Avaya TSAPI with SIPREC and DMCC, and Alvaria or POM Dialer
This topic provides guidelines for configuring Avaya TSAPI interface with SIPREC and DMCC for CXone Multi-ACD (CXone Open).
The supported Avaya AES TSAPI versions are 8.1.3 and 10.1.
Avaya site engineer is responsible for all procedures in the Avaya environment. The procedures described in this section are by recommendation only!
Follow these steps to set up the Avaya TSAPI interface with SIPREC and DMCC, and configure an optional dialer.
Step 1: Prepare Avaya AES TSAPI Environment
Step 2:Prepare Avaya AES DMCC Environment
Step 3: Prepare Session Border Controllers (SBCs) to integrate with CXone Multi-ACD (CXone Open):
(Optional) Step 4: Configure a dialer:
Step 5: Download and save the Essential Data for 3rd Party Connectivity Config in CXone Excel file. You will be required to fill in essential information as you proceed. Once you have finished entering all the necessary details and prepared your environment for CXone Multi-ACD, you must submit the Excel file to your NICE Professional Services representative.
Prepare Avaya AES TSAPI Environment
You must configure the Avaya AES TSAPI Server before you configure CXone Multi-ACD.
The supported Avaya AES TSAPI versions are 8.1.3 and 10.1.
Perform these steps to prepare the Avaya AES TSAPI environment:
Step 1: Verify the TSAPI License and Status
Step 2: Prepare the AES Environment
Step 5: Create a Secure Connection Using VPN
Step 1: Verify the TSAPI License and Status
Before configuring the Avaya TSAPI interface, you must verify that the Avaya TSAPI Service is running, and that the license is valid.
To verify the TSAPI Service and status:
-
Log in to the AES Server. The Application Enablement Services page appears.
-
From the menu, select AE Services.
-
Verify:
-
The TSAPI Service Status column is Online and that the State is Running.
-
The Licensed Mode column shows Normal Mode.
-
Step 2: Prepare the AES Environment
An Avaya site engineer is responsible for all procedures in the Avaya environment. These procedures are recommendations and guidelines only!
In an AES environment, the AES administrator must prepare the AES-CTI link connections.
To configure the switch on the AES (general guidelines):
-
Navigate to the AES webpage and login.
-
Enter your Username and Password. Click Login. The Home page appears.
-
From the menu, click Communication Manager Interface.
-
Select Switch Connections.
-
In the Switch Connections window, in the field add the switch name and click Add Connection. The Connection Details window for the new switch appears.
-
In the Switch Password field, enter the switch password. The switch password must be between 12 - 16 alphanumeric characters and identical to the password assigned to the AES service in the Communication Manager.
-
In the Confirm Switch Password field, enter the switch password again.
-
If your Communication Manager supports Processor Ethernet, select Processor Ethernet.
-
Click Apply. The Switch Connections window reappears.
-
-
Click Edit PE/CLAN IPs. The Edit Processor Ethernet IP window appears.
-
In the field provided, add the IP address of the Processor Ethernet/CLAN board, then click Add/Edit Name or IP.
-
In the AES menu, click Switch Connections to return to the Switch Connections window.
-
Click Edit H.323 Gatekeeper. The Edit H.323 Gatekeeper window appears.
-
In the field provided, enter the IP address of one of the Processor Ethernet/CLAN boards, and click Add Name or IP. Repeat this step for all Processor Ethernet/CLAN boards.
After the CTI link is configured, the administrator should verify that the AES-CTI link connection is active and in a Talking state.
To verify the CTI link:
-
From the AES webpage, select Status > Status and Control > TSAPI Service Summary.
-
Check the Status is set for Talking for the relevant AES-CTI link connection.
Step 3: Add a User
The user must be added to the system via the webpage.
This procedure must be performed together with an Avaya administrator. The AES administrator must first prepare the AES-CTI link connection.
At the end of this step, you are required to provide to NICE Professional Services:
-
User credentials.
To add a user:
-
On the AE Services menu, navigate to User Management > User Admin and click Add User.
-
In the Add User window, configure the mandatory fields:
-
User Id
-
Common Name
-
Surname
-
User Password
-
Confirm Password
-
Change the CT User setting to Yes.
-
-
Click Apply to save the information.
-
Save these user credentials in the Excel file. Once you have finished entering all the necessary details and prepared your environment, submit the Excel file to NICE Professional Services.
-
Verify that the User created successfully message appears in the Add User Results window.
-
Provide unrestricted monitoring for all devices to user:
-
On the AE Services menu, expand Security > Security Database > CTI Users and click Search Users.
-
In the Search Users window, search for the user created previously.
-
Click Search. The new user appears.
-
Click Edit.
-
In the Edit CTI User window, in the User Profile area, select Unrestricted Access.
-
Click Apply Changes.
-
In the Apply Changes to CTI User Properties, click Apply.
-
Step 4: Verify the Tlink
In the CTI Connection TSAPI configuration, the Server Name parameter uses the Tlink value.
At the end of this step, you are required to provide to NICE Professional Services:
-
Tlink name
To verify the Tlink:
-
In the AES webpage, select Security > Security Database > Tlinks.
The list of Tlinks appears in the Tlink Name column. If your site uses more than one Tlink, make sure you choose the correct Tlink, according to the switch name.
The Tlink consists of these segments:
-
AVAYA - Vendor
-
# - Separator
-
AVAYA10 - Switch / Connection Name (as defined in Communication Manager Interface> Switch Connections)
-
CSTA/CSTA-S - Non-Secure / Secure Portal
-
AES10 - AES Server Name
-
-
Save the correct Tlink name in the Excel file. Once you have finished entering all the necessary details and prepared your environment, submit the Excel file to NICE Professional Services.
-
If using the secured Tlink, verify that the TLS version is configured in the AES. Navigate to Networking > TCP/TLS Settings.
-
By default, only Support TLSv1.2 Protocol is enabled. TLSv1.2 Protocol is supported as a sole security protocol.
-
Since default certificates are no longer provided, the Avaya site engineer must generate the relevant certificate and upload it to the Avaya telephony system in CXone. Navigate to Security > Certificate Management > Server Certificates.
-
In the Server Certificates window, in the Alias column, select the certificate and click Export.
-
In the Server Certificate Export window, verify that No, do not export the private key is selected and click Export.
-
Upload this exported certificate to the Avaya telephony system in Cxone.
Step 5: Create a Secure Connection Using VPN
This step must be performed only in coordination with NICE Professional Services.
At the end this step, by completing the form in the Essential Data for 3rd Party Connectivity Config in CXone Excel file, you will provide the necessary details to NICE Professional Services, who will aid you in establishing a secure VPN connection with CXone.
SIPREC environments only are required to complete additional information in the form, so that SBC can establish a connection between SIPREC and CXone.
-
NICE Professional Services will provide you with the VPN connect form.
-
Fill out the provided form with details of your side and the necessary information for CXone Multi-ACD.
-
NICE Professional Services will coordinate with CXone teams to ensure all fields are appropriately filled out.
-
Both parties must agree on the form and details.
-
-
NICE Professional Services will schedule a collaborative call:
- To agree on the form and provided details with CXone Multi-ACD.
-
With CXone teams for VPN provisioning.
-
You will set up two VPNs: one for resiliency and one for failover.
-
Configure routing by setting up BGP over VPN with CXone Multi-ACD firewalls or create static routes to the provided IP addresses.
-
Configure NAT. NAT your endpoint behind a public IP, either advertised via BGP or using static routing.
-
Configure firewall settings:
-
Allow inbound traffic from the provided IP addresses (2) into the CTI Endpoint.
-
Open the required ports. See Ports and Protocols by Application for more information.
-
For High Availability environments, the ports mentioned above in step b must be open for all servers, active and standby.
