LTRT 41887 Arm Users Manual Ver 80
LTRT 41887 Arm Users Manual Ver 80
LTRT 41887 Arm Users Manual Ver 80
AudioCodes
Routing Manager (ARM)
Version 8.0
User's Manual Contents
Table of Contents
1 Overview ............................................................................................................ 15
1.1 Features ...............................................................................................................16
1.2 Benefits ................................................................................................................17
1.3 Simplicity ..............................................................................................................17
1.4 ARM-Routed Devices ...........................................................................................17
1.5 Third-Party Open-Source Software....................................................................... 18
2 Getting Started with the ARM ........................................................................... 19
2.1 Logging in.............................................................................................................19
2.2 Getting Acquainted with the ARM GUI .................................................................. 19
2.2.1 Getting Acquainted with the Network Map Topology Layer ....................................21
2.2.2 Getting Acquainted with the Network Map Quality Layer ........................................23
2.2.3 Getting Acquainted with Network Map Page Actions ..............................................26
2.2.3.1 Node Information and Actions ..................................................................26
2.2.3.2 VoIP Peer Information and Actions ..........................................................32
2.2.3.3 Connection Information and Actions ........................................................33
2.2.3.4 Peer Connection Information and Actions................................................34
2.2.4 Peer Connections Page Actions ..............................................................................35
2.2.5 Connections Page Actions ......................................................................................36
2.2.6 Viewing Network Summary Panes ..........................................................................37
2.2.6.1 Overall Network Statistics ........................................................................37
2.2.6.1.1 Network Summary .................................................................. 37
2.2.6.1.2 General Statistics ................................................................... 38
2.2.6.1.3 Top 5 Routes Pane................................................................. 39
2.2.6.1.4 Test Route .............................................................................. 40
2.2.6.2 Statistics on a Selected Entity ..................................................................40
3 Defining a Network Topology ........................................................................... 41
3.1 Adding an AudioCodes Node to the ARM ............................................................. 41
3.2 Adding a Third-Party Node to the ARM................................................................. 42
3.3 Adding Connections .............................................................................................44
3.4 Synchronizing Topology .......................................................................................45
3.5 Building a Star Topology ......................................................................................46
3.6 Testing a Route ....................................................................................................48
4 Designing a Network Topology in the Offline Planning Page ....................... 51
4.1 Performing Actions in the Offline Planning Page .................................................. 52
4.1.1 Adding a Virtual Entity .............................................................................................52
4.1.2 Adding a Virtual Peer Connection to the Offline Planning Page .............................54
4.1.3 Adding a Virtual Connection ....................................................................................54
4.1.4 Importing a Full Topology ........................................................................................54
4.1.5 Importing a Node from the Live Topology ...............................................................54
4.1.6 Deleting a Virtual Entity ...........................................................................................55
4.1.7 Testing a Route .......................................................................................................55
4.1.8 Exporting a Node from the Offline Page to the Live Topology ................................55
5 Viewing Statistics and Reports ........................................................................ 57
6 Performing User-Related Administration ........................................................ 61
6.1 Adding a User Not Listed in an AD to the ARM..................................................... 61
List of Figures
Figure 2-1: ARM GUI - Network Page - Map View .................................................................................19
Figure 2-2: Network Map – Topology Layer ...........................................................................................23
Figure 2-3: Network Map –Quality Layer................................................................................................24
Figure 2-4: Connection Summary Including Quality ...............................................................................25
Figure 2-5: Quality Layer - Peer Connection ..........................................................................................25
Figure 2-6: Node Information..................................................................................................................26
Figure 2-7: Node Summary – Operative State .......................................................................................27
Figure 2-8: Node’s ‘Unknown’ State .......................................................................................................27
Figure 2-9: Node Actions ........................................................................................................................28
Figure 2-10: Edit Node ...........................................................................................................................28
Figure 2-11: Add Connection..................................................................................................................29
Figure 2-12: Node Hoover Menu - Collapse...........................................................................................30
Figure 2-13: Collapsed VoIP Peers ........................................................................................................30
Figure 2-14: Test Route Path Terminates on Collapsed VoIP Peer ......................................................30
Figure 2-15: Expand Node VoIP Peers ..................................................................................................31
Figure 2-16: SIP Trunk ...........................................................................................................................32
Figure 2-17: PBX | IP PBX .....................................................................................................................32
Figure 2-18: PSTN..................................................................................................................................32
Figure 2-19: IP Phone ............................................................................................................................32
Figure 2-20: Edit VoIP Peer....................................................................................................................32
Figure 2-21: Connection Information ......................................................................................................33
Figure 2-22: Edit Connection ..................................................................................................................33
Figure 2-23: Peer Connection Information .............................................................................................34
Figure 2-24: Edit Peer Connection .........................................................................................................34
Figure 2-25: Peer Connections ..............................................................................................................35
Figure 2-26: Connections .......................................................................................................................36
Figure 2-27: Network Summary .............................................................................................................37
Figure 2-28: General Statistics Pane .....................................................................................................38
Figure 2-29: Projecting a Zoomed-in Graph to the Front .......................................................................39
Figure 2-30: Top 5 Routes......................................................................................................................39
Figure 2-31: Top 5 Routes – Route Details ............................................................................................39
Figure 2-32: Popular Path Visualized in the Network Map .....................................................................40
Figure 2-33: Summary Pane Displaying Information Related to a Selected Entity - Connection ..........40
Figure 3-1: Drag and Drop an AudioCodes Node into the Network Map ...............................................41
Figure 3-2: Node Name | IP Address | Credentials ................................................................................41
Figure 3-3: Added AudioCodes Node ....................................................................................................42
Figure 3-4: Third-Party Device Added to the Network Map ...................................................................42
Figure 3-5: Adding a VoIP Peer .............................................................................................................43
Figure 3-6: Adding a VoIP Peer – Giving the VoIP Peer a Name ..........................................................43
Figure 3-7: Add Peer Connection ...........................................................................................................43
Figure 3-8: Edit Peer Connection ...........................................................................................................43
Figure 3-9: Add Connection....................................................................................................................44
Figure 3-10: Add Connection..................................................................................................................44
Figure 3-11: Sync Topology ...................................................................................................................45
Figure 3-12: Build Star............................................................................................................................46
Figure 3-13: Build Star Topology ............................................................................................................46
Figure 3-14: Test Route..........................................................................................................................48
Figure 3-15: Test Route..........................................................................................................................48
Figure 3-16: Route Path .........................................................................................................................49
Figure 3-17: Test Route Details .............................................................................................................49
Figure 3-18: Strip + from the Number.....................................................................................................49
Figure 3-19: Example of a Test Call with a 'Quality' Advanced Routing Condition ................................50
Figure 4-1: Offline Planning ....................................................................................................................51
Figure 4-2: Edit Peer Connection ...........................................................................................................52
Figure 4-3: Add Peer Connection ...........................................................................................................54
Figure 4-4: Export ...................................................................................................................................55
Figure 5-1: Statistics Graphs Page – ARM over time ............................................................................57
Figure 5-2: Top Routers Filtered by Routing Attempts Displayed as a Pie Chart ..................................58
Figure 5-3: Downloading Statistics in a Format of Choice .....................................................................59
Figure 5-4: Top Routers Filtered by Routing Attempts Displayed as a Bar Chart .................................59
Figure 5-5: Elements that Hold Statistics Information ............................................................................60
Figure 5-6: Top Routing rules over time .................................................................................................60
Figure 6-1: Users Page – Users tab .......................................................................................................61
Figure 6-2: User Details..........................................................................................................................62
Figure 6-3: User Details..........................................................................................................................62
Figure 6-4: Users Groups .......................................................................................................................63
Figure 6-5: Users Group Details .............................................................................................................63
Figure 6-6: Users Page – LDAP Servers tab .........................................................................................65
Figure 6-7: LDAP Server Settings ..........................................................................................................65
Figure 6-8: LDAP Properties ..................................................................................................................67
Figure 6-9: Users Page – LDAP Servers tab – AD Summary ................................................................67
Figure 6-10: LDAP Server Settings ........................................................................................................68
Figure 6-11: Users Page – Property Dictionary tab ...............................................................................69
Figure 6-12: Property Dictionary ............................................................................................................69
Figure 6-13: Property..............................................................................................................................70
Figure 7-1: Network Services .................................................................................................................71
Figure 7-2: Syslog Details ......................................................................................................................72
Figure 7-3: NTP Servers.........................................................................................................................73
Figure 7-4: NTP Server Details ..............................................................................................................73
Figure 7-5: QoS ......................................................................................................................................74
Figure 7-6: Normalization Groups ..........................................................................................................77
Figure 7-7: Normalization Groups ..........................................................................................................77
Figure 7-8: Prefix Groups .......................................................................................................................79
Figure 7-9: Prefix Group Details .............................................................................................................79
Figure 7-10: Normalization Before Routing ............................................................................................80
Figure 7-11: Policy Studio ......................................................................................................................81
Figure 7-12: Policy Studio Settings ........................................................................................................82
Figure 7-13: Policy Studio Rule Example 1 ............................................................................................83
