Sangoma VM SBC AMI at AWS (Amazon Web Services) SBC in a Cloud Based UC/VoIP Service.
One of the interesting use cases for Sangoma SBC is to provide VoIP Edge
connectivity between Soft switches or IPPBX's and VoIP End Points of IP Telephony Service providers (ITSP's)
Here we are going to show you how to deploy Sangoma SBC VM as an EC2 (Elastic Compute Cloud) Instance inside a VPC (Virtual Private Cloud).
Several VPC scenarios could be implemented
(See: http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Scenarios.h tml).
In our example, we are using a VPC with Public and Private Subnets, as this scenario perfectly fits the need to have VoIP resources in a private subnet, not accessible from the exterior, and the SBC located in the Public Subnet enabling remote endpoints and Service providers to reach VoIP resources in a controlled and secured way. (For more details about this VPC scenario
see: http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Scenario2.ht ml)
For our exercise, we will be using a VPC similar to this one:
Our VPC Will have the following attributes:
• VPC: 10.0.0.0/16
• Private subnet: 10.0.1.0/24
• Public subnet: 10.0.0.0/24 Our SBC will have:
• Internal interface in the Private subnet at: 10.0.1.133
• External Interface in the Public subnet at: 10.0.0.133
• CPU: 2 Core
• Memory: 4 Gig
• Hard Drive: 30 Gig Lets Start:
• Login to your AWS Console and go to your EC2 dashboard:
• From this point we will initiate the process to Create an EC2 Instance using Sangoma’ s SBC AMI. Press "Launch Instance" button.
• Search "sbc" in the Community AMI and you will find our Sangoma SBC AWS AMI. Then just press "Select "
• Select the type of instance according to your own needs:
• Press next: Configure Instance Details
• Now you will be able to execute the steps to configure the specific characteristics for the VM Instance you will be using in your production environment
• In the Instance Details Screen o Select the VPC 10.0.0.0/16
o Select the Public Subnet as this one will be the primary LAN interface (10.0.1.0/24).
• In the Network Interface Section, assign specific IP address to eth0, as well as eth1. Please note eth1 is being associated to the private subnet.
• Click on Next: Add Storage.
• In our example, we will select a 30Gig drive of General Purpose SSD.
• Now Click Next: Tag Instance
• You can add any Tag. On this example we will just complete the Name Tag
• Click on Next: Configure Security Group
• This is a set of rules controlled by AWS infrastructure. It is not associated to any internal Firewall features. In our case, we are configuring the Security rules to allow:
o SSH, HTTP and HTTPS access only from VPC addresses o Ports UDP and TCP 5060 to 5061 from anywhere
• Now we will proceed to review the Instance browsing thru all the sections in the following page:
• Now, after pressing Launch button, a popup window will ask you if you want to associate an encrypted key to access the new instance.
• In our case, we have decided not to assign an access key.
• Click Launch Instance
• Now, Click on View Instance
• You will notice the new Instance starting, wait until it is fully initialized and show all initial testing passed
• Once the Instance is UP and Running, access the GUI using the browser of your preference.
• In our case, we will be accessing http://10.0.0.133, which is the Primary IP address (public) assigned to eth0 during the Instance creation task. It is important to understand:
o You will not be able to access the Private IP (10.0.1.133 on eth1) as it is not automatically assigned via DHCP.
o In order to access the public IP address you will need at least to have VPN access to the Public Subnet.
• The User/Password by default assigned to the AMI is: root/sangoma.
• After Logged in you will notice "Vega Session Controller Configuration is not completed"
o License Is Not Installed
o An initial Sip Profile is not defined.
o And of course, Configuration has not been generated yet
• In order to install the license you will need to contact our sales department (sales@sangoma.com) or any Sangoma Chanel Partner worldwide
(http://www.sangoma.com/partner-finder/) in order to purchase it.
• Also, the license is associated to your instance MAC address for eth0. In order to obtain the MAC Address, first from the Help Menu select and click on
"About"
• Scroll down the page:
• Write down the MAC Address for eth0 as you will needed during the License file generation procedure.
• Now, we will complete the configuration of LAN Interfaces.
• Go to Configuration --> IP Settins --> Signaling Interface
• Change eth0 from DHCP to Static. DO NOT CHANGE THE PREASSIGNED IP ADDRESS
• Modify the Host Name if you want
• Make sure you have the default gateway correctly assigned. In AWS for Public subnet 10.0.0.0/24 it is usually 10.0.0.1
• Make sure you have the DNS server correctly assigned. In AWS for Public subnet 10.0.0.0/24 it is usually 10.0.0.2
• Add a secondary DNS Server if desired
• Now assign to eth1 the static IP address we defined during the Instance Launch process (10.0.1.133)
• We are ready with Signaling Interfaces and it should look like this:
• In order to be able to generate a configuration and start the SBC you will need at least to create one SIP Profile.
• One last point is to Disable Source Destination Check in the Instance . This must be done in your AWS Console:
As you can see, now you can easily deploy Sangoma SBC in a cloud environment (AWS in this case). Soon you will also learn how to do it in other Cloud Providers.
If you have any question, or suggestion, feel free to send me an email:
ecasas@sangoma.com