CISCO IOS XE 17.5 Unified Border Element Configuration Guide Through User Guide
- June 15, 2024
- Cisco
Table of Contents
IOS XE 17.5 Unified Border Element Configuration Guide Through
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5
Last Modified: 2022-08-15
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA
http://www.cisco.com Tel: 408 526-4000
800 553-NETS (6387) Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE
SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND
RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED
WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL
RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET
FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE
INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE
SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A
COPY.
The Cisco implementation of TCP header compression is an adaptation of a
program developed by the University of California, Berkeley (UCB) as part of
UCB’s public domain version of the UNIX operating system. All rights reserved.
Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF
THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-
NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING,
WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE
PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL,
CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST
PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE
THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document
are not intended to be actual addresses and phone numbers. Any examples,
command display output, network topology diagrams, and other figures included
in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and
coincidental.
All printed copies and duplicate soft copies of this document are considered
uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are
listed on the Cisco website at www.cisco.com/go/offices.
The documentation set for this product strives to use bias-free language. For
purposes of this documentation set, bias-free is defined as language that does
not imply discrimination based on age, disability, gender, racial identity,
ethnic identity, sexual orientation, socioeconomic status, and
intersectionality. Exceptions may be present in the documentation due to
language that is hardcoded in the user interfaces of the product software,
language used based on standards documentation, or language that is used by a
referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco
and/or its affiliates in the U.S. and other countries. To view a list of Cisco
trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party
trademarks mentioned are the property of their respective owners. The use of
the word partner does not imply a partnership relationship between Cisco and
any other company. (1721R)
© 2023 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 1 CHAPTER 2 CHAPTER 3 PART I CHAPTER 4
CHAPTER 5
Read Me First 1 Short Description 2
New and Changed Information 3 New and Changed Information 3
Supported Platforms 5 Feature Comparison on Supported Platforms 7
CUBE Fundamentals and Basic Setup 11
Overview of Cisco Unified Border Element 13 Information About Cisco Unified
Border Element 13 SIP/H.323 Trunking 16 Typical Deployment Scenarios for CUBE
17 How to Configure Basic CUBE Features 18 Enabling the CUBE Application on a
Device 19 Verifying the CUBE Application on the Device 21 Configuring a
Trusted IP Address List for Toll-Fraud Prevention 22
Virtual CUBE 25 Feature Information for Virtual CUBE 25 Prerequisites for
Virtual CUBE 26 Hardware 26 Software 26 Features Supported with Virtual CUBE
27
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 iii
Contents
CHAPTER 6 CHAPTER 7
CHAPTER 8
Restrictions 27 Information about Virtual CUBE 27
Media 27 Virtual CUBE Licensing Requirements 28
Virtual CUBE with CSR1000V 28 Virtual CUBE with Catalyst 8000V 28 Install
Virtual CUBE on ESXi 28 How to Enable Virtual CUBE 29 Troubleshooting Virtual
CUBE 29
Dial-Peer Matching 31 Dial Peers in CUBE 31 Configuring Inbound and Outbound
Dial-Peer Matching for CUBE 33 Preference for Dial-Peer Matching 34
DTMF Relay 37 Feature Information for DTMF Relay 37 Information About DTMF
Relay 38 DTMF Tones 38 DTMF Relay 38 Configuring DTMF Relays 41
Interoperability and Priority with Multiple DTMF Relay Methods 42 DTMF
Interoperability Table 42 Verifying DTMF Relay 46
Introduction to Codecs 51 Why CUBE Needs Codecs 51 Restrictions for Voice-
Class Codec Transparent 52 Voice Media Transmission 52 Voice Activity
Detection 53 VoIP Bandwidth Requirements 54 Supported Audio and Video Codecs
56 How to Configure Codecs 57 Configuring Audio and Video Codecs at the Dial
Peer Level 57
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 iv
Contents
CHAPTER 9 CHAPTER 10
Configuring Audio Codecs Using a Codec Voice Class and Preference Lists 59
Configuring Video Codecs Using Codec Voice Class 61 Verifying an Audio Call 62
Configuration Examples for Codecs 62
Call Admission Control 65 Configuring CAC Based on Total Calls, CPU or Memory
65 Example: Internal Error Code (IEC) for Default Call Rejection Based on CPU
Utilization and Memory 67 Configuring CAC Based on Call Spike Detection 67
Configuring CAC Based on Maximum Calls per Destination 68 Bandwidth-Based Call
Admission Control 69 Restrictions for Bandwidth-Based Call Admission Control
70 Information About Bandwidth-Based Call Admission Control 70 Maximum
Bandwidth Calculation 70 Bandwidth Tables 70 How to Configure Bandwidth-Based
Call Admission Control 72 Configuring Bandwidth-Based Call Admission Control
at the Interface Level 72 Configuring Bandwidth-Based Call Admission Control
at the Dial Peer Level 74 Configuring the Bandwidth-Based Call Admission
Control SIP Error Response Code Mapping 75 Verifying Bandwidth-Based Call
Admission Control 77 Troubleshooting Tips 78 Configuration Examples for
Bandwidth-Based Call Admission Control 79 Example: Configuring Bandwidth-Based
Call Admission Control at the Interface Level 79 Example: Configuring
Bandwidth-Based Call Admission Control at the Dial Peer Level 79 Example:
Configuring the Bandwidth-Based Call Admission Control SIP Error Response Code
Mapping at the Global Level 80 Example: Configuring the Bandwidth-Based Call
Admission Control SIP Error Response Code Mapping at the Dial Peer Level 80
Feature Information for Bandwidth-Based Call Admission Control 80
Basic SIP Configuration 83 Prerequisites for Basic SIP Configuration 83
Restrictions for Basic SIP Configuration 83
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 v
Contents
CHAPTER 11 CHAPTER 12
Information About Basic SIP Configuration 84 SIP Register Support 84 SIP
Redirect Processing Enhancement 84 Sending SIP 300 Multiple Choice Messages 85
How to Perform Basic SIP Configuration 85 Configuring SIP VoIP Services on a
Cisco Gateway 86 Shut Down or Enable VoIP Service on Cisco Gateways 86 Shut
Down or Enable VoIP Submodes on Cisco Gateways 86 Configuring SIP Register
Support 87 Configuring SIP Redirect Processing Enhancement 89 Configure Call-
Redirect Processing Enhancement 89 Configuring SIP 300 Multiple Choice
Messages 92 Configuring Sending of SIP 300 Multiple Choice Messages 92
Configuring SIP Implementation Enhancements 93 Interaction with Forking
Proxies 93 SIP Intra-Gateway Hairpinning 94 Verifying SIP Gateway Status 95
General Troubleshooting Tips 99
Configuration Examples for Basic SIP Configuration 101 SIP Register Support
Example 101 SIP Redirect Processing Enhancement Examples 103 SIP 300 Multiple
Choice Messages Example 107
Toll Fraud Prevention 108
SIP Binding 111 Feature Information for SIP Binding 111 Information About SIP
Binding 112 Benefits of SIP Binding 112 Source Address 113 Voice Media Stream
Processing 116 Configuring SIP Binding 118 Verifying SIP Binding 120
Media Path 127
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 vi
Contents
CHAPTER 13
Feature Information for Media Path 127 Media Flow-Through 128
Restrictions for Media Flow-Through 128 Configure Media Flow-Through 129 Media
Flow-Around 130 Configure Media Flow-Around 130 Media Anti-Trombone 131
Prerequisites 132 Restrictions for Media Anti-Tromboning 132 Configuring Media
Anti-Tromboning 132
SIP Profiles 135 Feature Information for SIP Profiles 135 Information About
SIP Profiles 136 Important Characteristics of SIP Profiles 137 Restrictions
for SIP Profiles 139 How to Configure SIP Profiles 139 Configuring a SIP
Profile to Manipulate SIP Request or Response Headers 140 Configuring SIP
Profiles for Copying Unsupported SDP Headers 141 Example: Configuring SIP
Profile Rules (Attribute Passing) 143 Example: Configuring SIP Profile Rules
(Parameter Passing) 143 Example: Configuration to Remove an Attribute 143
Configuring SIP Profile Using Rule Tag 143 Configuring a SIP Profile for Non-
standard SIP Header 145 Upgrading or Downgrading SIP Profile Configurations
147 Configuring a SIP Profile as an Outbound Profile 148 Configuring a SIP
Profile as an Inbound Profile 149 Verifying SIP Profiles 150 Troubleshooting
SIP Profiles 151 Examples: Adding, Modifying, Removing SIP Profiles 152
Example: Adding a SIP, SDP, or Peer Header 152 Example: Modifying a SIP, SDP,
or Peer Header 153 Example: Remove a SIP, SDP, or Peer Header 156 Example:
Inserting SIP Profile Rules 157
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 vii
Contents
CHAPTER 14 CHAPTER 15
CHAPTER 16
Example: Upgrading and Downgrading SIP Profiles automatically 157 Example:
Modifying Diversion Headers 158 Example: Sample SIP Profile Application on SIP
Invite Message 159 Example: Sample SIP Profile for Non-Standard SIP Headers
160 Example: Copy a User-to-User from REFER Message 160
SIP Out-of-Dialog OPTIONS Ping Group 163 Information About SIP Out-Of-dialog
OPTIONS Ping Group 163 SIP Out-of-Dialog OPTIONS Ping Group Overview 163 How
to Configure SIP Out-Of-dialog OPTIONS Ping Group 164 Configuring SIP Out-of-
Dialog OPTIONS Ping Group 164 Configuration Examples For SIP Out-of-Dialog
OPTIONS Ping Group 166 Additional References 168 Feature Information for SIP
Out-of-dialog OPTIONS Ping Group 169
Configure TCL IVR Applications 171 Tcl IVR Overview 171 Tcl IVR Enhancements
172 RTSP Client Implementation 172 TCL IVR Prompts Played on IP Call Legs 173
TCL Verbs 174 TCL IVR Prerequisite Tasks 177 TCL IVR Configuration Tasks List
177 Configuring the Call Application for the Dial Peer 178 Configuring TCL IVR
on the Inbound POTS Dial Peer 180 Configuring TCL IVR on the Inbound VoIP Dial
Peer 182 Verifying TCL IVR Configuration 184 TCL IVR Configuration Examples
185 TCL IVR for Gateway1 (GW1) Configuration Example 185 TCL IVR for GW2
Configuration Example 188
VoIP for IPv6 191 Prerequisites for VoIP for IPv6 191 Restrictions for
Implementing VoIP for IPv6 191
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 viii
Contents
Information About VoIP for IPv6 193 SIP Features Supported on IPv6 193 SIP
Voice Gateways in VoIPv6 194 VoIPv6 Support on Cisco UBE 195
How to Configure VoIP for IPv6 199 Configuring VoIP for IPv6 199 Shutting Down
or Enabling VoIPv6 Service on Cisco Gateways 200 Shutting Down or Enabling
VoIPv6 Submodes on Cisco Gateways 201 Configuring the Protocol Mode of the SIP
Stack 201 Verifying SIP Gateway Status 203 RTCP Pass-Through 205 Configuring
IPv6 Support for Cisco UBE 205 Verifying RTP Pass-Through 206 Configuring the
Source IPv6 Address of Signaling and Media Packets 207 Configuring the SIP
Server 208 Configuring the Session Target 209 Configuring SIP Register Support
210 Configuring Outbound Proxy Server Globally on a SIP Gateway 212
Configuring UDP Checksum 213 Configuring IP Toll Fraud 214 Configuring the RTP
Port Range for an Interface 215 Configuring Message Waiting Indicator Server
Address 216 Configuring Voice Ports 217 Configuring Cisco UBE Mid-call Re-
INVITE Consumption 218 Configuring Passthrough of Mid-call Signalling 218
Configuring Passthrough SIP Messages at Dial Peer Level 219 Configuring H.323
IPv4-to-SIPv6 Connections in a Cisco UBE 220
Configuration Examples for VoIP over IPv6 222 Example: Configuring the SIP
Trunk 222
Troubleshooting Tips for VoIP for IPv6 223 Verifying and Troubleshooting Tips
223
Verifying Cisco UBE ANAT Call Flows 223 Verifying and Troubleshooting Cisco
UBE ANAT Flow-Through Call 225 Verifying Cisco UBE ANAT Flow-Around Calls 230
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 ix
Contents
CHAPTER 17 CHAPTER 18
PART II
Verifying VMWI SIP 235 Verifying SDP Passthrough Configuration 236 Feature
Information for VoIP for IPv6 241
Monitoring of Phantom Packets 247 Restrictions of Monitoring of Phantom
Packets 247 Information About Monitoring of Phantom Packets 248 Monitoring of
Phantom Packets 248 How to Configure Monitoring of Phantom Packets 248
Configuring Monitoring of Phantom Packets 248 Configuration Examples For
Monitoring of Phantom Packets 250 Additional References for Configurable Pass-
Through of SIP INVITE Parameters 250 Feature Information for Monitoring of
Phantom Packets 251
Configurable SIP Parameters via DHCP 253 Finding Feature Information 253
Prerequisites for Configurable SIP Parameters via DHCP 253 Restrictions for
Configurable SIP Parameters via DHCP 254 Information About Configurable SIP
Parameters via DHCP 254 How to Configure SIP Parameters via DHCP 258
Configuring the DHCP Client 258 Configuring the DHCP Client Example 259
Enabling the SIP Configuration 260 Enabling the SIP Configuration Example 261
Troubleshooting Tips 261 Configuring a SIP Outbound Proxy Server 262
Configuring a SIP Outbound Proxy Server in Voice Service VoIP Configuration
Mode 262 Configuring a SIP Outbound Proxy Server in Voice Service VoIP
Configuration Mode Example 263 Configuring a SIP Outbound Proxy Server and
Session Target in Dial Peer Configuration Mode 263 Configuring a SIP Outbound
Proxy Server in Dial Peer Configuration Mode Example 264 Feature Information
for Configurable SIP Parameters via DHCP 265
Dial Peer Enhancements 267
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 x
Contents
CHAPTER 19 CHAPTER 20
CHAPTER 21
Matching Inbound Dial Peers by URI 269 Configuring an Inbound Dial Peer to
Match on URI 269 Examples for Configuring an Inbound Dial Peer to Match on a
URI 271
URI-Based Dialing Enhancements 273 Feature Information for URI-Based Dialing
Enhancements 273 Information About URI-Based Dialing Enhancements 274 Call
Flows for URI-Based Dialing Enhancements 274 How to Configure URI-Based
Dialing Enhancements 277 Configuring Pass Through of SIP URI Headers 277
Configuring Pass Though of Request URI and To Header URI (Global Level) 277
Configuring Pass Though of Request URI and To Header URI (Dial Peer Level) 278
Configuring Pass Through of 302 Contact Header 279 Configuring Pass Through of
302 Contact Header (Global Level) 279 Configuring Pass Through of 302 Contact
Header (Dial Peer Level) 280 Deriving of Session Target from URI 282
Configuration Examples for URI-Based Dialing Enhancements 284 Example:
Configuring Pass Though of Request URI and To Header URI 284 Example:
Configuring Pass Though of Request URI and To Header URI (Global Level) 284
Example: Configuring Pass Though of Request URI and To Header URI (Dial Peer
Level) 284 Example: Configuring Pass Through of 302 Contact Header 284
Example: Configuring Pass Through of 302 Contact Header (Global Level) 284
Example: Configuring Pass Through of 302 Contact Header (Dial Peer Level) 284
Example: Deriving Session Target from URI 285 Additional References for URI-
Based Dialing Enhancements 285