-
-
NICE Professional Services will coordinate with CXone teams to:
-
Ensure the VPN form is correctly filled out.
-
Schedule a time with CXone teams for VPN provisioning and routing setup.
-
Test VPN tunnel, routing, and connectivity.
-
Prepare Avaya AES DMCC Environment
This section describes how to prepare the Avaya Device Media Call Control (DMCC) environment for CXone Multi-ACD.
The supported Avaya AES DMCC versions are 8.1.3 and 10.1.
Avaya site engineer is responsible for all procedures in the Avaya environment. The procedures described in this section are by recommendation only!
For comprehensive information about configuring the Avaya switch, see the Avaya documentation.
Workflow
Use this workflow to set up Avaya DMCC active recording with CXone Multi-ACD.
Before beginning this workflow, you must ensure that site components are configured.
Step 1: Configure Virtual Extensions to Capture Audio
Step 2: Configure SRTP
Step 3: Prepare information for NICE Professional Services
Before You Begin
Before integrating the Avaya DMCC environment with CXone Multi-ACD, gather the required information and enter it in the Essential Data for 3rd Party Connectivity Config in CXone Excel file you downloaded. Once you have finished entering all the necessary details and prepared your environment, submit the Excel file to NICE Professional Services.
Configure Virtual Extensions to Capture Audio
Use these procedures to prepare the Avaya Communication Manager for a site using virtual extensions for audio capture.
When using virtual extensions to capture your audio, verify you have enough licenses for the NICE CTI.
-
Log in to the AES Server. The Application Enablement Services page appears.
-
From the menu, select Licensing > WebLM Server Access.
-
Log in to WebLM Server.
-
Select Licensed products > Application Enablement from the panel on the left, and verify that sufficient licenses are defined for DMCC DMC.
Before the DMCC Server can register the emulated (virtual) extensions on the Media Gateway, define the extensions on the switch.
Each virtual extension must be separately defined and requires a DMCC license. Make sure the total number of DMCC licenses match the maximum number of agents operating concurrently. However, it is recommended to maintain DMCC licenses at least 20% above the maximum call volume.
When your site is configured for Single Step Conference, you must define the virtual extensions on the AES in the same group as the extensions observed via Single Step Conference. Otherwise, the user will be granted unrestricted access to the security database.
To define the virtual extensions for recording on the switch:
-
On the switch, open a console window and type this:
-
Extension Type: 4624
ExtensionType 4624 represents all soft phones.
-
IP Softphone: Y (Yes)
-
Security Code: The Security Code value is the extension password. When configuring the CTI in CXone Multi-ACD, you enter this value in the Password field.
-
COR: Ensure that the selected COR (Class of Restriction) is configured to enable Service Observation. See the following step.
-
-
Display the COR (Class of Restriction) definitions and define Can be a Service Observer? as Y. This enables all configured virtual extensions or soft phones to observe and record.
The Avaya AES Server supports up to 16 simultaneous C-LAN connections. This allows the AES Server to provide load balancing across multiple connections and a C-LAN failover mechanism.
You configure the symbolic name, or Connection Name, on the Avaya AES Server. The symbolic name represents multiple C-LANs on the Avaya Media Gateways. This allows the recording system to implement redundancy and load sharing over multiple C-LANs by communicating with the symbolic name. Multiple C-LANs are required in implementations of over 300 Avaya DMCC channels.
The symbolic name is the Connection Name on the AES, and is case sensitive.
To configure the symbolic name:
-
From the AES webpage, select Communication Manager Interface > Switch Connections.
-
Select the required Connection Name and click Edit PE/CLAN IPs.
-
Enter the host name or IP address of the C-LAN or/and PE for AES connectivity, and then click Add/Edit Name or IP. Repeat for each C-LAN or PE attached to this connection.
-
In the Switch Connections window, click Edit H.323 Gatekeeper.
To use the symbolic name feature, the H.323 gatekeeper must be specified. The C-LAN configuration alone is not sufficient. The H.323 IP list can be different from the C-LAN IP list.
-
Select the required Name or IP Address, or type in the host name or IP address of the H.323 Gatekeeper and click Add Name or IP.
-
Select Networking > Ports.
-
Ensure that the DMCC Server port is enabled.
The codec set defined in CXone Multi-ACD must match the codec set defined on the switch.
-
In Avaya Site Administration, enter display ip-codec-set <n> where <n> is the codec set associated with the IP network region of the extensions that you need to observe.
-
In the Audio Codec column, review the list of compression types. These are the codecs that the switch allows.
Make sure that the CodecList you define in CXone Multi-ACD contains at least one of the compression types defined here.
-
Enter display ip-network-region <n> where <n> is the network region of the extensions that you need to observe.
-
Verify that the defined Codec Set is the ip-codec-set you confirmed above.
Verify that the silence suppression feature is enabled on Avaya Media Server for audio codecs. This conserves bandwidth by not transmitting audio packets during periods of silence. Silence suppression may cause audio clipping.
-
In Avaya Site Administration, enter the display ip-codec-set <n> command, where <n> is the number of the codec set associated with the IP network region of the extensions that you need to observe.
-
In the IP Codec Set window, in the Codec Set section, for each codec listed you can set in the Silence Suppression column:
-
Enable silence suppression, define Silence Suppression as y.
-
Disable silence suppression, define Silence Suppression as n.
-
-
Press Esc and then e to submit your changes.
Configure SRTP
Use these procedures when your site requires SRTP configuration.
-
Log in to the Avaya Aura Media server.
-
Under the System Configuration menu, go to Media Processing > Media Security.
-
Verify that:
-
Security Policy is set to BEST EFFORT.
-
Best Effort Mode is set to CAPABILITY.
-
-
Under Crypto Suites, enable:
-
AES_CM_128_HMAC_SHA1_80
-
AES_CM_128_HMAC_SHA1_32
-
-
For each of them, select SRTP encryption and SRTP Authentication.
-
Go to Configuring Avaya Switch Encryption for the IP Network Region.
SRTP encryption is configured on two levels: the signaling (H.323) and the media stream (SRTP).
This section describes how to enable SRTP and signaling encryption on Avaya Communication Manager.
At the end of this procedure, you are required to provide to NICE Professional Services:
-
Encryption used on site: HMAC32 or HMAC80.
To configure encryption:
-
In Avaya Site Administration, enter the display ip-codec-set <n> command, where <n> is the codec-set associated with the IP network region of the extensions that you need to observe.
-
Verify if the site has:
-
Avaya Media Servers with G Series gateway/s. aes can be supported only with G-series gateways.
-
Avaya Media Servers, use either 2-srtp-aescm128-hmac32 or 1-srtp-aescm128-hmac80.
-
-
In the IP Codec Set screen, in the Media Encryption section, enter one or more of the Media Encryption types.
-
2-srtp-aescm128-hmac32
-
1-srtp-aescm128-hmac80
-
aes - not supported if using Avaya Media Server
The Avaya site engineer must inform NICE Professional Services which encryption is used on site: HMAC32 or HMAC80.
Save the encryption information in the Excel file. Once you have finished entering all the necessary details and prepared your environment, submit the Excel file to NICE Professional Services.
-
-
In Avaya Site Administration, enter the display ip-network-region <n> command, where <n> is the network region of the extensions that you need to observe.
-
In the network region, enter the IP Codec Set you edited previously.
-
When you configure CLAN/Medpro: In the Network Region, enter the region you configured for encryption. In the example in this procedure, to enable SRTP in the Network Region, enter 2.
Prepare information for NICE Professional Services
Before you can begin your CXone CTI configuration, you require specific information.