Figure 7-14: Policy Studio Rule Example 2 ............................................................................................84
Figure 7-15: Configuring Criteria for a Quality Profile ............................................................................85
Figure 7-16: Time Based Routing ..........................................................................................................86
Figure 7-17: Time Condition ...................................................................................................................86
Figure 7-18: Time Condition - Example..................................................................................................87
Figure 7-19: Alternative Routing SIP Reasons Page .............................................................................88
Figure 7-20: Adding an Alternative Routing SIP Reason .......................................................................88
Figure 7-21: Editing an Alternative Routing SIP Reason .......................................................................89
Figure 7-22: Deleting an Alternative Routing SIP Reason .....................................................................89
Figure 7-23: Global Routing Settings .....................................................................................................90
Figure 7-24: License Page .....................................................................................................................91
Figure 7-25: License Details ...................................................................................................................92
Figure 7-26: Security Page .....................................................................................................................93
Figure 7-27: Operators ...........................................................................................................................94
Figure 7-28: Operator Details .................................................................................................................94
Figure 7-29: Authentication Page ...........................................................................................................95
Figure 7-30: LDAP Connectivity Test Result ..........................................................................................97
Figure 7-31: Routing Servers .................................................................................................................98
Figure 7-32: Server Details.....................................................................................................................98
Figure 7-33: Routing Servers .................................................................................................................99
Figure 7-34: Server Details.....................................................................................................................99
Figure 7-35: Routing Servers - Administrative State ............................................................................100
Figure 8-1: Routing – Routing Groups .................................................................................................101
Figure 8-2: Add Group ..........................................................................................................................102
Figure 8-3: Add Group ..........................................................................................................................102
Figure 8-4: Edit Group ..........................................................................................................................103
Figure 8-5: Edit Group ..........................................................................................................................103
Figure 8-6: Edit Group ..........................................................................................................................103
List of Tables
Table 2-1: ARM GUI – Map View ...........................................................................................................20
Table 2-2: Network Map view – Network Entities ...................................................................................21
Table 2-3: Quality Color Codes ..............................................................................................................24
Table 2-4: Node Information ...................................................................................................................26
Table 3-1: Build Star Topology ...............................................................................................................47
Table 4-1: Add a Virtual Node ................................................................................................................53
Table 4-2: Add a Virtual VoIP Peer ........................................................................................................53
Table 5-1: Statistics Graphs Page (From Left to Right) .........................................................................57
Table 6-1: Users Group Details ..............................................................................................................64
Table 6-2: LDAP Server Settings ...........................................................................................................66
Table 6-3: Active Directories Summary ..................................................................................................68
Table 6-4: Add Property .........................................................................................................................70
Table 7-1: Syslog Details........................................................................................................................72
Table 7-2: NTP Server Details ...............................................................................................................73
Table 7-3: Protocols Mapped to Class of Service ..................................................................................74
Table 7-4: QoS Settings .........................................................................................................................75
Table 7-5: CDR Parameters ...................................................................................................................76
Table 7-6: Normalization Groups ...........................................................................................................78
Table 7-7: Prefix Group Details ..............................................................................................................79
Table 7-8: Normalization Before Routing ...............................................................................................80
Table 7-9: Policy Studio Settings ...........................................................................................................82
Table 7-10: Configuring Criteria for a Quality Profile .............................................................................85
Table 7-11: Time Condition ....................................................................................................................87
Table 7-12: Routing Settings ..................................................................................................................90
Table 7-13: Security Settings .................................................................................................................93
Table 7-14: Operator Details ..................................................................................................................95
Table 7-15: LDAP Authentication Server Parameters ............................................................................96
Table 7-16: SSL Parameters ..................................................................................................................96
Table 7-17: Test Connectivity .................................................................................................................96
Table 7-18: Test Connectivity .................................................................................................................97
Table 7-19: Routing Server Details ........................................................................................................98
Table 7-20: Server Details ......................................................................................................................99
Table 8-1: Live | Test Mode Combinations ...........................................................................................108
Table 8-2: Source Settings ...................................................................................................................108
Table 8-3: Destination Settings ............................................................................................................109
Table 8-4: Routing Actions ...................................................................................................................112
Table 8-5: Routing Actions – Call Discard............................................................................................114
Table 9-1: SNMP Destination Details ...................................................................................................122
Table A-1: SBC Migration Checklist .....................................................................................................139
Table B-1: Prefixes ...............................................................................................................................143
Table F-1: Opening Firewall Ports for the ARM ...................................................................................151
Table G-1: CDR Field Descriptions ......................................................................................................155
Notice
Information contained in this document is believed to be accurate and reliable at the time of
printing. However, due to ongoing product improvements and revisions, AudioCodes cannot
guarantee accuracy of printed material after the Date Published nor can it accept responsibility
for errors or omissions. Updates to this document can be downloaded from
https://www.audiocodes.com/library/technical-documents.
This document is subject to change without notice.
Date Published: May-14-2018
WEEE EU Directive
Pursuant to the WEEE EU Directive, electronic and electrical waste must not be disposed
of with unsorted waste. Please contact your local recycling authority for disposal of this
product.
Customer Support
Customer technical support and services are provided by AudioCodes or by an authorized
AudioCodes Service Partner. For more information on how to buy technical support for
AudioCodes products and for contact information, please visit our Web site at
https://www.audiocodes.com/services-support/maintenance-and-support.
Related Documentation
Manual Name
Documentation Feedback
AudioCodes continually strives to produce high quality documentation. If you have any
comments (suggestions or errors) regarding this document, please fill out the
Documentation Feedback form on our Web site at http://online.audiocodes.com/doc-
feedback.
LTRT Description
1 Overview
This document shows how to use the AudioCodes Routing Manager (ARM). The ARM is a
LINUX-based, software-only, telephony management product which expedites and
streamlines IP telephony routing for enterprises with multiple globally distributed branches.
The ARM determines the quickest, least expensive, and best call quality routes in packet
networks.
Routing data, previously located on the SBC, Unified Communications (UC) application
(e.g., Microsoft's Skype for Business), or Media Gateway, is now located on the ARM
server. If an enterprise has an SBC in every branch, a single ARM, deployed in HQ, can
route all calls in the globally distributed corporate network to PSTN, the local provider,
enterprise headquarters, or to the IP network.
Routing rules, configured by the IT manager in the ARM's Routing Table, perform the
routing.
If an enterprise has only one or two branches, its IT manager can easily independently
implement maintenance changes. In globally distributed enterprises, IT managers until now
had to laboriously implement changes, multiple times, per branch. With the ARM, IT
managers implement changes only once, saving significant labor and time resources and
costs.
The figure below shows a typical, globally-distributed, multi-branch enterprise VoIP
network.
1.1 Features
ARM features are as follows:
Centralized, enterprise-wide session routing management
Centralized & optimized PSTN routing
Automatic discovery of VoIP network entities
Supports third-party devices as well as AudioCodes SBCs and gateways
Smart Dial Plan management
• Centralized Dial Plan logic; simple, clear, intuitive and easy to maintain
• Dialing plan dry test by ‘Test Route’ simulation
• Incoming number manipulation
• Outgoing number manipulation
• User properties manipulation
Reduces SIP trunk costs
• Implements Tail-End-Hop-Off Routing
• Assigns actions to routing rules with different sequence
• Source and destination number manipulation
Advanced routing based on user properties
Quality-based routing
Time-based routing
Flexible load balancing
Automatic topology network generation
Manual network generation (simply drawing lines between dots)
On-the-fly routing calculation:
• Centralized management of Network Routing Rules
• Routing decision is based on source / destination call parameters, and user
properties
• Predefined weights on connections
• User information from external Data Bases (e.g., LDAP)
• Flexible API
Intuitive graphical representation of the enterprise VoIP network
Personalized Call Routing Applications
• Communication-Enabled Business Process
• Full on-line management and routing via REST API
• Fallback to SBC routing table if call does not match ARM configuration
1.2 Benefits
The ARM benefits users as follows:
Reduces operational time spent on designing and provisioning network topology
Reduces OPEX, avoiding routing configuration of VoIP network entities
Reduces time spent implementing network evolutions such as:
• Adding new connections to PSTN (e.g., SIP trunks)
• Adding new branches to the enterprise VoIP network
• Modifying user voice services privileges
1.3 Simplicity
VoIP network entities registering in the ARM
Auto-discovery of VoIP peers
One-click topology network creation, star formation
Customized topology network.
• Configuring a connection is as simple as drawing a line.
• Modify by adding, deleting and changing connections
ARM connects to user data base
2.1 Logging in
This section shows how to log in.
To log in:
1. Point your web browser to the ARM's IP address and press Enter.
2. In the Login to ARM screen, log in using the default Operator and Operator
username and password. It's advisable to change these as soon as possible (see
Section 7.4.4 for instructions on how to change them).
The ARM opens in the Network page, Map view (default) in your browser.
By default, all VoIP entities managed in the network are displayed.
4 Main Screen The Network page displays a Map view of network entities.
5 Summary The Network page, Map view, displays these summary panes:
Panes • Network Summary
Nodes (Available, Unavailable, Locked)
Peer Connections (Available, Unavailable, Locked)
Connections (Available, Unavailable)
• General Statistics
Routing Attempts per 5 Minutes
Unsuccessful Routes per 5 Minutes
Unsuccessful Routes (Alternative Attempts / Destinations Not
Routable)
Calls per 5 Minutes (Destination Calls / Transient Calls)
• Top 5 Routes
• Test Route
Node Indicates an AudioCodes SBC communicating with the ARM. It's part of
the ARM network topology.
Blue = operative state available/logging in
Red = operative state unavailable/unrouteable
Orange = operative state logged out
Strikethrough = locked
No strikethrough = unlocked
Indicates an AudioCodes gateway communicating with the ARM. It's part
of the ARM network topology.
Blue = operative state available
Red = operative state unavailable
INVALID CONFIGURATION
Orange = operative state logged out
Strikethrough = locked
No strikethrough = unlocked
Indicates a hybrid AudioCodes device (AudioCodes' Gateway and SBC
in one).
Blue = operative state available
Red = operative state unavailable
INVALID CONFIGURATION
PSTN
IP phones
The figure above shows the Network Map when the Quality Layer is applied.
Table 2-3 describes the different quality color codes.
Table 2-3: Quality Color Codes
Color Description
A glance at the page reveals the quality of each Connection and Peer Connection,
indicated by color code.
2. In the Connection Summary pane on the right side of the Network Map page, view the
Connection Summary. The figure above shows the Connection Summary pane for the
Connection between node-1 China_4 and node-2 Paris_2. The 'Quality' parameter for
both nodes is 'FAIR'.
3. Use each direction's MOS and ASR values to tune the threshold for quality-based
routing [Settings > Routing > Quality Based Routing] and optimize network quality.
2. In the Peer Connection Summary pane on the right side of the Network Map page,
view the Peer Connection Summary for the Peer Connection you clicked (selected).