Multiple Pattern Support on a Voice Dial Peer 287 Feature Information for
Multiple Pattern Support on a Voice Dial Peer 287 Restrictions for Multiple
Pattern Support on a Voice Dial Peer 288 Information About Multiple Pattern
Support on a Voice Dial Peer 288 Configuring Multiple Pattern Support on a
Voice Dial Peer 288 Verifying Multiple Pattern Support on a Voice Dial Peer
290 Configuration Examples for Multiple Pattern Support on a Voice Dial Peer
292
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xi
Contents
CHAPTER 22 CHAPTER 23 CHAPTER 24 CHAPTER 25
Outbound Dial-Peer Group as an Inbound Dial-Peer Destination 293 Feature
Information for Outbound Dial-Peer Group as an Inbound Dial-Peer Destination
293 Restrictions 294 Information About Outbound Dial-Peer Group as an Inbound
Dial-Peer Destination 294 Configuring Outbound Dial-Peer Group as an Inbound
Dial-Peer Destination 295 Verifying Outbound Dial-Peer Groups as an Inbound
Dial-Peer Destination 297 Troubleshooting Tips 298 Configuration Examples for
Outbound Dial Peer Group as an Inbound Dial-Peer Destination 299
Inbound Leg Headers for Outbound Dial-Peer Matching 303 Feature Information
for Inbound Leg Headers for Outbound Dial-Peer Matching 303 Prerequisites for
Inbound Leg Headers for Outbound Dial-Peer Matching 304 Restrictions for
Inbound Leg Headers for Outbound Dial-Peer Matching 304 Information About
Inbound Leg Headers for Outbound Dial-Peer Matching 305 Configuring Inbound
Leg Headers for Outbound Dial-Peer Matching 305 Verifying Inbound Leg Headers
for Outbound Dial-Peer Matching 308 Configuration Example: Inbound Leg Headers
for Outbound Dial-Peer Matching 310
Server Groups in Outbound Dial Peers 313 Feature Information for Configuring
Server Groups in Outbound Dial Peers 313 Information About Server Groups in
Outbound Dial Peers 314 How to Configure Server Groups in Outbound Dial Peers
315 Configuring Server Groups in Outbound Dial Peers 315 Verifying Server
Groups in Outbound Dial Peers 318 Configuration Examples for Server Groups in
Outbound Dial Peers 319
Domain-Based Routing Support on the Cisco UBE 323 Feature Information for
Domain-Based Routing Support on the Cisco UBE 323 Restrictions for Domain-
Based Routing Support on the Cisco UBE 324 Information About Domain-Based
Routing Support on the Cisco UBE 324 How to Configure Domain-Based Routing
Support on the Cisco UBE 325 Configuring Domain-Based Routing at Global Level
325 Configuring Domain-Based Routing at Dial Peer Level 326
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xii
Contents
CHAPTER 26
PART III CHAPTER 27
Verifying and Troubleshooting Domain-Based Routing Support on the Cisco UBE
327 Configuration Examples for Domain-Based Routing Support on the Cisco UBE
330
Example Configuring Domain-Based Routing Support on the Cisco UBE 330
ENUM Enhancement per Kaplan Draft RFC 331 Feature Information for ENUM
Enhancement per Kaplan Draft RFC 331 Restrictions for ENUM Enhancement per
Kaplan Draft RFC 332 Information About ENUM Enhancement per Kaplan Draft RFC
333 How to Configure ENUM Enhancement per Kaplan Draft RFC 333 Enabling
Source-Based Routing 333 Testing the ENUM Request 334 Verifying the ENUM
Request 334 Troubleshooting Tips 336 Configuration Examples for ENUM
Enhancement per Kaplan Draft RFC 336
Multi-Tenancy 339
Support for Multi-VRF 341 Feature Information for VRF 341 Information About
Voice-VRF 343 Information About Multi-VRF 343 VRF Preference Order 344
Restrictions 344 Recommendations 345 Configuring VRF 345 Create a VRF 346
Assign Interface to VRF 347 Create Dial-peers 348 Bind Dial-peers 349
Configure VRF-Specific RTP Port Ranges 351 Example: VRF with overlapping and
non-overlapping RTP Port Range 353 Directory Number (DN) Overlap across
Multiple-VRFs 354 Example: Associating Dial-peer Groups to Overcome DN Overlap
355 IP Overlap with VRF 356
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xiii
Contents
CHAPTER 28 PART IV CHAPTER 29
CHAPTER 30
Using Server Groups with VRF 358 Inbound Dial-Peer Matching Based on Multi-VRF
359
Example: Inbound Dial-Peer Matching based on Multi-VRF 359 VRF Aware DNS for
SIP Calls 361 High Availability with VRF 362 Configuration Examples 362
Example: Configuring Multi-VRF in Standalone Mode 362 Example: Configuring RG
Infra High Availability with VRF 366 Example: Configuring HSRP High
Availability with VRF 373 Example: Configuring Multi VRF where Media Flows
Around the CUBE 380 Example: Configuring Multi VRF where Media Flows Through
the CUBE 388 Troubleshooting Tips 393
Configuring Multi-Tenants on SIP Trunks 395 Feature Information for
Configuring Multi-Tenants on SIP Trunks 395 Information About Configuring
Multi-tenants on SIP Trunks 395 How to Configure Multi-Tenants on SIP Trunks
399 Configuring Multi-Tenants on SIP Trunks 399 Example: SIP Trunk
Registration in Multi-Tenant Configuration 401
Codecs 403
Codec Support and Restrictions 405 Feature Information for Codec Support on
CUBE 405 OPUS Codec Support on CUBE 406 Design Recommendations for Opus Codec
406 Restrictions for Opus Codec Support on CUBE 407 ISAC Codec Support on CUBE
408 Restrictions for ISAC Codec Support on CUBE 408 AAC-LD MP4A-LATM Codec
Support on Cisco UBE 408 Restrictions for AAC-LD MP4A-LATM Codec Support on
Cisco UBE 409
Codec Preference Lists 411 Feature Information for Negotiation of an Audio
Codec from a List of Codecs 411
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xiv
Contents
PART V CHAPTER 31
CHAPTER 32 CHAPTER 33
Codecs Configured Using Preference Lists 412 Prerequisites for Codec
Preference Lists 412 Restrictions for Codecs Preference Lists 413 How to
Configure Codec Preference Lists 413
Configuring Audio Codecs Using a Codec Voice Class and Preference Lists 413
Disabling Codec Filtering 415 Troubleshooting Negotiation of an Audio Codec
from a List of Codecs 416 Verifying Negotiation of an Audio Codec from a List
of Codecs 417
DSP Services 421
Transcoding 423 Configure LTI-Based Transcoding 424 Configuration Examples for
LTI Based Transcoding 426 Configuring SCCP-based Transcoding (ISR-G2 devices
only) 428 TLS for SCCP Connection for DSP Services 431 Configuring Secure
Transcoding 431 Configuring the Certificate Authority 431 Configuring a
Trustpoint for the Secure Universal Transcoder 432 Configuring DSPFARM
Services 434 Associating SCCP to the Secure DSPFARM Profile 434 Registering
the Secure Universal Transcoder to the CUBE 437 Configuration Examples for
SCCP Based Transcoding 439
Transrating 441 Configuring Transrating for a Codec 441
Call Progress Analysis Over IP-to-IP Media Session 443 Feature Information for
Call Progress Analysis Over IP-IP Media Session 443 Restrictions for Call
Progress Analysis Over IP-to-IP Media Session 444 Information About Call
Progress Analysis Over IP-IP Media Session 445 Call Progress Analysis 445 CPA
Events 445 How to Configure Call Progress Analysis Over IP-to-IP Media Session
446
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xv
Contents
CHAPTER 34 CHAPTER 35
PART VI CHAPTER 36
Enabling CPA and Setting the CPA Parameters 446 Verifying the Call Progress
Analysis Over IP-to-IP Media Session 448 Troubleshooting Tips 449
Configuration Examples for the Call Progress Analysis Over IP-to-IP Media
Session 449 Example: Enabling CPA and Setting the CPA Parameters 449
Voice Packetization 451 Configuring Transrating for a Codec 451
Fax Detection for SIP Call and Transfer 453 Restrictions for Fax Detection for
SIP Call and Transfer On Cisco IOS XE 453 Information About Fax Detection for
SIP Call and Transfer 453 Local Redirect Mode 454 Refer Redirect Mode 455 Fax
Detection with Cisco IOS XE High Availability 456 How to Configure Fax
Detection for SIP Calls 456 Configure DSP Resource to Detect Fax Tone 456
Dial-peer Configuration to Redirect Fax Call 457 Verifying Fax Detection for
SIP Calls 459 Troubleshooting Fax Detection for SIP Calls 460 Configuration
Examples for Fax Detection for SIP Calls 460 Example: Configuring Local
Redirect 460 Example: Configuring Refer Redirect 461 Feature Information for
Fax Detection for SIP Call and Transfer 461
Video 463
Video Suppression 465 Feature Information for Video Suppression 465
Restrictions 465 Information About Video Suppression 466 Feature Behavior 466
Configuring Video Suppression 466 Troubleshooting Tips 467
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xvi
Contents
PART VII CHAPTER 37 PART VIII CHAPTER 38
CHAPTER 39
Media Services 469
Configuring RTCP Report Generation 471 Prerequisites 471 Restrictions 471
Configuring RTCP Report Generation on Cisco UBE 472 Troubleshooting Tips 473
Feature Information for Configuring RTCP Report Generation 474
Media Recording 477
Network-Based Recording 479 Feature Information for Network-Based Recording
479 Restrictions for Network-Based Recording 480 Information About Network-
Based Recording Using CUBE 481 Deployment Scenarios for CUBE-based Recording
481 Open Recording Architecture 482 Network Layer 483 Capture and Media
Processing Layer 483 Application Layer 483 Media Forking Topologies 484 Media
Forking with Cisco UCM 484 Media Forking without Cisco UCM 484 SIP Recorder
Interface 484 Metadata 484 How to Configure Network-Based Recording 485
Configuring Network-Based Recording (with Media Profile Recorder) 485
Configuring Network-Based Recording (without Media Profile Recorder) 488
Verifying the Network-Based Recording Using CUBE 490 Additional References for
Network-Based Recording 505
SIPREC (SIP Recording) 507 Feature Information for SIPREC-based Recording 507
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xvii
Contents
CHAPTER 40
Prerequisites for SIPREC Recording 508 Restrictions for SIPREC Recording 508
Information About SIPREC Recording Using CUBE 509
Deployment 509 SIPREC High Availability Support 510 How to Configure SIPREC-
Based Recording 510 Configuring SIPREC-Based Recording (with Media Profile
Recorder) 510 Configuring SIPREC-Based Recording (without Media Profile
Recorder) 513 Configuration Examples for SIPREC-based Recording 515 Example:
Configuring SIPREC-based Recording with Media Profile Recorder 515 Example:
Configuring SIPREC-based Recording without Media Profile Recorder 516 Validate
SIPREC Functionality 516 Troubleshoot 517 Configuration Example for Metadata
Variations with Different Mid-call Flows 521 Example: Complete SIP Recording
Metadata Information Sent in INVITE or Re-INVITE 521 Example: Hold with Send-
only / Recv-only Attribute in SDP 524 Example: Hold with Inactive Attribute in
SDP 527 Example: Escalation 529 Example: De-escalation 531 Configuration
Example for Metadata Variations with Different Transfer Flows 534 Example:
Transfer of Re-INVITE/REFER Consume Scenario 534 Configuaration Examples for
Metadata Variations with Caller-ID UPDATE Flow 535 Example: Caller-ID UPDATE
Request and Response Scenario 535 Configuration Example for Metadata
Variations with Call Disconnect 536 Example: Disconnect while Sending Metadata
with BYE 536
Video Recording – Additional Configurations 537 Feature Information for Video
Recording – Additional Configurations 537 Information About Additional
Configurations for Video Recording 538 Full Intra-Frame Request 538 How to
Configure Additional Configurations for Video Recording 538 Enabling FIR for
Video Calls (Using RTCP of SIP INFO) 538 Configuring H.264 Packetization Mode
539 Monitoring Reference files or Intra Frames 540
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xviii
Contents
CHAPTER 41 CHAPTER 42
Verifying Additional Configurations for Video Recording 541
Third-Party GUID Capture for Correlation Between Calls and SIP-based Recording
543 Feature Information for Third-Party GUID Capture for Correlation Between
Calls and SIP-based Recording 543 Restrictions for Third-Party GUID Capture
for Correlation Between Calls and SIP-based Recording 544 Information About
Third-Party GUID Capture for Correlation Between Calls and SIP-based recording
544 How to Capture Third-Party GUID for Correlation Between Calls and SIP-
based Recording 544 Verifying Third-Party GUID Capture for Correlation Between
Calls and SIP-based Recording 547 Configuration Examples for Third-Party GUID
Capture for Correlation Between Calls and SIP-based Recording 548
Cisco Unified Communications Gateway Services–Extended Media Forking 551
Feature Information for Cisco Unified Communications Gateway Services–Extended
Media Forking 551 Restrictions for Extended Media Forking 552 Information
About Cisco Unified Communications Gateway Services 552 Extended Media Forking
(XMF) Provider and XMF Connection 552 XMF Call-Based Media Forking 553 XMF
Connection-Based Media Forking 554 Extended Media Forking API with
Survivability TCL 554 Media Forking for SRTP Calls 555 Crypto Tag 555 Example
of SDP Data sent in an SRTP Call 556 Multiple XMF Applications and Recording
Tone 556 Forking Preservation 558 How to Configure UC Gateway Services 558
Configuring Cisco Unified Communication IOS Services on the Device 558
Configuring the XMF Provider 561 Verifying the UC Gateway Services 562
Troubleshooting Tips 565 Configuration Examples for UC Gateway Services 565
Example: Configuring Cisco Unified Communication IOS Services 565
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xix
Contents
PART IX CHAPTER 43
Example: Configuring the XMF Provider 566 Example: Configuring UC Gateway
Services 566
CUBE Media Proxy 567
CUBE Media Proxy 569 Feature Information for CUBE Media Proxy 569 Supported
Platforms 570 Restrictions for CUBE Media Proxy 570 CUBE Media Proxy Using
Unified CM Network-Based Recording 571 SIPREC-Based CUBE Media Proxy 571 About
Multiple Media Forking Using CUBE Media Proxy 571 Secure Forking of Secure and
Nonsecure Calls 572 Deployment Scenarios for CUBE Media Proxy 572 CUBE Media
Proxy Using Unified CM Network-Based Recording 572 SIPREC-Based CUBE Media
Proxy 574 Recording Metadata 575 Session Identifier 577 Session-ID Handling
577 Recording State Notification 579 SIP Info Messages from CUBE Media Proxy
to Unified CM 579 SIP Info Message Sent During the Initial Call 580 SIP Info
Message Sent During the Initial Call (All the Recorders as Optional) 580 SIP
Info Message Sent During the Initial Call (One Recorder as Mandatory and
Remaining as Optional) 581 How to Configure CUBE Media Proxy 582 How to
Configure CUBE Media Proxy for Network-Based Recording Solutions 582 Configure
Outbound Dial-Peers to the Recorders 582 Configure CUBE Media Proxy 584
Configure Inbound Dial-Peer from Unified CM 586 How to Configure CUBE Media
Proxy for SIPREC Solutions 587 Verification of CUBE Media Proxy Configuration
587 Supported Features 598 Mid-Call Message Handling 598
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xx
Contents
PART X CHAPTER 44 CHAPTER 45
CHAPTER 46
PART XI CHAPTER 47
Secure Recording of Secure Calls and Nonsecure Calls 598 Support for High
Availability 599 Media Latch 599
SIP Header Manipulation 601
Passing Headers Unsupported by CUBE 603 Feature Information for Copying with
SIP Profiles 603 Example: Passing a Header Not Supported by CUBE 603
Copying SIP Headers 605 Feature Information for Copying with SIP Profiles 605
How to Copy SIP Header Fields to Another 606 Copying From an Incoming Header
and Modifying an Outgoing Header 606 Copying From One Outgoing Header to
Another 608 Example: Copying the To Header into the SIP-Req-URI 609
Manipulate SIP Status-Line Header of SIP Responses 611 Feature Information for
Manipulating SIP Responses 611 Copying Incoming SIP Response Status Line to
Outgoing SIP Response 612 Modifying Status-Line Header of Outgoing SIP
