MBG ENGs R11.3
MBG ENGs R11.3
Guidelines
November, 2021
Release 11.3
Notice
The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Networks™
Corporation (MITEL®). The information is subject to change without notice and should not be construed in any way as a commit-
ment by Mitel or any of its affiliates or subsidiaries. Mitel and its affiliates and subsidiaries assume no responsibility for any errors
or omissions in this document. Revisions of this document or new editions of it may be issued to incorporate such changes.No
part of this document can be reproduced or transmitted in any form or by any means - electronic or mechanical - for any purpose
without written permission from Mitel Networks Corporation.
Trademarks
The trademarks, service marks, logos and graphics (collectively “Trademarks”) appearing on Mitel's Internet sites or in its publi-
cations are registered and unregistered trademarks of Mitel Networks Corporation (MNC) or its subsidiaries (collectively "Mitel")
or others. Use of the Trademarks is prohibited without the express consent from Mitel. Please contact our legal department at
legal@mitel.com for additional information. For a list of the worldwide Mitel Networks Corporation registered trademarks, please
refer to the website: http://www.mitel.com/trademarks.
Chapter: 11 Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Cluster Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
Node Weighting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
Additional Considerations . . . . . . . . . . . . . . . . . . . . . . . . . .49
Firewall Configuration for Clustering . . . . . . . . . . . . . . . . . . . .49
Overview
The purpose of this document is to describe configuration rules, provisioning, and performance informa-
tion for the MiVoice Border Gateway, and associated products in order to assist in sales and support of
this product. This information is intended for Training, Sales and Product support staff and complements
other sales material and product documentation.
NOTE: The Secure Recording Connector (SRC) has been consolidated into MBG. Accordingly, although
this document discusses the SRC control interface and its protocol, it does not treat them as a separate
feature.
Prerequisites
The MiVoice Border Gateway application runs on the Mitel Standard Linux (MSL) Server. The reader
should first become familiar with the MSL Installation and Administration Guide and the MSL Qualified
Hardware List. These documents are available here.
1
SERVICES
CHAPTER 2 SUPPORTED CONFIGURATIONS
Supported Configurations
Services
MBG provides the following services:
• Remote MiNet IP Phones: The classic use of MBG, formerly known as the Teleworker Solution,
permits remote MiNet phones to securely access the corporate phone network over the Internet.
• Remote SIP IP Phones: Permits Teleworker functionality for SIP hard or soft phones over the Internet.
• SIP Trunking: Allows a corporate phone switch to connect to a SIP Trunk provider, protecting the
switch from malformed messages, unauthorized use, and various attacks, and providing an anchor
point for media streams.
• Call Recording: Formerly the Secure Recording Connector, this service allows secure recording of
phone calls by a third-party application.
• WebRTC: A gateway to support browser-based voice and video calling. This guide provides informa-
tion about the requirements and installation procedures of the MiVoice Border Gateway.
• Remote Proxy:
– Web Proxy: end-user access from the WAN to applications hosted inside the firewall
– Remote Management Service: administrative access from the WAN to applications hosted inside
the firewall
Refer to the Remote Proxy Services documentation for details. MBG can be deployed in several ways
depending on the services required.
Overview
The original design intent of MBG is to provide a Teleworker solution. Once an MBG server is installed,
extensions from the office PBX can be extended across the Internet to permit MiNet phones to work from
homes, remote offices, hotels, and so on. As of MBG 10.1 Teleworkers can now be configured in a more
flexible way for encrypted audio streaming (SRTP) or unencrypted audio streaming (RTP).
When MBG is used in its traditional NORMAL streaming mode it acts as a middleman performing media
anchoring.
Each side of MBG can be configured independently as follows:
• SRTP on both sides
• SRTP on one side and RTP on the other side
• RTP on both sides
While SIP LOCAL streaming mode has been partially supported for some time, MBG 11.2 improves the
existing SIP LOCAL streaming mode for better reliability.
See Remote Phone Access chapter for all details regarding SIP LOCAL streaming.
2
TELEWORKERS AND REMOTE OFFICES
CHAPTER 2 SUPPORTED CONFIGURATIONS
In Teleworker use-case, either the server-gateway profile or DMZ profile could be used depending where
on the network MBG is to be deployed. If deploying behind an existing firewall on a DMZ, then a single
network interface and DMZ profile is appropriate. If deploying beside an existing firewall, or if there is no
existing firewall, then server-gateway profile is appropriate.
Failure to follow these guidelines will result in one-way or no-way audio.
