Communications

Communications

Oracle Enterprise Session Border Controller with Zoom Phone Premise Peering ( BYOC) and Verizon Business SIP Trunk Technical Application Note COMMUNICATIONS Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2 | P a g e Contents 1 RELATED DOCUMENTATION ............................................................................................................................... 5 1.1 ORACLE SBC ........................................................................................................................................................................ 5 1.2 ZOOM PHONE ....................................................................................................................................................................... 5 2 REVISION HISTORY ................................................................................................................................................. 5 3 INTENDED AUDIENCE ............................................................................................................................................ 5 3.1 VALIDATED ORACLE VERSIONS ........................................................................................................................................ 5 4 ZOOM PHONE CONFIGURATION ......................................................................................................................... 6 4.1 CREATE A ZOOM USER ................................................................................................................................................................ 6 4.2 ADD BYOC NUMBER ................................................................................................................................................................... 6 4.3 ASSIGN THE BYOC NUMBER TO A USER .................................................................................................................................. 7 5 INFRASTRUCTURE REQUIREMENTS ................................................................................................................. 8 6 CONFIGURATION ..................................................................................................................................................... 9 6.1 PREREQUISITES ................................................................................................................................................................... 9 6.2 GLOBAL CONFIGURATION ELEMENTS ........................................................................................................................... 10 6.2.1 System-Config .......................................................................................................................................................... 10 6.2.2 Media Manager ........................................................................................................................................................ 12 6.2.3 SIP Config ................................................................................................................................................................... 12 6.2.4 NTP Config................................................................................................................................................................. 14 6.3 NETWORK CONFIGURATION ........................................................................................................................................... 14 6.3.1 Physical Interfaces ................................................................................................................................................. 14 6.3.2 Network Interfaces ................................................................................................................................................ 15 6.4 SECURITY CONFIGURATION ............................................................................................................................................ 16 6.4.1 Certificate Records ................................................................................................................................................ 16 6.4.2 SBC End Entity Certificate .................................................................................................................................. 16 6.5 ROOT CA AND INTERMEDIATE CERTIFICATES ............................................................................................................ 17 6.5.1 Digicert Root and intermediate Certificates: .............................................................................................. 17 6.5.2 GoDaddy Root and Intermediate Certificates: ........................................................................................... 17 6.5.3 Generate Certificate Signing Request............................................................................................................. 18 6.5.4 Import Certificates to SBC .................................................................................................................................. 19 6.5.5 TLS Profile ................................................................................................................................................................. 20 6.6 MEDIA SECURITY CONFIGURATION ............................................................................................................................... 21 6.6.1 Sdes-profile ............................................................................................................................................................... 21 6.6.2 Media Security Policy ........................................................................................................................................... 22 6.7 MEDIA CONFIGURATION ................................................................................................................................................. 24 6.7.1 Realm Config ............................................................................................................................................................ 24 6.7.2 Steering Pools .......................................................................................................................................................... 25 6.8 SIP CONFIGURATION ....................................................................................................................................................... 29 6.8.1 SIP Manipulations .................................................................................................................................................. 29 6.9 SESSION-TRANSLATION .................................................................................................................................................. 34 6.9.1 Session Timer Profile (Optional) ..................................................................................................................... 36 6.9.2 SIP Interface ............................................................................................................................................................. 36 6.9.3 Session Agents ......................................................................................................................................................... 37 6.9.4 Session Agent Group ............................................................................................................................................. 39 6.9.5 Routing Configuration .......................................................................................................................................... 40 3 | P a g e 6.9.6 Local Policy Configuration .................................................................................................................................. 40 6.9.7 Access Controls ....................................................................................................................................................... 43 7 VERIFY CONNECTIVITY ...................................................................................................................................... 45 7.1 ORACLE SBC OPTIONS PING ........................................................................................................................................ 45 8 APPENDIX A ............................................................................................................................................................ 46 8.1 SBC BEHIND NAT SPL CONFIGURATION .................................................................................................................... 46 9 CAVEAT .................................................................................................................................................................... 48 9.1 TRANSCODING OPUS CODEC ........................................................................................................................................... 48 10 ACLI RUNNING CONFIGURATION ...................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    59 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us