Session Router Configuration

You can configure the following session-router objects from the Configuration tab on the Web GUI:

Note:

Click Show Advanced in the navigation pane to display all of the Session Router objects in the preceding list.

Configure Access Control

Use the access-control configuration element to manually create an Access Control List (ACL) for the host path in the Oracle® Enterprise Session Border Controller.

  1. From the Web GUI, click Configuration, session-router, access-control.
  2. In the Add Access Control dialog, click Show advanced, and do the following:
  3. Click OK.
  4. Save the configuration.

Dynamic ACL for the HTTP-ALG

The dynamic Access Control List (ACL) option for HTTP-Application Layer Gateway (ALG) provides Distributed Denial of Service (DDoS) attack protection for the HTTP port.

When you enable the dynamic ACL option, the system sets the trust level for static flow for the public listening socket defined in http-alg, public to untrusted. Each listening socket creates and manages its ACL list, which allows the listening socket to keep track of the number of received and invalid messages, the number of connections per endpoint, and so on. You can configure a different setting for each http-alg object.

Dynamic ACL for each endpoint is triggered by Session Initialization Protocol (SIP) registration messages. Upon receiving a SIP registration message, the SIP agent creates a dynamic ACL entry for the endpoint. If the 200 OK response is received, the ACL is promoted, allowing the HTTP message to go through the security domain. If SIP registration is unsuccessful, the ACL entry is removed and HTTP ingress messages are blocked from the endpoint. The ACL entry is removed upon incomplete registration renewal or telephone disconnect.

The following example describes the criteria and associated configuration item that result in a denied or allowed connection for both low and medium control levels.

Criteria Associated Configuration Item Action
Exceed total number of connections for allowed http-alg, max-incoming-conns Connection denied
Exceed total connections per peer http-alg, per-src-ip-mas-incoming-conns Connection denied
ACL not promoted Dynamically set on SIP registration Connection denied
Exceed maximum number of packets/sec realm-config, maximum-signal-threshold Connection denied and peer is promoted
Exceed maximum number of error packets Realm-config, invalid-signal-threshold Connection denied and peer is promoted

Oracle recommends setting realm-config, access-control-level to medium.

If a peer is promoted to trusted, the system performs DDoS checks on max number of packets/sec and max number of error packets allowed.

Demotions depend on the ream-config, access-control-trust-level setting for the realm. For more information on realm-config settings, see the ACLI Configuration Guide.

If you want to configure different ACL settings for SIP traffic and for HTTP-ALG traffic, you must configure a realm for each type of traffic.

Enable Dynamic ACL for the HTTP ALG

The Dynamic Access Control List (ACL) for HTTP Application Layer Gateway (ALG) option, which provides Distributed Denial of Service (DDoS) attack protection for the HTTP port, is an option that you must enable.

  • Confirm that the session manager is mapped to the Oracle® Enterprise Session Border Controller.

Two ACL entires are required for each registered telephone, where one entry is used for SIP traffic and one is used for HTTP-ALG traffic.

Note:

Enabling dynamic access control for HTTP-ALG traffic reduces the number of available dynamic ACL entries on the session border controller, which may reduce the number of concurrent trusted endpoints that the system can support.
  1. From the Web GUI, on the Configuration tab, click Configuration, session-router, http-alg.
  2. Click Add.
    The system displays the Add http-alg page.
  3. On the Add http-alg page, click Show advanced.
  4. In the Add http-alg dialog, do the following:
  5. Click OK.
  6. Save the configuration.

Dynamic Access Control List (ACL) Settings for the HTTP Application Layer Gateway (ALG)

You can set the following parameters for the realm specified in http-alg, public, realm-id.
  • access-control-trust-level
  • invalid-signal-threshold
  • maximum-signal-threshold
  • untrusted-signal-threshold
  • deny-period

For more information on realm-config settings, see the ACLI Configuration Guide.