Ask the Avaya site engineer to verify the information below is entered in the Excel file. Submit the Excel file to NICE Professional Services.
step |
parameter |
Where is this configured? |
---|---|---|
1 | Avaya DMCC port number: Check the Avaya DMCC port number for a secure connection and an unsecure connection. | On the AES Server. |
Verify the DMCC ports are enabled. | On the AES Server. | |
2 | Verify the CXone Multi-ACD username and password for Avaya DMCC as defined on AES. | On the AES Server. |
For Virtual Extensions:
|
||
4 | Verify the Avaya DMCC symbolic name. |
On the AES Server. In the Switch Connections area, verify the Connection Name. The Connection Name is also known as the Symbolic Name. |
5 | Verify the Observation Code in the Service Observing Listen Only Access Code field. | On the Communication Manager (CM). |
6 | Verify the list of supported codecs. | On the Communication Manager (CM), verify the codecs that the organization is using. |
7 | Verify the list of supported encryption algorithms (AES_128_ Counter (aes)/ No Encryption / AES_128_ HMAC). If AES_128_ HMAC is supported, the CXone Multi-ACD engineer must be informed whether to use HMAC32 or HMAC80. | On the Communication Manager (CM). |
The Avaya site engineer must inform the CXone Multi-ACD engineer which encryption is used on site: HMAC32/HMAC80. |
Prepare Oracle (Acme Packet) SBC
This section describes how to prepare the Oracle (Acme Packet) Session Border Controller (SBC) to integrate with CXone Multi-ACD (CXone Open).
The procedures described in this section are recommendations only. The Oracle site engineer should perform all procedures.
Workflow
Use this workflow to prepare your Oracle (Acme Packet) SBC for CXone Multi-ACD. Before beginning this workflow, you must ensure that site components are configured.
phase |
Description |
reference |
---|---|---|
Phase 1: Site Preparation | ||
Step 1: Review the prerequisites. | ||
Phase 2: Set up Oracle SBC | ||
Step 1: Verify that the license is valid and includes the Session Recording feature. SRTP requires Software TLS. | Verify the License | |
Step 2: Configure the recording realm to which the SBC connects. | Configure the Recording Realm | |
Step 3: Configure the Session Recording Server (SRS) connection. | Configure the Session Recording Server (SRS) Connection | |
Step 4: (Optional) For more than one recorder, configure the connection to the session recording group (SRG). | (Optional) Configure the Session Recording Group (SRG) | |
Step 5: Configure a SIP Interface. | Configure SIP Interfaces, Realms, and Session Agents for the SRS and SRG | |
Step 6: Configure an ingress or egress realm: | ||
Step 7: Configure a session agent. | Configure SIP Interfaces, Realms, and Session Agents for the SRS and SRG | |
Step 8: Generate UCIDs for inbound calls. | Configure the Generation of Universal Call Identifiers for Inbound Calls |
Configure the Generation of Universal Call Identifiers for Inbound Calls
The Universal Call Identifier Session Plug-in Language (SPL) plug-in for an Oracle SBC can be configured to generate or preserve a universal call identifier based on the configuration. Once a universal call identifier is generated or preserved, the system adds the value to all subsequent egress SIP requests within the session. You can also configure the plug-in to remove unwanted universal call identifier headers to avoid duplicity in egress SIP requests. Avaya UCID can be added as extension data to the session element in the metadata of a recording when SIPREC is used.
After you have performed the steps to configure the SPL plug-in to generate an Avaya UCID for every incoming call, you can verify the configuration.
-
In the Acme Packet CLI, at the opening prompt, type:
configure terminal
-
Press Enter.
The prompt changes to
YourSBC(configure)#
. -
Type:
system
-
Press Enter.
The prompt changes to
YourSBC(system)#
. -
Type the following and press Enter:
spl-config
The prompt changes to
YourSBC(spl-config)#
. -
Type the following and press Enter:
select
-
Type the following and press Enter:
show
The configuration of the SPL plug-in for generating an Avaya UCID for every incoming call displays.
-
Type the following and press Enter:
exit
The prompt changes to
YourSBC(system)#
. -
Type the following and press Enter:
exit
The prompt changes to
YourSBC(configure)#
. -
Type the following and press Enter:
exit
The prompt changes to
YourSBC#
.
(Optional) Encryption Prerequisites
-
Verifying one call leg is encrypted:
For encryption of the recorder call leg, verify that one of the other SBC call legs either going in/coming out of the SBC is encrypted.
-
Follow the Oracle documentation for configuring certificates.
Verify the License
Verify that the license is valid and includes the Session Recording feature.
-
Connect to the Acme Packet CLI and type the user password.
-
Type the following and press Enter:
enable
-
Type the superuser password and press Enter:
-
Type the following and press Enter:
configure terminal
-
Type the following and press Enter:
system
-
Type the following and press Enter:
license
-
Type the following and press Enter:
show
-
Verify that the license is valid (not expired).
-
Verify that the license includes Session Recording.
-
For SRTP, verify that the license includes Software TLS.
Configure the Recording Realm
-
Connect to the Acme Packet CLI and type the user password.
-
Type the following and press Enter:
enable
-
Type the superuser and press Enter:
-
Type the following and press Enter:
configure terminal
-
Type the following and press Enter:
media-manager
-
Type the following and press Enter:
realm-config
-
Configure the realm name, type:
identifier <Name of the realm>
This must be the same as the recording realm name you define in Configuring the Session Recording Server (SRS) Connection or (Optional) Configuring the Session Recording Group (SRG).
-
Configure the interface, type the following and press Enter:
network-interfaces <interface>
For example:
network-interfaces M01:0
-
Configure the RTCP Mux feature, type the following and press Enter:
rtcp-mux enable
-
Type the following and press Enter:
done
The graphic above is for example purposes only. In a non secure environment, the media-sec- policy is blank.
Configure the Session Recording Server (SRS) Connection
The SRS is the VRSP.
-
Make sure you completed Configuring the Recording Realm.
-
Connect to the Acme Packet CLI and type the user password.
-
Type the following and press Enter:
enable
-
Type the superuser password and press Enter.
-
Type the following and press Enter:
configure terminal
-
Type the following and press Enter:
session-router
-
Type the following and press Enter:
session-recording-server
-
Configure the SRS name, type the following and press Enter:
name <name of the SRS>
For example:
name NiceVRSP
-
(Optional) Configure the SRS description, type the following and press Enter:
description <description of the SRS>
For example:
description SignalingToVRSP
-
Configure the SRS realm, type the following and press Enter:
realm <Name of the realm>
For example:
realm recording-realm
-
Configure the SRS mode, type the following and press Enter:
mode selective
-
Configure the destination IP address, type the following and press Enter:
destination <IP address of the VRSP>
For example:
destination 192.168.10.10
-
Configure the destination port:
-
In a non-secure environment, type
port 5060
and press Enter -
In a secure environment, type
port 5061
and press Enter
-
-
Configure the transport layer protocol:
-
In a non-secure environment, for TCP as the transport layer protocol, type
transport-method TCP
and press Enter -
In a secure environment, type
DynamicTLS
and press Enter
-
-
Type the following and press Enter:
done
-
Add the SRS to a SIP Interface, Realm, or Agent Session. See Configuring SIP Interfaces, Realms, and Session Agents for the SRS and SRG.
While you can add the SRS to all three recording options, the system automatically prioritizes your selection in this order: first Agent Session, then Realm, and then SIP Interface.
-
To enable recording with recorders that expect RTP on consecutive ports (VoIP loggers), you must disable force-parity. By default, force-parity is already disabled using the force-parity parameter. To verify that force-parity is disabled, type:
configure terminal
session-router
session-recording-server
select [choose the recording server name by number]
show
The configuration of the Session Recording Server appears.
-
Check that force-parity is disabled.
-
If force-parity is enabled, type the following and press Enter:
force-parity disabled
done
-
Save and activate the configuration.
(Optional) Configure the Session Recording Group (SRG)
Configure this if you have more than one recorder.
-
Verify you completed Configuring the Recording Realm.
