and TCP transport mechanisms
are supported for SIP messages.
The SSM uses administratively configured rules for proxying outbound calls based on dialed
digit patterns using a dial plan written in Avaya NTML (Number Translation Markup Language).
The NTML rules are configured in a Normal Mode NTML file located on attached flash media
which is uploaded using CLI for SSM processing.
The SSM routes incoming calls from the central SIP server to the destination SIP endpoints
by retrieving the contact from the registration database.
Call Admission Control functionality
For the proper functioning of SSM in Normal mode, you must enable call admission control
(CAC).
SIP Survivability fundamentals
14 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
15/86
CAC is required on the IP WAN interface because, unlike trunks on circuit-switched networks,
packet-switched networks have no hard physical limit on the number of calls that can exist
on a link. If you do not configure CAC on the WAN link, an unlimited number of calls threatens to
consume all the link bandwidth, causing degradation of voice quality for all calls. With CAC
enabled, you can limit the number of simultaneous calls on the link to avoid bandwidth
overutilization on the WAN link.
SSM allows you to configure the max-call counter associated with the WAN link. This count
need to be calculated based on the WAN link bandwidth of the WAN router and not based
on the bandwidth of the link between SR2330/4134 and the router. When SR2330/4134 is also
used as a WAN router, the directly connected WAN link bandwidth is used for the max-call
count calculation.
On receiving an outbound or inbound call that would use WAN bandwidth for media, the SSM
verifies whether the max-call limit allows for the call to be admitted. If the max-call limit is
reached, SSM rejects the inbound call with response 503. To identify whether the call will use
WAN bandwidth, an additional configuration of exclude-pool is needed. An exclude-pool
identifies the IP address range of the SIP endpoints that will use SSM and are local to the
branch office. CAC processing will then exclude the incoming streams from these endpointsfrom the max-call limit count. When SR2330/4134 is also used as WAN router, the exclude-
pool configuration is not required.
SSM supports PSTN fallback on CAC failure. To enable the fallback feature, you must configure
the default-gatewaycommand. In this case, if the max-call limit is reached, the SSM
forwards the outbound call to the configured default gateway for routing. You must also
configure the specified default gateway as the bind IP of the SIP Media Gateway on the same
SR2330/4134.
In normal mode, the SSM also monitors the configured CAC interfaces and, if all configured
CAC interfaces are down, it switches to survivable mode. This feature is useful for
SR2330/4134 with WAN routing, when the directly connected WAN links are configured asCAC interfaces.
With the CAC feature, only static bandwidth monitoring is supported. With static bandwidth
monitoring, SSM tracks the number of simultaneous calls established through the WAN link
and does not allow it to exceed the configured maximum value. This method assumes that all
calls have the same bandwidth requirement. Take this operation into consideration when
configuring the max-call limit, especially if you expect bandwidth requirements to vary for each
call.
Survivable mode
In survivable mode, the SSM routes the intra-branch calls to the appropriate endpoint
according to the in-memory registration database. Calls for PSTN interfaces are routed to the
SIP Media Gateway. The Gateway can route the intra-branch POTS calls to the FXS endpoints.
Survivable mode
Configuration SIP Survivability October 2010 15
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
16/86
Inter-branch calls are routed through the Gateway to the PSTN trunks, provided that they are
dialed as PSTN numbers.
Figure 3: Survivable mode
SSM periodically polls the central server using SIP OPTIONS requests, if configured. While in
Normal mode, when the server is not reachable (either because the server is down or the WAN
connectivity is down), SSM transitions to Survivable mode. When the server becomes
reachable, it reverts to Normal mode. If the periodic polling is not configured, SSM remains in
Survivable mode always. The SSM can also monitor WAN link status. This feature is useful
for SR2330/4134 with WAN routing enabled. In this scenario in Survivable mode, SSM moves
from "WAN Down" state to "WAN Up" state after recovery of the WAN link following a failure,
and then transitions to Normal mode when it gets a response to SIP OPTIONS requests.
SIP REGISTER handlingIn survivable mode, the SSM functions as a SIP Registrar and terminates REGISTER requests
by sending a 200 OK response after successful validation. SSM also provides optional
authentication of SIP endpoints. If authentication is enabled, you must provision the
subscribers by configuring SIP username and password. If authentication is disabled, a
configurable option is provided to allow all REGISTER requests or to restrict the registration
to provisioned users. In addition to dynamically populating subscribers at SSM, a manual
SIP Survivability fundamentals
16 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
17/86
provisioning of subscribers is also supported. When responding to the REGISTER request with
a successful response, SSM reduces the expiration interval to a small configured value (for
example 120 s) to ensure that registrations are refreshed frequently and are migrated back to
the Central server when it is available (that is, when SSM returns to Normal mode).
Similar to normal mode, SSM stores registered contacts locally in an in-memory database and
removes the entries from its database once they expire.
SSM refreshes the registration expiry timer on receiving a registration refresh and removes
the registration entry from its database on receiving a de-registration request.
SIP Proxy functionality
The SSM routes local intra-site calls in survivable mode using the in-memory database lookup.
It uses administratively configured rules for proxying incoming calls based on dial digit patterns
using a dial plan written in Avaya NTML. The NTML rules are specified through a survivable
mode NTML file uploaded using CLI.
SSM supports proxying of SIP messages required for support of endpoint hosted
supplementary services Call hold/resume, call transfer, call forward, call waiting, 3-way
conference, Do Not Disturb.
Persistence across reboots
In normal mode and in survivable mode, the in-memory database is periodically backed up in
flash file ssm.db. If the SR2330/4134 reboots, SSM reloads ssm.db to its memory and uses it
for call routing.