Accounting Configuration

The Oracle® Enterprise Session Border Controller (E-SBC) supports RADIUS, an accounting, authentication, and authorization (AAA) system. RADIUS servers are responsible for receiving user connection requests, authenticating users, and returning all configuration information necessary for the client to deliver service to the user.

You can configure the E-SBC to send call accounting information to one or more RADIUS servers. This information can help you to see usage and Quality of Service (QoS) metrics, monitor traffic, and even troubleshoot your system.

For information about how to configure the E-SBC for RADIUS accounting, refer to the Oracle Communications Session Border Controller Accounting Guide. The Accounting Guide contains all RADIUS information, as well as information about:

  • Accounting for SIP and H.323
  • Local CDR storage on the E-SBC, including CSV file format settings
  • Ability to send CDRs via FTP to a RADIUS sever (the FTP push feature)
  • Per-realm accounting control
  • Configurable intermediate period
  • RADIUS CDR redundancy
  • RADIUS CDR content control

Configure Call Accounting

Use the account-config element to set the destination parameters for accounting messages.

  1. From the Web GUI, click Configuration, account-config, Show Advanced.
  2. On the Add account-config dialog, do the following:
  3. Save the configuration.

Configure RADIUS Call Accounting

You can configure the Oracle Enterprise Session Border Controller to send call accounting information to one or more RADIUS servers. This information can help you to see usage and Quality of Service (QoS) metrics, to monitor traffic, and to troubleshoot the system.

To set the RADIUS call accounting parameters, use the account-config element to specify where and when you want the system to send accounting messages, and the strategy for selecting account servers. Use the following procedure to configure the minimum settings required for RADIUS call accounting.

  1. From the Web GUI, click Configuration, session-router, account-config.
  2. In the Add Account Config dialog do the following:
  3. Click OK.
  4. Save the configuration.

Configure H.323 Global Settings

Configuring H.323 signaling for theOracle® Enterprise Session Border Controller (E-SBC) requires setting global parameters and parameters for each interface. The global parameters govern how the E-SBC performs general H.323 operations. The E-SBC applies the global settings to all interfaces that you configure to use H.323. For example, you can turn H.323 support on and off for the entire E-SBC, using the global settings. Use the following procedure to configure the global H.323 parameters.

  • Configure the basic parameters for physical interfaces, network interfaces, global system parameters, SNMP, trap receiver, accounting support, and any holiday information that you need.
  • Decide how you want to configure realms and routing, including the use of session agents and session agent groups, to support H.323 operations.
  • Determine the settings that you want to use for the attributes in this procedure.
  • Know the names of any Options that you want to add. See "H.323 Signalling Services" in theACLI Configuration Guide for descriptions.
  1. Access the h.323-config object.
    Configuration, session-router, session-router, h32, h323-config.
  2. On the Add h3232 config page, do the following:
  3. Save the configuration.

Session Manager Mapping

The Oracle® Enterprise Session Border Controller (E-SBC) supports mapping between multiple session managers and multiple SBCs. Such mapping allows the SBC to work in a redundant network configuration where you can map:
  • The primary session manager to the primary SBC IP address
  • One or more redundant session managers to one or more redundant SBCs

To map a redundant session manager to a redundant SBC, map the private IP address of the redundant session manager to the public SIP IP address configured in HTTP-ALG, Public on the SBC. For instructions, see "Map a Session Manager to a Session Border Controller."

Map a Session Manager to a Session Border Controller

You can map one or more session managers to an Oracle® Enterprise Session Border Controller (E-SBC) to provide redundancy and load balancing.

  • Note the private IP address of the session manager and the public SIP interface IP address of the session border controller that you want to map.

Map the private IP address of the session manager to the public SIP interface IP address of the E-SBC.

  1. From the Web GUI, go to Configuration, session-router, http-alg.
  2. On the http-alg page, click Show advanced, Add.
  3. In the Add http-alg dialog, enter the information in the fields and make the selections for the deployment.
  4. Click OK.
    The system lists the new map on the http-alg page.
  5. Save the configuration.