WARNING: Some firewalls which use port-forwarding to simulate a DMZ are Port-forwarding Firewalls. See
the Common Requirementschapter for full
details.
3
TELEWORKERS AND REMOTE OFFICES
CHAPTER 2 SUPPORTED CONFIGURATIONS
The interface may be configured via DHCP, PPPoA, PPPoE or similar technology, but the address it
receives must always be the same.
WARNING: If the external address changes, all teleworker phones must be reprogrammed with the new
address.
An enterprise can take advantage of the DSL, authenticated DHCP and PPPoE/PPPoA1 capabilities of
the MSL server. Additionally provides NAT for all devices at the enterprise, a stateful packet filter firewall,
and optional port-forwarding.
NOTE: If desired and if hardware is available, a third interface may be configured in MSL. This interface
might be useful as a dedicated interface for if a network between the MBG servers can be set aside for
this purpose. Alternatively, the third interface could be put into bridged mode on MSL 9.2+ to permit an
MBG server in parallel with an existing firewall to transparently handle all traffic from that firewall and
accomplish traffic shaping. See Traffic Shaping for full details.
1. Limited support is provided for PPPoA. Mitel recommends the use of a D-Link DSL 300T modem at the enterprise site if PPPoA
connectivity is required in gateway mode. Configure the modem to provide DHCP on the internal interface, and use DHCP on the MSL
server to configure the public interface. The modem acts as a bridge. Note that PPPoA routers that provide NAT will not work here.
4
TELEWORKERS AND REMOTE OFFICES
CHAPTER 2 SUPPORTED CONFIGURATIONS
If the customer’s network has multiple subnets with a common prefix, access can be allowed from the
prefix. For example, if the customer uses various subnets within the 192.168.0.0/16 network, enter a
network of 192.168.0.0 and mask of 255.255.0.0 in the Networks panel, and allow the local router to deter-
mine the routing to the individual subnets.
In addition to providing application access control, the Networks panel can also be used to add static
routes.
NOTE: Note: The Networks panel is a feature of MSL. Refer to the MSL documentation for a full description
of its capabilities.
5
NAT TRAVERSAL FOR MULTI-INSTANCE MIVOICE BUSINESS
CHAPTER 2 SUPPORTED CONFIGURATIONS
Figure 2.4: MBG providing NAT traversal for Multi-instance MiVoice Business
6
SECURE RECORDING ENVIRONMENT
CHAPTER 2 SUPPORTED CONFIGURATIONS
NOTE: Contact Broadview Networks to determine which MBG versions are compatible with silhouette, and
for all support inquiries.
7
SECURE RECORDING ENVIRONMENT
CHAPTER 2 SUPPORTED CONFIGURATIONS
8
SIP TRUNKING
CHAPTER 2 SUPPORTED CONFIGURATIONS
SIP Trunking
MBG introduced support for SIP trunks in release 5.1. The SIP trunk is established from MiVoice Busi-
ness, MiVoice Office 250, MiVoice MX-One, or MiVoice Office 400 to the SIP trunk provider, using MBG
as a SIP-aware firewall and proxy, as shown in figure below. MBG's SIP trunk service provides:
• Support for encrypted audio streaming (SRTP) on the TRUNK side of MBG if the remote TRUNK
provider endpoint also supports it.
• Support for encrypted audio streaming (SRTP) on the ICP side of MBG if the remote ICP endpoint also
supports it.
• NAT traversal of media and signaling
• Media anchoring for the remote provider, regardless of the internal device
• SIP adaptation and normalization to improve interoperability
• Protection from malformed & malicious requests, various types of attack, and request flooding
9
DAISY CHAIN DEPLOYMENTS
CHAPTER 2 SUPPORTED CONFIGURATIONS
When providing SIP trunk service, MBG can be deployed either in the DMZ of, in parallel with, or in place
of an existing fire-
wall.
10
DAISY CHAIN DEPLOYMENTS
CHAPTER 2 SUPPORTED CONFIGURATIONS
11
DAISY CHAIN DEPLOYMENTS
CHAPTER 2 SUPPORTED CONFIGURATIONS
12
MBG IN MICOLLAB
CHAPTER 2 SUPPORTED CONFIGURATIONS
MBG in MiCollab
There are two supported deployments of MBG in MiCollab: on the LAN and on the network edge
(Gateway mode). Deployment in the DMZ is not supported.
