FRAFOS ABC SBC Handbook Release 4.5
Total Page:16
File Type:pdf, Size:1020Kb
FRAFOS ABC SBC Handbook Release 4.5 FRAFOS GmbH November 10, 2020 Contents 1 About the ABC Session Border Controller1 1.1 How to Start?.............................................2 1.2 Credits................................................3 2 Release Notes 4 2.1 Release Notes for ABC SBC version 4.5..............................4 2.2 Release Notes for ABC Monitor version 4.5.............................5 3 Introduction 6 3.1 A Brief Introduction to History and Architecture of SIP......................6 3.2 What is a Session Border Controller (SBC)?............................9 3.3 Do You Need an SBC?........................................ 12 3.4 ABC SBC Networking Concepts.................................. 13 4 Practical Guide to the ABC SBC 19 4.1 Network Planning Guidelines.................................... 19 4.2 Planning Checklists......................................... 26 4.3 A Typical SBC Configuration Example............................... 27 5 Installing the ABC SBC 45 5.1 Types of Installations: Hardware-based, Virtualized, and Cloud-based............... 45 5.2 Hardware Requirements....................................... 45 5.3 OS Tuning.............................................. 46 5.4 Deployment Modes......................................... 46 5.5 VM Installation............................................ 47 5.6 Installation Procedure........................................ 49 5.7 Initial Configuration......................................... 51 5.8 Setting Up Web Interface Access and User Accounts........................ 53 5.9 ABC SBC License.......................................... 54 5.10 Interface Configuration........................................ 54 5.11 TLS profiles Configuration...................................... 58 5.12 Hardware Specific Configurations.................................. 58 5.13 Last ABC SBC Installation Steps.................................. 60 5.14 ABC Monitor Installation (optional)................................. 60 5.15 ABC Monitor Installation Off AWS (optional)........................... 65 6 General ABC Configuration Guide 67 6.1 Physical, System and SBC Interfaces................................ 67 6.2 Defining Rules............................................ 67 6.3 Using Replacements in Rules.................................... 72 6.4 Using Regular Expression Backreferences in Rules......................... 75 6.5 Binding Rules together with Call Variables............................. 75 6.6 SIP Routing............................................. 78 6.7 SIP Mediation............................................ 90 6.8 SDP Mediation............................................ 102 6.9 Media Handling........................................... 106 6.10 NAT Traversal............................................ 114 i 6.11 Registration Caching and Handling................................. 119 6.12 Call Data Records (CDRs)...................................... 125 6.13 Advanced Use Cases with Provisioned Data............................. 129 6.14 SIP-WebRTC Gateway........................................ 143 6.15 Amazon Elastic Cloud Configuration Cookbook.......................... 155 6.16 Template parameters......................................... 162 7 ABC SBC System administration 165 7.1 User Management.......................................... 165 7.2 Server Administration........................................ 167 7.3 Backup and Restore Operations................................... 167 7.4 ABC Monitor Backup and Restore Operations........................... 172 7.5 Howto setup a Semi-redundant CCM on ABC Sbc......................... 173 7.6 Upgrade Procedure.......................................... 176 7.7 ABC Monitor Upgrade Procedure.................................. 177 7.8 SBC Dimensioning and Performance Tuning............................ 177 8 Monitoring and Troubleshooting 180 8.1 Overview of Monitoring and Troubleshooting Techniques..................... 180 8.2 ABC Monitor (Optional)....................................... 181 8.3 Live ABC SBC Information..................................... 211 8.4 Using SNMP for Measurements and Monitoring.......................... 214 8.5 Command-line SBC Process Management............................. 217 8.6 Additional Sources of Diagnostics Information........................... 218 9 Securing SIP Networks using ABC SBC and ABC Monitor (optional) 220 9.1 SIP Security Principles: Collect, Analyze and Police........................ 220 9.2 Police: Devising Security Rules in the ABC SBC.......................... 222 9.3 Collect Events: Gathering Usage Data in the ABC Monitor.................... 241 9.4 Analyze: Finding Patterns in Events using the ABC Monitor.................... 243 9.5 Practices for Devising Secure Rule-basis.............................. 249 10 Preview of Experimental Features 256 10.1 Registration Agent.......................................... 256 10.2 Using Two-Factor Authentication for Users............................. 256 10.3 AWS: Reputation Lists........................................ 265 10.4 Server Transaction limits....................................... 266 10.5 Advanced Load Balancing...................................... 268 11 Reference of Actions 269 11.1 SIP Mediation............................................ 269 11.2 SDP Mediation............................................ 274 11.3 Monitoring and Logging....................................... 275 11.4 Traffic Shaping............................................ 276 11.5 Media Processing........................................... 278 11.6 SIP Dropping............................................. 279 11.7 Scripting............................................... 279 11.8 Register Processing......................................... 279 11.9 External Interaction......................................... 280 11.10 NAT Handling............................................ 280 11.11 Other................................................. 280 12 Reference of Global Configuration Parameters 281 12.1 AWS Parameters........................................... 282 12.2 Backup Parameters.......................................... 282 12.3 CDR Parameters........................................... 282 12.4 Event Parameters........................................... 283 12.5 Firewall Parameters......................................... 284 12.6 LDAP Parameters.......................................... 285 ii 12.7 Lawful Interception Parameters................................... 287 12.8 Login................................................. 287 12.9 Low-level Parameters........................................ 288 12.10 Miscellaneous Parameters...................................... 290 12.11 System Monitoring Parameters................................... 290 12.12 PCAP Parameters.......................................... 291 12.13 Prompts Parameters......................................... 292 12.14 SEMS Parameters.......................................... 292 12.15 SIP Parameters............................................ 297 12.16 SRTP Parameters........................................... 297 12.17 Syslog Parameters.......................................... 298 13 Reference of Log Level Parameters 299 14 Reference of Call Agent Configuration Parameters 302 14.1 Destination Monitor Parameters................................... 302 14.2 Blacklisting Parameters....................................... 302 14.3 Registration Agent Parameters.................................... 303 14.4 Topology Hiding Parameters..................................... 303 14.5 Firewall Blacklisting Parameters................................... 303 15 Reference of Used Open-Source Software 304 16 Reference of Default Port Numbers 307 17 Command Line Reference 310 17.1 Configuration Management..................................... 311 17.2 User Management.......................................... 311 17.3 Low-Level CLI............................................ 312 17.4 HA CLI................................................ 312 17.5 ABC Monitor Configuration Management.............................. 312 18 Reference Userdata Parameters for AWS Instances 313 19 Reference Interface Parameters 314 20 Glossary 315 Index 317 iii Chapter 1 About the ABC Session Border Controller This manual is a complete handbook for the ABC Session Border Controller (ABC SBC). It documents network planning, SBC installation, policy configuration and the best current practices for operating the SBC. The ABC Session Border Controller (ABC SBC) is a SIP Back-2-Back User Agent (B2BUA) that provides op- erators and enterprises with a scalable session border control solution for secure connections with Voice over IP (VoIP) operators and users. With the ABC SBC VoIP service providers and enterprises deploy a session border controller that is designed to run on top of high end hardware as well as appliances and virtual machines. Thereby, the ABC SBC enables VoIP providers to gradually scale up their infrastructure and covers the needs of enterprises of all sizes. The ABC SBC provides the following features: • Infrastructure Security: The ABC SBC serves as the first line of defence, fending off attacks coming over the Internet, hiding internal topology, applying rate limits and performing Call Admission Control, limiting number of parallel calls and call length, and off-loading registrar and registration throttling. • Confidentiality. The ABC SBC implements cryptographic protocols TLS and SRTP that make it incredi-