The figure above shows the Peer Connection whose name is 'IpGrp-GW'. The 'Quality'
parameter is 'BAD'.
3. Use each direction's MOS and ASR values to tune the threshold for quality-based
routing [Settings > Routing > Quality Based Routing] and optimize network quality.
Item Description
The example below shows a node’s ‘Unknown’ state when the ARM Configurator is unable
to access the SBC 'Texas'. Note that in this state, call routing requests coming from this
node to the ARM Routers will be served.
Figure 2-8: Node’s ‘Unknown’ State
♦ From the 'Protocol' dropdown, select the protocol that the ARM Configurator
(server) uses when communicating with this node. Default: HTTPS. If you
don't want to encrypt the traffic – e.g., when debugging – use HTTP.
♦ From the 'Routing policy' dropdown, select either:
- Round Robin (default). For each request, the node selects a different
router.
- Sticky Last Available. The node picks the first available router from the
routers that are listed in order of priority under 'Selected Routing Server',
and stays with it until it fails. If it fails, the node continues down the list.
The node therefore only functions with one router at a time.
- Sticky Primary. The node picks the first available router from the
routers that are listed in order of priority under 'Selected Routing Server',
and stays with it until it fails. If it fails, the node goes to the highest
available router in the list. The node therefore functions at any time with
the highest available router in the list.
♦ Routing Server
- Allows you to select routers to operate with the selected node. Useful if
an enterprise has servers located in different regions and you want a
node in one region to be served by routers located only in that region
(for example).
The pane lets you define the order of the routers in the node, which is
relevant for the Sticky routing policies.
c. Add Connection [also available by selecting the node and then clicking the Add
Connection button]
Figure 2-11: Add Connection
♦ Make sure the relevant SIP interface in the SBC is provisioned and
configured as ‘Used by routing server’
♦ Click Add Connection and then click the Node to which to make the
Connection; a line is defined to indicate that the connection was made.
♦ In the Connection Definition dialog that opens, select the routing interface for
Node-1 and then for Node-2, and then click Apply. See Section 3.1 for more
information.
d. Sync Node
e. Lock/Unlock
f. Build Star (Topology)
g. Collapse. In Network Map view, you can collapse VoIP Peers associated with a
node. In large networks containing multiple VoIP Peers with each VoIP Peer
connected to a node, this can significantly simplify Network Map view, factilitating
more effective management. To apply a collapse:
♦ Select the action from the node hoover menu.
Note:
• A VoIP Peer associated with more than one node is excluded from the collapsed
group.
• If a test route is performed that terminates on a collapsed VoIP Peer, the VoIP Peer
will not be expanded automatically and the path displayed in the GUI will terminate
on the collapsed icon.
h. Expand. Click the 'Expand' action to expand previously collapsed VoIP Peers
associated with a node.
i. Delete. Only available if the Node has been Locked and no routing rules and
Policy Studio rules are associated with it. If routing rules are associated with the
Node or its Peer Connections and you want to delete it, update or delete the rule
so it does not refer to the topology entity which is going to be deleted.
♦ You can edit the 'Name' of the VoIP Peer and/or select the 'Peer Type' from
the dropdown.
Note: The Delete option is only available if no Peer Connection or routing rules are
associated with the VoIP Peer. If there are, you must first update / delete routing rules
before you can delete the VoIP Peer. You must then associate the Peer Connection
with another VoIP Peer.
2. You can view the Name and the State of the connection.
Note:
• The Delete option will only be available for Peer Connections in locked and pre-
deleted state, unassociated with routing rules or with a Policy Studio rule.
• The Detach option will only be available if the Peer Connection is connected to a
VoIP Peer that is connected to more than one Peer Connection.
• Action buttons Add connection, Edit, Delete and Lock/Unlock are also available in
the Network Map page.
a. Modify the weight (Range: 0-100; Default: 50) for the ARM to calculate the
optimal call path. Use if you have a VoIP Peer as a Routing Rule action and you
want to prioritize a specific Peer Connection (e.g., SIP trunk) to be chosen for
calls routing. Also use to reflect Peer Connection cost or bandwidth.
b. From dropdown list, select the VoIP Peer that this Peer Connection is connected
to.
c. From the dropdowns, select the Normalization Rule for Source and Destination
URI User if pre-routing manipulation is required for a specific Peer Connection
(defined as shown in Section 7.2.1).
d. Leave use global quality definitions selected (default) for this Peer Connection
to use the global quality profile configured as shown in Section 7.3.1.
Select use specific quality definitions for this Peer Connection to use only the
'MOS' or the 'ASR' criteria of the quality profile configured as shown in Section
7.3.1.
2. Test the Route (see Section 3.6)
3. Delete the Peer Connection. Only Peer Connections in locked and pre-deleted state,
unassociated with routing rules or with a Policy Studio rule, can be deleted.
4. If the Peer Connection is connected to a VoIP Peer that is connected to more than
one Peer Connection, you can click Detach. You'll be prompted to define a name for a
new VoIP Peer.
Select a route to display its details: Source Node/Peer Connection and destination
Node/Peer Connection.
Selecting a specific route also displays the popular path visually in the Network map, as
you can see in the figure below.
Figure 2-33: Summary Pane Displaying Information Related to a Selected Entity - Connection
3. View the added AudioCodes node in the Topology Map; all elements associated with
the node are automatically provisioned and displayed in the Network Map.
Note:
• Peer Connections are displayed in Locked state; you need to perform an unlock for
them to provide a service.
• Node provisioning by auto-detection is described in Section 10.
2. Provide the third-party device's properties. The third-party device's remote IP address
is used as the destination address of the connection from the AudioCodes device.
3. Add a VoIP Peer according to type, e.g., SIP trunk or PBX, and attach it to the third-
party node by dragging and dropping it from the 'add voippeer' menu.
4. In the 'Add VoIP Peer' screen, give the VoIP Peer a name.
Figure 3-6: Adding a VoIP Peer – Giving the VoIP Peer a Name
5. Associate the VoIP Peer with the third-party node using a Peer Connection, by
drawing a line between the VoIP Peer and the third-party node, or using action 'Add
Peer Connection'.
Figure 3-7: Add Peer Connection
Note: The action ‘Add Peer Connection’ is available only to third-party, non-AudioCodes
SBCs or Media Gateways. It's not applicable to AudioCodes SBCs or Media Gateways.
6. You need to connect the third-party device to the ARM topology, to an AudioCodes
node or to a SIP module, for end-to-end routing capabilities.
Note: The ARM uses standard SIP TGRP capabilities to communicate with a third-party
device interface that does not support AudioCodes nodes' REST API, so when adding a
Peer Connection to a third-party device, you're prompted to provide TGRP. The TGRP
must match the configuration in the third-party device. When the ARM chooses to route
a call towards a specific Peer Connection of the third-party device, it installs into the SIP
Invite the TGRP name configured in the ARM.
The ARM performs routing to Peer Connections attached to third-party devices. In the
Routing Rules definition, choose the Peer Connection or VoIP Peer associated with the
third-party device and in this way, achieve end-to-end routing in a heterogenous network.
To add a connection:
1. In the Network Map view, point your cursor to the node from which to define the
connection and in the popup menu click Add Connection.
Figure 3-9: Add Connection
Alternatively, in the Network Map view select the node to which to add a connection and
then click the action button Add connection.
Figure 3-10: Add Connection
4. From the 'Transport Type' dropdown, select UDP (default), TCP or TLS.
5. From the 'Node-1' dropdown, select the name of the node and from the 'Routing
Interface-1' dropdown, select its routing interface
6. From the 'Node-2' dropdown, select the name of the node and from the 'Routing
Interface-2' dropdown, select its routing interface
7. To define Advanced Conditions (quality-based routing), see Section 7.3.
8. Click OK; the connection is made.
To sync:
In the Network Map view or Peer Connections view or Connections view, click Sync
Topology on the action buttons bar.
Figure 3-11: Sync Topology
All VoIP traffic from/to connected star nodes passes through the central node.
2. In the left pane of the Build Star Topology screen select the nodes that you want to
connect to the star and then click
3. Configure the screen using Table 3-1 on the next page as reference.
Parameter Description
Star center The node you pointed your cursor to before selecting the 'Build Star'
menu option is displayed in the field; it'll be at the center of the star. To
select another node to be at the center of the star instead of this node,
from the dropdown list of nodes select the node.
Routing I/F Select one of the SIP interfaces from which connections will be made
from this node in the star center, to the other nodes in the star. E.g.:
SIP-c
SIP-0
SIP-1
SIP-2
Default weight Enter the weight 1-100 to be applied to all connections in the star
topology build. Later, you can prioritize per connection (see under
Section 2.2.3.3 for more information). The ARM uses this setting to
select the most optimal routing path for each call. The parameter
therefore facilitates more effective network management.
The builder panes Use the builder panes to build your topology star. From the left pane,
select the nodes to include in the star, and then click >> to move them
to the right pane. If you select a single node at a time, select it and then
click >. To remove a node from the build, in the right pane click <, or <<
to remove multiple modes after selecting them.
4. Click OK; the topology is built. You can view it in Topology Map view.
To test a route:
1. In the Network Map view, point the mouse over the connection between a node and a
VoIP Peer (Peer Connection) [or select the link and click the Test Route button].
Figure 3-14: Test Route
3. [Optional] Enter the Source and Destination Route. From the dropdown, select the
Peer Connection.
4. Under 'Advanced Options', select the routing rules mode:
• Live. When a new call destination is calculated, the Routing Rule is taken into
consideration and live traffic may be impacted.
• Test. Tests the Routing Rule or Dial Plan offline without impacting or disrupting
live calls traffic.
• Live and Test selected together. The Routing Rule is considered when:
♦ calculating the live routing path -and-
♦ testing a route in the live topology map and in the offline planning page
Each routing rule can be enabled or disabled separately for Live mode and/or Test
mode (see also under Section 8.2).
5. Under 'Advanced Options', select the call trigger. By default, the Initial option is
enabled. See step 11 on page 110 for more information about call triggers.