13
MBG IN MIVOICE BUSINESS EXPRESS
CHAPTER 2 SUPPORTED CONFIGURATIONS
• SIP Trunking
– Connecting to a SIP trunk service provider from MBG in MiCollab on the LAN is not supported.
• Call Recording
– Connecting to MBG in MiVoice Business Express is not supported for LAN phones.
– Recording calls with MBG in MiCollab on the network edge is not supported for LAN phones.
– Recording calls with standalone MBG on the network edge is not supported for LAN phones.
– Call recording is not available with MBG for the following ICP types: MiVoice Office, silhouette
14
ADMINISTRATIVE ACCESS
CHAPTER 3 COMMON REQUIREMENTS
Common Requirements
This section provides general guidance common to all types of deployments and all services. Read this
carefully.
Administrative Access
MBG provides a web-based management GUI for normal administration, log access, etc. This service can
be accessed with any of the following supported web browsers:
• Microsoft Edge 20
• Internet Explorer 9 and higher (do not run in Compatibility View)
• Mozilla Firefox 41 and higher
• Google Chrome 46 and higher
Although not officially supported, the following browsers are tested occasionally and should also work:
• Apple Safari
• Any browser using the Mozilla Gecko engine or the Apple WebKit engine
NOTE: The MBG GUI requires a browser that supports JavaScript. The built-in MSL text-mode browser
does not support JavaScript and cannot be used to manage MBG.
Some troubleshooting or advanced configuration requires command-line access. SSH is the only
supported mechanism to reach the MSL command line remotely. On Microsoft Windows, Mitel recom-
mends the use of PuTTY (a small, free SSH client). Open SSH is included with Apple Mac OS X (open
Terminal and type “ssh”), and is included with or available for most flavors of Unix.
15
FIREWALLS (DMZ DEPLOYMENT)
CHAPTER 3 COMMON REQUIREMENTS
Details of the protocols that must be configured in the firewall are provided in Firewall Configuration.
Particular attention should be paid to the requirement that all UDP ports >= 1024 on the LAN be permitted
to reach the public IP of the MBG server.
WARNING: Failure to configure the firewall properly will result in audio problems (typically one-way audio).
Known Issues
Port-Forwarding Firewalls
Use of MBG server with a port-forwarding firewall (where the external address of the firewall is shared
between the MiVoice Border Gateway and other applications) is supported by MBG version 3.0 and
higher. The firewall device must have at least 3 interfaces (external, internal, DMZ). This allows for a
single external IP address to be assigned to the firewall. It does not eliminate the need for a separate DMZ
network.
This special configuration is identical to a normal DMZ deployment with the exception that the MBG’s
publicly-visible IP address will be the same as the firewall’s publicly-visible address (that is, the single
public IP address is shared).
WARNING: Two-port firewall devices that simulate a DMZ through port forwarding are not supported, even
if the device allows multiple external IP addresses.
SIP-Aware Firewalls
Many firewall devices today understand the SIP protocol and include some type of NAT traversal or
rewriting of SIP packets. When MBG is used for connecting SIP clients (sets) and trunks, Mitel recom-
mends turning off any SIP features of the main firewall. At best, it is redundant to have two devices
performing the same job. In worse cases, they interfere with each other. Use of SIP over TLS can help
prevent interference from SIP-aware firewalls.
16
FIREWALLS (DMZ DEPLOYMENT)
CHAPTER 3 COMMON REQUIREMENTS
17
REMOTE SITE REQUIREMENTS
CHAPTER 4 REMOTE PHONE ACCESS
Router
A set in a remote site (such as a home or branch office) is assumed to be part of a wired or wireless LAN
behind a simple NAT router that provides access to the Internet, typically through a DSL or cable modem.
Mitel IP and SIP phones generally require a 100/1000 Mbps Ethernet connection, although some models
can be configured for WiFi. (Refer to the device's documentation for configuration details.) All devices
expect a TCP/IP network regardless of the link-layer technology.
The router should provide DHCP service, offering at least an IP address and default gateway. However,
devices can be programmed with static IP addresses and settings in the absence of DHCP.
The router may need to support Authenticated DHCP (client) when used with a cable modem, and must
be configured with the user name and password provided by the ISP.
If WiFi sets are to be used, the router or a separate WiFi access point must also provide 802.11 b/g/n/AC
etc.
The router must control the Internet connection in order for multiple devices to share the connection.
18
REMOTE SITE REQUIREMENTS
CHAPTER 4 REMOTE PHONE ACCESS
NOTE: The remote site may have a dynamic IP address. However, if the address changes during a call,
the call will drop and all devices at the site must re-register with MBG to restore service.