Response with User Defined Values 615
Payload Type Interoperability 617
Dynamic Payload Type Interworking for DTMF and Codec Packets for SIP-to-SIP
Calls 619 Feature Information for Dynamic Payload Type Interworking for DTMF
and Codec Packets for SIP-to-SIP Calls 619 Restrictions for Dynamic Payload
Type Interworking for DTMF and Codec Packets for SIP-to-SIP Calls 620
Symmetric and Asymmetric Calls 620 High Availability Checkpointing Support for
Asymmetric Payload 621 How to Configure Dynamic Payload Type Passthrough for
DTMF and Codec Packets for SIP-to-SIP Calls 622 Configuring Dynamic Payload
Type Passthrough at the Global Level 622
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xxi
Contents
PART XII CHAPTER 48
CHAPTER 49 CHAPTER 50
Configuring Dynamic Payload Type Passthrough for a Dial Peer 623 Verifying
Dynamic Payload Interworking for DTMF and Codec Packets Support 624
Troubleshooting Tips 624 Configuration Examples for Assymetric Payload
Interworking 625 Example: Asymmetric Payload Interworking–Passthrough
Configuration 625 Example: Asymmetric Payload Interworking–Interworking
Configuration 626
Protocol Interworking 627
Delayed-Offer to Early-Offer 629 Feature Information for Delayed-Offer to
Early-Offer 629 Prerequisites for Delayed-Offer to Early-Offer 630
Restrictions for Delayed-Offer to Early-Offer Media Flow-Around 630 Delayed-
Offer to Early-Offer in Media Flow-Around Calls 630 Configuring Delayed Offer
to Early Offer 631 Configuring Delayed Offer to Early Offer for Video Calls
632 Configuring Delayed Offer to Early Offer Medial Flow-Around 633 MidCall
Renegotiation Support for Delayed-Offer to Early-Offer Calls 634 Restrictions
for MidCall Renegotiation Support for DO-EO Calls 635 Configuring Mid Call
Renegotiation Support for Delayed-Offer to Early-Offer Calls 635 High-Density
Transcoding Calls in Delayed-Offer to Early-Offer 636 Restrictions for High-
Density Transcoding DO-EO Calls 637 Configuring High-Density Transcoding 637
H.323-to-SIP Interworking on CUBE 639 Prerequisites 639 Restrictions 639 H.323
-to-SIP Basic Call Interworking 640 H.323-to-SIP Supplementary Features
Interworking 642 H.323-to-SIP Codec Progress Indicator Interworking for Media
Cut-Through 643 Configuring H.323-to-SIP Interworking 643
H.323-to-H.323 Interworking on CUBE 645 Feature Information for H.323-to-H.323
Interworking 645
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xxii
Contents
CHAPTER 51
PART XIII CHAPTER 52
Prerequisites 646 Restrictions 646 Slow Start to Fast-Start Interworking 646
Restrictions for Slow-Start and Fast-Start Interworking 647 Enabling
Interworking between Slow Start and Fast Start 647 Call Failure Recovery
(Rotary) 648 Enabling Call Failure Recovery (Rotary) without Identical Codec
Configuration 648 Managing H.323 IP Group Call Capacities 649 Configuration
Examples for Managing H.323 IP Group Call Capacities 651 Overlap Signaling 654
Configuring Overlap Signaling 654 Verifying H.323-to-H.323 Interworking 655
Troubleshooting H.323-to-H.323 Interworking 657
SIP RFC 2782 Compliance with DNS SRV Queries 659 Prerequisites SIP RFC 2782
Compliance with DNS SRV Queries 659 Information SIP RFC 2782 Compliance with
DNS SRV Queries 659 How to Configure SIP-RFC 2782 Compliance with DNS SRV
Queries 660 Configuring DNS Server Query Format RFC 2782 Compliance with DNS
SRV Queries 660 Configuring DNS Server Lookups 661 Verifying 663 Feature
Information for SIP RFC 2782 Compliance with DNS SRV Queries 663
Support for SRTP 665
SRTP-SRTP Interworking 667 Feature Information for SRTP-SRTP Interworking 667
Prerequisites for SRTP-SRTP Interworking 668 Restrictions for SRTP-SRTP
Interworking 668 Information About SRTP-SRTP Interworking 668 Supplementary
Services Support 669 How to Configure SRTP-SRTP Interworking 670 Configuring
SRTP 670 Configuring Cipher Suite Preference (optional) 672
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xxiii
Contents
CHAPTER 53 CHAPTER 54
Applying Crypto Suite Selection Preference (optional) 673 Enabling SRTP
Fallback 675 Configuration Examples 678 Example: Configuring SRTP-SRTP
Interworking 678 Example: Changing the Cipher-Suite Preference 680
SRTP-RTP Interworking 683 Feature Information for SRTP-RTP Interworking 683
Prerequisites for SRTP-RTP Interworking 684 Restrictions for SRTP-RTP
Interworking 684 Information About SRTP-RTP Interworking 684 Support for SRTP-
RTP Interworking 684 Using SRTP-RTP Chain for Interworking Between
AES_CM_128_HMAC_SHA1_32 and AES_CM_128_HMAC_SHA1_80 Crypto Suites 686
Supplementary Services Support 687 How to Configure Support for SRTP-RTP
Interworking 688 Configuring SRTP-RTP Interworking Support 688 Configuring
Crypto Authentication 690 Enabling SRTP Fallback 692 Troubleshooting Tips 694
Verifying SRTP-RTP Supplementary Services Support 694 Configuration Examples
for SRTP-RTP Interworking 695 Example: SRTP-RTP Interworking 695 Example:
Configuring Crypto Authentication 696 Example: Configuring Crypto
Authentication (Dial Peer Level) 696 Example: Configuring Crypto
Authentication (Global Level) 696
SRTP-SRTP Pass-Through 697 Feature Information for Support of SRTP-SRTP Pass-
Through Calls 697 Information About SRTP-SRTP Pass-Through 698 Pass-Through of
Unsupported Crypto Suites 698 Configure Pass-Through of Unsupported Crypto
Suites for a Specific Dial Peer 699 Configure Pass-Through of Unsupported
Crypto Suites Globally 701 Configuration Examples for SRTP-SRTP Pass-Through
702
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xxiv
Contents
PART XIV CHAPTER 55
CHAPTER 56
High Availability 705
High Availability on Cisco 4000 Series ISR and Cisco Catalyst 8000 Series Edge
Platforms 707 About CUBE High Availability on Cisco 4000 Series ISR and Cisco
Catalyst 8000 Series Edge Platforms 707 Box-to-Box Redundancy 707 Redundancy
Group (RG) Infrastructure 708 Network Topology 708 Considerations and
Restrictions 710 Considerations 710 Restrictions 711 How to Configure CUBE
High Availability on Cisco 4000 Series ISR and Cisco Catalyst 8000 Series Edge
Platforms 712 Before You Begin 712 Configure High Availability 713
Configuration Examples 718 Example: Control Interface Protocol Configuration
718 Example: Redundancy Group Protocol Configuration 718 Example: Redundant
Traffic Interface Configuration 718 Verify Your Configuration 718 Troubleshoot
High Availability Issues 726
High Availability on Cisco ASR 1000 Series Aggregation Services Routers 729
About CUBE High Availability on Cisco ASR 1000 Series Routers 729 Inbox
Redundancy 730 Box-to-Box Redundancy 731 Redundancy Group (RG) Infrastructure
731 PROTECTED Mode 732 Network Topology 732 Considerations and Restrictions
734 Considerations 734 Restrictions 735 How to Configure CUBE High
Availability on Cisco ASR 1000 Series Router 736
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xxv
Contents
CHAPTER 57 CHAPTER 58
Before You Begin 736 Configure Inbox High Availability 737 Configure Box-to-
Box High Availability 737 Configuration Examples 743 Verify Your Configuration
749 Verify Redundancy State on Active and Standby Routers 749 Verify Call
State After Switchover 751 Verify SIP IP Address Bindings 754 Verify Current
CPU Use 755 Force a Manual Failover for Testing 755 Troubleshoot High
Availability Issues 756
High Availability on Cisco CSR 1000V or C8000V Cloud Services Routers 759
About vCUBE High Availability on CSR 1000V or C8000V Cloud Services Routers
759 Box-to-Box Redundancy 760 Redundancy Group (RG) Infrastructure 760 Network
Topology 761 Considerations and Restrictions 763 Considerations 764
Restrictions 765 How to Configure vCUBE High Availability on Cisco CSR 1000v
or C8000V 766 Before You Begin 766 Configure High Availability 766
Configuration Example 768 Troubleshoot High Availability Issues 769
High Availability on Cisco Integrated Services Routers (ISR-G2) 771 About CUBE
High Availability on Cisco ISR-G2 771 Box-to-Box Redundancy 771 Hot Standby
Router Protocol (HSRP) 772 Network Topology 772 Configure CUBE High
Availability Using HSRP 773 Verify Redundancy State 784 Verify Call State
After a Switchover 787
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xxvi
Contents
CHAPTER 59 CHAPTER 60
Considerations and Restrictions 790 Considerations 790 Restrictions 791
How to Configure CUBE High Availability on Cisco ISR-G2 791 Before You Begin
791 Configure High Availability 791 Configuration Examples 800 Example
Configuration for Dual-Attached CUBE HSRP Redundancy 800 Example Configuration
for Single-Attached CUBE HSRP Redundancy 803
Verify Your Configurations 805 Verify SIP IP Address Bindings 805 Verify
Current CPU Use 805 Verify the Call Processing During a Switchover 805 Force a
Manual Failover for Testing 806
Troubleshoot High Availability Issues 808
DSP High Availability Support 811 Feature Information for DSP High
Availability Support on CUBE 811 Prerequisites for DSP High Availability 811
Features Supported with DSP High Availability 812 Restrictions for DSP High
Availability 812 Troubleshooting DSP HA Support on CUBE 812 Configuration
Examples for DSP HA 813
Stateful Switchover Between Redundancy Paired Intra- or Inter-box Devices 815
Feature Information for Stateful Switchover Between Redundancy Paired Intra-
or Inter-box Devices 815 Prerequisites for Stateful Switchover Between
Redundancy Paired Intra- or Inter-box Devices 816 Restrictions for Stateful
Switchover Between Redundancy Paired Intra- or Inter-box Devices 817
Information About Stateful Switchover Between Redundancy Paired Intra- or
Inter-box Devices 817 Call Escalation with Stateful Switchover 818 Call De-
escalation with Stateful Switchover 818 Media Forking with High Availability
819 High Availability Protected Mode and Box-to-Box Redundancy for ASR 819
Support for Box-to-Box High Availability with Virtual IP Addresses 820
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5
xxvii
Contents
CHAPTER 61
PART XV CHAPTER 62
Monitoring Call Escalation and De-escalation with Stateful Switchover 820
Monitoring Media Forking with High Availability 822 Verifying the High
Availability Protected Mode 824 Support for REFER and BYE/Also after Stateful
Switch-Over 825 Troubleshooting Tips 825 Example: Configuring the Interfaces
for ISR-G2 Devices 827 Example: Configuring the Interfaces for ASR Devices 827
Example: Configuring SIP Binding 827
CVP Survivability TCL support with High Availability 829 Feature Information
for CVP Survivability TCL support with High Availability 829 Prerequisites 830
Restrictions 830 Recommendations 830 CVP Survivability TCL support with High
Availability 830 Configuring CVP Survivability TCL support with High
Availability 830
ICE-Lite Support on CUBE 831
ICE-Lite Support on CUBE 833 Feature Information for ICE-Lite Support on CUBE
833 Restrictions for ICE-lite Support on CUBE 834 Information About ICE-Lite
Support on CUBE 834 Characteristics 834 ICE Candidate 835 ICE Lite 835 High
Availability Support with ICE 835 How to Configure ICE-Lite Support on CUBE
836 Configuring ICE on the CUBE 836 Verifying ICE-Lite on the CUBE (Success
Flow Calls) 837 ICE-Lite on CUBE (Error Flow Calls) 840 Troubleshooting ICE-
Lite Support on CUBE 845 Additional References 845
xxviii
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5
Contents
PART XVI CHAPTER 63
CHAPTER 64 CHAPTER 65
SIP Protocol Handling 847
Mid-call Signaling Consumption 849 Feature Information for Mid-call Signaling
849 Prerequisites 850 Mid-call Signaling Passthrough – Media Change 850
Restrictions for Mid-Call Signaling Passthrough – Media Change 851 Behavior of
Mid-call Re-INVITE Consumption 851 Configuring Passthrough of Mid-call
Signalling 853 Example Configuring Passthrough SIP Messages at Dial Peer Level
854 Example Configuring Passthrough SIP Messages at the Global Level 854 Mid-
call Signaling Block 854 Restrictions for Mid-Call Signaling Block 854
Blocking Mid-Call Signaling 855 Example Blocking SIP Messages at Dial Peer
Level 856 Example: Blocking SIP Messages at the Global Level 856 Mid Call
Codec Preservation 857 Configuring Mid Call Codec Preservation 857 Example:
Configuring Mid Call Codec Preservation at the Dial Peer Level 858 Example:
Configuring Mid Call Codec Preservation at the Global Level 858
Early Dialog UPDATE Block 859 Feature Information for Early Dialog UPDATE
Block 859 Prerequisites 860 Restrictions 860 Information about Early Dialog
UPDATE Block 860 Important Characteristics of Early Dialog UPDATE Block 860
Configuring Early Dialog UPDATE Block 861 Configuring Early Dialog UPDATE
Block Renegotiate 862 Troubleshooting Tips 863
Consumption of Forked 18x Responses with SDP During Early Dialog 865
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xxix
Contents
CHAPTER 66 CHAPTER 67
PART XVII
Feature Information for Consumption of Multiple Forked 18x Responses with SDP
During Early Dialog 865
Prerequisites 866 Restrictions 866 Information About Consumption of Forked 18x
Responses with SDP During Early Dialog 866
Characteristics of Forked 18x Responses with SDP during Early Dialog 866
Configuring Consumption of Forked 18x Responses with SDP During Early Dialog
867 Configuring Consumption of Forked 18x Responses with SDP During Early
Dialog Renegotiate 868 Troubleshooting Tips 870
Support for Pass-Through of Unsupported Content Types in SIP INFO Messages 871
Feature Information 871 Configure SIP INFO Message with Unsupported Content
Type 871 Information About Pass-Through of Unsupported Content Types in SIP
INFO Messages 872
Support for PAID PPID Privacy PCPID and PAURI Headers on the Cisco Unified
Border Element 873 Feature Information for PAID PPID Privacy PCPID and PAURI
Headers on the Cisco Unified Border Element 883 Prerequisites for Support for
PAID PPID Privacy PCPID and PAURI Headers on the Cisco Unified Border Element
884 Restrictions for Support for PAID PPID Privacy PCPID and PAURI Headers on
the Cisco Unified Border Element 885 Configuring P-Header and Random-Contact
Support on the Cisco Unified Border Element 885 Configuring P-Header
Translation on a Cisco Unified Border Element 885 Configuring P-Header
Translation on an Individual Dial Peer 886 Configuring P-Called-Party-Id
Support on a Cisco Unified Border Element 887 Configuring P-Called-Party-Id
Support on an Individual Dial Peer 888 Configuring Privacy Support on a Cisco
Unified Border Element 889 Configuring Privacy Support on an Individual Dial
Peer 890 Configuring Random-Contact Support on a Cisco Unified Border Element
891 Configuring Random-Contact Support for an Individual Dial Peer 893
SIP Supplementary Services 895
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xxx
Contents
CHAPTER 68
CHAPTER 69
PART XVIII CHAPTER 70 CHAPTER 71
Dynamic Refer Handling 897 Feature Information for Dynamic REFER Handling 897
Prerequisites 898 Restrictions 898 Configuring REFER Passthrough with
Unmodified Refer-to 898 Configuring REFER Consumption 900 Troubleshooting Tips
902
Cause Code Mapping 903 Feature Information for Cause Code Mapping 903 Cause
Code Mapping 904 Configuring Cause Code Mapping 905 Verifying Cause Code
Mapping 906
Hosted and Cloud Services 909
Hosted and Cloud Services Delivery with CUBE 911
CUBE SIP Registration Proxy 913 Registration Pass-Through Modes 913 End-to-End
Mode 913 Peer-to-Peer Mode 914 Registration in Different Registrar Modes 915
Registration Overload Protection 916 Registration Overload Protection–Call
Flow 916 Registration Rate-limiting 916 Registration Rate-limiting
Success–Call Flow 917 Prerequisites for SIP Registration Proxy on Cisco UBE