6. Click Find Routes. Test routing is performed as if a real call is occurring, taking
Operative State and Admin State of topology entities (Connections, nodes, Peer
Connections), and the Admin State of routing rules, into account. In addition, the
entity's Quality or Time/Date criteria are taken into consideration if required by the
Routing Rule (Advanced Condition). The Route Path is highlighted violet (shown in
Figure 3-16); the TEST ROUTE pane on the right displays detailed information.
• Column WHEN indicates when manipulation was performed, i.e., before or after
routing. In the example above, manipulation was performed before routing.
• Column ENTITY indicates which part of the SIP Request was manipulated.
♦ Possible values: Source URI User, Source URI Host, Destination URI User,
Destination URI Host, Destination IP Address, Destination Port, Destination
Protocol, User Credential User Name, User Credential Password
• Column CHANGED BY – the first row indicates by global Normalization Group –
see under Section 7.2.1 and Section 7.2.3 for detailed information; the second
row indicates that the normalization was attached to a Peer Connection - see
under Section 2.2.3.4 for detailed information.
• Column NORMALIZATION/MANIPULATION GROUP indicates which
'Manipulation Group' the entity passed through, according to which regular
expression the entity was changed.
The figure below shows an example of a test call with a quality advanced condition. The
condition avoids passing through 'bad' or 'fair' Connections/Peer Connections.
Figure 3-19: Example of a Test Call with a 'Quality' Advanced Routing Condition
In the view, the operator can create virtual nodes, Peer Connections, VoIP Peers, and
Connections. The operator can import a full, currently-used topology, or part of one, e.g., a
specific node, for making changes and testing offline.
The operator can 'play' with the Administrative State, Operative State, Quality and Weight -
if available - of each virtual entity and test how the changes impact call traffic.
After entities are added to the Offline Planning page they can be used in Routing Rules in
testing mode; live network traffic will not be impacted.
The feature allows operators to test almost any scenario before transposing the
configuration to the live topology.
The figure below shows the Operative State and Quality settings per peer connection.
Figure 4-2: Edit Peer Connection
After designing virtual VoIP network entities, you can export them to the live topology.
When you export a newly defined node to the live topology, the node configuration
downloads to AudioCodes' device which automatically connects to the live topology. 1
1
When exporting an offline node to the live ARM topology, only the connections in the live node are provisioned; you need to
manually provision Peer Connections in the node.
Icon Used to
Drag and drop a virtual hybrid device onto the Offline Planning page.
Drag and drop a virtual gateway onto the Offline Planning page.
Drag and drop a virtual SBC onto the Offline Planning page.
2. Drag the selected type of device to the map and configure its name.
1. Click and then ; then select the VoIP Peer type using the following table as
reference.
Table 4-2: Add a Virtual VoIP Peer
Icon Used to
Drag and drop a PSTN entity onto the Offline Planning page.
Drag and drop a SIP Trunk onto the Offline Planning page.
2. Drag the icon to the map and configure the name of the VoIP Peer.
To test a route:
To test a route in a virtual network, select the Peer Connection and then select Test
Route (see Section 3.6). Testing a route in the Offline Planning page factors in all
entities configured in the Offline Planning page and their status and voice quality.
4.1.8 Exporting a Node from the Offline Page to the Live Topology
You can export a node from the offline page to the live topology.
Note:
• Before exporting a node to the live topology, make sure it's correctly configured in
the Offline Planning page.
• If a node with the same IP address already exists in the live topology, the entire
configuration of the node will be transferred to that node in the live topology.
• Before exporting a node to the live topology, make sure all Peer Connections
(IPGroups) are configured on that node.
In the offline map, point your mouse over a node and from the popup click More
Actions > Export.
Figure 4-4: Export
Statistics are displayed per Filters differ depending on the Graphic representation of the
element. Select either: element selected. For all statistics of the selected
• ARM elements except Routing element in a chart, with a
• Router (Routers over time,
Group and Routing Rule, range of graph functionalities:
Top routers, Top routers select from: • Refresh
over time) • 'Date' ('Range' or • Chart type (line, area or
• Node (Nodes over time, Top 'Relative') stacked area)
nodes, Top nodes over time, • Statistics Type: Export chart
Nodes by peer connections, Routing attempts
Top nodes by peer
Alternative attempts
connections)
• Peer Connection (Peer
Unsuccessful routes
connections over time, Top Destinations Not
peer connections, Top peer Routable
connections over time) Destination calls
• Connection (Connections Transient calls (does
over time, Top connections, not apply to Peer
Top connections over time) Connection) (for
• Routing Group (Routing Connection, only this
groups over time, Top filter applies)
routing groups, Top routing
Figure 5-2: Top Routers Filtered by Routing Attempts Displayed as a Pie Chart
A glance at the chart immediately reveals the top router. Point your cursor over a
segment to display the number of routing attempts attempted by that router.
You can print the chart or download the statistics in a format of your choice.
You can select your preferred graphical representation – bar chart, column chart or pie
chart. An icon 'Select chart type' allows you to present statistics according to your
preferred graphical representation.
Figure 5-4: Top Routers Filtered by Routing Attempts Displayed as a Bar Chart
A glance at this chart also immediately reveals the top router. Point the cursor over a
bar to display the number of routing attempts attempted by that router. The figure
below shows the elements that hold statistics information.
Each element displays subcategories. Under Routing Rule, for example, you can select
'Top Routing rules over time’ or ‘Top Routing rules by action’.
In addition, in the Filters section of the page, you can select 'Number of elements'.
Figure 5-6: Top Routing rules over time
2. Click Add.
User Details are taken from the Property Dictionary screen. If a property is added in
the Property Dictionary screen, it appears here. To add a property, see Section 6.4.
Note that if an LDAP server is provisioned, the ARM automatically brings users from
it to the ARM database, and displays them in the GUI under the User tab.
3. Click OK; the user is added and displayed in the Users page. To view and/or edit,
select the user's row and click Edit; the screen shown below is displayed.
Note: Grayed fields in the figure above indicate that the origin of this user isn’t ARM and
cannot be edited. Non-grayed fields indicate that the origin of the user is ARM and can
be edited.
2. Click Add.
Setting Description
Name Enter a name for the group for intuitive future reference.
Dialable From the dropdown, select one of the Dialable Number properties. This is
the user’s property that is compared to the received source or destination
URI to determine if the route request is from/to one of the users in this
User Group. Example: 'Office phone number'.
Attribute Name Click the field and from the dropdown, select a user attribute according to
which the user will be associated with the group. Example: Country.
Click the plus button + to add more attributes. All attributes must match for
the user to be a member of the group.
equals / not equals From the dropdown, select the operation to be used to define the criterion.
contains / not contains
Value Enter a value for the attribute, according to which the user will be
associated with the group. Example: Sweden. Press enter to add more
values. At least one of the values must match for the attribute to be
considered a match.
2. Edit using the table above as reference, and then click the Users tab; the screen
shown above right opens allowing you to view the users that were associated to the
group in the Users tab of the User Group Details dialog.
Setting Description
Search Filter An LDAP search filter used when fetching the users from the LDAP
server under the base DN. The default is 'objectClass=user'.
Security Settings
Bind DN The DN (distinguished name) or username of the user used to bind to the
LDAP server. For example: [email protected]
Properties that have LDAP mappings will be synced from the LDAP server. Properties that
do not have LDAP mappings can be configured locally.
2. Edit the LDAP Server Settings screen, click Test Connectivity to test the connection
settings and then click Next; the LDAP Properties screen shown in Figure 6-8 opens.
3. For each LDAP property's LDAP Mapping dropdown, select a mapping. Properties
that have LDAP mappings will be synced from the LDAP server. Properties that do not
have LDAP mappings can be configured locally.
4. Select the row of the LDAP property to which to attach a Normalization Group (Rule)
and then from the property's Attribute Normalization dropdown, select a Normalization
Group. See Section 7.2.1 for information about how to configure a Normalization
Group.
5. Click Finish.
After updating an LDAP server, a full sync is started. After a short while (depending on the
size and responsiveness of the LDAP server), you can view the updated users in the Users
page.
After adding a property to the dictionary, you can add it to some or all your LDAP servers.
Properties added to an LDAP server will automatically be read from the LDAP server.
Properties not added can be set locally in the ARM for each user. The Properties from the
dictionary can then be used as User Group conditions as well as in in 'Policy Studio'.
Setting Description
Name Define an intuitive name for the property, for intuitive future reference.
Description Enter a brief description of the property, for intuitive future reference.
Dialable Defines if this property is a dialable number. Only dialable numbers are
used for matching with a received source or destination URI in a route
request.
Examples of dialable number properties: Office phone number, mobile
phone number, Skype number, etc.
Display in Users Table Select the option to display the user property in the Users page. The
option can be used to reduce clutter on the Users page.
7 Configuring Settings
The Settings page (under the Settings menu) lets you
Network Services Settings
• Syslog server (see Section 7.1.1)
• NTP server (see Section 7.1.2)
Call Flow Settings
• Normalization Groups (see Section 7.2.1)
• Prefix Groups (see Section 7.2.2)
• Normalization Before Routing (see Section 7.2.3)
• Policy Studio (see Section 7.2.4)
Routing Settings
• Configuring a Quality Based Routing Condition (see Section 7.3.1)
• Configuring a Time-Based Routing Condition (see Section 7.3.2)
• Configuring SIP Alternative Route Reason (see Section 7.3.3)
• Configuring Global Routing Settings (see Section 7.3.4)
Administration Settings
• Software License (see Section 7.4.1)
• Security (see Section 7.4.3)
• Operators (see Section 7.4.4)
Routing Servers Settings
• Adding a Routing Server (see Section 7.4.4.2)
• Editing a Routing Server (see Section 7.5.1)
• Locking/Unlocking a Routing Server (see Section 7.5.2)
2. Select the Router or Topology row and then click the enabled Edit button.
Setting Description
Note:
• When enabling syslog for a Router, there's a single syslog server for all Routing
servers in the ARM. All ARM Routers send their syslog to this syslog server (at the
same 'Debug Level'). This is necessary for proper calls debugging, as a single call
can be processed by several different ARM Routers (they are state-less). For the
ARM Configurator, however, you can assign a different syslog server.