Configure IWF

You must enable and configure the Oracle® Enterprise Session Border Controller to perform Inter-Working Function (IWF) operations.

  • A complete SIP configuration, including SIP interfaces, SIP ports, SIP NAT if needed, and SIP features
  • A complete H.323 configuration, including H.323 global and H.323 interface configurations
  • Local policy and local policy attributes
  • Media profiles
  • Session agents and, if needed, session groups

In the following procedure, the system provides dialogs where you can either select existing media profiles and options or add new ones.

  1. From the Web GUI, click Configuration, Show advanced, session-router, iwf-config.
  2. On the Add iwf config page, click Show Advanced, and do the following:
  3. Click OK.
  4. Save the configuration.

Configure LDAP

The Oracle® Enterprise Session Border Controller (E-SBC) uses Lightweight Directory Access Protocol (LDAP) for interaction between an LDAP client and an LDAP server. Use the ldap-config object in Expert mode to create and enable an LDAP configuration on the E-SBC.

  • Confirm that one or more authentication modes exist.
  • Confirm that one or more Transport Layer Security (TLS) profiles exist.

In the following procedure, you configure the LDAP server, filters, security, and local policy. Note that you can use multiple ldap-config configurations that reference the same LDAP server within different local-policy policy-attributes to allow for multiple LDAP queries to the same LDAP server.

  1. From the Web GUI, click Configuration, session-router, ldap-config.
  2. On the LDAP config page, click Add.
  3. On the Add LDAP config page, click Show advanced, and do the following:
  4. Click OK.
  5. Save the configuration.

Configure Local Policy

Configure local policy and local policy attributes for session routing based on the next hop parameter. The local policy specifies the protocol the

Use the local-policy element to configure where signalling messages are routed and forwarded.

For the Policy priority parameter, the priority hierarchy from lowest to highest is none, normal, non-urgent, urgent, emergency. None means no priority. Each higher priority handles sessions at its level plus the sessions in the priorities above it. For example, non-urgent also handles sessions for urgent and emergency.

  1. From the Web GUI, click Configuration, session-router, local-policy.
  2. On the Add local-policy page, click Show advanced, and do the following:
  3. Click OK.
  4. Save the configuration.

Add a Local Response Map

Configuring cause and reason mapping for SIP to SIP calls requires a local response map. The entries in the map generate the SIP response and Q850 cause code value for particular error scenarios.

  • If you plan to add a Reason header, enable the function in the global SIP configuration.

You can customize the SIP status SIP reason for a local error. For example, the default 503 message for the error that the Oracle® Enterprise Session Border Controller (E-SBC) sends when the licensed session capacity is reached is "503 licensed session capacity reached". You can customize the number for this error message in the SIP Status field, and you can customize the reason in the SIP Reason field. Select licensed-session-capacity-reached from the Local Error list and you can add custom text about the error to the SIP header.

.

Repeat the following procedure to create as many local response map entries as you need.

  1. Access the local-response-map entries object.
    Configuration, session-router, how advanced, local-response-map, Add.
  2. In the Local response map entries configuration, do the following.
  3. Click OK.
  4. Save the configuration.

Configure Local Routing

Use the local-routing-config element to specify route tables that the Oracle® Enterprise Session Border Controller (E-SBC) uses to direct calls to the next hop and to map an E.164 telephone number to a SIP URI, locally.

  1. From the Web GUI, click Configuration, session-router, local-routing-config.
  2. On the local routing config page, click Add.
  3. On the Add local routing config page, do the following:
  4. Click OK.
  5. Save the configuration.

Configure a Session Agent

You can enable and configure constraints that the Oracle® Enterprise Session Border Controller (E-SBC) applies to regulate session activity with the session agent.

Configure the following before you configure a session agent.