NTML
The Avaya Number Translation Markup Language (NTML) is an Extensible Markup Language(XML) based, proprietary scripting language used by SSM to define URI transformation rulesand specialized routing rules. You can use NTML scripts to modify the URI, for example, toinsert a string at any position within the user or host part of a URI, to remove a substring from aURI, or to replace the URI with an entirely new URI. NTML also allows decisions to be madebased on the value or pattern of the dialed URI or the caller or original called URI. It also allows
a set of next-hop routes to be specified for a given outgoing request to force specific routingrules.
SSM supports the configuration of NTML scripts for each of the modes: normal and survivable.
NTML
Configuration SIP Survivability October 2010 17
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
18/86
SSM feature licensing
Software licensing limits the number of SSM users allowable on the SR2330/4134. If you boot
up the SR2330/4134 with the PVIM module only, in addition to the eight supported DSP
channels, the SR2330/4134 supports a maximum of 25 SSM users.
To operate the SR2330/4134 with additional SSM users, you must obtain a license key from
Avaya support. License keys can expand the maximum SSM user capacity to support 100
users.
The license upgrade procedure is similar to the DSP channel upgrade procedure. For more
information, seeAvaya Secure Router 2330/4134 Configuration SIP Media Gateway
(NN47263-508).
SSM digest authentication
SSM supports digest authentication for subscribers in backup mode. If authentication is
enabled, you must provision the subscribers by configuring SIP username and password using
subscriber-credentialscommand. If authentication is disabled, use the registrar
policycommand to allow all register requests, or to restrict the registration to provisioned
users. Digest authentication is skipped for all requests received from gateway (trusted hosts)
in backup mode.
Supported SIP servers and endpoints
SSM supports the following SIP servers and endpoints.
SIP servers SIP endpoints
Avaya Aura 5.2, 6.0 Avaya 96xx SIP Deskphone Series , one-X
Communicator
Avaya SES/CM 5.2.1 Avaya 96xx SIP Deskphone Series
Avaya CS 1000 6.0, 7.0 Avaya 1120E/1140E SIP DeskphonesAvaya CS 2100 Avaya 1120E/1140E SIP Deskphones,
Avaya Multimedia client, LG Nortel (Now LG
Ericsson) 6812, Polycom IP330
SIP Survivability fundamentals
18 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
19/86
SIP servers SIP endpoints
Avaya SCS 3.0 Avaya 12xx Series SIP Deskphones, Avaya
3456 UC client, LG Nortel (Now LG Ericsson)
6812, 8820, Polycom IP330
Nortel CS 2000 (Now part of Genband) Avaya 1120E/1140E SIP Deskphones,
Avaya Multimedia client, LG Nortel (Now LGEricsson) 6812, Polycom IP330
Broadsoft BroadWorks 14.0 SP1 LG Nortel (Now LG Ericsson) 6812, Polycom
IP330
Sylantro 4.1.1 (Now part of Broadsoft) LG Nortel (Now LG Ericsson) 6812, Polycom
IP330
SIP server interoperability with SSMThe mode of operation of SSM must be configured based on the central SIP server. Also the
SR2330/4134 gateway subsystem can be configured to communicate with the central SIP
server directly instead of using SSM as the outbound proxy. The following sections describe
the deployment model of SSM and gateway subsystems with each of the Avaya SIP servers.
Avaya Auraon page 19
Avaya CS 1000on page 21
Avaya CS 2100on page 23
Avaya SCSon page 24
Avaya Aura
Avaya Aura is the core communications platform for supporting midsize to large companies,
providing the foundation for all of Avayas Unified Communications and Customer Service
Solutions. The core components of Avaya Aura include: Avaya Aura Communication Manager
(CM), Avaya Aura Session Manager (SM) and Avaya Aura System Manager. Avaya Aura
Session Manager enables distributed SIP-based system solutions featuring multi-vendor
integration, centralized dial plans and user profiles, centralized SIP trunks, easily administered
"on-net" call routing, and greatly enhanced SIP scalability and security. Avaya Aura
Communication Manager provides robust PBX features, high reliability and scalability, andmulti-protocol support. Communication Manager can be deployed in one of two roles: it can
be deployed as a PBX or as a Feature Server. When deployed as a feature server,
Communication Manager can support features for up to 7000 SIP endpoints that register to
Session Manager.
The SR2330/4134 is positioned as the SIP survivable gateway solution for Avaya Aura.
SIP server interoperability with SSM
Configuration SIP Survivability October 2010 19
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
20/86
In this deployment, the SR2330/4134 SSM module is always kept in Survivable mode by not
configuring server polling or the keepalive mechanism. When the Avaya Aura Session
Manager is reachable from the branch office, "simultaneous dual registration capable" SIP
endpoints register with the SM and the SSM separately and direct the calls to the SM. The
"alternate registration capable" SIP endpoints register with SM only and direct the calls to the
SM. These SIP endpoints monitor the reachability of the SM. If the SM is not reachable, they
move to survivable mode.
The following figure shows the interoperation of the SR2330/4134 with the Avaya Aura when
the Session Manager is reachable from the branch office.
Figure 4: Avaya Aura: Normal operation
When Avaya Aura Session Manager is not reachable from the branch office, "alternate
registration capable" SIP endpoints register with the SSM and direct the calls to the SSM. In
the case of "simultaneous dual registration capable" SIP endpoints, the registration step with
SSM is not required as these SIP endpoints were already registered when the session manager
was still reachable from the branch office which reduces the delay in switch over.