2. Click Add.
3. Configure the NTP server details using the table below as reference. The same details
open when editing the server.
Table 7-2: NTP Server Details
Setting Description
2. Configure QoS values using Table 7-4 on the next page as reference
Setting Description
Gold [Application protocol: HTTP/S, JMS, NTP] You can change the
default value of 46 to suit the requirements of your IP network. As
part of IP network planning and optimization, the value can be
changed to a value in the range between 0-63. The value
determines priority of IP packets related to 'Gold' service.
Silver [Application protocol: SNMP, CDR, Syslog, LDAP] You can change
the default value of 24 to suit the requirements of your IP network.
As part of IP network planning and optimization, the value can be
changed to a value in the range between 0-63. The value
determines priority of IP packets related to 'Silver' service.
Bronze [Application protocol: SSH] You can change the default value of 12
to suit the requirements of your IP network. As part of IP network
planning and optimization, the value can be changed to a value in
the range between 0-63. The value determines priority of IP packets
related to 'Bronze' service.
To enable CDRs:
1. Open the CDR page (Settings > Network Services > CDR).
Setting Description
2. Click Add.
Setting Description
Note: The same Normalization Group can be reused/attached several times in any of
the above cases.
Note: To develop a customer-specific Dial Plan into an ARM Prefix Group, the REST
API is available. This can significantly facilitate ARM provisioning.
Setting Description
Setting Description
Source URI User From the dropdown, select the normalization rules group. This will
be the normalization on the Source URI User field.
Destination URI User From the dropdown, select the normalization rules group. This will
be the normalization on the Destination URI User field.
3. Click Submit.
2. Click Add.
Setting Description
Name Defines the name of the Policy Studio rule to add, to facilitate
management of the feature.
MATCH The set of match conditions for finding a user from the Users table.
Click + to add more conditions.
Source Nodes / Peer Select a Node or Peer Connection - or set of Nodes or Peer
Connections Connections - for which this rule will be used. If left empty, the rule is
used regardless of the origin of the call.
Request field Select a route REQUEST field from the following available fields (this
is a field from the route REQUEST that is compared with the user
properties):
SOURCE_URI_USER
SOURCE_URI_HOST
DEST_URI_USER
DEST_URI_HOST
CONTACT_URI_USER
CONTACT_URI_HOST
CONTACT_URI_HOST
If a call matches the selected criterion, the manipulative action you
select below will be performed. For a SIP field manipulation example,
see Example 2 under Section 7.2.4.2 below.
Action The set of replacement actions that will be performed on the route
request and route response fields for a found user.
Action field Select a route request or route response field from the following
available fields (when a user is found, this field will be replaced with
the value of the configured user properties):
SOURCE_URI_USER
SOURCE_URI_HOST
DEST_URI_USER
DEST_URI_HOST
DEST_IP_ADDR
DEST_PORT
DEST_PROTOCOL [the P-ASSERTED_IDENTITY_USER will be
Setting Description
replaced by company site main number
P-ASSERTED_IDENTITY_DISPLAY_NAME]
USER_CREDENTIALS_USER_NAME
USER_CREDENTIALS_PASSWORD
Multiple actions can be defined. Click + to define another action.
Note: If either USER_CREDENTIALS_USER_NAME or
USER_CREDENTIALS_PASSWORD is used in an action, you must
add both.
For a SIP field manipulation example, see Example 2 under Section
7.2.4.2 below.
Request User Property Select a set of user properties. The request field is compared to these
properties of the users. If any of the properties of a user is equal to
the value of the field, then this condition is considered a match.
Replacement User Property Select a set of user properties. The action is to replace the value in
the request or response field with the value of this user property. If the
found user has no value for this property, then no action is done on
this field. If there more than one property is listed here, then ARM
replaces the field with the first property if the user has it. If the user
does not have it, ARM proceeds to the next property in the list, in the
configured order.
Note: The quality of voice on a line is calculated based on the quality of voice measured
in multiple calls over a period. The ARM issues alarm indications for quality change.
2. Activate either MOS, ASR or both and then configure criteria by dragging the range
indicators to the lower and upper limit you require. Use the table below as reference.
Table 7-10: Configuring Criteria for a Quality Profile
2. Add a time-based routing condition: Click Add; the Time Condition screen is
displayed.
3. Configure a time-based routing condition. Use the table below as reference. See the
figure above for an example.
Table 7-11: Time Condition
4. Click OK; a profile is generated which you can associate with a Routing Rule (see
Section 8.2 under 'Advanced Conditions'). Also, you can associate the configured time
condition with a Routing Group. In this case, it will apply to all Routing Rules in the
Group. Note that the same time condition profile can be reused multiple times.
Note: If a call fails and the SIP response received from the remote side is not configured
in the SIP Alternative Route Reason page, the ARM will not apply an alternative route
for the call.
The page allows operators to change the default ARM behavior for an Alternative Routing
decision.
Note:
• SIP responses are listed in numerical order.
• You can browse to the next page or to the last page of responses.
• You can browse to the page before the page you are on, if you're not on the first
page, or you can browse to the first page.
2. Click Edit.
Note: By clearing the 'Active' option, the operator can 'deactivate' a SIP reason without
deleting its row in the table. If a SIP reason is 'deactivated', the ARM will not apply an
alternative route. The ARM will function as if there is no row at all. The 'deactivated' row,
however, remains in the table, and if the operator redecides, it can be 'reactivated' by
selecting the 'Active' option.
2. Click Delete.
Setting Description
Maximum number of Routing Defines the maximum number of routing attempts per call. If the
Attempts maximum number of routing attempts has not yet been reached, the
ARM searches for an alternative routing possibility for the specific
call.
Maximum number of routing Defines the maximum number of routing attempts per Peer
attempts per Peer Connection. If the maximum number of routing attempts has not yet
Connection been reached, the ARM tries to re-route the call to a preferable Peer
Connection. Default: 2 attempts.
3. Click Submit.
2. Select and copy the 'License Key' shown in red in the figure above.
3. Activate the product through the AudioCodes License Activation tool at
www.audiocodes.com/swactivation. You'll need your Product Key and the
Configurator's Machine ID for the activation process. An email will subsequently be
sent to you with your License Key.
4. Copy and paste the License Key string that AudioCodes sends you into the 'License
Key' field, and then click Submit; the number of sessions purchased and the license
expiry date are displayed.
5. Make sure the license details (the number of sessions purchased and the license's
expiry date) match those that you purchased.
Setting Description
Session timeout Closes the session timeout and forces the user to reenter their password (to
(hours) reopen the session) if the timeout you define (in hours) expires. Note that this
setting only takes effect after logging out and then re-logging in.
Inactivity period Suspends the user's account if the user does not log in to the ARM over the
(minutes) period you define. 0 disables the feature; users accounts will then never be
suspended due to inactivity. Note that this setting only takes effect after logging
out and then re-logging in.
http/https enabled Enables an HTTP/HTTPS connection between the ARM server and the SBC /
Gateway.
General Node Credentials
Username Username and Password are the default credentials that ARM uses when
communicating with the node. Default: Admin/Admin.
The ARM uses this Username if in the EDIT NODE screen (see above for more
information), you select Use general credentials. Change the Username only
if the credentials of the node aren’t Admin/Admin.
Password Username and Password are the default credentials that ARM uses when
communicating with the node. Default: Admin/Admin.
The ARM uses this Password if in the EDIT NODE screen (see above for more
information), you select Use general credentials. Change the Password only if
the credentials of the node aren’t Admin/Admin.
3. Click Submit; the security configuration is saved.
2. Click Add.
Setting Description
Note: Only operators with a security level of Admin can edit LDAP authentication server
parameters.
2. Configure the LDAP Authentication Server parameters using the table below as
reference.
Table 7-15: LDAP Authentication Server Parameters
Parameter Description
Enable LDAP Select or clear this option to enable or disable operator login
Authentication authentication using an LDAP-compliant authentication server.
LDAP Authentication Enter the IP address of the LDAP server's host.
Server Host
LDAP Authentication Enter the LDAP server's port number. Default: 389
Server Port
LDAP Connectivity DN Configure the 'LDAP Connectivity DN' parameter as required.
LDAP Connectivity Configure the 'LDAP Connectivity Password' as required.
Password
User DN Search Base Configure the 'User DN Search Base' as required.
3. Configure the SSL parameters to secure the connection to the LDAP server, using the
table below as reference.
Table 7-16: SSL Parameters
Parameter Description
SSL Select the 'SSL' option to secure the connection with the LDAP server
over SSL. If left unselected (default), the connection with the LDAP
server will be non-secured.
Certificate file Click the 'Certificate file' browse button to browse to and select the
certificate file that you want to use to secure the connection with the
LDAP server over SSL.
If SSL is selected and a certificate is also selected, an HTTPS
connection between the ARM and the LDAP server will be opened. The
ARM authenticates the SSL connection using the certificate.
4. Configure the Test Connectivity parameters to test the connection to the LDAP server.
Use the table below as reference.
Table 7-17: Test Connectivity
Parameter Description
Name If 'Name' is undefined (empty), the connectivity test checks if the LDAP
authentication server can be logged into according to the values
defined under the 'LDAP Authentication Server' parameters described
in Table 7-15 above.
If you enter a user name, the connectivity test checks that it's valid for
logging into the ARM. Enter the user name assigned to the LDAP
server.
Password If 'Password' is undefined (empty), the connectivity test checks if the
LDAP authentication server can be logged into according to the values
defined under the 'LDAP Authentication Server' parameters described
in Table 7-15 above.
If you enter a user password, the connectivity test checks that it's valid
for logging into the ARM. Enter the password required for accessing the
LDAP server.
5. View the result of the LDAP server connectivity test; the figure uppermost shows a
failed test while the lowermost figure shows a successful connection.