  • Media profile
  • Out Translation ID
  • Local Response Maps
  • Codec Policy
  • Session Recording Server
  • TLS profile
  • SIP header manipulation IDs
  • LDAP
  • One or more target groups

In the following procedure, some constraints affect session agent groups and SIP proxies outside of, and at the edge of the network. For example, the maximum sessions and maximum outbound sessions constraints do not apply to core routing proxies because they are transaction statefull, rather than session statefull. Other constraints, such as maximum burst rate, burst rate window, maximum sustained rate, and sustained rate apply to core routing proxies.

  1. From the Web GUI, click Configuration, session-router, session-agent.
  2. On the session-agent page, click Add, do the following:
  3. Click OK.
  4. Save the configuration.

SIP hold-refer-reinvite

When SIP hold-refer-reinvite is enabled for REFER with Replaces, the system queues the outgoing Invite populated from the received REFER based on the dialog state.

In a deployment where a call goes through the Oracle® Enterprise Session Border Controller (E-SBC) before going to an Interactive Voice Response (IVR) server, the E-SBC proxies the intermediate reinvite that the IVR sends to the transfer target. If the intermediate reinvite is in either the pending state or the established state when the IVR initiates the transfer to the transfer target, the E-SBC terminates the call prematurely. The hold-refer-reinvite option allows the E-SBC to queue the Out Going INVITE from the received REFER request when the previously proxied reinvite request is in either the pending state or the established state. The result is a successful call.

Enable the SIP hold-refer-reinvite option from the ACLI command line or the Web GUI in Expert mode.

Enable hold-refer-reinvite

The SIP hold-refer-reinvite parameter for REFER with Replaces is a parameter that you enable to prevent premature call termination in a deployment where calls are proxied by the Oracle® Enterprise Session Border Controller.

  • Confirm that refer-reinvite is added to realm/SA/SipInterface options.
  • Confirm that refer-call-transfer is enabled on realm/SA/SipInterface
  • Confirm that the session agent on which you want to enable hold-refer-reinvite is configured.

To enable hold-refer-reinvite, select a configured session agent and enable the parameter on the selected agent.

  1. From the Web GUI, click Configuration, session-router, session-agent.
  2. On the Session Agent page, select the agent and click Edit.
  3. On the Modify Session Agent page, select Hold refer invite.
  4. Click OK.
  5. Save the configuration.
  • Enable the refer-hold-reinvite parameter in the realm configuration.
  • Enable the refer-hold-reinvite parameter in the session agent configuration.

Configure a Session Group

Use the sesison-group element to define a signalling endpoint configured to apply traffic shaping attributes and information about next hops and previous hops.

  1. From the Web GUI, click Configuration , session-router, session-group.
  2. On the session group page, click Add, Show advanced.
  3. On the Add session group page, do the following:
  4. Click OK.
  5. Save the configuration.

Configure Session Recording Group

The Oracle® Enterprise Session Border Controller (E-SBC) uses the session-recording-group attribute under session-router to define a collection of session recording servers.

  • Enable the SIP Session Recording licence. See "Getting Started."
  • Configure multiple session recording servers. See "Session-recording-server Attribute."
  • Determine the load balancing strategy that you want the E-SBC to use. See "Load Balancing."

In the configuration, you list the session recording servers that you want in the group, select a load balancing strategy, and set the number of simultaneous SIP dialogs.

  1. Access the system-config object.
    Configuration, session-router, session-recording-group.
  2. On the session recording group page, click Add.
  3. In the Add session recording group dialog, do the following:
  4. Click OK.
  5. Save the configuration.
  6. Save the configuration.

Configure Advanced Logging

From the Configuration tab, define sip-advanced-logging and advanced-log-condition. The criteria that you configure remaps the message logging and modifies the system configuration. You must save and activate these changes to the configuration.

When configuring multiple sip-advanced-logging configurations, note the following.
  • The system evaluates each configuration individually in an OR relationship.
  • The system evaluates all conditions and they must all match in an AND relationship.
  1. From the Web GUI, go to Configuration, session-router, Show Advanced, sip-advanced-logging, Show Advanced, and click Add.
  2. On the Add SIP Advanced Logging page, do the following:
  3. Save the configuration.