The following figure shows the operation of the SR2330/4134 when Avaya Aura Session
Manager is not reachable. SSM functions as a backup server to the central SIP server and
provides basic call features to the SIP endpoints including SIP phones, analog phones
connected to the gateway subsystem, and other devices.
SIP Survivability fundamentals
20 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
21/86
Figure 5: SR2330/4134 operation when central SIP server is not reachable
Configuration
Refer to the following documents for configuration and interoperability details:1. Avaya Solution & Interoperability Test Lab Application Note for Avaya Aura 6.0:
Configuring a Survivable SIP Gateway Solution using the Avaya Secure RouterSR2330 10.2.1, Avaya AuraSession Manager 6.0, Avaya AuraCommunicationManager 6.0, and Avaya Modular Messaging 5.2 Issue 1.0(http://support.avaya.com/css/P8/documents/100091900 )
2. Avaya Solution & Interoperability Test Lab Application Note for Avaya Aura 5.2:
Configuring a Survivable SIP Gateway Solution using the Avaya Secure Router,Avaya AuraSession Manager 5.2, Avaya AuraCommunication Manager 5.2,and Avaya Modular Messaging 5.2 in a Distributed Trunking Configuration Issue0.1(http://support.avaya.com/css/P8/documents/100090275 )
Avaya CS 1000
The Avaya Communication Server 1000 (CS 1000), which enables a simple evolutionary path
to the award-winning Avaya Aura unified communications solution, is a full-featured, highly-
scalable IP communications system that meets the needs of enterprises from small to large.
The core components of CS 1000 include SIP Line Gateway (SLG), SIP Signaling Gateway
(SSG) and SIP Proxy. SLG integrates SIP end points in the Communication Server 1000
system and extends business telephony features to SIP clients. The Network Routing Service
(NRS) application provides routing services to SIP-compliant devices. NRS is offered in two
versions: a SIP Redirect Server NRS and a SIP Proxy NRS (SPS). SSG is a softwarecomponent configured on virtual loops. They bridge CS 1000 call processing features and the
SIP network.
The SR2330/4134 is positioned as the SIP survivable gateway solution for Avaya CS 1000.
SIP server interoperability with SSM
Configuration SIP Survivability October 2010 21
http://support.avaya.com/css/P8/documents/100091900http://support.avaya.com/css/P8/documents/100091900http://support.avaya.com/css/P8/documents/100090275http://support.avaya.com/css/P8/documents/100090275http://support.avaya.com/css/P8/documents/100091900http://support.avaya.com/css/P8/documents/100091900 -
7/24/2019 NN47263-510 02.01 Config SIP Survivability
22/86
Normal mode
The SR2330/4134 SIP Gateway monitors the reachability of the currently active SPS usingSIP OPTIONS requests and registers with the currently active one. If the currently active SPS isnot reachable, the SIP Gateway switches to the other SPS as the currently active SPS.
SSM also monitors the reachability of the associated SIP Line Gateway (SLG) using SIP
OPTIONS requests. If the SLG is not reachable, the SR enters survivable mode.
In normal mode, the SR2330/4134 SSM proxies all Registration and INVITE requests from SIPUser Agents (SIP phone/softphone) to the SLG the Contact header is changed to includethe SSM IP address and port.
The following figure shows the interoperation of the SR2330/4134 with the Avaya CS 1000 innormal mode.
Figure 6: Avaya CS 1000: Normal mode
Survivable mode
The survivable mode operation with the CS 1000 is similar to the survivable mode operationwith the Avaya Aura (seeAvaya Auraon page 19 for details).
Configuration
Refer to the following document for configuration and interoperability details:
SIP Survivability fundamentals
22 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
23/86
Secure Router 2330/4134 as Communication Server 1000 Survivable SIP Branch Solution -Quick Start Configuration Guide(http://support.avaya.com/css/P8/documents/100099413 ).
Avaya CS 2100
Avaya Communication Server 2100 is an enterprise converged solution designed specifically
to address the demanding business and operational requirements of todays large enterprises.
The Communication Server 2100 platform is a best of all worlds integrated unified
communications solution that combines Avayas leading enterprise features and applications
with the exceptional scalability, reliability and networking usually only found in carrier solutions.
Combining these strengths with the capabilities of Avaya Aura architecture provides customers
an unmatched solution for consolidating dial plans, network access and applications into single
data center reducing network and operational cost.
The SR2330/4134 is positioned as the SIP survivable gateway solution for Avaya CS 2100.
SSM monitors the reachability of the call server using SIP OPTIONS request. If the call server is
not reachable, the SR2330/4134 enters survivable mode. In normal mode, SR2330/4134 SSM
proxies all Registration and INVITE requests from SIP end points and the SIP gateway to CS
2100.
Normal mode
The following figure shows the interoperation of the SR2330/4134 with the CS 2100 in normalmode.
SIP server interoperability with SSM
Configuration SIP Survivability October 2010 23
http://support.avaya.com/css/P8/documents/100099413http://support.avaya.com/css/P8/documents/100099413 -
7/24/2019 NN47263-510 02.01 Config SIP Survivability
24/86
Figure 7: Avaya CS 2100: Normal mode
Survivable mode
The survivable mode operation with the CS 2100 is similar to the survivable mode operation
with the Avaya Aura (seeAvaya Auraon page 19 for details).
Avaya SCS
The Avaya Software Communication System enables small and medium-sized businesses to
deliver powerful unified communications applications to improve employee productivity,
collaboration, and mobilityall while reducing communications costs. Functions include
unified messaging, meet me conferencing, video conferencing, presence, IM, advanced
softphones, personal auto attendant, find me/follow me capabilities, application integration with
Microsoft and IBM, and more. Employees can control and customize their apps with just a few
easy clicks.The Avaya SCS along with SR2330/4134 can be deployed as stand-alone, distributed and
centralized solutions for small and medium businesses.