-
Connect to the Acme Packet CLI and type the user password.
-
Type the following and press Enter:
enable
-
Type the superuser password and press Enter.
-
Type the following and press Enter:
configure terminal
-
Type the following and press Enter:
session-router
-
Type the following and press Enter:
session-recording-group
-
Configure the SRG name, type the following and press Enter:
name SRG:<name of the session recording group>
For example:
name SRG:NiceRecordingServer
-
(Optional) Add the SRG description, type the following and press Enter:
description <description of the SRG>
For example:
description SignalingToRecGroup
-
Configure the strategy of the SRG, for example, RoundRobin (see below). Type the strategy name and press Enter:
strategy RoundRobin
Note that a NICE VRSP pair does not support load balancing.
-
To view additional strategy options (such as Hunt, LeastBusy, PropDist, and LowSusRate), type the following and press Enter:
strategy?
-
Configure the number of session recording servers that will be allocated to the SRG, type the following and press Enter:
simultaneous-recording-servers
followed by the number of servers.
For a NICE VRSP pair, the number is 2.
-
Type
exit
and repeat this action until you reach the first superuser prompt (#), for example:NiceSBC4500(configure)# session-router
NiceSBC4500(session-router)# session-recording-group
NiceSBC4500(session-recording-group)# exit
NiceSBC4500(session-router)# exit
NiceSBC4500(configure)# exit
NiceSBC4500#
-
Specify the session recording servers to be included in the group. Type the session recording server names in quotation marks, with a space between each session recording server name, and press Enter:
"<servername1> <servername2>"
This must be the same as the recording realm name you define in Configuring the Session Recording Server (SRS) Connection.
-
Type the following and press Enter:
done
-
Type the following and press Enter:
verify-config
-
When you receive the notice Verification successful, type the following and press Enter:
save-config
-
Type the following and press Enter:
activate-config
Configure SIP Interfaces, Realms, and Session Agents for the SRS and SRG
While you can select all of these interfaces for the components above, the system will automatically prioritize the selection in this order: first session agent, then realm, and then SIP interface.
-
Verify you completed Configure the Recording Realm.
-
Connect to the Acme Packet CLI and type the user password.
-
Type the following and press Enter:
enable
-
Type the superuser password and press Enter:
-
Type the following and press Enter:
configure terminal
-
Type the following and press Enter:
session-router
-
Type the following and press Enter:
sip-interface
-
Type the following and press Enter:
select
-
Select the SIP interface and type the number for that interface.
For example, if you want to record the Core-ASM SIP interface, as in the example above, type 1.
-
Define the SRS that will record the selected SIP interface, type the following and press Enter:
session-recording-server <name of the SRS>
This must be the same SRS name you defined in Configuring the Session Recording Server (SRS) Connection.
For example:
name NiceVRSP
-
Type the following and press Enter:
done
Non-secure example:
Secure example:
-
Scroll down to view the session recording server field.
-
Type
exit
several times until you reach the superuser prompt (#) level. -
Type the following and press Enter:
verify-config
-
When you receive the notice Verification successful, type the following and press Enter:
save-config
-
Type the following and press Enter:
activate-config
-
Connect to the Acme Packet CLI and type the user password.
-
Type the following and press Enter:
enable
-
Type the superuser password and press Enter:
-
Type the following and press Enter:
configure terminal
-
Type the following and press Enter:
session-router
-
Go to the SIP interface, type the following and press Enter:
sip-interface
-
Type the following and press Enter:
select
In this example, the recording is not encrypted.
-
Select the SIP interface and type the number for that interface.
For example, if you want to record the Core-ASM SIP interface, as in the example above, type 1.
-
Define the SRG that will record the selected SIP interface, type the following and press Enter:
session-recording-group SRG:<name of the session recording group>
This must be the same SRG name you defined in (Optional) Configuring the Session Recording Group (SRG).
For example:
name SRG:NiceRecordingServer
. Remember to includeSRG:
before the name of the session recording group. -
Type the following and press Enter:
done
-
Type
exit
several times until you reach the superuser prompt (#) level. -
Type the following and press Enter:
verify-config
-
When you receive the notice Verification successful, type the following and press Enter:
save-config
-
Type the following and press Enter:
activate-config
-
Connect to the Acme Packet CLI and type the user password.
-
Type the following and press Enter:
enable
-
Type the superuser password and press Enter:
-
Type the following and press Enter:
configure terminal
-
Type the following and press Enter:
media-manager
-
Go to the SIP interface, type the following and press Enter:
realm-config
-
Type the following and press Enter:
select
The list of available realms displays with a number next to each realm.
-
In the row marked
selection
, type the number of the ingress or egress realm that you want to configure.For example, if you want to display the Core-ASM realm, type 1.
-
In the
(realm-config)#
row, type the following and press Enter:show
This displays the details of the selected realm.
-
If you are configuring the SRS, in the
(realm-config)# session-recording-server
row, enter the name of the session recording server. -
If you are configuring the SRG, in the
(realm-config)# session-recording-group
row, enter the name of the session recording group.For example:
name SRG:NiceRecordingServer
. Remember to includeSRG:
before the name of the session recording group. -
Type the following and press Enter:
done
-
Type
exit
several times until you reach the superuser prompt (#) level. -
Type the following and press Enter:
verify-config
-
When you receive the notice Verification successful, type the following and press Enter:
save-config
-
Type the following and press Enter:
activate-config
-
Connect to the Acme Packet CLI and type the user password.
-
Type the following and press Enter:
enable
-
Type the enable password and press Enter:
-
Type the following and press Enter:
configure terminal
-
Type the following and press Enter:
session-router
-
Type the following and press Enter:
session-agent
-
Type the following and press Enter:
select
A list of configured session agents appears.
-
Type the number of the agent that you want to record.
For example, if you want to record the Session Agent, type 1.
-
Define the session recording server that will record the selected session agent. Type the following and press Enter:
session-recording-server <name of the session recording server>
This must be the same SRS name you defined in Configure the Session Recording Server (SRS) Connection.
For example:
name NiceVRSP
. -
Type the following and press Enter:
done
The configured information for the session agent to be recorded appears.
-
Scroll down to view the session-recording-server field.
-
Type
exit
several times until you reach the enable prompt (#) level. -
Type the following and press Enter:
verify-config
-
When you receive the notice Verification successful, type the following and press Enter:
save-config
-
Type the following and press Enter:
activate-config
-
Connect to the Acme Packet CLI and type the user password.
-
Type the following and press Enter:
enable
-
Type the enable password and press Enter:
-
Type the following and press Enter:
configure terminal
-
Type the following and press Enter:
session-router
-
Type the following and press Enter:
session-agent
-
Type the following and press Enter:
select
A list of configured session agents appears.
-
Type the number of the agent that you want to record.
For example, if you want to record the Core-ASM session agent, type 1.
-
Define the session recording group (SRG) that will record the selected session agent. Type the following and press Enter:
session-recording-group SRG:<name of the session recording group>
This must be the same SRG name you defined in (Optional) Configure the Session Recording Group (SRG).
For example:
name NiceVRSP
. -
Type the following and press Enter:
done
The configured information for the session agent to be recorded appears.
-
Scroll down to view the session-recording-server field.
-
Type
exit
several times until you reach the enable prompt (#) level. -
Type the following and press Enter:
verify-config
-
When you receive the notice Verification successful, type the following and press Enter:
save-config
-
Type the following and press Enter:
activate-config
Prepare Ribbon (Sonus) SBC
This section describes how to prepare the Ribbon (Sonus) Session Border Controller (SBC) to integrate with CXone Multi-ACD (CXone Open). The information in this guide is relevant for the Ribbon 5000 and 7000 Series Core SBC and the Virtual Core SBC.
The procedures described in this guide are recommendations only and should be performed by a certified Ribbon engineer.