Disable Advanced Logging

From the Configuration tab, clear the advanced logging settings.

  1. From the Web GUI, go to Configuration, session-router, Show Advanced, sip-advanced-logging.
  2. On the SIP Advanced Logging page, clear all of the settings.
  3. Save the configuration.

Configure Advanced Logging

From the Configuration tab, define sip-advanced-logging and advanced-log-condition. The criteria that you configure remaps the message logging and modifies the system configuration. You must save and activate these changes to the configuration.

When configuring multiple sip-advanced-logging configurations, note the following.
  • The system evaluates each configuration individually in an OR relationship.
  • The system evaluates all conditions and they must all match in an AND relationship.
  1. From the Web GUI, go to Configuration, session-router, Show Advanced, sip-advanced-logging, Show Advanced, and click Add.
  2. On the Add SIP Advanced Logging page, do the following:
  3. Save the configuration.

Configure SIP

Use the sip-config element to define parameters for communications between the Session Initiation Protocol (SIP) and the Oracle® Enterprise Session Border Controller (E-SBC).

  • Configure at least one home realm, egress realm, and transcoding realm.
  1. From the Web GUI, click Configuration, session-router, sip-config.
  2. On the SIP config page, do the following:
  3. Click OK.
  4. Save the configuration.

Configure Pooled Transcoding

You must configure a transcoding realm and transcoding agents on the Access Session Border Controller, when used in a pooled transcoding deployment model. Set the parameters as part of the global SIP configuration.

  • Configure a realm as the separate realm for the public SIP interface for exclusive communication with the Transcoding Session Border Controller (T-SBC) in a pooled transcoding deployment
  • Configure one or more agents
  • Configure SIP
  • Configure the Access Session Border Controller (A-SBC)
  • Configure the Transcoding Session Border Controller (T-SBC)
  1. Access the sip-config object.
    Configuration, session-router, sip-config.
  2. On the SIP Config page, do the following.
  3. Click OK.
  4. Save the configuration.

Configure SIP-feature

Use the sip-feature element to define how the Oracle® Enterprise Session Border Controller (E-SBC) handles option tags in the SIP Supported header, Require header, and the Proxy-Require header.

You can specify whether a SIP feature is applied to a specific realm or globally across all realms. You can also specify the treatment for an option based upon whether is appears in an inbound or outbound packet. You need to configure option tag handling in the SIP feature element only when you want a treatment other than the default.

  1. From the Web GUI, click Configuration, session-router, sip-feature.
  2. On the Sip feature page, do the following:
  3. Click OK.
  4. Save the configuration.

Configure SIP Interface

Use the sip-interface element to define SIP signaling.

  • Confirm that a TLS profile exists.
  • Confirm that rules exist for inbound and outbound SIP manipulation.

Configure a SIP interface for each network or realm to which you want to connect the Oracle® Enterprise Session Border Controller.

  1. From the Web GUI, click Configuration, session-router, sip-interface.
  2. On the SIP Interface page, click Add.
  3. On the Add SIP Interface page, do the following:
  4. Click OK.
  5. Save the configuration.

Configure SIP Manipulation

When you need to modify specific components of a SIP message, configure a SIP manipulation rule. For example, you might need to resolve protocol differences between vendors. You can configure rules for SIP headers and for the sub-elements within the headers.

Use the sip-manipulation element to add, modify, delete, split, and join SIP headers and to specify SIP header rules. To begin, configure the Name, Description, (Optional) Split Headers, and (Optional) Join Headers attributes. When you reach the "Cfg Rules" section, click Add and select the header rule that you want to create. For further instructions, refer to the topics noted in the Cfg rules "Instructions" cell in the following table.

  1. From the Web GUI, click Configuration, session-router, sip-manipulation, Show advanced.
  2. In the SIP manipulation dialog, click Add and do the following:
  3. When you finish configuring SIP manipulations, and the system returns you to the SIP manipulation page, save and activate the configuration.
  • Apply the rules to a session agent or SIP interface as "inbound" or "outbound."