When used in a centralized model, SR2330/4134 operation with SCS is similar to
SR2330/4134 operation with the CS 2100 (seeAvaya CS 2100on page 23 for details).
SIP Survivability fundamentals
24 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
25/86
Chapter 4: SSM basic configuration
This chapter describes the basic SSM configuration. The required configuration steps are listed below.
Prerequisites for SSM basic configuration
Internal PVIM module must be installed
If more than 25 users are required, SSM license must be purchased and installed
SSM basic configuration tasks
SSM operating in survivable mode only
The following steps describe the configuration tasks required for deployments in which SSM
operates only in survivable mode. This deployment is feasible if the SIP endpoints have the
capability to perform dual registration - either registering simultaneously with two servers or
registering with two servers one after another based on the server availability. In this case, the
SIP endpoints have the capability to monitor the availability of the servers.
1. Configure the SIP Media Gateway. SeeAvaya Secure Router 2330/4134
Configuration SIP Media Gateway(NN47263-508).
2. If the SSM and the SIP Media Gateway need to be bound to the same IP interface for
SIP traffic, you must specify separate ports to bind for the SSM and the SIP Media
Gateway. Avaya recommends to use the SIP default port 5060 for SSM. For the SIP
Media Gateway, change the port value of the bound interface from 5060 to a
different port (for example port 5070).
3. Configure the SSM:
Bind the IP interface for SIP traffic. If you are using the same IP interface as
the SIP Media Gateway bound interface, Avaya recommends to use well-
known SIP port 5060 for SSM and use a different port for the gateway (for
example port 5070).
Enable SSM (this step is required to before the remaining steps are allowed).
Configuration SIP Survivability October 2010 25
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
26/86
Specify the domain name for the central SIP server.
Use thessm default-gatewaycommand to point the SSM to the SIP Media
Gateway IP interface (specifying the non-default port). This ensures that the
SSM routes the call to the gateway if the SSM is not able to find contacts for
the calling party in its local database..
4. Configure the SIP Media Gateway to point to the central call server using the sip-
ua sip-servercommand.
5. Configure the SIP Phones to point to the central call server.
SSM operating in normal or survivable mode
The following steps describe the configuration tasks required for deployments in which SSM
operates in normal mode or in survivable mode. In this deployment SSM monitors the
reachability of the call server using SIP OPTIONS requests. The SIP endpoints and SIP
gateway configure SSM as the outbound proxy. If the call server is not reachable, the SSMenters the survivable mode.
1. Configure the SIP Media Gateway. SeeAvaya Secure Router 2330/4134
Configuration SIP Media Gateway(NN47263-508).
2. If the SSM and the SIP Media Gateway need to be bound to the same IP interface for
SIP traffic, you must specify separate ports to bind for the SSM and the SIP Media
Gateway. Avaya recommends to use the SIP default port 5060 for SSM. For the SIP
Media Gateway, change the port value of the bound interface from 5060 to a
different port (for example port 5070).
3. Configure the SSM:
Bind the IP interface for SIP traffic. If you are using the same IP interface as
the SIP Media Gateway bound interface, Avaya recommends to use well-
known SIP port 5060 for SSM and use a different port for the gateway (for
example port 5070).
Enable SSM (this step is required to before the remaining steps are allowed).
Specify the domain name for the central SIP server.
Configure keepalives (using the keepalive-servercommand) to monitor
the central SIP server.
Configure Call Admission Control on the interface connecting to the SIP server
to limit the amount of voice traffic allowed on the WAN link. Configure exclude-pool to identify the branch SIP end-points. exclude-pool configuration is not
required when SR2330/4134 also functions as a WAN router.
Use thessm default-gatewaycommand to point the SSM to the SIP Media
Gateway IP interface (specifying the non-default port). This ensures that the
SSM routes the call to the gateway under the following conditions: in normal
mode, if the SSM is not able to find a registered contact for the caller for the
SSM basic configuration
26 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
27/86
calls coming from the server; and in survivable mode, if the SSM is not able to
find contacts for the calling party in its local database. SSM also forwards the
call to the gateway when CAC validation fails for calls originated from the
branch.
4. Configure the outbound proxy on the SIP Media Gateway to point to the SSM IP
interface at port 5060 using the sip-ua outbound-proxycommand. This allowsthe SSM to serve as the proxy server for the Media Gateway.
5. Configure the outbound proxy on the SIP Phones to point to the SSM IP interface
at port 5060 also.
SSM basic configuration tasks navigation
Binding an IP address for SSMon page 27
Enabling SSMon page 28
Configuring the domainon page 29
Configuring keepalives for SIP survivabilityon page 29
Configuring the call admission control on an interfaceon page 30
Configuring the default gatewayon page 32
Binding an IP address for SSM
Use this procedure to bind the IP address for SSM. This IP address needs to be validatedagainst an existing IP interface address. Signaling and media uses this address as a sourceaddress. The application listens to this address for SIP signaling.
The configuration does not take effect until enableis executed. Before changing or removingan IP address or shutting down or deleting the interface, you must first disable SSM (ssmno enable).
By default, no IP address is configured.
Procedure steps
1. To enter configuration mode, enterconfigure terminal
2. To select VoIP service configuration, enter
voice service voip
3. To select SSM configuration, enter:
SSM basic configuration tasks navigation
Configuration SIP Survivability October 2010 27
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
28/86
ssm
4. To bind an IP address for SSM, enter:
[no] bind ip ipv4:
Table 1: Variable definitions
Variable Value
[no] Removes the specified IP address
binding.