917 Restrictions 917 Configuring CUBE SIP Registration Proxy 917 Enabling
Local SIP Registrar 917 Configuring SIP Registration Proxy at the Global Level
919 Configuring SIP Registration Proxy at the Tenant Level 920
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xxxi
Contents
CHAPTER 72
Configuring SIP Registration Proxy at the Dial Peer Level 922 Configuring
Registration Overload Protection Functionality 923 Configuring Cisco UBE to
Route a Call to the Registrar Endpoint 924 Verifying the SIP Registration on
Cisco UBE 925 Configuration Example–CUBE SIP Registration Proxy 926 Feature
Information for CUBE SIP Registration Proxy 927
Survivability for Hosted and Cloud Services 929 Information About
Survivability for Hosted and Cloud Services 929 Advantages of Using CUBE
Survivability Feature 929 Local Fallback 929 Registration Synchronization 930
Registration Through Alias Mapping 930 CUBE when WAN is UP 931 CUBE
Survivability When WAN Is Down 932 How to Configure Survivability for Hosted
and Cloud Services 934 Configuring Local Fallback or Registration
Synchronization Globally 934 Configuring Local Fallback or Registration
Synchronization at the Tenant Level 935 Configuring Local Fallback or
Registration Synchronization on a Dial Peer 936 Configuring Survivability for
Phones Sending Single Register Request 937 Configuring OPTIONS Ping 938
Configuring Registration Timer 939 Configuring the REGISTER Message Throttling
in CUBE 940 Configuring the Class of Restrictions (COR) List 941 Verifying
Survivability for Hosted and Cloud Services 943 Configuration
Examples–Survivability for Hosted and Cloud Services 945 Example: Configuring
Local Fallback Globally 945 Example: Configuring Local Fallback at the Tenant
Level 946 Example: Configuring Local Fallback on a Dial Peer 946 Example:
Configuring Survivability for Phones Sending Single Register Request 946
Example: Configuring OPTIONS Ping 946 Example: Configuring the Registration
Timer 946 Example: Configuring REGISTER Message Throttling 947 Example:
Configuring the COR List 947
xxxii
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5
Contents
CHAPTER 73
PART XIX CHAPTER 74
Feature Information for Survivability for Hosted and Cloud Services 947
SUBSCRIBE-NOTIFY Passthrough 949 Restrictions for SUBSCRIBE-NOTIFY Passthrough
949 Information About SUBSCRIBE-NOTIFY Passthrough 950 SUBSCRIBE-NOTIFY
Passthrough Request Routing 950 SUBSCRIBE-NOTIFY Passthrough Survivability
Mode 951 Configure SUBSCRIBE-NOTIFY Passthrough 951 Configuring an Event List
951 Configuring SUBSCRIBE-NOTIFY Event Passthrough Globally 952 Configuring
SUBSCRIBE-NOTIFY Event Passthrough at the Dial-Peer Level 953 Verifying
SUBSCRIBE-NOTIFY Passthrough 954 Troubleshooting Tips 956 Configuration
Examples for SUBSCRIBE-NOTIFY Passthrough 956 Example: Configuring an Event
List 956 Example: Configuring SUBSCRIBE-NOTIFY Event Passthrough Globally 956
Example: Configuring SUBSCRIBE-NOTIFY Event Passthrough under a Dial Peer 957
Feature Information for SUBSCRIBE-NOTIFY Passthrough 957
Cisco Unified Communications Manager Line-Side Support 959
Cisco Unified Communications Manager Line-Side Support 961 Feature Information
for Cisco Unified Communications Manager Line-Side Support 961 Restrictions
for Cisco Unified Communications Manager Line-Side Support 962 Information
About Cisco Unified Communications Manager Line-Side Support 963 Cisco UBE
Line-Side Deployment 963 Line-Side Deployment Scenarios 963 Line-Side Support
for CUCM on CUBE 964 Configuring a PKI Trustpoint 965 Importing the CUCM and
CAPF Key 966 Creating a CTL File 967 Configuring a Phone Proxy 968 Attaching a
Phone Proxy to a Dial Peer 969 Verifying CUCM Lineside Support 971
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5
xxxiii
Contents
PART XX CHAPTER 75
PART XXI CHAPTER 76
CHAPTER 77
Example: Configuring a PKI Trustpoint 973 Example: Importing the CUCM and CAPF
Key 974 Example: Creating a CTL File 974 Example: Configuring a Phone Proxy
974 Example: Attaching a Phone Proxy to a Dial Peer 974 Example: Configuring
CUCM Secure Line-Side 975 Example: Configuring CUCM Non-Secure Line-Side 977
Security 981
SIP TLS Support on CUBE 983 Feature Information for SIP TLS Support on CUBE
983 Restrictions 984 Information About SIP TLS Support on CUBE 985 Deployment
985 TLS Cipher Suite Category 985 How to Configure SIP TLS Support on CUBE 986
Configuring SIP TLS on CUBE 986 Verifying SIP TLS Configuration 994 SIP TLS
Configuration Examples 995 Example: SIP TLS Configuration 995
Voice Quality in CUBE 1001
CUBE Call Quality Statistics Enhancement 1003 Feature Information for Call
Quality Statistics Enhancement 1003 Restrictions for Call Quality Statistics
Enhancement 1004 Information About Call Quality Statistics Enhancement 1004
How to Configure Call Quality Parameters 1005 Configuring Call Quality
Criteria Parameters 1005 Troubleshooting Call Quality Statistics 1006
Configuration Example for Call Quality Statistics 1007
Voice Quality Monitoring 1009
xxxiv
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5
PART XXII CHAPTER 78
PART XXIII CHAPTER 79
Feature Information for Voice Quality Monitoring 1009 Prerequisites for Voice
Quality Monitoring 1010 Restrictions for Voice Quality Monitoring and Voice
Quality Statistics 1011 Information About Voice Quality Monitoring 1011
VQM Metrics 1012 How to Configure Voice Quality Monitoring 1012
Enabling Media Statistics Globally 1012 Verifying Voice Quality Monitoring
1013 Troubleshooting Tips 1015 Configuration Examples for Voice Quality
Monitoring 1016 Example: Configuring Media Statistics Globally 1016 Example:
CDR Enabled MOS Output 1016
Smart Licensing 1017
CUBE Smart Licensing 1019 Smart License Operation 1019 Smart Software
Licensing Task Flow for CUBE 1021 Obtain the Registration ID Token 1021
Configure Smart Licensing Transport Settings 1021 Associate the Host Platform
with CSSM 1022 Configure CUBE Licensed Features 1022 Verify Smart Licensing
Operation for CUBE 1023 CUBE High Availability Configurations 1027 Smart
Licensing with CUBE Box-to-Box High Availability 1027 Verify Smart Licensing
Operation for Box-to-Box High Availability 1028 Smart Licensing with CUBE
Inbox High Availability 1030 Verify Smart Licensing Operation for Inbox High
Availability 1031 Syslog Messages 1032
Serviceability 1033
VoIP Trace for CUBE 1035 VoIP Trace for CUBE 1035
Contents
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 xxxv
Contents
CHAPTER 80
PART XXIV CHAPTER 81
Prerequisites for Voip Trace 1036 Benefits of VoIP Trace 1036 Guide to using
VoIP Trace Framework 1037 RTP Port Clear 1038 Feature Information for VoIP
Trace 1039
Support for Session Identifier 1041 Feature Information for Session Identifier
Support 1041 Restrictions 1042 Information About Session Identifier 1042
Feature Behavior 1043 Configuring Support for Session Identifier 1043
Troubleshooting Tips 1043
Security Compliance 1051
Common Criteria (CC) and The Federal Information Processing Standards (FIPS)
Compliance 1053 Feature Information for Common Criteria (CC) and the Federal
Information Standards (FIPS) Compliance 1054 Supported Hardware and Software
for Virtual CUBE 1054 Common Criteria Configuration on Cisco CSR 1000v 1054
Enable Common Criteria Mode 1054 SIP TLS Configuration 1055 SIP TLS
Configuration Task Flow 1055 Generate RSA Public Key 1055 Configure
Certificate Authority Server 1056 Configure CSR Trustpoint 1057 Configure Peer
Trustpoint 1058 Add Client Verification Trustpoint 1059 Enforce Strict SRTP
1060 HTTPS TLS Configuration 1061 HTTPS TLS Configuration Task Flow 1061
Prepare Cisco CSR 1000v Router’s HTTP Server to Run in CC Mode 1061 Create
Certificate Map for HTTPS Peer Trustpoint 1062
xxxvi
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5
PART XXV CHAPTER 82
CHAPTER 83
Configure HTTPS TLS Version 1063 Configure Supported Cipher Suites 1064 Apply
Certificate Map to HTTPS Peer Trustpoint 1064 NTP Configuration Restrictions
in Common Criteria Mode 1065 FIPS Configuration on Cisco CSR 1000v 1066
Configuration Requirements for FIPS Compliance 1066
Appendixes 1067
Additional References 1069 Related References 1069 Standards 1070 MIBs 1070
RFCs 1070 Technical Assistance 1072
Glossary 1073 Glossary 1073
Contents
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5
xxxvii
Contents
xxxviii
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5
Read Me First
Important Information
1 C H A P T E R
Note For CUBE feature support information in Cisco IOS XE Bengaluru 17.6.1a and later releases, see Cisco Unified Border Element IOS-XE Configuration Guide.
Note The documentation set for this product strives to use bias-free language.
For purposes of this documentation set, bias-free is defined as language that
does not imply discrimination based on age, disability, gender, racial
identity, ethnic identity, sexual orientation, socioeconomic status, and
intersectionality. Exceptions may be present in the documentation due to
language that is hardcoded in the user interfaces of the product software,
language used based on standards documentation, or language that is used by a
referenced third-party product.
Feature Information Use Cisco Feature Navigator to find information about
feature support, platform support, and Cisco software image support. An
account on Cisco.com is not required.
Related References · Cisco IOS Command References, All Releases
Obtaining Documentation and Submitting a Service Request · To receive timely,
relevant information from Cisco, sign up at Cisco Profile Manager. · To get
the business impact you’re looking for with the technologies that matter,
visit Cisco Services. · To submit a service request, visit Cisco Support. · To
discover and browse secure, validated enterprise-class apps, products,
solutions and services, visit Cisco Marketplace. · To obtain general
networking, training, and certification titles, visit Cisco Press. · To find
warranty information for a specific product or product family, access Cisco
Warranty Finder.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 1
Short Description
Read Me First
· Short Description, on page 2
Short Description
The documentation set for this product strives to use bias-free language. For
purposes of this documentation set, bias-free is defined as language that does
not imply discrimination based on age, disability, gender, racial identity,
ethnic identity, sexual orientation, socioeconomic status, and
intersectionality. Exceptions may be present in the documentation due to
language that is hardcoded in the user interfaces of the product software,
language used based on standards documentation, or language that is used by a
referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco
and/or its affiliates in the U.S. and other countries. To view a list of Cisco
trademarks, go to this URL: https://www.cisco.com/c/en/us/about/
legal/trademarks.html. Third-party trademarks mentioned are the property of
their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 2
2 C H A P T E R
New and Changed Information
· New and Changed Information, on page 3
New and Changed Information
Note
· For detailed information on CUBE features supported on Cisco IOS Releases, Cisco IOS XE 3S Releases,
and Cisco IOS XE Denali 16.3.1 and later Releases, refer to CUBE Cisco IOS Feature Roadmap, CUBE
Cisco IOS XE 3S Feature Roadmap, and CUBE Cisco IOS XE Releases Feature Roadmap respectively.
· For CUBE feature support information for Cisco IOS XE Bengaluru 17.6.1a and later releases, see Cisco Unified Border Element IOS-XE Configuration Guide.
· H.323 protocol is no longer supported from Cisco IOS XE Bengaluru 17.6.1a onwards. Consider using SIP for multimedia applications.
· The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product.
Description
Secure forking of nonsecure calls through Media Proxy
Support for Cisco 8200L Catalyst Edge Series Platforms
Support for VoIP Trace Serviceability Framework
Documented at CUBE Media Proxy, on page 569 Supported Platforms, on page 5 VoIP Trace for CUBE, on page 1035
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 3
New and Changed Information
New and Changed Information
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 4
Supported Platforms
3 C H A P T E R
Note Cisco Cloud Services Router 1000V Series (CSR 1000V) is no longer
supported from Cisco IOS XE Bengaluru 17.4.1a onwards. If you are using CSR
1000V, you have to upgrade to Cisco Catalyst 8000V Edge Software (Catalyst
8000V). For End-of-Life information on CSR 1000V, see End-of-Sale and End-of-
Life Announcement for the Select Cisco CSR 1000v Licenses.
Cisco Unified Border Element is supported on various platforms running on
Cisco IOS Software Releases and Cisco IOS XE Software Releases.
Note For information on migrating from existing Cisco IOS XE 3S releases to the Cisco IOS XE Denali 16.3 release, see Cisco IOS XE Denali 16.3 Migration Guide for Access and Edge Routers
The following table provides information on Cisco router platform support for Cisco Unified Border Element:
Cisco Router Platforms
Cisco Router Models
Cisco IOS Software Releases
Cisco Integrated Cisco 2900 Series Integrated Services Services Generation
Routers 2 Routers (ISR G2) Cisco 3900 Series Integrated Services
Routers
Cisco IOS 12 M and T Cisco IOS 15 M and T 1
Cisco 4000 Series Integrated Services Routers (ISR G3)
Cisco 4321 Integrated Services Routers Cisco 4331 Integrated Services Routers Cisco 4351 Integrated Services Routers
Cisco 4431 Integrated Services Routers
Cisco 4451 Integrated Services Routers
Cisco IOS XE 3S Cisco IOS XE Denali 16.3.1 onwards 2
Cisco 4461 Integrated Services Routers Cisco IOS XE Amsterdam 17.2.1r onwards
Cisco 1000 Series All router models belonging to Cisco 1100 Cisco IOS XE Gibraltar 16.12.1a onwards Integrated Services Integrated Services Routers Routers (ISR)
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 5
Supported Platforms
Cisco Router Platforms
Cisco Router Models
Cisco IOS Software Releases
Cisco Aggregated Services Routers (ASR)
Cisco ASR1001-X Aggregated Services Routers
Cisco ASR1002-X Aggregated Services Routers
Cisco ASR1004 Aggregated Services Routers with RP2
Cisco ASR1006 Aggregated Services Routers with RP2 and ESP40
Cisco IOS XE 3S Cisco IOS XE Denali 16.3.1 onwards
Cisco ASR1006-X Aggregated Services Cisco IOS XE Everest 16.6.1 onwards Routers with RP2 and ESP40
Cisco ASR1006-X Aggregated Services Cisco IOS XE Everest 16.6.1 onwards Routers with RP3 and ESP40/ESP100
Cisco ASR1006-X Aggregated Services Cisco IOS XE Amsterdam 17.3.2 onwards Routers with RP3 and ESP100X
Cisco Cloud Services Routers (CSR)
Cisco Cloud Services Router 1000V series Cisco IOS XE 3.15 onwards Cisco IOS XE Denali 16.3.1 onwards
Cisco Catalyst 8000V Edge Software (Catalyst 8000V)
Cisco Catalyst 8000V Edge Software (Catalyst 8000V)
Cisco IOS XE Bengaluru 17.4.1a onwards
Cisco 8300 Catalyst C8300-1N1S-6T
Edge Series Platforms
C8300-1N1S-4T2X
C8300-2N2S-6T
C8300-2N2S-4T2X
Cisco IOS XE Amsterdam 17.3.2
Cisco 8200 Catalyst C8200-1N-4T Edge Series Platform
Cisco IOS XE Bengaluru 17.4.1a
Cisco 8200L
C8200L-1N-4T
Catalyst Edge Series
Platform
Cisco IOS XE Bengaluru 17.5.1a
1 Support for CUBE on Cisco 2900 Series Integrated Services Routers and Cisco
3900 Series Integrated Services Routers are only up to release 15.7 M.
2 All CUBE features from release 11.5.0 (Cisco IOS XE Release 3.17) and
features introduced in CUBE 11.5.1 on Cisco Integrated Services Generation 2
Routers (ISR G2) are included in CUBE release 11.5.2 for the Cisco IOS XE
based platforms from Cisco IOS XE Denali 16.3.1 onwards.