6. Under the page section 'Authorization Level Settings', you can provide mapping of the
ARM's access rules (‘Security Admin’ and ‘Admin’) into the LDAP server’s values.
Use the table below as reference.
Table 7-18: Test Connectivity
Parameter Description
User Name Attribute The name of the LDAP-complaint server's directory | folder in which the
enterprise's user names are located. Default: sAMAccountName. When
the operator logs in, the authentication feature checks in this directory |
folder that the operator's name exists.
Permissions Attribute The name of the LDAP-complaint server's directory | folder in which the
permissions are located. Default: memberOf. When the operator logs
in, the authentication feature checks in this directory | folder if they
have permission to log in.
Security Admin Mapping The name of the LDAP-complaint server's directory | folder in which the
ARM's access rule is mapped. Default: ARM_SecurityAdmin. When the
operator logs in, the authentication feature checks against this directory
| folder if login is allowed or not.
Admin Mapping The name of the LDAP-complaint server's directory | folder in which the
ARM's access rule is mapped. Default: Default: ARM_Admin. When the
operator logs in, the authentication feature checks against this directory
| folder if login is allowed or not.
If LDAP authentication is enabled, the order used to authenticate operator login is:
LDAP
Local storage (Database)
If the LDAP server is down or if the operator can't be authenticated with the LDAP server
because either the operator isn't found or the password doesn't match, the local operators
table is used.
7. Click Submit.
2. Click Add.
The ARM operator can edit the Nodes list when adding the new router. After it's added, the
operator can connect or disconnect the Node to/from a specific router via the node's
Properties (see Figure 2-10 and the description under Section 2.2.3.1). A node can also be
associated with Routers from the node’s Edit action (see also Section 2.2.3.1)
3. Configure the routing server using Table 7-19 below as reference.
Table 7-19: Routing Server Details
Setting Description
2. Select the row of the routing server to edit, and then click Edit.
Setting Description
2. Determine from the icon under the 'Administrative State' column whether a routing
server is locked or unlocked, and then click the Lock / Unlock button.
An unlock performs a restart of the Routing Manager software. The action takes a few
seconds, during which time the Routing Manager is unavailable due to the restart.
A lock action is immediate.
These actions can be applied to any particular ARM router. The functionality lets you
gracefully take a router temporarily out of service. A locked router responds to all
keep-alive and login requests, from all nodes, with a standard 'Service Unavailable'
HTML error. This behavior causes all nodes to be disconnected from the router,
effectively taking the router out of service. The router still responds to any other
request from the nodes or the configurator, which makes the lock action graceful since
calls, statistical calculations and software upgrades are unaffected.
Follow this procedure when defining calls routing policy (ARM Dial Plan):
1. Add a new Routing Group (see Section 8.1)
2. Add a new Routing Rule (see Section 8.2)
3. Test the route (see Section 3.6)
2. Define a name for the Routing Group to be added. Define a user-friendly name to
facilitate intuitive management by administrators. Some example of groups you can
add are 'Restricted Calls', 'Calls to Europe', 'Calls to Far East', 'Calls to ROW', etc.
Note: The routing group's name must be distinct from names of other routing group
names, and must be between 1-999 characters.
3. Select the use time conditions option to attach a time condition to the Routing
Group. See Section 7.3.2 for related information on how to attach a time condition to a
Routing Rule. You can attach multiple time conditions. These conditions will apply to
all rules in the group. Note that if you attach a time condition to a group, it's indicated
visually in the Routing Groups page as follows:
Note:
• Routing Groups listed higher take precedence over those lower.
• Routing Groups in the list can be reordered (see Section 8.1.2).
• Priority is calculated internally, based on Previous and Next groups.
b. Click the Edit icon in its row which is then enabled, shown in the figure below.
2. Edit the 'Name' field. Enter a user-friendly name to facilitate intuitive management by
network administrators.
3. Edit the time condition. You can clear the use time conditions option to remove the
condition. See Section 7.3.2 for related information. You can alternatively remove a
single condition if multiple time conditions are attached.
4. Click OK.
2. Select Before or After, click the Routing Group before which / after which to move the
Routing Group you want to promote/demote, and then click OK.
Alternatively, you can move a Routing Group by clicking the icon shown in the figure
below, and then dragging it and dropping it in the Routing Groups page.
Figure 8-8: Moving a Routing Group by Dragging and Dropping
-or-
c. Click Delete.
Note:
• Routing rules are defined within Routing Groups.
√ To view a specific Routing Group's Routing Rules, click that Group.
√ To view all Routing Rules, click the Routing Rules tab.
• Any modification to the routing configuration (adding, deleting or modifying) takes
effect within 60 seconds after the modification request is answered by the
configurator and does not affect active calls.
• Any modification to routing logic because of an operational state change to a node or
Peer Connection takes effect within 60 seconds after the status change is identified
by the configurator.
• Any modification to routing logic because of a node or Peer Connection
administrative state change takes effect within 60 seconds after the status change is
identified by the configurator.
• Changes in users or user groups take effect within 60 seconds after the modification
is identified by the configurator.
The ARM parses from the top Routing Group listed, to the bottom Routing Group listed,
and within each Routing Group from the top Routing Rule listed to the bottom Routing Rule
listed. If it finds a matching rule and if devices and Connections/Peer Connections are
available, it sends the call to the destination configured for that rule. If it doesn't find a
matching rule, it indicates that a route for the call has not been found.
Alternative Routing
The ARM performs alternative routing as follows:
The ARM attempts to build an alternative path for the same Routing Rule action
(Node, Peer Connection, VoIP Peer), if available.
ARM attempts to build an alternative action (Node, Peer Connection, VoIP Peer), if
available, for this call, in the order that actions are listed in the Routing Rule.
All routing alternatives are sorted by weighted path, cost and then by number of hops.
Load Balancing
The ARM can balance call traffic between multiple destinations of the same Action. Call
traffic can be distributed equally between destinations, or the distribution can be defined by
the operator. Multiple routing attempts can be configured. Default: 1. Max: 3. The max can't
exceed the number of destinations in the load balancing action. If a call to a destination
configured in a load balancing action fails, the ARM will try to route it to one of the
destinations configured in load balancing before searching for a new rule or action for it.
Discard Call - the ARM can be configured to discard calls matching specific conditions as
a single action, or as the last action of a rule if previous destinations were unavailable.
2. Enter a name for the routing rule that is distinct from the names of the other routing
rules in the same group. Define a user-friendly name to facilitate intuitive management
by network administrators. The name can be between 1-999 characters.
3. Enable Live and/or Test mode. See Section 3.6.
• Live. The rule will be taken into consideration for live calls traffic.
• Test. The route will be tested offline without impacting live calls traffic.
By default, new routing rules are added with Test mode enabled and Live mode disabled.
It is highly recommended to test the newly added routing rule before enabling it for live
calls.
The table below shows the combinations that are supported for a Routing Rule:
Table 8-1: Live | Test Mode Combinations
Live is enabled | Test is enabled The rule will be considered for both test and live
traffic.
Live is enabled | Test is disabled The rule will be considered only for live traffic. Test
mode won't be impacted. Select this option to
simulate rule removal.
Live is disabled | Test is enabled The rule will only be considered only for test mode.
Live traffic won't be impacted. Select this option to
simulate and test a newly added rule.
Live is disabled | Test is disabled The rule will not be considered for test nor live
traffic. Select this option to prepare a Dial Plan.
4. Configure the settings under 'Source' - use the table below as reference.
Table 8-2: Source Settings
Setting Description
Prefixes/Prefix Groups Enter a source number prefix, or list of prefixes. You can also enter the
name of a prefix group, or from the dropdown select a prefix group or
list of prefix groups. See Section 7.2.2.
Hosts Enter a source hostname, or list of hostnames.
User Groups Enter the name of a source user group or list of source user groups, or
select user groups from the dropdown. See Section 6.2.
Nodes/Peer Connections Enter names of source nodes or peer connections, or a list of nodes or
peer connections, or select nodes or peer connections from the
dropdown. Must be configured if you want to define a routing rule
applicable to specific call sources rather than (globally) to the entire
network.
Setting Description
Prefix/Prefix Groups Enter a destination number prefix, or list of prefixes. You can also enter
the names of a prefix group or select prefix groups from the dropdown.
Hosts Enter a destination hostname or list of hostnames.
User Groups Enter the names of a user group, or list of destination user groups or
select user groups from the dropdown.
7. In the Routing Rule Settings screen, click Advanced Conditions.
Figure 8-14: Advanced Conditions
8. Under 'Quality Based Routing', select the option include paths with the following
quality; the dropdown becomes available. From it, select the quality criteria that you
defined as shown in Section 7.3. Criteria for bad, fair and good quality, based on the
calculation of MOS and ASR, can be defined. This screen lets you associate the
criteria you defined with the Routing Rule.
9. Under 'Time Based Routing', select the option use time conditions; the pane
becomes available. From the dropdown, select the time on which routing will be
based, configured under Settings > Routing > Time Based Routing (see Section 7.3
for information about configuring a time range).
Note:
• More than one Time Condition can be associated with the same Routing Rule.
Activation of the Routing Rule is then performed in ‘or’ between Time Conditions.
• A Time Condition can be attached to a Routing Rule which belongs to a Routing
Group with an already-associated period; the ARM's calculation of this Routing
Rule's activation will then be ‘and’; the rule will be activated during the period
assigned to the Routing Group and the period assigned to the Routing Rule.
10. Select Prioritize call when this rule is selected to prioritize emergency calls over
regular calls. The ARM supports emergency call preemption for SBC and gateway
calls. If one of the devices is unavailable to process an emergency call because of
lack of resources, a regular call will be preempted to free up resources so that the
emergency call will be established. The ARM may preempt more than one active call
to provide sufficient resources for processing the emergency call. Emergency calls
can be identified by the matching rules parameters in the Routing Rule Settings
screen.