Specifies the IP address to bind for SSM.
Enabling SSM
Use this procedure to enable or disable the SIP survivability functionality. By default,survivability is disabled.
Prerequisites
You cannot enable SIP survivability until you bind an IP address for SSM using thebind ipcommand.
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To select VoIP service configuration, enter
voice service voip
3. To select SSM configuration, enter
ssm
4. To enable or disable SIP survivability, enter
[no] enable
Table 2: Variable definitions
Variable Value
[no] Disables the SIP survivability server.
SSM basic configuration
28 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
29/86
Configuring the domain
Use this procedure to configure the managed domain under which the SR2330/4134 isoperational. By default, no domain is configured.
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To select VoIP service configuration, enter
voice service voip
3. To select SSM configuration, enter
ssm
4. To select SIP server configuration, enter
sip-server
5. To configure the domain, enter
[no] domain
Table 3: Variable definitions
Variable Value
[no] Removes the specified domain.
Specifies the domain name as either ipv4:or dns:.
Configuring keepalives for SIP survivability
Use this procedure to configure the address of the central SIP server to which keepalivemessages are sent. It also specifies the interval at which OPTIONS messages are sent to thecentral server along with the number of retries before taking a decision on the change fromnormal mode to survivable mode. By default, keepalives are disabled.
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To select VoIP service configuration, enter
Configuring the domain
Configuration SIP Survivability October 2010 29
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
30/86
voice service voip
3. To select SSM configuration, enter
ssm
4. To select SIP server configuration, enter
sip-server
5. To configure keepalives, enter
[no] keepalive-server {dns:[:port-num] |ipv4:[:port-num]}
[interval ] [retries ]
[transport {tcp | udp }]
Table 4: Variable definitions
Variable Value
[no] Removes the specified configuration.
dns:[:port-
num]
Specifies the DNS host name of the central SIP
server.
ipv4:[:port-num] Specifies the IP address of the central SIPserver.
interval Specifies the interval in seconds at which tosend OPTIONS messages to the keepalive
server. Default value is 60.
retries Specifies the number of retries before changingfrom normal to survivable mode, and vice versa.
Default value is 1.
transport {tcp | udp } Specifies the transport protocol. Default valueis udp.
Configuring the call admission control on an interface
Configure call admission control to limit the number of calls that can exist simultaneously onan interface. There are a maximum of five interfaces that can be configured. By default, CAC is
disabled.
Procedure steps
1. To enter configuration mode, enter
SSM basic configuration
30 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
31/86
configure terminal
2. To select VoIP service configuration, enter
voice service voip
3. To select SSM configuration, enter
ssm
4. To configure the maximum number of calls on an interface, enter
[no] cac max-calls
Table 5: Variable definitions
Variable Value
[no] Deletes the specified value.
Specifies the interface to configure.
Specifies the maximum number of calls allowed
on the specified interface.
Configuring an exclusion pool for call admission control
With CAC, you can configure an exclusion pool that identifies the IP address range of the SIPendpoints that use SSM. This configuration is required only if the SIP endpoints and the Serverare connected to the same interface of the SR2330/4134.
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To select VoIP service configuration, enter
voice service voip
3. To select SSM configuration, enter
ssm
4. To configure the exclusion pool for CAC, enter
[no] cac exclude-pool Table 6: Variable definitions
Variable Value
[no] Deletes the specified value.
Configuring an exclusion pool for call admission control
Configuration SIP Survivability October 2010 31
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
32/86
Variable Value
Specifies the network assigned to the SIPPhones.
Specifies the network mask.
Configuring the default gateway
Use this procedure to configure the default gateway to be used by SIP survivability. By default,there is no gateway configured; however the default transport is UDP, and the default port is5060.
The default gateway IP address must be the same as the bind IP address used by the SIPMedia Gateway.
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To select VoIP service configuration, enter
voice service voip
3. To select SSM configuration, enter
ssm
4. To configure the default gateway, enter
[no] default-gateway { ipv4:[:port-num] } [transport{tcp | udp }]
Table 7: Variable definitions
Variable Value
[no] Removes the specified default gateway.
ipv4:[:port-num] Specifies the IP address and optional portnumber for the default gateway.
[transport {tcp | udp} ] Specifies the transport used for the defaultgateway. Default value is udp.
SSM basic configuration
32 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
33/86
Chapter 5: SSM configuration examples
This chapter contains the following SSM configuration examples.
Basic SSM configuration exampleon page 33
SSM configuration example with existing LAN infrastructureon page 36
Basic SSM configuration example
The following figure shows a sample SSM network.
Configuration SIP Survivability October 2010 33
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
34/86
Figure 8: Basic SSM configuration example
The following steps show the configuration required for the SIP Media Gateway and the SSM toprovide SIP survivability in the network shown in the preceding figure.