Configure MIME ISUP Rule

You can configure a Multi-Purpose Internet Mail Extensions (MIME) - ISDN User Part (ISUP) signaling profile on the Oracle® Enterprise Session Border Controller (E-SBC) from the "CfgRules" section in the "Configuring SIP Manipulations" procedure.

  • Perform the "Configure SIP Manipulations" procedure.

The following procedure is the continuation of the "Configure SIP Manipulations" procedure. It begins with adding mime-isup-rule to "CfgRules" and includes the optional mime-header-rule and isup-param-rule sub-element configurations.

  1. From the "CfgRules" section of the SIP manipulation configuration page, click Add, and select mime-isup-rule from the list.
  2. In the SIP manipulation / Mime isup rule dialog, click Show advanced, and do the following.
  3. Click OK.
    The system displays the Add SIP manipulation page.
  4. Click OK.
    The system displays the SIP manipulation page.
  5. Click Close.
  6. Save the configuration.

Configure MIME SDP Rule

You can configure a Multi-Purpose Internet Mail Extensions (MIME) - Session Description Protocol (SDP) multimedia communications session profile on the Oracle® Enterprise Session Border Controller (E-SBC) from the "CfgRules" section in the "Configuring SIP Manipulations" procedure.

  • Perform the "Configure SIP Manipulations" procedure.

The following procedure is the continuation of the "Configuring SIP Manipulations" procedure. It begins with adding the mime-sdp-rule to "CfgRules" and includes the optional mime-header-rule, sdp-session-rule, sdp-media-rule, and sdp-line-rule sub-element configurations.

In step 2 of this procedure, you can configure as few or as many of the "CfgRules" sub-element options that you want.
  • If you do not configure an optional sub-element, proceed to step 3.
  • If you configure an optional sub-element, you can configure another one or proceed to step 3.
  1. From the "CfgRules" section of the SIP manipulation configuration page, click Add, and select mime-sdp-rule from the list.
  2. In the SIP manipulation / Mime sdp rule dialog, do the following.
  3. Click OK.
    The system displays the Add SIP manipulation page.
  4. Click OK.
    The system displays the SIP manipulation page.
  5. Click Close.
  6. Save the configuration.

Configure Header Rule

You can configure SIP header manipulations on the Oracle® Enterprise Session Border Controller (E-SBC) from the "CfgRules" section in the "Configuring SIP Manipulations" procedure.

  • Perform the Configure SIP Manipulations procedure.

The following procedure is the continuation of the "Configure SIP Manipulations" procedure. It begins with adding header-rule to "CfgRules" and includes the optional element-rule sub-element configuration.

  1. From the "CfgRules" section of the SIP manipulation configuration page, click Add, and select header-rule from the list.
  2. In the SIP manipulation / Header rule dialog, do the following.
  3. Click OK.
    The system displays the Add SIP manipulation page.
  4. Click OK.
    The system displays the SIP manipulation page.
  5. Click Close.
  6. Save the configuration.

Configure MIME Rule

You can configure a Multi-Purpose Internet Mail Extensions (MIME) data files exchange profile on the Oracle® Enterprise Session Border Controller (E-SBC) from the "CfgRules" section in the "Configuring SIP Manipulations" procedure.

  • Configure SIP Manipulations.

The following procedure is the continuation of the "Configure SIP Manipulations" procedure. It begins with adding mime-rule to "CfgRules" and includes the optional mime-rule sub-element configuration.

  1. From the "CfgRule"s section of the SIP manipulation configuration page, click Add, and select mime-rule from the list.
  2. In the SIP manipulation / Mime rule dialog, click Show advanced, and do the following.
  3. Click OK.
    The system displays the Add SIP manipulation page.
  4. Click OK.
    The system displays the SIP manipulation page.
  5. Click Close.
  6. Save the configuration.