Figure 8-16: Advanced Conditions – Prioritize call when this rule is selected
11. Under ‘Advanced Conditions', select a Call Trigger to activate the rule for a specific
Invite reason (i.e., alternative routing). By default, all 'Call Trigger' options are
selected, so routing by default is based on all Call Triggers. At least one must be
selected. The node applies to the ARM for a routing decision when it is triggered by
another condition – such as a fax call or a Broken RTP connection. You can configure
a rule to be triggered for example only for a fax call or for a ‘Refer call’. Call Trigger
options are:
• 3xx [Re-routes the request if it was triggered because of a SIP 3xx response]
• REFER [Re-routes the INVITE if it was triggered because of a REFER request]
• Initial [This routing rule is used for regular requests that the device forwards to
the destination]
• Broken Connection [If the Node detects a broken RTP connection during the
call and the Broken RTP Connection feature is enabled in Pcon Ip-Profile (IP
Profile > Broken Connection Mode = Reroute), you can use this option as an
explicit matching characteristic to route the call to an alternative destination.
Note that it's not supported for an incoming call from a third-party Pcon.
• Fax rerouting [This trigger will be used if the Node detects a call as a fax and the
fax recognition feature is enabled on the Peer Connection. To enable the feature,
the device Web interface's 'Routing Mode' parameter must be configured to
Rerouting without delay (IP Profile > Rerouting Mode). Make sure this IP Profile
is associated with the relevant IP Group. You can use this option as an explicit
matching characteristic to route the call to an alternative fax destination.
Note: Fax call trigger is unsupported for incoming calls from third-party Peer
Connection.
12. Each rule is by default relevant in all circumstances because all Call Triggers are
selected by default, but if you want to provide specific routing, for example, for fax
calls only, select it as follows:
Figure 8-17: Advanced Conditions – Specific Call Trigger/s Selected
In this case, the initial call is routed according to the generic Routing Rules (followed by the
SIP Invite message). When the SBC categorizes this call as a fax call, another request for
routing is sent to the ARM with the ‘Fax Rerouting’ trigger. This routing request matches
another ARM Routing Rule dedicated for fax rerouting. In this way, you can route fax calls
to a ‘Fax-to Mail’ server (for example).
13. In the Routing Rule Settings screen, click Routing Actions: The action or set of
actions to be taken if this Routing Rule matches. To select the action, click the icon
illustrated in the figure below (recommended) or select it from the dropdown.
• In the 'Choose Topology Item' screen, select the VoIP Peer, Peer Connection or
Node to serve as the Action in the Routing Rule, and then click OK. This is an
easy, visual way of selecting the correct topology element, especially in large
networks with high numbers of topology elements where human error can easily
occur.
14. Use the table below as reference.
Table 8-4: Routing Actions
Setting Description
[Action] left dropdown field Select from the dropdown the Peer Connection, VoIP Peer or Node to
which the call will be routed. In the figure above, the Peer Connection
IpGrp1 (Italy) is selected.
[Via] right dropdown field [Optional] Select from the dropdown the Node that the call must pass
through. In the figure above, the Node Paris_2 is selected. Only a
single Node can be added in Via.
> Normalization groups Click > to open post routing (after routing) normalization.
Source normalization Select a normalization group (see Section 7.2.1) to manipulate the
group source number in the outgoing call to the peer connection. The source
normalization group can only be connected to an IP Group or VoIP
Peer. It cannot be connected to a Node.
Destination normalization Select a normalization group (see Section 7.2.1) to manipulate the
group destination number in the outgoing call to the peer connection. The
destination normalization group can only be connected to an IP Group
or VoIP Peer. It cannot be connected to a Node.
15. Click Add loading balancing; the screen shown in Figure 8-20 on the next page is
displayed.
Load balancing is added between more than one Peer Connection, Node or VoIP
Peer. By default, these are equally balanced, i.e., the same percentage is assigned
for each option, as shown in the figure above.
You can optionally define your own percentage by clearing the 'Equally Balance'
option. Any distribution can be chosen, i.e., any percentage of calls can be handled by
a specific routing option. Several routing destinations (more than two) are supported
using the Add load balancing button, as shown in Figure 8-21 below.
16. Enter the percentage of routes that will take this action when load balancing is
configured and Equally Balance is cleared. Make sure you have 100% in the Action's
calls destinations summary else you won't be allowed to enable the action.
Figure 8-21: Routing Actions – Load Balancing - Defining Your Own Percentages
17. Configure the parameter 'Routing Attempts' as shown in the figure below. The
maximum attempts that can be configured is 3. Default: 1. The maximum number of
'Routing Attempts' can't exceed the number of destinations in the action (see for
example the action ORANGEFRGRP1 (PARIS_2) in the figure below).
Figure 8-22: Equally Balance: Routing Attempts = 2
The 'Routing Attempts' parameter determines the number of attempts that will be made
within the load balancing action. If load balancing is configured within a Routing Rule's
Action and a call to a destination configured in this Action fails for some reason, the ARM
will try to route the call to one of the destinations configured in load balancing before
searching for a new rule or action for the call.
18. Click the Call Discard action icon
Figure 8-23: Routing Actions – Call Discard
Setting Description
Discard Action In a routing rule, you can apply a policy to attempt multiple routing options and to
discard the call if none succeed. The Discard call routing action can be used - in
addition to other routing actions of the same rule - as a last routing rule action or
as a sole action. You can provide a specific SIP reason for 'Discard Call' as well as
use the last SIP reason received from the SBC or the Gateway.
SIP Reason Enter the SIP reason to be returned to the source peer connection when rejecting
the call. Must be a valid SIP reason.
To move a rule:
1. Click the Routing Group under which the rule is defined and then
• Drag and drop the rule to the Routing Group you want to move it to -OR-
• Select the rule to move and then click the now-enabled Move icon; the Move
Routing Rule dialog is displayed.
2. From the 'Group' dropdown, select the group to which you want to move the rule.
3. Select either Before (default) or After and then select the rule before which or after
which you want to move the rule.
4. Click OK; the rule is moved to the location you defined.
To delete a rule:
1. Click the group under which the rule is defined and then adjacent to the defined rule
that you want to delete, click the now-enabled Delete icon shown in the figure below –
OR- click the now enabled Delete Route button also shown in the figure below.
2. In the Confirmation prompt 'Are you sure you want to delete this rule?' shown in the
figure below, click Delete.
2. Select a rule or select multiple rules; the actions buttons are activated. Administrators
can:
• Edit a rule
• Delete rules
• Lock / Unlock rules
• Duplicate a rule (allows administrators to conveniently and easily add a rule
based on an already defined rule)
• Move rules
3. In the Search field, enter a search string. The functionality allows administrators to
search in all the defined rules, not just in a Rules Group.
9 Viewing Alarms
The Alarms page shown in the figures below displays alarms generated in the enterprise's
network topology, e.g., SBC disconnected. In the page, you can view alarms information
displayed under two tabs:
Active Alarms (default)
History Alarms
Click any alarm listed on any page; that alarm's ALARM SUMMARY pane, shown above,
displays the column information as well as:
ALARM TYPE
PROBABLE CAUSE
ADDITIONAL INFO1
ADDITIONAL INFO2
ACKNOWLEDGED
In the Active Alarms and History Alarms pages you can:
Sort alarms, according to column header
Use the 'Search' feature to locate specific alarms (see Section 9.4 below).
Refresh the page / Stop Auto Refresh
Acknowledge Alarm [Applies only to the Active Alarms page] Click the button to clear
a selected alarm from the page. Note that after acknowledging it, the alarm can be still
viewed in the History Alarms page.
The page can help you 'debug' a routing issue that may occur in the network. Each row
chronologically indicates an operator action | activity. Selecting a row displays the details of
that action | activity in a Journal Summary pane located on the right side of the page:
Setting Description
2. Enter any information about the alarm you know. You must enter information in at
least one field.
• The 'Name' field is identical to the simple search string field.
• From the 'Severity' dropdown, select Clear, Indeterminate, Warning, Minor, Major
or Critical. All alarms whose severity level match your selection will be displayed.
• For the alarm 'Source', enter the node name or the Peer Connection name, if you
know it. All alarms originating from that source will be displayed.
• In the 'Description' field, enter a key word used to describe the alarm.
• Select either Between Times, Last 24 hours, Last week or Last 30 days. All
alarms whose timestamp matches your selection will be displayed.
3. Click Search.
Note:
• This section assumes familiarity with the AudioCodes device whose routing is to be
migrated to the ARM. See Related Documentation for references to AudioCodes'
device documentation.
• The screenshots shown in this section are of Web interface version 7.2. If you're
using Web interface version 7.0 or earlier, refer to earlier versions of this document.
For auto-discovery provisioning, take the steps below to connect the device to the ARM
network.
4. Configure the dialog using the figure above as reference, and click Apply.
Figure 10-3: Web Interface - Remote Web Services – HTTP Remote Hosts
5. Click the HTTP Remote Hosts link shown in the figure above.
6. In the HTTP Remote Hosts page that opens, click the Add tab.
Figure 10-4: Web Interface - Remote Web Services - HTTP Remote Hosts - Add
7. Define the IP Address of the ARM Topology Server to which you want to point the
device and define the ARM Topology Server settings, and then click Save; wait until
connected.
Figure 10-5: Web Interface – Device Connected to ARM Topology Server
8. Make sure in the Remote Web Services – HTTP Remote Hosts screen shown in the
figure above that the status of the host, i.e., of the ARM Topology Server, is
Connected.
9. Connect to the router/s.
Figure 10-6: Web Interface – Remote Web Services - Routers
10. Make sure that the device is connected to all HTTP ARM services i.e., ARM Topology
Server and router/s, as shown in the figure above.
Figure 10-9: Web Interface – SIP Interfaces Table - Configuring a SIP Interface
Note:
• See also Appendix A.
• 'IP Group' and 'Trunk Group' in the Web are called 'Peer Connection' in the ARM.
Note: After configuring an IP group and then viewing it in the ARM, it is strongly
recommended not to change its unique name. Changing its unique name will prevent
routing by the ARM of calls to this Peer Connection (IP group) and receipt by the ARM
of calls from this Peer Connection (IP group).