Prerequisites
Secure Router must be running minimum Release 10.2 software
Internal PVM (for Avaya Secure Router 4134) or PVIM (for Avaya Secure Router 2330)module must be installed
If more than 25 users are required, SSM license must be purchased and installed
Procedure steps
1. Configure the Ethernet interface for connection to the SIP server:
configure terminalinterface ethernet 0/1
SSM configuration examples
34 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
35/86
ip address 20.20.20.1 255.255.255.0exit ethernet
2. Configure the Ethernet interface for SIP phone connectivity:
interface ethernet 0/2ip address 10.10.10.1 255.255.255.0exit ethernet
3. Configure a default route to the other end of the WAN:
ip route 0.0.0.0 0.0.0.0 20.20.20.2
4. Configure the SIP Media Gateway to listen on port 5070:
voice service voipsipbind all ipv4:10.10.10.1:5070exit sipexit voip
5. To configure the SIP Survivability Module, bind the IP interface for SIP traffic usingdefault port 5060:
voice service voip
ssmbind ip ipv4:10.10.10.1
6. Enable SSM:
enable
7. Specify the SSM domain name for the central SIP server:
sip-serverdomain dns:avaya.net
8. Enable SSM keepalives to monitor the central SIP server:
keepalive-server ipv4:30.30.30.1:5060transport udpexit sip-server
9. Configure SSM Call Admission Control on the WAN interface connecting to the SIPserver:
cacmax-calls ethernet0/1 50exit cac
10. Point the SSM to the SIP Media Gateway IP interface as the default gateway(specifying the non-default port):
default-gateway ipv4:10.10.10.1:5070exit ssmexit voip
11. Configure the outbound proxy on the SIP Media Gateway to point to the SSM:
sip-uaoutbound-proxy ipv4:10.10.10.1:5060
12. Configure the SIP Server for the SIP Media Gateway:
sip-server dns:avaya.netexit sip-ua
Basic SSM configuration example
Configuration SIP Survivability October 2010 35
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
36/86
13. Configure the FXS voice port for the analog phone:
voice-port 2/1signal loop-startstation number 4087541000no shutdownexit voice-port
14. Configure the POTS dial peer for the analog phone:dial-peer voice pots 1destination-pattern 4087541000port 2/1forward-digits allno shutdownexit pots
15. Configure the outbound proxy on the SIP Phones to point to the SSM IP interfaceat port 5060 also.
SSM configuration example with existing LAN infrastructureThe following figure shows the basic SSM network configuration as shown in Basic SSMconfiguration example with NTMLon page 75, but in this case the Secure Router is operatingwith SSM and SIP Media Gateway features enabled, but without routing enabled. The initialconfiguration is similar to the previous example, however here, the bound IP must be the IPaddress of the Ethernet interface that connects to the branch LAN. Also, you must create anexclusion pool for CAC, so that incoming calls from the SIP phones on the Secure RouterEthernet connection are not counted toward the max-call limit.
SSM configuration examples
36 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
37/86
Procedure steps
1. Configure the Ethernet interface for connection to the SIP server:configure terminalinterface ethernet 0/1ip address 20.20.20.1 255.255.255.0exit ethernet
2. Configure a default route to the branch router:
ip route 0.0.0.0 0.0.0.0 20.20.20.2
3. Configure the SIP Media Gateway to listen on port 5070:
voice service voipsipbind all ipv4:20.20.20.1:5070exit sip
exit voip
4. To configure the SIP Survivability Module, bind the IP interface for SIP traffic usingdefault port 5060:
voice service voipssmbind ip ipv4:20.20.20.1
SSM configuration example with existing LAN infrastructure
Configuration SIP Survivability October 2010 37
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
38/86
5. Enable SSM:
enable
6. Specify the SSM domain name for the central SIP server:
sip-serverdomain dns:avaya.net
7. Enable SSM keepalives to monitor the central SIP server:
keepalive-server ipv4:30.30.30.1:5060transport udpexit sip-server
8. Configure SSM Call Admission Control on the WAN interface connecting to the SIPserver:
cacmax-calls ethernet0/1 50exit cac
9. Configure the CAC exclusion pool:
exclude-pool 40.40.40.0 255.255.255.0exit cac
10. Point the SSM to the SIP Media Gateway IP interface as the default gateway(specifying the non-default port):
default-gateway ipv4:20.20.20.1:5070exit ssmexit voip
11. Configure the outbound proxy on the SIP Media Gateway to point to the SSM:
sip-uaoutbound-proxy ipv4:20.20.20.1:5060
12. Configure the SIP Server for the SIP Media Gateway:
sip-server dns:avaya.netexit sip-ua
13. Configure the FXS voice port for the analog phone:
voice-port 2/1signal loop-startstation number 4087541000no shutdownexit voice-port
14. Configure the POTS dial peer for the analog phone:
dial-peer voice pots 1destination-pattern 4087541000port 2/1forward-digits all
no shutdownexit pots
15. Configure the outbound proxy on the SIP Phones to point to the SSM IP interfaceat port 5060 also.
SSM configuration examples
38 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
39/86
Chapter 6: SSM additional configuration
This chapter provides additional optional procedures for SSM configuration.
Navigation
Loading and storing the dial planon page 40
Configuring the SIP transport and portson page 41
Configuring user provisioningon page 41
Configuring the SIP registrar for SIP survivabilityon page 44
Configuring the DNS timeouton page 45
Configuring service rejectionon page 45
Configuring the SIP timer valueson page 46
Configuring session timerson page 47
Configuring the SIP header valueson page 48
Configuring SSM user licensingon page 49
Configuring SSM congestion controlon page 50
Displaying the SIP survivability CAC configurationon page 52
Displaying the SIP survivability feature configurationon page 52
Displaying the SIP survivability dial plan filenameson page 52
Displaying the SIP survivability licensed user capacityon page 52
Displaying the SIP survivability protocol header configurationon page 53
Displaying the SIP survivability registered userson page 53
Displaying the SIP survivability registrar parameterson page 53
Displaying the SIP survivability session timer configurationon page 53
Displaying the SSM server configurationon page 54
Displaying the SIP survivability feature statuson page 54
Displaying the survivability SIP server statisticson page 54
Displaying the SIP survivability subscriberson page 55
Configuration SIP Survivability October 2010 39
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
40/86
Flushing the SSM databaseon page 55
Clearing the SIP survivability feature statisticson page 55
Debug procedureson page 55
Loading and storing the dial plan
Use this procedure to load and store the preconfigured dial plan. By default, no dial plan isloaded or stored.