Verify the License
The first step in configuring the Ribbon SBC to integrate with the CXone Multi-ACD environment is to verify that the license is valid and includes the SBC-SIPREC feature.
-
Connect to the Ribbon SBC with the user name admin.
-
In the Command Line Interface (CLI) type:
show table system licenseInfo
.The license information appears.
-
Verify that the license is valid (not expired).
-
Verify that the line for the SBC-SIPREC feature includes the license ID, an expiration date that has not yet passed, and a usage limit greater than 0.
Configure an Additional Zone
An additional zone, which can be named, for example, NICE_ZONE, must be added for the recorder. The name of the zone is arbitrary, but the same name that is used to configure it must also be used to reference it in subsequent steps.
This zone must have properties similar to those shown in the example.
To create a new zone named NICE_ZONE (an example):
-
At the command line prompt in the Command Line Interface (CLI), enter:
configure
The CLI responds with this message:
Entering configuration mode private
-
At the CLI command line prompt, enter:
set addressContext default zone NICE_ZONE id 0
-
At the CLI command line prompt, enter:
set addressContext default zone NICE_ZONE sipTrunkGroup NICE_TG state enabled mode inService policy carrier 0000 country 1 localizationVariant northAmerica tgIPVersionPreference both-ipv4-and-ipv6 digitParameterHandling numberingPlan NANP_ACCESS Value for 'media mediaIpInterfaceGroupName' [LIF1,LIF2]: LIF2
-
At the CLI command line prompt, enter:
set addressContext default zone NICE_ZONE sipTrunkGroup NICE_TG ingressIpPrefix 172.0.0.0 8
-
At the CLI command line prompt, enter:
set addressContext default zone NICE_ZONE sipTrunkGroup NICE_TG signaling messageManipulation outputAdapterProfile UUID-MessageBody
-
At the CLI command line prompt, enter:
set addressContext default zone NICE_ZONE sipSigPort 1001 ipInterfaceGroupName LIF1 ipAddressV4 172.21.13.62 portNumber 5060 mode inService state enabled recorder disabled siprec enabled transportProtocolsAllowed sip-udp,sip-tcp
-
At the CLI command line prompt, enter:
commit
Configure Call Recording
There are five steps to configuring call recording.
In the PSX Manager, the information that must be configured for the trunk group named NICE_TG in Trunk Group view. See below.
The information that must be configured for the recorder profile in SRS Group Profile view is shown below. The SRS Group Profile includes information that must be passed to the other servers.
-
In the SRS Server Properties area:
-
In the Sequence Number, enter 0.
-
In the Trunkgroup ID, enter NICE_TG.
-
From the Crypto Suite Profile drop-down list, select <None>.
-
In the IPv4 Address, enter the VRSP IP address. Ask NICE Professional Services for this information.
-
In the Port V4 Number, enter 5060.
-
For SRS Server Transport, select UDP.
-
Verify that Enable SRTP is not selected.
-
Click Add/Update.
-
Click Save.
-
The information that must be configured for the routing label named RL_NICE in Routing Label view is shown below.
Call recording criteria must be configured. Note that all possibilities on the service provider side are supported.
-
Avaya Ingress Calls
The call recording criteria that must be configured for Avaya ingress calls in the PSX Manager is shown below. In this case, ingress calls are directed from the service provider (Cisco) side to the agent (Avaya) side.
-
Avaya Egress Calls
The call recording criteria that must be configured for Avaya egress calls in the PSX Manager is shown below. In this case egress calls are directed from the agent (Avaya) side to the service provider (Cisco) side.
Send a UCID to the Recorder
In an Avaya environment the Universal Call Identifier (UCID) of every call must be sent to the recorder.
For egress calls, Avaya CM generates the UCID and then converts it to the User to User Information (UUI), which is sent from the Avaya Session Manager to the Ribbon SBC in the User-to-User field of the SIP INVITE header, as shown below. In a trace, the UUI appears as a hexadecimal value, and in an Avaya CTI event it is displayed as a decimal number (the UCID). The UUI (which contains the UCID) is sent to the Ribbon SBC, which subsequently uses SIP manipulations (SMMs) to send data, including the UCID, to the recorder.
On the Avaya CM, the UUI treatment must be configured as Shared on the trunk to the Avaya Session Manager as displayed in the following image.
The UCID may or may not be included in an ingress call, that is, a call directed from the service provider to an agent, when it arrives at the Ribbon SBC. If the UCID is not included, the SBC must generate it.
If the UCID is already included in an ingress call, the SBC should not generate a different UCID.
The UCID includes an identifier of the node that created it (the ucidNodeId). The following lines provide an example of the required configuration for setting the value of the node ID that will be used in each UCID generated by the Ribbon SBC:
% set global signaling sipSigControls ucidNodeId 20
% Commit
In this example, the UCID generated by the Ribbon SBC will include the node ID 20.
If the SBC needs to generate the UCID, the node ID in the UCID generated must be a unique ID that is not used by any Avaya CM in the local network.
In order to add support for ensuring that every call has a UCID, configure a command according to the following example on the Avaya trunk group:
% set addressContext default zone ZONE3 sipTrunkGroup AVAYA_INT_TG ucidSupport passthruOrGenerate
% Commit
This command instructs the Ribbon SBC to generate the UCID when necessary or to pass through the UCID supplied in the call.
Once a call is established through the Ribbon SBC, the SBC sends a SIP INVITE message to the VRSP. After confirmation by the VRSP, the SBC forks the audio and sends it to the recorder.
The VRSP is expected to receive the UCID in the SIP INVITE message sent from the SBC during an ingress call or an egress call. In the example below of the metadata part of a SIP INVITE message sent from the SBC to the VRSP, the callid element contains the UCID.
SIP manipulations (SMMs) must be configured for the Ribbon SBC to prepare the UCID and insert it into the SIP INVITE message sent to the VRSP for both egress and ingress calls. The relevant SMMs should be allocated to the relevant trunks.
Use the following CLI commands to create the User ID, create its UCID tag, and move it to the XML Metadata v1 CallID tag.
Use the commit
command after every section. You must verify that each commit is successful before you move on to the next set of commands.
The commands below are provided as examples only. Please check that you are using the correct Zone number that corresponds to the region of the internal or external provider, and the sipTrunkGroup that corresponds to the zone and internal or external provider.
-
Configure the following two SIP manipulations for input and output using the following CLI commands.