7. In the Web interface, open the IP-to-IP Routing page (Setup > Signaling & Media >
SBC > IP-to-IP Routing). The screen below shows an example of two routing rules.
Figure 10-12: Web Interface – IP-to-IP Routing
Figure 10-13: Web Interface – IP-to-IP Routing Table – Add Row – Rule tab
8. Define a 'Name' and for 'Request Type', define INVITE (see Appendix E if you need to
use the ARM to route other SIP Request Types such as MESSAGE or NOTIFY).
Leave all other conditions fields undefined (i.e., No Conditions, or Any).
9. From the 'Destination Type' dropdown, select Routing Server. This rule will serve to
perform routing via the ARM.
10. Leave all other fields undefined, and then click Add.
At this point, your routing service will still be operating according to that defined in the IP-
to-IP Routing page in the SBC's Web interface.
11. In the ARM GUI's Routing page, configure a rule parallel to one of the rules configured
in the Web interface's IP-to-IP Routing page (see Section 8.1).
Figure 10-14: Configuring a Routing Rule in the ARM
12. In the ARM GUI, switch ON the routing rule; rule is now activated in the ARM.
13. In the Web interface, delete the routing rule. The transition is now complete.
14. Perform a Test Route (see Section 8.3 for detailed information).
15. Make a call and make sure it was established by the ARM.
Configure manually using the ini file, or in the Web interface's 'Admin' page, configure
'SendAcSessionIDHeader' = 1 for the SBC/Gateway to preserve the Call ID when a
call passes through multiple SBCs/Gateways.
Note: 'Trunk Group' and 'IP Group' in the Web are called 'Peer Connection' in the ARM.
6. Navigate to the Trunk Group Settings page (Setup > Signaling & Media > Gateway >
Trunk Group Settings) shown in Figure 10-17.
7. Locate the Trunk Group to expose the enterprise network to the ARM environment.
8. [Mandatory] Enter a unique name for the Trunk Group.
9. Set the 'Used by Routing Server' parameter to Used, and then click Apply.
Figure 10-17: Web Interface - Trunk Group Settings
10. In the ARM GUI, make sure the device is displayed in the Network page, Map view.
Make sure the Peer Connection you configured is displayed. Unlock it and make sure
its color is green.
Note: After viewing the trunk group or IP Group in the ARM, it is strongly recommended
not to change its unique name. Changing its unique name will prevent routing by the
ARM of calls to this Peer Connection (trunk / IP group) and receipt by the ARM of calls
from this Peer Connection (trunk / IP group).
At this point, your routing service will still be operating according to that defined in the Tel-
to-IP Routing and IP-to-Tel Routing pages in the gateway's Web interface.
11. In the ARM GUI's Routing page, configure a rule parallel to one of the rules configured
in the Web interface's Tel-to-IP Routing or IP-to-Tel Routing pages.
12. Unlock the configured gateway Routing Rule in the ARM and check using the Test
Route feature that the rules are functioning as required.
13. Delete the parallel rules configured in the Web interface's Tel-to-IP Routing or IP-to-
Tel Routing pages.
b. From the 'SBC IPv4 SIP Interface' dropdown, select SBC SIP Interface and then
click Apply; the Proxy Sets page opens showing the list of proxy sets, including
the proxy set you added.
Figure 10-19: Proxy Sets
5. From the Proxy Sets list shown in the figure above, select the proxy set you added
and then click the Proxy Address link.
a. Enter the Proxy IP Address in the format <IPAddress>:Port. This address must
point to the Gateway SIP interface address so a loop between the SBC SIP
application and the Gateway SIP application is created.
b. Open the IP Groups page (Setup > Signaling & Media > IP Groups), add an IP
Group (click New) and associate it with the Proxy Set you added in Step 4a:
Figure 10-21: IP Group for the SBC Application
b. Select Gateway SIP Interface from the 'Gateway IPv4 SIP Interface' dropdown
and then click Apply; the Proxy Sets page opens showing the list of proxy sets,
including the proxy set you added.
7. From the Proxy Sets list shown in the figure above, select the proxy set you added
and then click the Proxy Address link.
Figure 10-24: Add New Proxy Address
a. Enter the Proxy IP Address in the format <IPAddress>:Port. This address must
point to the SBC SIP interface address so a loop between the Gateway SIP
application and the SBC SIP application is created.
b. Open the IP Groups page (Setup > Signaling & Media > IP Groups), add an IP
Group (click New) and associate it with the Proxy Set you added:
Figure 10-25: IP Group for the SBC Application
8. Click Apply. Check in the ARM that calls can be routed to and from the hybrid device.
Note: The screenshots shown in this section are of Web interface version 7.2. If you're
using Web interface version 7.0 or earlier, refer to earlier versions of this document.
What should be
Item SBC-Level
viewed in the ARM
1 Configure the SBC in the way you used to, including all the IP Groups Unrelated to ARM
for connectivity with external SIP trunks and PBXs.
2 Configure the IP address of the ARM's 'Configurator' View the new Node.
Note: Do not configure Routers independently. Only configure Make sure it
'Configurator' IP address and credentials: becomes green-
Configure in the SBC's Web interface (Setup > IP Network > Web coded, indicating
Services > Remote Web Services): that it's available.
IP address of the Configurator
User name and Password for connecting to the Configurator.
Default: Admin/Admin
What should be
Item SBC-Level
viewed in the ARM
3 Choose the SIP interfaces you want to use in the ARM (for ARM Peer You're able to select
Connections and ARM Connections) to be 'Used by Routing Server'. the chosen SIP
Open the SBC Web interface (Setup > Signaling & Media > Core Interfaces as ARM
Entities > SIP Interfaces) 'Routing Interfaces'
for ARM
Connections
between the Nodes
(SBCs)
4 Select each IP Group you want to use in the ARM as a Peer View the selected IP
Connection for routing, to be Used by Routing Server. These should Groups as ARM
be, for example, SIP trunks and connections to IP PBXs. Peer Connections
Open the IP Groups page (Setup > Signaling & Media > Core and attached VoIP
Entities > IP Groups). Peers.
View their availability
status (green/red).
In the ARM, unlock
these Peer
connections.
What should be
Item SBC-Level
viewed in the ARM
5 At this stage, the ARM does not route calls, though you can apply a In the ARM you can
‘test route’ at the ARM level. The Node (SBC) does not send a routing now:
request to the ARM after a SIP invite. View and create
ARM topology
(connections
between the
Nodes)
Add ARM routing
groups and
Routing rules,
manipulation
groups, etc.
Test yourself
using the ARM's
‘test route’
6 Command the SBC to route calls using the ARM: Calls are now routed
Open the SBC Web interface IP-to-IP Routing (Setup > Signaling by the ARM:
& Media > SBC > IP-to-IP Routing). SBC gets an
Make sure the rule that routes all INVITE requests to the ARM is INVITE
configured. The following parameters are mandatory: 'Request Sends routing
Type' = INVITE; 'Destination Type' = Routing Server. Request to ARM
Get reply from
ARM
Sends INVITE
further according
to the ARM's
instructions
7 Configure manually using the ini file (or in the 'Admin' Web interface Causes the SBC to
page): SendAcSessionIDHeader = 1 preserve Call ID
when a call passes
through several
SBCs.
B Prefixes
The table below describes the prefixes rules.
Table B-1: Prefixes
Skype for Business: Remove “tel:” from the prefix and any text from the number's
suffix. In the Test field, the full number is tel:+97239762938 (ext:2938).
If the fourth digit from the right is 4, change it to 8, and if the first digit is 0, change it to
+972.
D Call Routing
This appendix describes call routing.
A routing request results in an HTTP error response if no routing is available.
A routing request from a source node which has an alternate route option returns the
next alternate route option. The call route is not recalculated. If the alternate route list
is empty, a 404 result is returned.
A routing request from a node which is not the source node returns the next hop in the
routing chain according to the original route selection. The routing logic is not
performed again.
To configure the SBC to send SIP Requests other than INVITE to the ARM:
1. Open the Message Conditions page (Setup > Signaling & Media > Message
Manipulation > Message Conditions) and click Add.
Figure E-1: Web Interface – Message Conditions
2. Add the condition as shown in the figure above, and click Apply.
3. Open the IP-to-IP Routing page (Setup > Signaling & Media > SBC > Routing > IP-
to-IP Routing), select the row of the Routing Rule that directs calls to the ARM, and
click Edit.
Figure E-2: Web Interface – IP-to-IP Routing
CDR Report
CDR Field Description Format
Type
CDR Report
CDR Field Description Format
Type
CDR Report
CDR Field Description Format
Type
10.7.6.36","dstUri":"","dstUriBeforeMap":"101;[email protected]
03","armSetupTime":"","armReleaseTime":"2018-05-
01T06:43:39.957Z","sbcSetupTime":"17:44:32.466 UTC Fri Jan 08
2010","sbcConnectTime":"17:44:35.316 UTC Fri Jan 08
2010","sbcReleaseTime":"17:44:37.077 UTC Fri Jan 08
2010","sbcAlertTime":"17:44:32.575 UTC Fri Jan 08
2010","alertDuration":"2741","voiceDuration":"1760","completeDurat
ion":"4611","sipTerminationReason":"BYE","sipTerminationReasonDesc
":"BYE","routeSeq":-1,"sipInterface":"","legId":2,"path":null}
©2018 AudioCodes Ltd. All rights reserved. AudioCodes, AC, HD VoIP, HD VoIP Sounds Better,
IPmedia, Mediant, MediaPack, What’s Inside Matters, OSN, SmartTAP, User Management Pack,
VMAS, VoIPerfect, VoIPerfectHD, Your Gateway To VoIP, 3GX, VocaNom, AudioCodes One Voice
and CloudBond are trademarks or registered trademarks of AudioCodes Limited. All other products
or trademarks are property of their respective owners. Product specifications are subject to change
without notice.
Document #: LTRT-41887