· Feature Comparison on Supported Platforms , on page 7
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 6
Supported Platforms
Feature Comparison on Supported Platforms
Feature Comparison on Supported Platforms
The following table provides high level details of CUBE features supported on
different platforms.
Note Collaboration feature support on Cisco ISR 4000 Series Routers is available from Cisco IOS XE Release 3.13.1S onwards. Cisco Cloud Services Routers 1000V Series support is available from Cisco IOS XE Release 3.15S onwards.
Table 1: Feature Comparisons for Supported Platforms
Features
Cisco ASR 1000 Series Routers
Cisco ISR G2 Series Routers
Cisco ISR 4000 Series Cisco ISR 1000
Routers
Series Routers
High Availability Implementation
Redundancy Group Hot Standby
Redundancy Group No
Infrastructure
Protocol (HSRP) Infrastructure
Based
Media Forking
Yes (Cisco IOS XE Yes (Cisco IOS Yes (Cisco IOS XE No
Release 3.8S
Relase 15.2 (1) T Release 3.10S
onwards)
onwards
onwards)
DSP Card Type SPA-DSP
PVDM2/PVDM3 PVDM4
No
SM-X-PVDM
Transcoder
No
registered to CUCM
Yes (Exists via SCCP)
Yes (Exists via SCCP No – Cisco IOS XE Release 3.11S onwards)
Transcoder–LTI Yes
Yes
Yes
No
Cisco UC Gateway Yes (Cisco IOS XE Yes (Cisco IOS Yes
Yes
Services API
Release 3.8S
Release 15.2(2)T
onwards)
onwards
Noise Reduction Yes
Yes (Cisco IOS Yes
No
and ASP
Release 15.2(3)T
onwards)
Call Progress Analysis
Yes
Yes
Yes
No
(Cisco IOS XE
Cisco IOS Release Recommended –
Release 3.9S onwards 15.3(2)T onwards; Cisco IOS XE
; Recommended – Recommended Release 3.15S
Cisco IOS XE
-Cisco IOS
Release 3.15S)
Release 15.5(2)T
onwards)
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 7
Feature Comparison on Supported Platforms
Supported Platforms
Features
SRTP-RTP Interworking
CUBE for SP Managed and Hosted Services Unified SRST colocation with CUBE
IPv6
Cisco ASR 1000 Series Routers
Yes – No DSP resources required (Cisco IOS XE Release 3.7S onwards)
Yes
Cisco ISR G2 Series Routers
Cisco ISR 4000 Series Cisco ISR 1000
Routers
Series Routers
Yes – DSP
Yes – No DSP
resources required resources required
(Cisco IOS Release 12.4(22)YB onwards)
Cisco IOS XE Release 3.12S onwards
Yes – No DSP resources required
Yes
Yes
Yes
Not supported Yes
SCCP SRST is supported
SIP SRST is not supported
Yes (Cisco IOS XE Fuji 16.7.1 Release onwards)
Yes. From Cisco IOS XE Bengaluru 17.5.1a
Yes
Yes
Yes
Table 2: Feature Comparisons for Supported Platforms (Contd…)
Features
Cisco CSR 1000V Cisco 8000V Cisco 8300
Cisco 8200
Cisco 8200L
Series Routers Catalyst Series Catalyst Edge Catalyst Edge Catalyst Edge
Edge Platforms Series Platforms Series Platforms Series Platforms
HA
RG
RG
RG
RG
RG
Implementation Infrastructure Infrastructure Infrastructure Infrastructure Infrastructure
Media Forking Yes
Yes
Yes
Yes
Yes
DSP Card Type No
No
NIM-PVDM NIM-PVDM NIM-PVDM
SM-X-PVDM SM-X-PVDM SM-X-PVDM
Transcoder
No
No
Yes (via SCCP) Yes (via SCCP) Yes (via SCCP)
registered to
CUCM
Transcoder–LTI No
No
Yes
Yes
Yes
Cisco UC
Yes
Yes
Yes
Yes
Yes
Gateway
Services API
Noise Reduction No
No
Yes
Yes
Yes
& ASP
Call Progress No
No
Yes
Yes
Yes
Analysis
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 8
Supported Platforms
Feature Comparison on Supported Platforms
Features
Cisco CSR 1000V Cisco 8000V Cisco 8300
Cisco 8200
Cisco 8200L
Series Routers Catalyst Series Catalyst Edge Catalyst Edge Catalyst Edge
Edge Platforms Series Platforms Series Platforms Series Platforms
SRTP-RTP Interworking
Yes – No DSP resources required
(Cisco IOS XE Release 3.15S onwards)
Yes – No DSP resources required
Yes – No DSP resources required
Yes – No DSP resources required
Yes – No DSP resources required
CUBE for SP Yes
Yes
Yes
Yes
Yes
Managed and
Hosted Services
Unified SRST Not supported No colocation with CUBE
Yes
Yes
Yes
IPv6
Yes
Yes
Yes
Yes
Yes
Note For more information on Unified SRST and Unified Border Element Co-
location, see Unified SRST and Unified Border Element Co-location.
Co-location of Cisco Unified Border Element – High Availability (HA) with
Unified SRST is not supported.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 9
Feature Comparison on Supported Platforms
Supported Platforms
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 10
I P A R T
CUBE Fundamentals and Basic Setup
· Overview of Cisco Unified Border Element, on page 13 · Virtual CUBE, on page
25 · Dial-Peer Matching, on page 31 · DTMF Relay , on page 37 · Introduction
to Codecs, on page 51 · Call Admission Control, on page 65 · Basic SIP
Configuration, on page 83 · SIP Binding , on page 111 · Media Path, on page
127 · SIP Profiles, on page 135 · SIP Out-of-Dialog OPTIONS Ping Group, on
page 163 · Configure TCL IVR Applications, on page 171 · VoIP for IPv6, on
page 191 · Monitoring of Phantom Packets, on page 247 · Configurable SIP
Parameters via DHCP, on page 253
4 C H A P T E R
Overview of Cisco Unified Border Element
Cisco Unified Border Element (CUBE) bridges voice and video connectivity
between two separate VoIP networks. It is similar to a traditional voice
gateway, except for the replacement of physical voice trunks with an IP
connection. Traditional gateways connect VoIP networks to telephone companies
using a circuit-switched connection, such as PRI. The CUBE connects VoIP
networks to other VoIP networks and is often used to connect enterprise
networks to Internet telephony service providers (ITSPs).
· Information About Cisco Unified Border Element, on page 13 · How to
Configure Basic CUBE Features, on page 18
Information About Cisco Unified Border Element
Cisco Unified Border Element (CUBE) can terminate and originate signaling
(H.323 and Session Initiation Protocol [SIP]) and media streams (Real-Time
Transport Protocol [RTP] and RTP Control Protocol [RTCP]). CUBE extends the
functionality provided by conventional session border controllers (SBCs) in
terms of protocol interworking, especially on the enterprise side. As shown in
the chart below, the CUBE provides the following additional features:
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 13
Information About Cisco Unified Border Element Figure 1: Cisco Unified Border Element–More Than an SBC
CUBE Fundamentals and Basic Setup
The CUBE provides a network-to-network interface point for: · Signaling
interworking–H.323 and SIP. · Media interworking–dual-tone multifrequency
(DTMF), fax, modem, and codec transcoding. · Address and port
translations–privacy and topology hiding. · Billing and call detail record
(CDR) normalization. · Quality-of-service (QoS) and bandwidth management–QoS
marking using differentiated services code point (DSCP) or type of service
(ToS), bandwidth enforcement using Resource Reservation Protocol (RSVP), and
codec filtering.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 14
CUBE Fundamentals and Basic Setup
Information About Cisco Unified Border Element
CUBE functionality is implemented on devices using a special IOS feature set,
which allows CUBE to route a call from one VoIP dial peer to another.
Protocol interworking is possible for the following combinations:
· H.323-to-SIP interworking
· H.323-to-H.323 interworking
· SIP-to-SIP interworking
The CUBE provides a network-to-network demarcation interface for signaling
interworking, media interworking, address and port translations, billing,
security, quality of service, call admission control, and bandwidth
management.
The CUBE is used by enterprise and small and medium-sized organizations to
interconnect SIP PSTN access with SIP and H.323 enterprise unified
communications networks.
A CUBE interoperates with several different network elements including voice
gateways, IP phones, and call-control servers in many different application
environments, from advanced enterprise voice and/or video services with Cisco
Unified Communications Manager or Cisco Unified Communications Manager
Express, as well as simpler toll bypass and voice over IP (VoIP) transport
applications. The CUBE provides organizations with all the border controller
functions integrated into the network layer to interconnect unified
communications voice and video enterprise-to-service-provider architectures.
Figure 2: Why Does an Enterprise Need the CUBE?
If an enterprise subscribes to VoIP services offered by an ITSP, connecting
the enterprise CUCM through a CUBE provides network demarcation capabilities,
such as security, topology hiding, transcoding, call admission control,
protocol normalization and SIP registration, none of which is possible if CUCM
connects directly to the ITSP. Another use case involves mergers or
acquisitions in an enterprise and the need to integrate voice
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 15
SIP/H.323 Trunking
CUBE Fundamentals and Basic Setup
equipment, such as CUCMs, IP PBXs, VM servers, and so on. If the networks in
the two organizations have overlapping IP addresses, CUBE can be used to
connect the two distinct networks until the acquired organization can be
migrated into the enterprise addressing plan.
SIP/H.323 Trunking
Note H.323 protocol is no longer supported from Cisco IOS XE Bengaluru 17.6.1a
onwards. Consider using SIP for multimedia applications.
The Session Initiation Protocol (SIP) is a signaling communications protocol,
widely used for controlling multimedia communication sessions such as voice
and video calls over IP networks. SIP (or H.323) trunking is the use of VoIP
to facilitate the connection of PBX to other VoIP endpoints across the
Internet. To use SIP trunking, an enterprise must have a PBX (internal VoIP
system) that connects to all internal end users, an Internet telephony service
provider (ITSP), and a gateway that serves as the interface between the PBX
and the ITSP. One of the most significant advantages of SIP and H.323 trunking
is the ability to combine data, voice, and video in a single line, eliminating
the need for separate physical media for each mode.
Figure 3: SIP/H.323 Trunking
SIP trunking overcomes TDM barriers, in that it: · Improves efficiency of
interconnection between networks · Simplifies PSTN interconnection with IP
end-to-end · Enables rich media services to employees, customers, and partners
· Carries converged voice, video, and data traffic
Figure 4: SIP Trunking Overcomes TDM Barriers
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 16
CUBE Fundamentals and Basic Setup
Typical Deployment Scenarios for CUBE
Note For Cisco IOS XE Gibraltar 16.11.1a and later releases, the SIP processes
are initiated only when either of the following CLIs is configured: · Voice
dial-peer with session protocol as SIP. · voice register global · sip-ua In
the releases before Cisco IOS XE Gibraltar 16.11.1a, the following commands
initiated the SIP processes: · dial-peer voice (any) · ephone-dn · max-dn
under call-manager-fallback · ds0-group 0 timeslots 1 type e&m-wink-start
Typical Deployment Scenarios for CUBE
CUBE in an enterprise environment serves two main purposes: · External
Connections–CUBE is the demarcation point within a unified communications
network and provides interconnectivity with external networks. This includes
H.323 and SIP voice and video connections. · Internal Connections–When used
within a VoIP network, CUBE increases flexibility and interoperability between
devices.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 17
How to Configure Basic CUBE Features Figure 5: Typical Deployment Scenarios
CUBE Fundamentals and Basic Setup
How to Configure Basic CUBE Features
Consider a scenario where XYZ corporation uses a VoIP network to provide phone
services and uses a PRI connection for telecommunications services, and the
PRI trunk is controlled by MGCP. Migration from MGCP PRI to SIP trunk is
provided by ITSP telecommunications. CUCM sends the telephone number, as 10
digits, to CUBE. CUCM may send only the extension (4 digits) to the CUBE. When
the call is diverted (using call-forward), the requirement of the ITSP is that
they need the full 10-digit number in the SIP Diversion field.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 18
CUBE Fundamentals and Basic Setup Figure 6: CUBE Configuration Workflow
Enabling the CUBE Application on a Device
The following sections describe the basic setup of CUBE through the steps involved in migrating the XYZ corporation to CUBE using a SIP trunk.
Enabling the CUBE Application on a Device
SUMMARY STEPS
1. enable 2. configure terminal 3. voice service voip 4. mode border-element license [capacity sessions | periodicity {mins value | hours value | days value}] 5. allow-connections from-type to to-type 6. end
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 19
Enabling the CUBE Application on a Device
CUBE Fundamentals and Basic Setup
DETAILED STEPS
Step 1
Command or Action enable Example:
Purpose
Enables privileged EXEC mode. Enter your password if prompted.
Step 2
Device> enable
configure terminal Example:
Enters global configuration mode.
Step 3
Device# configure terminal
voice service voip Example:
Enters global VoIP configuration mode.
Step 4
Device(config)# voice service voip
mode border-element license [capacity sessions | periodicity {mins value | hours value | days value}]
Enables CUBE configuration and configures the number of licenses (capacity).
Example:
Device(conf-voi-serv)# mode border-element license capacity 200
Device(conf-voi-serv)# mode border-element license periodicity days 15
· Effective from Cisco IOS XE Amsterdam 17.2.1r, the capacity keyword and sessions argument are deprecated. However, the keyword and argument are available in the Command Line Interface (CLI). If you try to configure license capacity using CLI, the following error message is displayed:
Error: CUBE SIP trunk licensing is now based on dynamic session counting.
Static
license capacity configuration has been deprecated.
· Effective from Cisco IOS XE Amsterdam 17.2.1r, the periodicity keyword and
[mins | hours| days] argument are introduced. The periodicity keyword
configures periodicity interval for license entitlement requests for CUBE. If
you do not configure license periodicity, the default license period of 7 days
is enabled.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 20
CUBE Fundamentals and Basic Setup
Verifying the CUBE Application on the Device
Command or Action
Purpose Note
We recommend you to configure interval in days. Configuring interval in minutes or hours increases the frequency of entitlement requests and thereby increases the processing load on Cisco Smart Software Manager (CSSM). License periodicity configuration of minutes or hours is recommended to be used only with Cisco Smart Software Manager On-Prem (formerly known as Cisco Smart Software Manager satellite) mode.
Step 5 Step 6
allow-connections from-type to to-type Example:
Device(conf-voi-serv)# allow-connections sip to sip
Allows connections between specific types of endpoints in a VoIP network.
· The two protocols (endpoints) refer to the VoIP protocols (SIP or H.323) on
the two call legs.
end Example:
Returns to privileged EXEC mode.