At the end of each set of commands, enter
%commit
and verify that the commit was successful.-
For input:
copyset profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN state enabled
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN advancedSMM enabled
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN profileType messageManipulation
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 applyMatchHeader one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 applyMatchHdrRange undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 1 type message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 1 message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 1 message messageTypes all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 1 message condition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 2 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 2 header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 2 header name User-to-User
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 2 header value ""
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 2 header condition exist
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 2 header hdrInstance all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 2 header hdrRange undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 2 header numberOfInstances number 0
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 criterion 2 header numberOfInstances qualifier undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 operation regstore
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 headerInfo headerValue
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 headerPosition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 paramType undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 from
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 from type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 from value User-to-User
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 to
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 to type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 to variableValue var5
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 to variableScopeValue dialog
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 to offset whole
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 regexp
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 regexp string [a-zA-Z0-9]*
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 1 regexp matchInstance one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 2 type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 2 operation regdel
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 2 headerInfo undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 2 headerPosition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 2 paramType undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 2 to
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 2 to type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 2 to variableValue var5
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 2 to offset whole
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 2 regexp
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 2 regexp string 00FA08
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 2 regexp matchInstance all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 operation regprepend
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 headerInfo undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 headerPosition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 paramType undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 from
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 from type value
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 from value UUID-
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 to
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 to type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 to variableValue var5
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 to offset whole
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 regexp
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 regexp string .*
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 1 action 3 regexp matchInstance one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 applyMatchHeader one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 applyMatchHdrRange undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 1 type message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 1 message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 1 message messageTypes all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 1 message condition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 2 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 2 header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 2 header name TO
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 2 header value ""
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 2 header condition exist
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 2 header hdrInstance all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 2 header hdrRange undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 2 header numberOfInstances number 0
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 criterion 2 header numberOfInstances qualifier undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 type token
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 operation add
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 headerInfo undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 headerPosition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 paramType undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 from
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 from type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 from variableValue var5
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 from offset whole
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 from length all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 to
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 to type token
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 2 action 1 to tokenValue uridisplayname
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 applyMatchHeader one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 applyMatchHdrRange undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 1 type message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 1 message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 1 message messageTypes responseAll
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 1 message condition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 2 type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 2 variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 2 variable condition exist
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 2 variable variableID var7
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 2 variable value ""
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 2 variable otherVariableID undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 3 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 3 header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 3 header name TO
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 3 header value ""
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 3 header condition exist
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 3 header hdrInstance all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 3 header hdrRange undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 3 header numberOfInstances number 0
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 criterion 3 header numberOfInstances qualifier undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 operation regappend
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 headerInfo undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 headerPosition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 paramType undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 from
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 from type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 from variableValue var7
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 from offset whole
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 from length all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 to
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 to type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 to value TO
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 regexp
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 regexp string "<.*>;tag=.*"
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 3 action 1 regexp matchInstance one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 applyMatchHeader one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 applyMatchHdrRange undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 1 type message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 1 message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 1 message messageTypes requestAll
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 1 message methodTypes [ undefined ]
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 1 message condition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 2 type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 2 variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 2 variable condition exist
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 2 variable variableID var7
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 2 variable value ""
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 2 variable otherVariableID undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 3 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 3 header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 3 header name From
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 3 header value ""
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 3 header condition exist
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 3 header hdrInstance all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 3 header hdrRange undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 3 header numberOfInstances number 0
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 criterion 3 header numberOfInstances qualifier undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 operation regappend
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 headerInfo undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 headerPosition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 paramType undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 from
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 from type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 from variableValue var7
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 from offset whole
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 from length all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 to
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 to type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 to value From
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 regexp
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 regexp string "<.*>;tag=.*"
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 4 action 1 regexp matchInstance one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 applyMatchHeader one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 applyMatchHdrRange undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 1 type message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 1 message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 1 message messageTypes request
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 1 message methodTypes [ bye ]
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 1 message condition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 2 type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 2 variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 2 variable condition exist
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 2 variable variableID var7
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 2 variable value ""
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 2 variable otherVariableID undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 3 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 3 header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 3 header name FROM
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 3 header value ""
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 3 header condition exist
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 3 header hdrInstance all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 3 header hdrRange undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 3 header numberOfInstances number 0
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 criterion 3 header numberOfInstances qualifier undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 operation regappend
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 headerInfo undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 headerPosition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 paramType undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 from
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 from type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 from variableValue var7
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 from offset whole
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 from length all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 to
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 to type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 to value FROM
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 regexp
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 regexp string "<.*>;tag=.*"
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 5 action 1 regexp matchInstance one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 applyMatchHeader one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 applyMatchHdrRange undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 criterion 1 type message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 criterion 1 message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 criterion 1 message messageTypes response
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 criterion 1 message methodTypes [ invite ]
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 criterion 1 message statusCode [ 200 ]
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 criterion 1 message condition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 criterion 2 type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 criterion 2 variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 criterion 2 variable condition exist
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 criterion 2 variable variableID var23
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 criterion 2 variable value ""
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 criterion 2 variable otherVariableID undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 operation add
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 headerInfo undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 headerPosition last
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 paramType undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 from
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 from type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 from variableValue var23
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 from offset whole
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 from length all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 to
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 to type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_IN rule 6 action 1 to value X-EGRESS-UUID
% Commit -
For output:
copyset profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT state enabled
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT advancedSMM enabled
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT profileType messageManipulation
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 applyMatchHeader one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 criterion 1 type message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 criterion 1 message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 criterion 1 message messageTypes request
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 criterion 1 message methodTypes [ invite ]
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 criterion 2 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 criterion 2 header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 criterion 2 header name User-To-User
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 criterion 2 header condition exist
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 criterion 2 header hdrInstance all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 1 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 1 operation store
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 1 headerInfo headerValue
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 1 from
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 1 from type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 1 from value User-To-User
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 1 to
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 1 to type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 1 to variableValue var23
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 1 to variableScopeValue dialog
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 2 type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 2 operation regdel
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 2 headerInfo undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 2 headerPosition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 2 paramType undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 2 to
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 2 to type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 2 to variableValue var23
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 2 to offset whole
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 2 regexp
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 2 regexp string 00FA08
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 2 regexp matchInstance all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 operation regprepend
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 headerInfo undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 headerPosition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 paramType undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 from
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 from type value
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 from value UUID-
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 to
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 to type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 to variableValue var23
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 to offset whole
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 regexp
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 regexp string .*
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 1 action 3 regexp matchInstance one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 applyMatchHeader one
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 applyMatchHdrRange undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 criterion 1 type message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 criterion 1 message
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 criterion 1 message messageTypes response
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 criterion 1 message methodTypes [ invite ]
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 criterion 1 message statusCode [ 200 ]
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 criterion 1 message condition undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 criterion 2 type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 criterion 2 variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 criterion 2 variable condition exist
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 criterion 2 variable variableID var5
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 criterion 2 variable otherVariableID undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 operation add
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 headerInfo undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 headerPosition last
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 paramType undefined
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 from
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 from type variable
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 from variableValue var5
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 from offset whole
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 from length all
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 to
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 to type header
set profiles signaling sipAdaptorProfile U2U_TO_SIPREC_OUT rule 2 action 1 to value X-EGRESS-UUID
% Commit
-
-
Allow transparency of the header X-EGRESS-UCID using the following CLI commands:
copyset profiles services transparencyProfile TP_UCID_SIPREC state enabled
set profiles services transparencyProfile TP_UCID_SIPREC sipHeader X-EGRESS-UCID
% Commit -
Configure the SIPREC metadata profile to map the X-EGRESS-UCID value from 200 OK to the SIPREC XML parameter callid using the following CLI commands:
copyset profiles services sipRecMetadataProfile SIPREC_MDP_MAR state enabled
set profiles services sipRecMetadataProfile SIPREC_MDP_MAR version 1
set profiles services sipRecMetadataProfile SIPREC_MDP_MAR metaDataSource fromLatest
set profiles services sipRecMetadataProfile SIPREC_MDP_MAR sipHeader X-EGRESS-UCID sipToXmlTagName callid
% Commit -
Assign the metadata profile to the In-Out Trunk Groups (including where the recording is going) using the following CLI commands.
For the first CLI command, choose the zone that corresponds to the external provider you are using (the example below uses
ZONE2
) and choose the sipTrunkGroup that corresponds to the zone and external provider (the example below usesCISCOUCM_EXT_TG
).copyset addressContext default zone ZONE2 sipTrunkGroup CISCOUCM_EXT_TG services transparencyProfile TP_UCID_SIPREC
set addressContext default zone NICE_ZONE sipTrunkGroup NICE_TG services sipRecMetadataProfile SIPREC_MDP_MAR
% Commit -
Assign the SIP manipulations to the Avaya trunk group.
copyset addressContext default zone ZONE3 sipTrunkGroup AVAYA_INT_TG signaling messageManipulation inputAdapterProfile U2U_TO_SIPREC_IN
set addressContext default zone ZONE3 sipTrunkGroup AVAYA_INT_TG signaling messageManipulation outputAdapterProfile U2U_TO_SIPREC_OUT
% Commit -
If you have successfully configured the SIP manipulations, the Signaling>Message Manipulation screen should look similar to the example below.