Procedure steps
1. To enter configuration mode, enter:
configure terminal
2. To select VoIP service configuration, enter:
voice service voip
3. To select SSM configuration, enter:
ssm
4. To load the dial plan, enter:
[no] dialplan load {normal | survivable}
If the load command is entered again, it overwrites the currently loaded dial-plan
5. To store the dial plan, enter: .
dialplan store {normal | survivable} You must load a dial plan before you can perform a store operation.
Table 8: Variable definitions
Variable Value
load {normal |
survivable}
Loads either the normal or survivable mode dial plan
from the specified path. If the full path is not
specified, then the system searches for the specified
filename in cf0 (internal flash memory). The no form
of the command unloads the dial plan.
store {normal |
survivable}
Stores either the normal or the survivable mode dial
plan to the specified path. The no form of thecommand is not supported.
SSM additional configuration
40 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
41/86
Configuring the SIP transport and ports
Use this procedure to configure the port and the associated transport protocol on which theSSM accepts SIP requests. By default, SSM listens on both the transport protocols: UDP andTCP. Each port is validated against an existing port used in the local SIP IP port. If the twoports are the same and have the same IP, a warning message is displayed requesting you toreconfigure the SIP IP port.
The configuration does not take effect until ssm enableis executed. Once SSM is enabled, tomodify the transport configuration, you must first enter the no enablecommand under thessmtree.
The default port value for TCP and UDP is 5060.
Procedure steps
1. To enter configuration mode, enter:
configure terminal
2. To select VoIP service configuration, enter:
voice service voip
3. To select SSM configuration, enter:
ssm
4. To configure SIP transport parameters, enter:
[no] bind transport
Table 9: Variable definitions
Variable Value
[no] Restores binding parameters to the default values.
Specifies the transport protocol: udp, or tcp.
Specifies the port to bind. Range is 1024-65535.
Configuring user provisioningBy default SSM learns the subscriber details from SIP REGISTRATIONS. It also provides astatic method to provision subscriber information. The subscriber information used by SSMincludes user name, domain, alias and identity.
Configuring the SIP transport and ports
Configuration SIP Survivability October 2010 41
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
42/86
Use this procedure to configure subscriber details. It is mainly used to configure aliasinformation.
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To select VoIP service configuration, enter
voice service voip
3. To select SSM configuration, enter
ssm
4. To configure user provisioning for SIP survivability, enter
[no] provisioning subscriber alias calling-line-id
Table 10: Variable definitions
Variable Value
[no] Removes the specified configuration.
Specifies the user name of the subscriber.
Specifies the domain name of the subscriber informat of ipv4: or dns:
Specifies the alias name.
Specifies the calling line ID.
Configuring digest authentication
Use this procedure to configure digest authentication for subscribers in backup mode.
Procedure steps
1. To enter the configuration mode, enter:
configure terminal2. To select VoIP service configuration, enter:
voice service voip
3. To select SSM configuration, enter:
SSM additional configuration
42 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
43/86
ssm
4. To configure authentication options, enter:
[no] digest-auth enable
Table 11: Variable definitions
Variable Value
enable Enables digest authentication.
[no] Disables digest authentication.
Configuring digest authentication user credentials
Use this procedure to configure user credentials for digest authentication.
Procedure steps
1. To enter the configuration mode, enter:
configure terminal
2. To select VoIP service configuration, enter:
voice service voip
3. To select SSM configuration, enter:
ssm
4. To configure subscriber credentials for authentication, enter:[no] provisioning subscriber-credentials
Table 12: Variable definitions
Variable Value
[no] Removes the user credentials configuration.
Specifies the user name of the subscriber.
Specifies the domain name of the subscriber
in format of ipv4:or dns:.
Specifies the user name for digest
authentication.
Specifies the password for digest
authentication.
Configuring digest authentication user credentials
Configuration SIP Survivability October 2010 43
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
44/86
Configuring the SIP registrar for SIP survivability
Use this procedure to configure the SIP registrar for SIP survivability.
Procedure steps
1. To enter configuration mode, enter:
configure terminal
2. To select VoIP service configuration, enter:
voice service voip
3. To select SSM configuration, enter:
ssm
4. To select SIP registrar configuration, enter:
registrar
5. To configure the range within which the expires header value is accepted by theSSM registrar, enter:
[no] expires {max|min|default}
6. To configure the maximum contacts that can be registered for a single AOR, enter:
[no] max-contacts
7. To configure registration policy options in backup mode, enter:
[no] policy {all | provisioned-users}
Table 13: Variable definitions
Variable Value
[no] Removes the specified registrar configuration.
expires {max|min|default} Specifies the range within which the expires header
value is accepted by the survivable SIP registrar. The
no form of the command sets the values for
maximum, minimum and default to their default
values (180, 180, and 180, respectively).
max-contacts Specifies the maximum contacts that can be
registered for a single AOR. The no form of thecommand sets the value to the default: 5.
SSM additional configuration
44 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
45/86
Variable Value
policy {all | provisioned-users Configures registration policy in backup mode.
allallows all registrations.
provisioned-usersallows registration from
provisioned users only.
Default value is all.
Configuring the DNS timeout
Use this procedure to configure the DNS lookup timeout in milliseconds after which DNSlookups attempted by the proxy must timeout. By default, the DNS timeout is 86400milliseconds.