Device(conf-voi-serv)# end
Verifying the CUBE Application on the Device
SUMMARY STEPS
1. enable 2. show cube status
DETAILED STEPS
Step 1
enable Enables privileged EXEC mode. Example: Device> enable
Step 2
show cube status
Displays the CUBE status, the software version, the license capacity, the
image version, and the platform name of the device. In releases before Cisco
IOS XE Amsterdam 17.2.1r, CUBE status display is enabled only if mode border-
element command is configured with call license capacity. Effective from Cisco
IOS XE Amsterdam 17.2.1r, this dependency is removed and Licensed-Capacity
information is excluded from output.
Example:
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 21
Configuring a Trusted IP Address List for Toll-Fraud Prevention
CUBE Fundamentals and Basic Setup
Before Cisco IOS XE Amsterdam 17.2.1r:
Device# show cube status
CUBE-Version : 12.5.0 SW-Version : 16.11.1, Platform CSR1000V HA-Type : none
Licensed-Capacity : 10 Calls blocked (Smart Licensing Not Configured) : 0
Calls blocked (Smart Licensing Eval Expired) : 0
Effective from Cisco IOS XE Amsterdam 17.2.1r:
Device# show cube status
CUBE-Version : 12.8.0 SW-Version : 17.2.1, Platform CSR1000V HA-Type : none
Configuring a Trusted IP Address List for Toll-Fraud Prevention
SUMMARY STEPS
1. enable 2. configure terminal 3. voice service voip 4. ip address trusted list 5. ipv4 ipv4-address [network-mask] 6. ipv6 ipv6-address 7. end
DETAILED STEPS
Step 1
Command or Action enable Example:
Device> enable
Step 2
configure terminal Example:
Device# configure terminal
Step 3
voice service voip Example:
Device(config)# voice service voip
Step 4
ip address trusted list Example:
Device(conf-voi-serv)# ip address trusted list
Purpose Enables privileged EXEC mode.
· Enter your password if prompted. Enters global configuration mode.
Enters global VoIP configuration mode.
Enters IP address trusted list mode and enables the addition of valid IP
addresses.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 22
CUBE Fundamentals and Basic Setup
Configuring a Trusted IP Address List for Toll-Fraud Prevention
Step 5 Step 6 Step 7
Command or Action ipv4 ipv4-address [network-mask] Example:
Device(cfg-iptrust-list)# ipv4 192.0.2.1 255.255.255.0
ipv6 ipv6-address Example:
Device(cfg-iptrust-list)# ipv6 2001:DB8:0:ABCD::1/48
end Example:
Device(cfg-iptrust-list)# end
Purpose Allows you to add up to 100 IPv4 addresses in the IP address trusted
list. Duplicate IP addresses are not allowed.
· The network-mask argument allows you to define a subnet IP address.
Allows you to add IPv6 addresses to the trusted IP address list.
Returns to privileged EXEC mode.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 23
Configuring a Trusted IP Address List for Toll-Fraud Prevention
CUBE Fundamentals and Basic Setup
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 24
5 C H A P T E R
Virtual CUBE
The Cisco Unified Border Element (CUBE) feature set has traditionally been
delivered with hardware router platforms, such as the Cisco Integrated
Services Router (ISR) series. A subset of CUBE features (vCUBE) may be used in
virtualized environments with the Cisco CSR 1000v Series Cloud Services Router
or Cisco Catalyst 8000V Edge Software (Catalyst 8000V).
Note When upgrading to Catalyst 8000V software from a CSR1000V release, an
existing throughput configuration will be reset to a maximum of 250 Mbps.
Install an HSEC authorization code, which you can obtain from your Smart
License account, before reconfiguring your required throughput level.
· Feature Information for Virtual CUBE, on page 25 · Prerequisites for Virtual
CUBE, on page 26 · Features Supported with Virtual CUBE , on page 27 ·
Restrictions, on page 27 · Information about Virtual CUBE, on page 27 ·
Install Virtual CUBE on ESXi, on page 28 · How to Enable Virtual CUBE , on
page 29 · Troubleshooting Virtual CUBE, on page 29
Feature Information for Virtual CUBE
The following table provides release information about the feature or features
described in this module. This table lists only the software release that
introduced support for a given feature in a given software release train.
Unless noted otherwise, subsequent releases of that software release train
also support that feature.
Use Cisco Feature Navigator to find information about platform support and
Cisco software image support. To access Cisco Feature Navigator, go to
www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 3: Feature Information for Virtual CUBE Support
Feature Name
Releases
Feature Information
Virtual CUBE in Cisco Catalyst Cisco IOS XE Bengaluru Virtual CUBE introduced for Cisco Catalyst
8000V Edge Software (Catalyst 17.4.1a
8000V Edge Software (Catalyst 8000V) in
8000V)
VMware ESXi and AWS environments.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 25
Prerequisites for Virtual CUBE
CUBE Fundamentals and Basic Setup
Feature Name
vCUBE in Amazon Web Services (AWS)
Virtual CUBE
Releases
Feature Information
Cisco IOS XE Gibraltar vCUBE offer introduced in AWS for Cisco CSR
16.12.4a
1000v Series Cloud Services Router.
Cisco IOS XE 3.15S
Virtual CUBE introduced for Cisco CSR 1000v Series Cloud Services Router in VMware ESXi environments.
Prerequisites for Virtual CUBE
Hardware
· The vCUBE feature set is bundled as part of the Cisco virtual router
software and is used when deployed in VMware ESXi virtualized environments.
For more information on how to deploy Cisco virtualized routers in VMware ESXi
environments, see Installing the Cisco CSR 1000V in VMware ESXi Environments
and Installing in VMware ESXi Environment.
· For information on the best practices for setting ESXi host BIOS parameters
for performance, see BIOS Settings.
· Virtual CUBE is supported on the CSR 1000V and C8000V platforms.
· Virtual CUBE is also supported in AWS. You must use the AWS Marketplace
product listing for virtual CUBE.
· For more information about the Cisco CSR 1000V in AWS, see Cisco CSR 1000V
Series Cloud Services Router Deployment Guide for Amazon Web Services.
Note
· The CSR1000V and Catalyst 8000V product may be used in several different public and private cloud
environments. However, vCUBE is only supported when deployed on VMware ESXi and AWS platforms
currently.
· When you use a consolidated (.bin) image to upgrade a CSR 1000V medium configuration (2 vCPU, 4 GB RAM) to Catalyst 8000V, you must change the virtual machine vRAM allocation to at least 5 GB to ensure advertised performance. Alternatively and when deploying in AWS environments, boot the router using individual packages rather than a consolidated image without the need for additional memory. Refer to Installing Subpackages from a Consolidated Package for details.
Software
· Obtain the relevant license for the router platform. See Virtual CUBE
Licensing Requirements , on page 28 for more information.
· In AWS, only Bring Your Own License (BYOL) is supported for vCUBE. Pay as
You Go (Subscription) versions of the CSR 1000V and C8000V are not supported.
Make sure you choose the vCUBE AWS Marketplace product listing. Refer to Cisco
Virtual CUBE-BYOL.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 26
CUBE Fundamentals and Basic Setup
Features Supported with Virtual CUBE
· For more information about Cisco virtual routers, see CSR 1000V Data Sheet
and Catalyst 8000V Data Sheet.
Features Supported with Virtual CUBE
vCUBE supports most of the CUBE features available in IOS XE releases. vCUBE
does not support the following:
· DSP-based features · Codec Transcoding, Transrating · Raw Inband to RTP-NTE
DTMF Interworking · Call progress Analysis (CPA) · Noise Reduction (NR),
Acoustic Shock Protection (ASP), and Audio Gain
· H.323 Interworking · IOS-based Hardware Media Termination Point (MTP)
Note CUBE high availability is not currently supported on vCUBE when deployed
in AWS.
Restrictions
· Software MTP is not supported. · CSR1000V used as MTP/TRP for CUCM is not
supported.
Note All caveats, restrictions, and limitations of Cisco ASR IOS-XE 3.15 and later releases are applicable to virtual CUBE.
Information about Virtual CUBE
Media
vCUBE media performance depends on the underlying host platform consistently
providing packet switching latency of less than 5 milliseconds. The
recommended hardware and virtual machine configurations ensure this
performance when followed closely.
For more information on how to monitor media performance, see Voice Quality
Monitoring.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 27
Virtual CUBE Licensing Requirements
CUBE Fundamentals and Basic Setup
Virtual CUBE Licensing Requirements
For information about licensing of virtual CUBE with CSR1000V and C8000V,
refer to CUBE Smart Licensing.
Virtual CUBE with CSR1000V
vCUBE is enabled for the CSR1000V with the APPX and AX platform licenses.
vCUBE processes and CLI commands are enabled when either of these licenses are
enabled. Secure call features require the AX license. In common with all CUBE
instances, L-CUBE Smart License options are required for each active session.
The following table details the license requirements for Virtual CUBE on the
CSR1000V.
Virtual CUBE Session License
Platform License
Features
Throughput License
L-CUBE Smart License APPX options
AX
No TLS / SRTP support Session count * (signaling
All vCUBE features
+ bidirectional media bandwidth)
For detailed information about licensing, see Cisco CSR 1000v Software Configuration Guide.
Virtual CUBE with Catalyst 8000V
vCUBE is enabled for the Catalyst 8000V with the DNA Network Essentials license.
Virtual CUBE Session License
DNA Subscription
Features
DNA Bandwidth License
L-CUBE Smart License Essentials or above options
All vCUBE features
Session count * (signaling + bidirectional media bandwidth)/2
For detailed information on licensing, see Licensing.
Install Virtual CUBE on ESXi
SUMMARY STEPS
1. Use the CSR1000V or the Catalyst 8000V OVA application file (available from software.cisco.com) to deploy a new virtual instance directly in VMware ESXi.
DETAILED STEPS
Step 1
Command or Action
Purpose
Use the CSR1000V or the Catalyst 8000V OVA application Note
Select the required instance size during the
file (available from software.cisco.com) to deploy a new
OVA deployment.
virtual instance directly in VMware ESXi.
For further details on how to perform the deployment, see
Cisco CSR 1000V Series Cloud Services Router Software
Configuration Guide or Cisco Catalyst 8000V Edge
Software Installation And Configuration Guide.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 28
CUBE Fundamentals and Basic Setup
How to Enable Virtual CUBE
How to Enable Virtual CUBE
SUMMARY STEPS
1. Power on the virtual machine. 2. Enable platform and throughput licenses and register to a Cisco licensing server. 3. Enable virtual CUBE using the steps in Enabling the CUBE Application on a Device.
DETAILED STEPS
Step 1
Command or Action Power on the virtual machine.
Purpose Powers on the vCUBE.
Step 2
Enable platform and throughput licenses and register to a Enables platform and throughput licenses and registers that
Cisco licensing server.
virtual CUBE to a licensing server.
Step 3
Enable virtual CUBE using the steps in Enabling the CUBE Enables vCUBE on a device. Application on a Device.
Troubleshooting Virtual CUBE
To troubleshoot vCUBE, follow the same procedure for Cisco ASR routers. This
procedure includes crash file decoding, decoding traceback, and so on. For
more details, see Troubleshoot Cisco ASR 1000 Series Aggregation Services
Routers Crashes.
To troubleshoot virtual machine issues, see Cisco CSR 1000V Series Cloud
Services Router Software Configuration Guide and Cisco Catalyst 8000V Edge
Software Configuration Guide.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 29
Troubleshooting Virtual CUBE
CUBE Fundamentals and Basic Setup
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 30
6 C H A P T E R
Dial-Peer Matching
CUBE allows VoIP-to-VoIP connection by routing calls from one VoIP dial peer
to another. As VoIP dial peers can be handled by either SIP or H.323, CUBE can
be used to interconnect VoIP networks of different signaling protocols. VoIP
interworking is achieved by connecting an inbound dial peer with an outbound
dial peer.
Note All CUBE Enterprise deployments must have signaling and media bind
statements specified at the dial-peer or voice class tenant level. For voice
call tenants, you must apply tenants to dial-peers used for CUBE call flows if
these dial-peers do not have bind statements specified.
· Dial Peers in CUBE, on page 31 · Configuring Inbound and Outbound Dial-Peer
Matching for CUBE, on page 33 · Preference for Dial-Peer Matching, on page 34
Dial Peers in CUBE
A dial peer is a static routing table, mapping phone numbers to interfaces or
IP addresses. A call leg is a logical connection between two routers or
between a router and a VoIP endpoint. A dial peer is associated or matched to
each call leg according to attributes that define a packet-switched network,
such as the destination address. Voice-network dial peers are matched to call
legs based on configured parameters, after which an outbound dial peer is
provisioned to an external component using the component’s IP address. For
more information, refer to the Dial Peer Configuration Guide. Dial-peer
matching can also be done based on the VRF ID associated with a particular
interface. For more information, see Inbound Dial-Peer Matching Based on
Multi-VRF, on page 359. In CUBE, dial peers can also be classified as LAN dial
peers and WAN dial peers based on the connecting entity from which CUBE sends
or receives calls.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 31
Dial Peers in CUBE Figure 7: LAN and WAN Dial Peers
CUBE Fundamentals and Basic Setup
A LAN dial peer is used to send or receive calls between CUBE and the Private
Branch Exchange (PBX)–a system of telephone extensions within an enterprise.
Given below are examples of inbound and outbound LAN dial peers.
Figure 8: LAN Dial Peers
A WAN dial peer is used to send or receive calls between CUBE and the SIP
trunk provider. Given below are examples of inbound and outbound WAN dial
peers.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 32
CUBE Fundamentals and Basic Setup Figure 9: WAN Dial Peers
Configuring Inbound and Outbound Dial-Peer Matching for CUBE
Configuring Inbound and Outbound Dial-Peer Matching for CUBE
The following commands can be used for inbound and outbound dial peer matching
in the CUBE:
Table 4: Incoming Dial-Peer Matching
Command in Dial-Peer Configuration
incoming called-number DNIS-string
Description
Call Setup Element
This command uses the destination number that was called DNIS number to match the incoming call leg to an inbound dial peer. This number is called the dialed number identification service (DNIS) number.
answer-address ANI-string
This command uses the calling number to match the
ANI string
incoming call leg to an inbound dial peer. This number is
called the originating calling number or automatic number
identification (ANI) string.
destination-pattern ANI-string
This command uses the inbound call leg to the inbound ANI string for
dial peer.
inbound
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 33
Preference for Dial-Peer Matching
CUBE Fundamentals and Basic Setup
Command in Dial-Peer Configuration
Description
Call Setup Element
{incoming called | incoming This command uses a group of incoming called (DNIS) or E.164 Patterns
calling} e164-pattern-map incoming calling (ANI) number patterns to match the
pattern-map-group-id
inbound call leg to an inbound dial peer.
The command calls a globally defined voice class identifier where the E.164 pattern groups are configured.
voice class uri
This command uses the directory URI (Uniform Resource Directory URI
URI-class-identifier with Identifier) number of an incoming INVITE from a SIP
incoming uri {from | request entity to match an inbound dial peer. This directory URI
| to | via} URI-class-identifier is part of the SIP address of a device.
The command calls a globally defined voice class identifier where the directory URI is configured. It requires the configuration of session protocol sipv2
incoming uri {called |
This command uses the directory URI (Uniform Resource Directory URI
callling} URI-class-identifier Identifier) number to match the outgoing H.323 call leg to
an outgoing dial peer.
The command calls a globally defined voice class identifier where the directory URI is configured.
Table 5: Outgoing Dial-Peer Matching
Dial-Peer Command destination-pattern DNIS-string
destination URI-class-identifier
destination e164-pattern-map pattern-map-group-id
Description
Call Setup Element
This command uses DNIS string to match the outbound DNIS string for
call leg to the outbound dial peer.
outbound
ANI string for inbound
This command uses the directory URI (Uniform Resource Directory URI
Identifier) number to match the outgoing call leg to an outgoing dial peer.