Configure TLS and SRTP
Follow these procedures for TLS and SRTP configuration.
-
Log into the Ribbon EMA.
The Dashboard displays.
- In the title bar, click the Administration button.
-
Click System Administration.
-
Expand License Management > Legacy License Settings.
-
In the License Info List, verify the ENCRYPT and SRTP licenses.
-
From the EMA, in the titlebar, click Configuration > Security Configuration.
-
Expand PKI and select Certificate.
-
Copy the 2 self-signed certificates to the SBC path: /obt/sonus/external.
-
For the self-signed SBC certificate, verify:
-
It has a .p12 extension
-
You know the Pass Phrase
-
-
For the NICE self-signed certificate, verify that it has a .der extension.
-
To use and apply the self-signed certificate, click + New Certificate.
-
You need to configure 2 certificates: one for the SBC, and one for CXone.
For each certificate, configure:
Parameter Name
Description
Name Enter a name. This name will be required later.
State Click Enabled.
File Name Enter the name of the certificate that was copied to the path. The value is case sensitive.
Pass Phrase For the SBC certificate only, enter the Pass Phrase. Type -
For the SBC certificate, select Local.
-
For the NICE certificate, select Remote.
-
-
Click Save.
-
Click System Provisioning.
-
Verify that the SIP Carrier Peering is selected in the drop-down list.
-
From the menu, select SIP Sig Port.
-
From the Address Context list, select the relevant Address Context.
-
From the Zone list, select the NICE_ZONE.
-
Select the SIP port row.
-
Scroll down and under Transport Protocols Allowed enable sip-tls-tcp.
-
Click Save.
-
Connect to the PSX Manager.
-
Under Entity, select Crypto Suite Profile.
-
Select the default profile.
-
The supported crypto types for NICE are:
-
AES-CM-128-HMAC- SHA1-32
-
AES-CM-128-HMAC- SHA1-80
-
-
In the Session Parameter Flag area, verify that all checkboxes are unselected.
-
From the menu, select the SRS Group Profile.
-
In the SRS Server Properties area, do this:
-
From the Crypto Suite Profile drop-down list, select Default.
-
Under SRS Server Transport, click TLS.
-
Select Enable SRTP.
-
Click Add Update.
-
Click Save.
-
Prepare AudioCodes SBC
This section describes how to prepare and configure the AudioCodes Session Border Controller (SBC) to integrate with CXone Multi-ACD (CXone Open).
The supported AudioCodes SBC version is 7.4.
The procedures described in this section are recommendations only. The AudioCodes site engineer must perform the AudioCodes preparation and configuration.
Workflow
Use this workflow to prepare your AudioCodes SBC system for CXone Multi-ACD (CXone Open).
Step 1: Verify the License
Step 2: Configure the Proxy Set for CXone Environment
Step 3: Configure the IP Group for the CXone AudioCodes SBC
Step 4: (Secure/Non-secure Environments) Configure SIP Recording
Step 5: Send a UCID to the CXone AudioCodes SBC
Workflow for Secure SIPREC
Use this workflow to prepare your AudioCodes SBC system for secure SIPREC configuration with CXone Multi-ACD (CXone Open).
Step 1: Verify the License
Step 2: (Secure Environments only) Configure the Proxy Set
Step 3: Configure Secure IP Profile
Step 4: (Secure Environments only) Configure the IP Group
Step 5: (Secure Environments only) Import and Export Certificates for SIP Recording
Step 6: (Secure/Non-secure Environments) Configure SIP Recording
Step 7: Send a UCID to the CXone AudioCodes SBC
Verify the License
Verify that the license is valid and that the SBC-SIPREC feature is supported.
-
Connect to the AudioCodes SBC via web.
-
Click the ADMINISTRATION menu.
-
Under TIME & DATE, expand MAINTENANCE and select License Key.
-
Under VOIP FEATURES, verify that the license supports SIPRec Sessions.
Configure the Proxy Set for CXone Environment
This procedure provides guidelines for configuring the SBC for the CXone AudioCodes SBC, including the IP address of the CXone AudioCodes SBC.
-
In the menu, click SIGNALING & MEDIA.
-
Under TOPOLOGY VIEW, expand CORE ENTITIES and select Proxy Sets.
-
In the list of Proxy Sets, click New.
-
In the Proxy Set window, under GENERAL:
-
In the Name field, enter a name.
-
From the SBC IPv4 SIP Interface drop-down list, select the SIP interface.
-
Click APPLY.
-
-
Scroll down and click the Proxy Address link.
-
In the Proxy Sets > Proxy Address window, click New and add IP address for CXone AudioCodes SBC.
-
In the Proxy Address window, under GENERAL, in the Proxy Address field, enter the CXone AudioCodes SBC IP address.
-
Click APPLY.
(Secure Environments only) Configure the Proxy Set
This procedure provides guidelines for configuring the SBC Proxy Set and the Proxy IP address for the CXone AudioCodes SBC for secure connection.
-
In the menu, click SIGNALING & MEDIA.
-
Under TOPOLOGY VIEW, expand CORE ENTITIES and select Proxy Sets.
-
In the list of Proxy Sets, click New.
-
In the Proxy Set window, under GENERAL:
-
In the Name field, enter a name.
-
From the SBC IPv4 SIP Interface drop-down list, select the SIP interface.
-
From the TLS Context Name drop-down list, select the TLS Context with the SBC certificate.
-
-
Scroll down and click the Proxy Address link.
-
In the Proxy Sets > Proxy Address window, click New and add the IP address for CXone AudioCodes SBC.
-
In the Proxy Address window, under GENERAL, in the Proxy Address field, enter the CXone AudioCodes SBC IP address and set the Transport Type to TLS.
-
Click APPLY.
Configure Secure IP Profile
-
From the Setup menu, go to SIGNALING & MEDIA. Under TOPOLOGY VIEW, expand CODERS & PROFILES and select IP Profiles.
-
In the list of IP Profiles, click New.
-
In the list IP Profiles window, under MEDIA SECURITY, make sure the SBC Media Security Mode is set to Secured.
-
Click APPLY.
Configure the IP Group for the CXone AudioCodes SBC
-
In the menu, click SIGNALING & MEDIA.
-
Under TOPOLOGY VIEW, expand CORE ENTITIES and select IP Groups.
-
In the list of IP Groups, click New.
-
In the IP Groups window, under GENERAL:
-
In the Index field, configure the next sequential number.
-
In the Name field, enter a name.
-
From the Topology Location drop-down list, select the location.
-
From the Type drop-down list, select Server.
-
From the Proxy Set field, select the Proxy Set for this IP Group.
-
In the IP Profile field, enter an existing IP Profile ID.
-
In the Media Realm Name field, select the existing Media Realm name.
-
-
Click APPLY.
(Secure Environments only) Configure the IP Group
Verify that the secure IP Profile was configured. See Configure Secure IP Profile.
-
In the menu, click SIGNALING & MEDIA.
-
Under TOPOLOGY VIEW, expand CORE ENTITIES and select IP Groups.
-
In the list of IP Groups, click New.
-
In the IP Groups window, under GENERAL:
-
In the Index field, configure the next sequential number.
-
In the Name field, enter a name.
-
From the Topology Location drop-down list, select the location.
-
From the Type drop-down list, select Server.
-
From the Proxy Set field, select the CXone Proxy Set for this IP Group.
-
In the IP Profile field, select the secure IP Profile previously created in Configure Secure IP Profile.
-
In the Media Realm Name field, select the existing Media Realm name.
-
-
Click APPLY.
-
Then click Save.
(Secure Environments only) Import and Export Certificates for SIP Recording
At the end of this step, you are required to provide to NICE Professional Services:
-
The certificate in PEM format
Before import, the CXone AudioCodes SBC certificate must be saved in PEM format.