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To select VoIP service configuration, enter
voice service voip
3. To select SSM configuration, enter
ssm
4. To select SIP server configuration, enter
sip-server
5. To configure the DNS timeout, enter .
[no] dns-timeout
Table 14: Variable definitions
Variable Value
[no] Restores the DNS timeout to the default value:86400 milliseconds.
Configuring service rejection
Use this procedure to configure the SIP server to reject SIP service messages in the survivablemode. By default, the SIP server rejects SIP service messages in survivable mode.
Configuring the DNS timeout
Configuration SIP Survivability October 2010 45
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
46/86
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To select VoIP service configuration, enter
voice service voip
3. To select SSM configuration, enter
ssm
4. To select SIP server configuration, enter
sip-server
5. To configure service rejection, enter
[no] reject-services-in-survivable-mode
Table 15: Variable definitions
Variable Value
[no] Activates the forwarding of service related toSIP messages.
Configuring the SIP timer values
Use this procedure to configure the SIP timer values within the SIP server.
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To select VoIP service configuration, enter
voice service voip
3. To select SSM configuration, enter
ssm
4. To select SIP server configuration, enter
sip-server
5. To configure SIP timer values, enter
[no] timer {T1|T2|B|C|D|F|H|I|J|K}
SSM additional configuration
46 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
47/86
Table 16: Variable definitions
Variable Value
[no] Resets the specified timer to the default values:
T1: 500 ms
T2: 4000 ms
B: 32000 ms
C: 180000 ms
D: 32000 ms
F: 32000 ms
H: 32000 ms
I: 5000 ms
J: 32000 ms
K: 5000 ms
T1, T2, B, C, F, H, I, J, KSpecifies values between 1-2147483647.
C Specifies a value between 180000-2147483647.
D Specifies a value between 32000-2147483647.
Configuring session timers
Use this procedure to configure session timer values in seconds. By default, session timervalues are max: 3600, min: 90, and default: 1800. Be sure to configure the min value to beless than the default value, and the default value to be less than the max value, otherwise theconfiguration is rejected.
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To select VoIP service configuration, enter
voice service voip
3. To select SSM configuration, enter
ssm
4. To configure the session timer, enter:
Configuring session timers
Configuration SIP Survivability October 2010 47
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
48/86
[no] sessiontimer session-timer {max|min|default} ]
5. To configure the session timer period validation, enter:
[no] sessiontimer range-validation
Table 17: Variable definitions
Variable Value
[no] Sets the specified parameter to the default value.
range-validation Turns on the session timer period validationrequested by endpoints. The no form of the
command resets the parameter to the default
value, that is, to not validate the session timer
range.
session-timer {max|min|
default}
Specifies the session timer to configure.
Specifies a value in seconds for the sessiontimer. Range is 904294967295.
Configuring the SIP header values
Use this procedure to configure the SIP header values.
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To select VoIP service configuration, enter
voice service voip
3. To select SSM configuration, enter
ssm
4. To select SIP protocol header configuration, enter:
protocol-header
5. To configure the retry-after interval, enter:
[no] retry-after-interval
6. To configure the organization header, enter:
[no] organization-header
7. To configure the server header, enter:
SSM additional configuration
48 Configuration SIP Survivability October 2010
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
49/86
[no] server-header
Table 18: Variable definitions
Variable Value
[no] Removes the specified configuration.
retry-after-interval Specifies the retry after interval value (in
seconds) to be inserted into the retry after SIP
header. The no form of this command sets the
interval to the default value (300 seconds).
Use 0 to omit the retry after SIP header.
organization-header Specifies the organization name to be inserted as
organization header into the messages
generated by the SIP server. The no form of the
command removes the organization header.
There is no default value.
server-header Specifies the string to be used in the server
header in responses generated by the SIP server.The no form of this command removes the server
header. There is no default value.
Configuring SSM user licensing
Use this procedure to load an SSM license key onto the SR2330/4134 to support additionalSSM users.
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To specify the number of users the license key supports, enter:
system license ssm_users
The system then prompts you for the license key.
3. When prompted, enter the license key. If the key is valid, the system prompts youto reboot.
4. After the reboot is completed, to verify the updated number of supported SSM users,enter:
show ssm licensed-users
Configuring SSM user licensing
Configuration SIP Survivability October 2010 49
-
7/24/2019 NN47263-510 02.01 Config SIP Survivability
50/86
Configuring SSM congestion control
SSM implements a mechanism to perform SIP message load control and throttling based onits memory consumption. SSM monitors the memory it utilizes and takes appropriate actionsbased on the percentage of memory consumption. There are three threshold levels defined.
Associated with each level are two trigger values: up and down.
Threshold 1: The percentage of memory consumption after which SSM starts rejectingall new requests which are not part of an existing dialogue with "503 Service Unavailable"responses. However, all requests within the dialogue are processed normally.
Threshold 2: The percentage of memory consumption after which SSM starts droppingall new requests which are not part of an existing dialogue. While in this state, SSM doesnot send any response to these requests. However, all requests within the dialogue areprocessed normally.
Threshold 3: Defines the percentage of memory consumption after which SSM stopsreceiving SIP messages from all network interfaces. In this state, SSM only sendsmessages out to the network and does not accept any messages from the network.
Use the following procedure to configure SSM congestion control.
Procedure steps
1. To enter configuration mode, enter
configure terminal
2. To select VoIP service configuration, enter:
voice service voip
3. To select SSM configuration, enter:
ssm
4. To configure congestion threshold levels, enter:
[no] congestion-thresholds memory
5. To verify the configured values, enter:
show ssm congestion-thresholds
Table 19: Variable definitions
Variable Value
[no] Resets the threshold levels to the default values:
up-threshold1: 75
up-threshold2: 85
SSM a