VPN Connectivity
Connecting a PC to the second Ethernet port on the back of a Mitel IP phone does not provide the PC
with a VPN connection to the office network. That connection must still be made by use of the organiza-
tion's supported VPN client software. This ensures that security of the corporate network is maintained
when using MiVoice Border Gateway.
A gateway-to-gateway VPN can be constructed between branch offices (or homes) and the main office,
if desired, such that all the PCs in the remote office have full access to the corporate LAN. However, Mitel
advises that only non-voice traffic be routed across the VPN; voice traffic between sets and the MBG
should traverse the Internet whenever possible. Routing real-time voice protocols across a VPN can
result in degraded service.
MSL, upon which MBG runs, does provide a PPTP VPN service. If desired, the MBG server can be used
as a VPN concentrator for access to the corporate network. However, a VPN is not required to use the
features of MBG itself. For more details, see the Mitel Standard Linux Installation & Administration Guide
(available in Mitel Document Center).
19
REMOTE SITE REQUIREMENTS
CHAPTER 4 REMOTE PHONE ACCESS
Table 4.1: Bandwidth requirements of a single remote teleworker device (Continued) (Sheet 2 of 2)
This table does not consider bandwidth requirements for PCs or other devices, which must be provisioned
in addition to the IP Phone. If there is insufficient bandwidth, symptoms experienced by the IP phone user
may include degraded voice quality, slow response, service interruption or loss of service. It also does not
consider bandwidth requirements for additional applications. See the Additional Application Require-
ments section for more information.
NOTE: A video call requires 10 to 20 times more bandwidth than a compressed audio call even when
configured with the lowest bandwidth settings.
A remote MiVoice Video Unit connecting to MBG over the Internet should be configured to disable the
H.264 High Profile codec and to disable the Dynamic Bandwidth Allocation option. A video conference
should not be initiated from a MiVoice Video Unit on the Internet because it would serve as a bridge and
dramatically increase bandwidth requirements for the call.
Video calls between MiCollab Client 6.0 and MiVoice Video Unit 2.0 are supported through MBG but they
do not negotiate bandwidth at the time of writing. For example, a MiCollab Client on the Internet will
receive video at the rate configured on a MiVoice Video Unit on the LAN even if the MiCollab Client is
configured to use low bandwidth. This will be rectified in a future release of MiCollab Client and/or MiVoice
Conference/Video Unit.
MiCollab Audio, Web and Video Conferencing between AWV clients via the AWV server is also supported
through MBG. The bandwidth usage per video stream is configurable on the AWV client. An additional
consideration is that an AWV client can receive multiple video streams, one for each video participant in
the conference. That number can be reduced at the AWV client by minimizing or closing video windows.
For details and current values, please see the engineering guidelines for the devices/applications refer-
enced as examples here (available in Mitel Document Center).
Bandwidth Usage and ISP Quotas
Many Internet Service Providers set quotas on the amount of IP bandwidth per month. As an aid in
predicting whether a specific quota will be exceeded, this section provides the necessary data and a
sample calculation.
Assumptions:
• Signaling channel requires 1 KByte per minute (average), based on 6 calls per hour, business usage,
15 minutes per hour
• Options keepalive and Gap registration enabled for SIP, at 20s and 300s respectively
Monthly Usage
Bandwidth Required Hourly Usage (100%) (100%)
20
REMOTE SITE REQUIREMENTS
CHAPTER 4 REMOTE PHONE ACCESS
Table 4.2: Bandwidth usage vs time for an IP or SIP phone (Continued) (Sheet 2 of 2)
Monthly Usage
Bandwidth Required Hourly Usage (100%) (100%)
NOTE: 20ms is the default RTP frame size, but the value is configurable in the MiVoice Border Gateway
administration panel.
The data in the above table can be used to:
• estimate the available call time given a quota
• estimate the monthly bandwidth requirement for a given call volume
Given the same 2 GB/month quota, and usage of 15 min/hr, 12 hours per day, 7 days per week:
• Call hours of G.729a = (1448 hours or more than 1 month)
• Call hours of G.711 = (432 hours or roughly 18 days)
If the remote office has a firewall, it must be configured to allow the IP or SIP phone to connect through it
to the MiVoice Border Gateway. The simplest approach is to permit all connections to or from the MBG's
IP address. A second very simple approach is to permit all outgoing connections and any responses to
them. By default, most small office and home NAT routers allow outgoing connections and responses to
those outgoing connections.