This directory URI is part of the SIP address of a device.
The command actually refers to a globally defined voice class identifier where
the directory URI is configured.
This command uses a group of destination number
E.164 patterns
patterns to match the outbound call leg to an outbound
dial peer.
The command calls a globally defined voice class identifier where the E.164 pattern groups are configured.
Preference for Dial-Peer Matching
The following is the order in which inbound dial-peer is matched for SIP call-
legs:
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 34
CUBE Fundamentals and Basic Setup
Preference for Dial-Peer Matching
· voice class uri URI-class-identifier with incoming uri {via} URI-class-
identifier · voice class uri URI-class-identifier with incoming uri {request}
URI-class-identifier · voice class uri URI-class-identifier with incoming uri
{to} URI-class-identifier · voice class uri URI-class-identifier with incoming
uri {from} URI-class-identifier · incoming called-number DNIS-string · answer-
address ANI-string
The following is the order in which inbound dial-peer is matched for H.323
call-legs: · incoming uri {called} URI-class-identifier · incoming uri
{callling} URI-class-identifier · incoming called-number DNIS-string · answer-
address ANI-string
The following is the order in which outbound dial-peer is matched for SIP
call-legs: · destination route-string · destination URI-class-identifier with
target carrier-id string · destination-pattern with target carrier-id string ·
destination URI-class-identifier · destination-pattern · target carrier-id
string
Note If CUBE with Cisco Unified Communications Manager Express (CUCME) is
configured with the same DNs, then the ANI is given the preference. The system
dial-peer for the DN is selected over the other dial-peers created.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 35
Preference for Dial-Peer Matching
CUBE Fundamentals and Basic Setup
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 36
7 C H A P T E R
DTMF Relay
The DTMF Relay feature allows CUBE to send dual-tone multi-frequency (DTMF)
digits over IP.
This chapter talks about DTMF tones, DTMF relay mechanisms, how to configure
DTMF relays, and interoperability and priority with multiple relay methods.
· Feature Information for DTMF Relay , on page 37 · Information About DTMF
Relay , on page 38 · Verifying DTMF Relay , on page 46
Feature Information for DTMF Relay
The following table provides release information about the feature or features
described in this module. This table lists only the software release that
introduced support for a given feature in a given software release train.
Unless noted otherwise, subsequent releases of that software release train
also support that feature.
Use Cisco Feature Navigator to find information about platform support and
Cisco software image support. To access Cisco Feature Navigator, go to
www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 6: Feature Information for DTMF Relay
Feature Name
Releases
Feature Information
DTMF Relay
Cisco IOS Release 12.1(2)T The DTMF relay feature allows CUBE to send
Cisco IOS XE 2.1
DTMF digits over IP.
The dtmf-relay command was added.
Support for sip-info to rtp-nte Cisco IOS XE Everest 16.6.1 This feature adds support for sip-info to
DTMF relay mechanism for
rtp-nte DTMF relay mechanism for SIP-SIP
SIP-SIP calls
calls.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 37
Information About DTMF Relay
CUBE Fundamentals and Basic Setup
Information About DTMF Relay
DTMF Tones
DTMF tones are used during a call to signal to a far-end device; these signals
may be for navigating a menu system, entering data, or for other types of
manipulation. They are processed differently from the DTMF tones that are sent
during the call setup as part of the call control. TDM interfaces on Cisco
devices support DTMF by default. Cisco VoIP dial-peers do not support the DTMF
relay by default and to enable, requires DTMF relay capabilities.
Note DTMF tones that are sent by phones do not traverse the CUBE.
DTMF Relay
Dual-tone multifrequency (DTMF) relay is the mechanism for sending DTMF digits
over IP. The VoIP dial peer can pass the DTMF digits either in the band or out
of band. In-band DTMF-Relay passes the DTMF digits using the RTP media stream.
It uses a special payload type identifier in the RTP header to distinguish
DTMF digits from actual voice communication. This method is more likely to
work on lossless codecs, such as G.711.
Note The main advantage of DTMF relay is that in-band DTMF relay sends low-
bandwidth codecs such as the G.729 and G.723 with greater fidelity. Without
the use of DTMF relay, calls established with low-bandwidth codecs has trouble
accessing automated DTMF-based systems. For example, voicemail, menu-based
Automatic Call Distributor (ACD) systems, and automated banking systems.
Out-of-band DTMF-Relay passes DTMF digits using a signaling protocol (SIP or
H.323) instead of using the RTP media stream. The VoIP compressed code causes
the loss of integrity of the DTMF digits. However, the DTMF relay prevents the
loss of integrity of DTMF digits. The relayed DTMF regenerates transparently
on the peer side.
Figure 10: DTMF Relay Mechanism
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 38
CUBE Fundamentals and Basic Setup
DTMF Relay
The following lists the DTMF relay mechanisms that support the VoIP dial-peers
based on the configured keywords. The DTMF relay mechanism can be either out-
of-band (H.323 or SIP) or in-band (RTP).
· h245-alphanumeric and h245-signal–These two methods are available only on
H.323 dial peers. It is an out-of-band DTMF relay mechanism that transports
the DTMF signals using H.245, which is the media control protocol of the H.323
protocol suite.
The H245-signal method carries more information about the DTMF event (such as
its actual duration) than the H245-Alphanumeric method. It addresses a
potential problem with the alphanumeric method when interworking with other
vendors’ systems.
· sip-notify–This method is available on the SIP dial peers only. It is a
Cisco proprietary out-of-band DTMF relay mechanism that transports DTMF
signals using SIP-Notify message. The SIP Call-Info header indicates the use
of the SIP-Notify DTMF relay mechanism. Acknowledging the message with a 18x
or 200 response message containing a similar SIP Call-Info header.
The Call-Info header for a NOTIFY-based out-of-band relay is as follows:
Call-Info:
DTMF relay digits are a 4 bytes in binary encoded format.
The mechanism is useful for communicating with SCCP IP phones that do not
support in-band DTMF digits and analog phones that are attached to analog
voice ports (FXS) on the router.
If multiple DTMF relay mechanisms enable and negotiate successfully on a SIP
dial peer, NOTIFY-based out-of-band DTMF relay takes precedence.
· sip-kpml–This method is available only on SIP dial peers. The RFC 4730
defines the out-of-band DTMF relay mechanism to register the DTMF signals
using the SIP-Subscribe messages. It transports the DTMF signals using the
SIP-Notify messages containing an XML-encoded body. This method is calked Key
Press Markup Language.
If you configure KPML on the dial peer, the gateway sends INVITE messages with
KPML in the Allow-Events header.
A registered SIP endpoint to Cisco Unified Communications Manager or Cisco
Unified Communications Manager Express uses this method. This method is useful
for non-conferencing calls and for interoperability between SIP products and
SIP phones.
If you configure rtp-nte, sip-notify, and sip-kmpl, the outgoing INVITE
contains an SDP with a rtp-nte payload, a SIP Call-Info header, and an Allow-
Events header with KPML.
The following SIP-Notify message displays after the subscription. The
endpoints transmit digits using SIP-Notify messages with KPML events through
XML. The following example transmits, the digit “1”:
NOTIFY sip:192.168.105.25:5060 SIP/2.0 Event: kpml <?xml version=”1.0″
encoding=”UTF-8″?> <kpml-response version=”1.0″ code=”200″ text=”OK”
digits=”1″ tag=”dtmf”/>
· sip-info–The sip-info method is available only on SIP dial peers. It is an
out-of-band DTMF relay mechanism that registers the DTMF signals using SIP-
Info messages. The body of the SIP message consists of signaling information
and uses the Content-Type application/dtmf-relay.
The method enables for SIP dial peers, and invokes on receiving a SIP INFO
message with DTMF relay content.
The gateway receives the following sample SIP INFO message with specifics
about the DTMF tone. The combination of the From, To, and Call-ID headers
identifies the call leg. The signal and duration
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 39
DTMF Relay
CUBE Fundamentals and Basic Setup
headers specify the digit, in this case 1, and duration, 160 milliseconds in
the example, for DTMF tone play.
INFO sip:2143302100@172.17.2.33 SIP/2.0 Via: SIP/2.0/UDP 172.80.2.100:5060
From: <sip:9724401003@172.80.2.100>;tag=43 To:
<sip:2143302100@172.17.2.33>;tag=9753.0207 Call-ID:
984072_15401962@172.80.2.100 CSeq: 25634 INFO Supported: 100rel Supported:
timer Content-Length: 26 Content-Type: application/dtmf-relay Signal= 1
Duration= 160
· rtp-nte–Real-Time Transport Protocol (RTP) Named Telephone Events (NTE). The
RFC2833 defines the in-band DTMF relay mechanism. RFC2833 defines the formats
of NTE-RTP packets to transport DTMF digits, hookflash, and other telephony
events between two peer endpoints. Using the RTP stream, sends the DTMF tones
as packet data after establishing call media. It is differentiated from the
audio by the RTP payload type field, preventing compression of DTMF-based RTP
packets. For example, sending the audio of a call on a session with an RTP
payload type identifies it as G.711 data. Similarly sending the DTMF packets
with an RTP payload type identifies them as NTEs. The consumer of the stream
utilizes the G.711 packets and the NTE packets separately.
The SIP NTE DTMF relay feature provides a reliable digit relay between Cisco
VoIP gateways on using a low-bandwidth codec.
Note By default, Cisco device uses Payload type 96 and 97 for fax. A third-
party device may use Payload type 96 and 97 for DTMF. In such scenarios, we
recommend you to perform one of the following:
· Change the Payload type for fax in both incoming and outgoing dial-peers
using rtp payload-type command
· Use assymetric payload dtmf command
For more information on configuring rtp payload-type and assymetric payload
DTMF, see Dynamic Payload Type Interworking for DTMF and Codec Packets for
SIP-to-SIP Calls.
Payload types and attributes of this method negotiate between the two ends at
call setup. They use the Session Description Protocol (SDP) within the body
section of the SIP message.
Note This method is not similar to the “Voice in-band audio/G711” transport.
The latter is just the audible tones being passed as normal audio without any
relay signaling method being “aware” or involved in the process. It is plain
audio passing through end-to-end using the G711Ulaw/Alaw codec.
· cisco-rtp–It is an in-band DTMF relay mechanism that is Cisco proprietary,
where the DTMF digits are encoded differently from the audio and are
identified as Payload type 121. The DTMF digits are part
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 40
CUBE Fundamentals and Basic Setup
Configuring DTMF Relays
of the RTP data stream and distinguished from the audio by the RTP payload type field. Cisco Unified Communications Manager does not support this method.
Note The cisco-rtp operates only between two Cisco 2600 series or Cisco 3600
series devices. Otherwise, the DTMF relay feature does not function, and the
gateway sends DTMF tones in-band.
· G711 audio–It is an in-band DTMF relay mechanism that is enabled by default
and requires no configuration. Digits are transmitted within the audio of the
phone conversation, that is, it is audible to the conversation partners;
therefore, only uncompressed codecs like g711 Alaw or mu-law can carry in-band
DTMF reliably. Female voices sometimes trigger the recognition of a DTMF tone.
The DTMF digits pass like the rest of your voice as normal audio tones with no
special coding or markers. It uses the same codec as your voice, generated by
your phone.
Configuring DTMF Relays
You can configure the DTMF relay using the dtmf-relay method1 […[method6]]
command in the VoIP dial peer. Perform DTMF negotiation based on the matching
inbound dial-peer configuration. Use any of the following variablesmethod:
· h245-alphanumeric · h245-signal · sip-notify · sip-kpml · sip-info · rtp-nte
[digit-drop] · ciso-rtp
Configure multiple DTMF methods on CUBE simultaneously in order to minimize
MTP requirements. If you configure more than one out-of-band DTMF method,
preference goes from highest to lowest in the order of configuration. If an
endpoint does not support any of the configured DTMF relay mechanisms on CUBE,
an MTP or transcoder is required.
The following table lists the supported DTMF relay types on a SIP and H.322
gateway.
Table 7: Supported H.323 and SIP DTMF Relay Methods
In-band Out-of-band
H.323 Gateway
SIP Gateway
cisco-rtp, rtp-nte
rtp-nte
h245-alphanumeric, h245-signal sip-notify, sip-kpml, sip-info
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 41
Interoperability and Priority with Multiple DTMF Relay Methods
CUBE Fundamentals and Basic Setup
Interoperability and Priority with Multiple DTMF Relay Methods
· CUBE negotiates both rtp-nte and sip-kmpl if both support and advertise in
the incoming INVITE. However, If CUBE does not initiate sip-kmpl, CUBE relies
on the rtp-nte DTMF method to receive digits and a SUBSCRIBE. CUBE still
accepts SUBSCRIBEs for KPML. It prevents double-digit reporting problems at
CUBE.
· CUBE negotiates to one of the following: · cisco-rtp · rtp-nte · rtp-nte and
kpml · kpml · sip-notify
· If you configure rtp-nte, sip-notify, and sip-kpml, the outgoing INVITE
contains a SIP Call-Info header, an Allow-Events header with KPML, and an SDP
with rtp-nte payload.
· If you configure more than one out-of-band DTMF method, preference goes from
highest to lowest in the order of configuration.
· CUBE selects DTMF relay mechanisms using the following priority: · sip-
notify or sip-kpml (highest priority) · rtp-nte · None–Send DTMF in-band
H.323 gateways select DTMF relay mechanisms using the following priority: ·
cisco-rtp · h245-signal · h245-alphanumeric · rtp-nte · None–Send DTMF in-band
DTMF Interoperability Table
This table provides the DTMF interoperability information between various DTMF
relay types in different call flow scenarios. For instance, refer table 3 if
you must configure sip-kpml on an inbound dial peer and h245-signaling on an
outbound dial peer in an RTP-RTP Flow through configuration. The table shows
that the combination supports (as image information is present) the required
image IOS 12.4(15)T or IOS XE or above. The following are the call scenarios
provided:
· RTP-RTP Flow-Through · RTP-RTP with transcoder Flow-Through
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 42
CUBE Fundamentals and Basic Setup
DTMF Interoperability Table
· RTP-RTP Flow Around · RTP-RTP with high-density transcoder Flow Through · SRTP-RTP Flow Through
Table 8: RTP-RTP Flow-Through
Outbound H.323
SIP
dial-peer
protocol
In-band
Inbound DTMF h245- h245dial-peer Relay Type alphanumeric signal protocol
Rtp-nte Rtp-nte Sip-kpml Sipnotify
Sip-info Voice in-band (G.711)
H.323
h245-alpha Supported numeric
Supported Supported Supported Supported
h245-signal
Supported Supported Supported Supported Supported
rtp-nte Supported Supported Supported Supported
Supported
Supported*
SIP
rtp-nte Supported Supported Supported Supported Supported Supported
Supported*
sip-kpml Supported Supported
Supported Supported
sip-notify Supported Supported Supported Supported
Supported
sip-info
Supported
3
In-band Voice in-band (G.711)
Supported Supported
Supported
3 Supported from Cisco IOS XE Everest 16.6.1 onwards for calls that do not involve DSP resources.
- media resource is required (Transcoder) for IOS versions.