Configure SIP Monitoring

Use the sip-monitoring element to configure SIP Monitor and Trace features and to set filters for SIP monitoring.

  • Confirm that a session agent, a realm, or both are configured, or you must set filtering on a global basis for Monitor and Trace to occur.

You must configure the sip-monitoring object to enable filtering. The only required setting is State, which enables sip-monitoring. You can optionally monitor all filters or you can specify one or more filters to monitor. You can specify a time for short session duration monitoring and you can select interesting events to monitor.

Note:

Interesting Events are always enabled on a global-basis on the Oracle® Enterprise Session Border Controller.
  1. From the Web GUI, click Configuration, session-router, sip-monitoring.
  2. On the SIP monitoring page, click Show advanced, and do the following:
  3. Click OK.
  4. Save the configuration.

Surrogate Registration

The Oracle® Enterprise Session Border Controller surrogate registration feature lets the Oracle® Enterprise Session Border Controller explicitly register on behalf of a Internet Protocol Private Branch Exchange (IP-PBX). After you configure a surrogate agent, the Oracle® Enterprise Session Border Controller periodically generates a REGISTER request and authenticates itself using a locally configured username and password, with the Oracle® Enterprise Session Border Controller as the contact address. Surrogate registration also manages the routing of class from the IP-PBX to the core and from the core to the IP-PBX.

Configure Surrogate Registration

Surrogate registration allows the Oracle® Enterprise Session Border Controller (E-SBC) to explicitly register on behalf of an Internet Protocol Private Branch Exchange (IP-PBX). Surrogate registration also manages the routing of calls from the IP-PBX and from the core to the IP-PBX. The E-SBC uses the configuration information of the surrogate agent that corresponds to a specific IP-PBX to send REGISTER requests. You can configure the number of requests to send.

Configure a surrogate agent for each IP-PBX proxy that you want the E-SBC to register.

Note:

To view all surrogate agent configuration parameters, enter a ? at the surrogate-agent prompt.
  1. From the Web GUI, click configuration, session-router, show advanced, surrogate-agent, show advanced.
  2. On the Surrogate Agent page, click Add.
  3. On the Add Surrogate Agent page, do the following:
  4. Click OK.
  5. Save the configuration.
  • Add the surrogate agent as a session-agent under session-router.

Remote Site Survivability Configuration

You must enable remote site survivability on the Oracle® Enterprise Session Border Controller (E-SBC) and set the ping method for the session agent before the E-SBC can perform remote site survivability operations.

The process for configuring remote site survivability includes the following procedures.
  1. Enable remote site survivability mode on the E-SBC.
  2. Configure a ping method for the session agent to use to determine when the E-SBC is not responding.

Note:

The system does not require a reboot after activating or modifying remote site survivability.

Configure Remote Site Survivability

You must enable remote site survivability on the Oracle® Enterprise Session Border Controller (E-SBC) and set the parameters before the system can enter and exit survival mode.

  • Configure at least one session agent.
  1. From the Web GUI, click Configuration, session-router, session-router, survivability.
  2. At the bottom of the left pane, click Show advanced.
  3. On the Add survivability page, do the following:
  4. Click OK.
  5. Save and activate the configuration.
  • Configure a ping method on the session agent. See "Configure a Session Agent."

Configure Translation Rules

You can configure the Oracle® Enterprise Session Border Controller (E-SBC) to use number translation to change a layer 5 endpoint name according to prescribed rules. For example, to add or to remove a 1 or a + from a phone number sent from or addressed to a device. Use the translation-rules element to create unique sets of translation rules to apply to calling and called party numbers.

In the following procedure, you set the translation type, define the string to add or delete, and set the character position (index) where the add, delete, or replace occurs in the string. The index starts at 0, immediately before the leftmost character, and increases by 1 for every position to the right. Use the $ character to specify the last position in a string.

  1. From the Web GUI, click Configuration, session-router, translation-rules.
  2. On the Translation rules page, click Show advanced, and do the following:
  3. Click OK.
  4. Save the configuration.