-
To import the CXone AudioCodes SBC certificate to the SBC, go to SETUP > IP NETWORK. Under NETWORK VIEW, expand SECURITY and select TLS Contexts.
-
In the TLS Context window, click Trusted Root Certificates.
-
Click Import.
-
In the Import New Certificate window, click Choose File and browse to the CXone AudioCodes SBC certificate. Verify the CXone AudioCodes SBC certificate is in PEM format.
-
Click OK.
-
In the TLS Contexts window, click Certificate Information.
-
On the Certificate Information page, under CERTIFICATE, copy the text of the certificate. Create a certificate from this text.
-
Send the certificate in PEM format to the NICE Professional Services together with the CA, if exists.
(Secure/Non-secure Environments) Configure SIP Recording
This section describes the procedure for SIP Recording enablement and the SIP Recording routing configuration.
-
In the menu, click SIGNALING & MEDIA.
-
Expand SIP RECORDING and select SIP Recording Settings.
-
Under General, from the SIP Recording Metadata Format drop-down list, select either Legacy or RFC 7865 Metadata option. CXone Multi-ACD (CXone Open) supports both options. Configure according to your preferences.
-
Click APPLY.
-
Form SIP RECORDING, select SIP Recording Rules.
-
In the SIP Recording Rules area, click New.
-
In the SIP Recording Rules window, under GENERAL:
-
From the Recorded IP Group list, select the existing agent's side group ID.
-
In the Recorded Source Pattern field, enter the source prefix to be recorded.
-
In the Recorded Destination Pattern field, enter the destination prefix to be recorded.
-
From the Peer IP Group list, select the Service Provider side's group ID.
-
From the Caller list, select Both.
-
-
Under RECORDING SERVER:
-
From the Recording Server (SRS) IP Group list, select the previously created IP Group for the Recorder.
See Configure the IP Group for the CXone AudioCodes SBC or (Secure Environments only) Configure the IP Group.
-
-
Click APPLY.
-
A new row is added in the SIP Recording Routing section.
-
To save all new information, click Save.
Send a UCID to the CXone AudioCodes SBC
In an Avaya environment, the Universal Call Identifier (UCID) of every call must be sent to the CXone AudioCodes SBC.
For egress calls, Avaya CM generates the UCID and then converts it to the User to User Information (UUI), which is sent from the Avaya Session Manager to the AudioCodes SBC in the User-to-User field of the SIP INVITE header, see image below.
In a trace the UUI appears as a hexadecimal value, and in an Avaya CTI event it is displayed as a decimal number (the UCID). The UUI (which contains the UCID) is sent to the AudioCodes SBC, which subsequently sends the UCID to the CXone AudioCodes SBC.
On the Avaya CM, the UUI treatment must be configured as Shared on the trunk to the Avaya Session Manager.
The UCID may or may not be included in an ingress call, that is, a call directed from the service provider to an agent, when it arrives at the AudioCodes SBC. If the UCID is not included, the SBC must generate it.
If the UCID is already included in an ingress call, the SBC should not generate a different UCID.
Follow these steps to enable the SBC generation of the Avaya UCID in the SBC.
-
In the menu, click SIGNALING & MEDIA.
-
Under TOPOLOGY VIEW, expand CORE ENTITIES and select IP Groups.
-
In the IP Groups table, select the IP Group for Avaya and click Edit.
-
In the IP Groups window, scroll down to ADVANCED.
-
From the UUI Format drop-down list, select Enable.
-
Click Apply.
-
Click Save and then click Yes.
The UCID includes an identifier of the node that created it. Configure the value of the node ID that will be used in each UCID generated by the AudioCodes SBC.
-
Use the browser to access the AudioCodes SBC Admin Page. Input this URL:
Http://AudioCodes IP Address/AdminPage
-
Log in using your username and password.
-
Click ini Parameters.
-
In the Parameter Name field, type NetworkNodeId.
-
In the Enter Value field, enter a unique node ID. This node ID must be a unique ID that is not used by any Avaya CM in the local network.
-
Click Apply New Value.
Once a call is established through the AudioCodes SBC, the SBC sends a SIP INVITE message to the CXone AudioCodes SBC. After confirmation by the CXone AudioCodes SBC, the SBC forks the audio and sends it to the CXone AudioCodes SBC.
The CXone AudioCodes SBC is expected to receive the UCID in the SIP INVITE message sent from the SBC during an ingress call or an egress call. The following is an example of the metadata part of a SIP INVITE message sent from the SBC to the CXone AudioCodes SBC, the <ac:AvayaUCID xmlns="urn:ietfarams:xml:ns:Avaya">0015EE805586C304</ac:AvayaUCID> element contains the UCID.
For example, the UCID value here is highlighted:
<ac:AvayaUCID xmlns="urn:ietfarams:xml:ns:Avaya">0015EE805586C304</ac:AvayaUCID>
Prepare the Avaya POM Dialer Environment
Integrate Avaya POM dialer only after configuring Avaya TSAPI with SIPREC and Avaya DMCC.
This section describes how to configure the Avaya POM server to integrate with CXone Multi-ACD.
Avaya site engineer is responsible for all procedures in the Avaya environment. The procedures described in this section are by recommendation only!
Before starting the integration of Avaya POM with CXone Multi-ACD, you need to configure the POM Server.
To configure POM in Avaya Aura Experience Portal:
-
Log in to Avaya Aura Experience Portal.
-
Select the POM page.
-
Select the AACC Configurations page.
-
Check the Avaya AACC login details. Use these details in the CTI configuration.
-
Select the Manage POM Zone Licenses page.
-
Verify that there are sufficient POM Server zone licenses.
-
Select the Campaign Manager page.
-
Select a campaign.
-
Select Call.
-
Verify that the agent outbound skill configured in the POM Server matches that configured in AACC.
-
Close the campaign.
-
Select the Manage Global Configuration page.
-
Scroll down to the WFO section.
-
Check the Avaya POM Server WFO port and the Nail-up call CLID. These will be used in the configuration of the CTI connection.
You need to configure the password for the AACC Agent for POM to never expire.
-
Open the Server Manager on the AACC Agent for POM.
-
In Server Manager, ensure that the user account's password is set to never expire.
The following procedure describes how to configure Avaya POM in Avaya Contact Center.
-
Select the Configuration - Server Properties page.
-
Ensure that the server Type is set to CCPO.
-
Select the Configuration - CDNs page.
-
Check the configuration of the CDNs (the number that customers call to get a skill).
-
Select the Configuration - Skillsets page.
-
Verify that the skillsets are configured.
-
Select Launchpad > Contact Center Management.
-
Select the Agent Details page.
-
In the Agent Details verify that the Voice URI is configured, and that the Create CCT Agent is selected and associated with a local or DNS user.
-
Ensure that the Contact Types are configured:
-
POM_Outbound and Voice - mandatory
-
Email - optional
-
-
Select the Multimedia page.
-
In Multimedia Configuration, launch the multimedia client.
-
In Server Settings, select the POM Server and click Edit.
-
In the POM Settings, verify the POM voice path CLID.
-
In the Agent Settings, verify that the Set Password option is selected and add a password.
-
In CCT Administration, click Launch CCT Console.
-
In the CCT Users page, select the required user.
-
Verify that the Login User Name is configured as the domain\user.
Prepare the Alvaria Aspect Unified IP Dialer Environment
This document details the preparation of the Aspect Unified IP Dialer environment.
To receive CTI Events, you must verify the port number.
To verify the port number:
-
Verify the IP address of the Aspect Unified IP portal.
-
Connect to the Server Configurator.
-
Navigate to Sites > Tenants > EPro > Servers.
-
Right-click CenterCord and select Properties. The Server Properties window appears.
-
In the Server Properties Window, select the CenterCord tab.
-
The Call Logger lists the port, for example 15161. This is the port used to receive CTI events.