Table 9: RTP-RTP with DSP Involved Flow-Through Calls
Outbound H.323
SIP
dial-peer
protocol
In-band
Inbound DTMF
h245- h245-
dial-peer Relay Type alphanumeric signal
protocol
Rtp-nte Rtp-nte Sip-kpml Sipnotify
Sip-info Voice in-band (G.711)
H.323
h245-alpha Supported numeric
Supported Supported Supported Supported
h245-signal
Supported Supported Supported Supported Supported
rtp-nte Supported Supported Supported Supported
Supported
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 43
DTMF Interoperability Table
CUBE Fundamentals and Basic Setup
Outbound H.323
SIP
dial-peer
protocol
In-band
Inbound DTMF
h245- h245-
dial-peer Relay Type alphanumeric signal
protocol
Rtp-nte Rtp-nte Sip-kpml Sipnotify
Sip-info Voice in-band (G.711)
SIP
rtp-nte Supported Supported Supported Supported
Supported
sip-kpml Supported Supported
Supported
sip-notify Supported Supported Supported
Supported
sip-info
In-band Voice in-band (G.711)
Supported Supported
Table 10: RTP-RTP Flow Around
Outbound H.323
SIP
dial-peer
protocol
In-band
Inbound DTMF
h245- h245-
dial-peer Relay Type alphanumeric signal
protocol
Rtp-nte Rtp-nte Sip-kpml Sipnotify
Sip-info Voice in-band (G.711)
H.323
h245-alpha Supported numeric
h245-signal
Supported
rtp-nte
Supported
Supported*
SIP
rtp-nte
Supported
Supported*
sip-kpml
Supported
sip-notify
Supported
sip-info
In-band Voice in-band (G.711)
Supported Supported
Supported
- media resource is required (Transcoder) for IOS versions. CUBE falls back to flow-through mode if the media resource is unavailable.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 44
CUBE Fundamentals and Basic Setup
DTMF Interoperability Table
Table 11: RTP-RTP with High-Density Transcoder Flow Through
Outbound H.323
SIP
dial-peer
protocol
In-band
Inbound DTMF
h245- h245-
dial-peer Relay Type alphanumeric signal
protocol
Rtp-nte Rtp-nte Sip-kpml Sipnotify
Sip-info Voice in-band (G.711)
H.323
h245-alpha Supported numeric
h245-signal
Supported
Supported Supported Supported Supported
rtp-nte
Supported Supported
Supported
SIP
rtp-nte
Supported Supported Supported
Supported
sip-kpml Supported Supported
Supported
sip-notify Supported Supported
Supported
sip-info
In-band Voice in-band (G.711)
Supported Supported
Table 12: SRTP-RTP Flow Through
Outbound H.323 dial-peer protocol
Inbound DTMF
h245- h245-
dial-peer Relay Type alphanumeric signal
protocol
H.323 SIP
h245-alpha numeric h245-signal rtp-nte rtp-nte
sip-kpml
sip-notify
sip-info
In-band Voice in-band (G.711)
SIP
In-band
Rtp-nte Rtp-nte Sip-kpml Sipnotify
Sip-info Voice in-band (G.711)
Supported Supported Supported
Supported Supported
Supported
Supported
Supported
Supported Supported
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 45
Verifying DTMF Relay
CUBE Fundamentals and Basic Setup
Note For calls sent from an in-band (RTP-NTE) to an out-of band method, configure the dtmf-relay rtp-nte digit-drop command on the inbound dial-peer and the desired out-of-band method on the outgoing dial-peer. Otherwise, send the same digit in OOB and in-band, and gets interpreted as duplicate digits by the receiving end. On configuring the digit-drop option on the inbound leg, CUBE suppresses NTE packets and configures only relay digits using the OOB method on the outbound leg.
Verifying DTMF Relay
SUMMARY STEPS
1. show sip-ua calls 2. show sip-ua calls dtmf-relay sip-info 3. show sip-ua history dtmf-relay kpml 4. show sip-ua history dtmf-relay sip-notify
DETAILED STEPS
Step 1
show sip-ua calls The following sample output shows that the DTMF method is SIP-KPML. Example:
Device# show sip-ua calls
SIP UAC CALL INFO
Call 1
SIP Call ID
: 57633F68-2BE011D6-8013D46B-B4F9B5F6@172.18.193.251
State of the call
: STATE_ACTIVE (7)
Substate of the call : SUBSTATE_NONE (0)
Calling Number
:
Called Number
: 8888
Bit Flags
: 0xD44018 0x100 0x0
CC Call ID
:6
Source IP Address (Sig ): 192.0.2.1
Destn SIP Req Addr:Port : 192.0.2.2:5060
Destn SIP Resp Addr:Port: 192.0.2.3:5060
Destination Name
: 192.0.2.4.250
Number of Media Streams : 1
Number of Active Streams: 1
RTP Fork Object
: 0x0
Media Mode
: flow-through
Media Stream 1
State of the stream
: STREAM_ACTIVE
Stream Call ID
:6
Stream Type
: voice-only (0)
Negotiated Codec
: g711ulaw (160 bytes)
Codec Payload Type
:0
Negotiated Dtmf-relay : sip-kpml
Dtmf-relay Payload Type : 0
Media Source IP Addr:Port: 192.0.2.5:17576
Media Dest IP Addr:Port : 192.0.2.6:17468
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 46
CUBE Fundamentals and Basic Setup
Verifying DTMF Relay
Step 2
Orig Media Dest IP Addr:Port : 0.0.0.0:0 Number of SIP User Agent Client(UAC)
calls: 1 SIP UAS CALL INFO Number of SIP User Agent Server(UAS) calls: 0
show sip-ua calls dtmf-relay sip-info
The following sample output displays active SIP calls with INFO DTMF Relay
mode.
Example:
Device# show sip-ua calls dtmf-relay sip-info
Total SIP call legs:2, User Agent Client:1, User Agent Server:1
SIP UAC CALL INFO
Call 1
SIP Call ID
: 9598A547-5C1311E2-8008F709-2470C996@172.27.161.122
State of the call
: STATE_ACTIVE (7)
Calling Number
: sipp
Called Number
: 3269011111
CC Call ID
:2
No.
Timestamp
Digit
Duration
=======================================================
0 01/12/2013 17:23:25.615 2
250
1 01/12/2013 17:23:25.967 5
300
2 01/12/2013 17:23:26.367 6
300
Call 2
SIP Call ID
: 1-29452@172.25.208.177
State of the call
: STATE_ACTIVE (7)
Calling Number
: sipp
Called Number
: 3269011111
CC Call ID
:1
No.
Timestamp
Digit
Duration
=======================================================
0 01/12/2013 17:23:25.615 2
250
1 01/12/2013 17:23:25.967 5
300
2 01/12/2013 17:23:26.367 6
300
Number of SIP User Agent Client(UAC) calls: 2
SIP UAS CALL INFO
Call 1
SIP Call ID
: 1-29452@172.25.208.177
State of the call
: STATE_ACTIVE (7)
Calling Number
: sipp
Called Number
: 3269011111
CC Call ID
:1
No.
Timestamp
Digit
Duration
=======================================================
0 01/12/2013 17:23:25.615 2
250
1 01/12/2013 17:23:25.967 5
300
2 01/12/2013 17:23:26.367 6
300
Call 2
SIP Call ID
: 9598A547-5C1311E2-8008F709-2470C996@172.27.161.122
State of the call
: STATE_ACTIVE (7)
Calling Number
: sipp
Called Number
: 3269011111
CC Call ID
:2
No.
Timestamp
Digit
Duration
=======================================================
0 01/12/2013 17:23:25.615 2
250
1 01/12/2013 17:23:25.967 5
300
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 47
Verifying DTMF Relay
CUBE Fundamentals and Basic Setup
Step 3 Step 4
2 01/12/2013 17:23:26.367 6
300
Number of SIP User Agent Server(UAS) calls: 2
show sip-ua history dtmf-relay kpml The following sample output displays SIP call history with KMPL DTMF Relay mode. Example:
Device# show sip-ua history dtmf-relay kpml
Total SIP call legs:2, User Agent Client:1, User Agent Server:1
SIP UAC CALL INFO
Call 1
SIP Call ID
: D0498774-F01311E3-82A0DE9F-78C438FF@10.86.176.119
State of the call
: STATE_ACTIVE (7)
Calling Number
: 2017
Called Number
: 1011
CC Call ID
: 257
No.
Timestamp
Digit
Duration
=======================================================
Call 2
SIP Call ID
: 22BC36A5-F01411E3-81808A6A-5FE95113@10.86.176.142
State of the call
: STATE_ACTIVE (7)
Calling Number
: 2017
Called Number
: 1011
CC Call ID
: 256
No.
Timestamp
Digit
Duration
=======================================================
Number of SIP User Agent Client(UAC) calls: 2
SIP UAS CALL INFO
Call 1
SIP Call ID
: 22BC36A5-F01411E3-81808A6A-5FE95113@10.86.176.142
State of the call
: STATE_ACTIVE (7)
Calling Number
: 2017
Called Number
: 1011
CC Call ID
: 256
No.
Timestamp
Digit
Duration
=======================================================
Call 2
SIP Call ID
: D0498774-F01311E3-82A0DE9F-78C438FF@10.86.176.119
State of the call
: STATE_ACTIVE (7)
Calling Number
: 2017
Called Number
: 1011
CC Call ID
: 257
No.
Timestamp
Digit
Duration
=======================================================
Number of SIP User Agent Server(UAS) calls: 2
show sip-ua history dtmf-relay sip-notify The following sample output displays SIP call history with SIP Notify DTMF Relay mode. Example:
Device# show sip-ua history dtmf-relay sip-notify
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 48
CUBE Fundamentals and Basic Setup
Verifying DTMF Relay
Total SIP call legs:2, User Agent Client:1, User Agent Server:1
SIP UAC CALL INFO
Call 1
SIP Call ID
: 29BB98C-F01311E3-8297DE9F-78C438FF@10.86.176.119
State of the call
: STATE_ACTIVE (7)
Calling Number
: 2017
Called Number
: 1011
CC Call ID
: 252
No.
Timestamp
Digit
Duration
=======================================================
Call 2
SIP Call ID
: 550E973B-F01311E3-817A8A6A-5FE95113@10.86.176.142
State of the call
: STATE_ACTIVE (7)
Calling Number
: 2017
Called Number
: 1011
CC Call ID
: 251
No.
Timestamp
Digit
Duration
=======================================================
Number of SIP User Agent Client(UAC) calls: 2
SIP UAS CALL INFO
Call 1
SIP Call ID
: 550E973B-F01311E3-817A8A6A-5FE95113@10.86.176.142
State of the call
: STATE_ACTIVE (7)
Calling Number
: 2017
Called Number
: 1011
CC Call ID
: 251
No.
Timestamp
Digit
Duration
=======================================================
Call 2
SIP Call ID
: 29BB98C-F01311E3-8297DE9F-78C438FF@10.86.176.119
State of the call
: STATE_ACTIVE (7)
Calling Number
: 2017
Called Number
: 1011
CC Call ID
: 252
No.
Timestamp
Digit
Duration
=======================================================
Number of SIP User Agent Server(UAS) calls: 2
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 49
Verifying DTMF Relay
CUBE Fundamentals and Basic Setup
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 50
8 C H A P T E R
Introduction to Codecs
A codec is a device or software capable of encoding or decoding a digital data
stream or signal. Audio codecs can code or decode a digital data stream of
audio. Video codecs enable compression or decompression of digital video. CUBE
uses codecs to compress digital voice samples to reduce bandwidth usage per
call. This chapter describes the basics of encoding digital voice samples
using codecs and how to configure them.
· Why CUBE Needs Codecs, on page 51 · Voice Media Transmission, on page 52 ·
Voice Activity Detection, on page 53 · VoIP Bandwidth Requirements, on page 54
· Supported Audio and Video Codecs, on page 56 · How to Configure Codecs, on
page 57 · Configuration Examples for Codecs, on page 62
Why CUBE Needs Codecs
CUBE uses codecs to compress digital voice samples to reduce bandwidth usage
per call. Refer to Table 14: Codec and Bandwidth Information, on page 54 to
see the relationship between codec and bandwidth utilization. Configuring
codecs on a device (configured as CUBE) allows the device to act as a
demarcation point on a VoIP network and allows a dial peer to be established
only if the desired codec criteria are satisfied. Additionally, preferences
can be used to determine which codecs are selected over others. If codec
filtering is not required, CUBE also supports transparent codec negotiations.
This enables negotiations between endpoints with CUBE leaving the codec
information untouched. The illustrations below show how codec negotiation is
performed on CUBE. Two VoIP clouds need to be interconnected. In this
scenario, both VoIP 1 and VoIP 2 networks have G.711 a-law configured as the
preferred codec.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 51
Restrictions for Voice-Class Codec Transparent Figure 11: Codec Negotiation on CUBE
CUBE Fundamentals and Basic Setup
In the first example, the CUBE router is configured to use the G.729a codec.
This can be done by using the appropriate codec command on both VoIP dial
peers. When a call is set up, CUBE will accept only G.729a calls, thus
influencing the codec negotiation. In the second example, the CUBE dial peers
are configured with a transparent codec and this leaves the codec information
contained within the call signaling untouched. Because both VoIP 1 and VoIP 2
have G.711 a-law as their first choice, the resulting call will be a G.711
a-law call.
Restrictions for Voice-Class Codec Transparent
· While using the voice-class codec transparent, only the offer is passed
transparently (without filtering). Codec filtering is done on the SDP present
in answer and the first codec is passed to other side.
· CUBE does not support Early-Offer to Delayed-Offer (EO-DO) call flows.
Note You can use ‘pass-thru content sdp’, if you do not want to involve CUBE
in the codec negotiation.
Voice Media Transmission
When a VoIP call is established, using the signaling protocols, the digitized
voice samples need to be transmitted. These voice samples are often called the
voice media. Voice media protocols found in a VoIP environment are the
following:
· Real-Time Transport Protocol (RTP)–RTP is a Layer 4 protocol that is
encapsulated inside UDP segments. RTP carries the actual digitized voice
samples in a call.
Cisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5 52
CUBE Fundamentals and Basic Setup
Voice Activity Detection
· Real-Time Control Protocol (RTcP)–RTcP is a companion protocol to RTP. Both
RTP and RTcP operate at Layer 4 and are encapsulated in UDP. RTP and RTCP
typically use UDP ports 16384 to 32767, though these ranges may vary according
to hardware platform. However, RTP uses the even port numbers in that range,
whereas RTcP uses the odd port numbers. While RTP is responsible for carrying
the voice stream, RTcP carries information about the RTP stream such as
latency, jitter, packets, and octets sent and received.
· Compressed RTP (cRTP)–One of the challenges with RTP is its overhead.
Specifically, the combined IP, UDP, and RTP headers are approximately 40 bytes
in size, whereas a common voice payload size on a VoIP network is only 20
bytes, which includes 20 ms of voice by default. In that case, the header is
twice the size of the payload. cRTP is used for RTP header compression and can
reduce the 40-byte header to 2 or 4 bytes in size (depending on whether UDP
checksums are in use), as shown in the figure below.
Figure 12: Compressed RTP
· Secure RTP (sRTP)–To help prevent an attacker from intercepting and decoding
or possibly manipulating voice packets, sRTP supports encryption of RTP
packets. In addition, sRTP provides message authentication, integrity
checking, and protection against replay attacks.
VPN technology like IP Security (IPSec) may be used to protect traffic between
sites. Encrypting sRTP traffic at the source of transmission results in
encrypting already encrypted traffic, adding significant overhead and
bandwidth needs. So it is recommended that sRTP is used for voice traffic, and
that this traffic is excluded from IPSec encapsulation. sRTP uses lesser
bandwidth, has the same level of security, and can be used by devices at any
location because the payload is originated and terminated at the voice
endpoint. Because endpoints can be mobile, the security follows the phone.
Voice Activity Detection
Voice Activity Detection (VAD) is a technology that works with the human
nature of voice conversations, mainly that one person listens while the other
talks. VAD classifies traffic as speech, unknown, and silence. Speech and
unknown payloads are transported, but silence is dropped. This accounts for
approximately 30 percent savings in bandwidth over time.
VAD can significantly reduce the amount of bandwidth required by a media
stream. However, VAD has a few negative attributes that need to be considered.
Because no packets are sent during silence, the listener can get the
impression that the talker has been disconnected. Another characteristic is
that it takes a moment for VAD to recognize the speech as having started
again, and as a result, the first part of the sentence can be clipped. This
can be annoying to the listening party. Music on Hold (MoH) and fax can also
cause VAD to become ineffective because the media stream is constant.
VAD is enabled by default in CUBE dial peers as long as the codec selected
support
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>