Sites with more restrictive security policies may wish to use the following rules:
21
BEHAVIOR
CHAPTER 4 REMOTE PHONE ACCESS
• Allow bi-directional TCP connections to destination port 6881 on the MiVoice Border Gateway IP
Address (for 6920, 6930, and 6940 avatar support)
• Allow TCP connections to destination port 6881 for Corporate Directory Access.
• Allow a bi-directional TCP connection to destination ports 6801 and 6802 on MiVoice Border Gateway
IP address
• Allow bi-directional TCP connections to destination ports 3998 and 6881 on the MiVoice Border
Gateway IP address (for 5235, 5330, 5340 and Navigator set features)
• Allow incoming UDP from source ports 20000 to 30999 on MiVoice Border Gateway IP address
• Allow outgoing UDP to destination ports 20000 to 30999 on MiVoice Border Gateway IP address
• Allow bi-directional TCP connections to destination port 36008 on the MiVoice Border Gateway IP
address, if using Release 6.0 or later.
• Allow incoming and outgoing UDP and TCP to port 5060 on the MiVoice Border Gateway IP address,
if non-encrypted IP support is desired for SIP devices.
• Allow incoming and outgoing TCP to port 5061 on the MiVoice Border Gateway IP address, if
encrypted SIP support is desired for MiCollab Client devices.
Behavior
Mitel IP phones require a TFTP server that holds their set firmware and HTML applications. For remote
phones, this TFTP service is provided by MBG.
Previous versions of MBG bundled a version of the HTML applications and served them directly. This
caused some trouble with keeping versions in sync, especially with multiple ICPs. Since release 7.0, MBG
does a proxy request to the appropriate ICP instead.
When an IP phone connects to its ICP, the ICP (MiVoice Business, MiVoice Office 250, MiVoice MX-One,
and MiVoice Office 400) may issue a File Download directive over the SAC protocol connection. MBG
intercepts these directives and downloads the file on behalf of the remote set. It then sends a modified
directive to the set instructing it to download the cached file from MBG. This ensures that the set receives
the same file that it would if it were directly connected to MiVoice Business. MBG will check periodically
for updated HTML application files at the ICP. The frequency of checks depends on the feature set
supported by the ICP. It could be as often as 10 minutes, and as infrequent as 24 hours.
NOTE: MBG's file downloader does not know about any ICPs until sets connect to MBG and thus get
connected to an ICP. This step happens after a set has already retrieved its firmware load via TFTP. Due
to that, set firmware loads are still bundled with MBG and are not fetched from the ICPs.
22
CONFIGURING MBG FOR REMOTE SIP DEVICES
CHAPTER 4 REMOTE PHONE ACCESS
NOTE: This is a minimal configuration. Refer to Appendix A: Firewall Configuration Reference for the full
set of rules and optional settings.
You can change this configuration, globally or for individual users, with the “Options keepalives” and
“Options interval” parameters. For example, to force Options requests to be sent to all SIP devices
(including devices that are connected using TCP or TLS, and devices that are connected using UDP but
are not located behind NAT) set the “Options keepalives” parameter to “Always” on the Settings screen.
To ensure that the SIP connection is maintained on a busy network, reduce the “Options interval” from its
default value of 60 seconds to 20 seconds. Alternatively, on a quiet network, you may choose to increase
the “Options interval” to its maximum value of 180 seconds. Note that frequent SIP traffic is required
between the set and MBG in order to maintain NAT bindings on the remote NAT router. A device that
times out due to inactivity may lose its NAT binding and the ability to receive calls from MBG.
On a “quiet” network it is sufficient to disable gapped registration and raise the options interval to its
maximum value (180s at this time). If all remote SIP devices send their own keepalives or re-register at
an interval less than 300s, MBG's Options Keepalives can be turned off.
Support
While SIP clients can address MBG by its IP address, Mitel recommends the use of a fully-qualified
domain name (FQDN) in the public Domain Name System (DNS) that resolves to the public IP of the MBG
server.
Advantages:
• The IP address of the MBG server can be changed, and the clients will not need to be reconfigured.
23
FIREWALL CONFIGURATION FOR REMOTE SIP DEVICES
CHAPTER 4 REMOTE PHONE ACCESS
• DNS can provide a certain level of resiliency in case an MBG server experiences any kind of service
outage. Simply configure the FQDN to resolve to multiple MBG servers. Please note that MBG cannot
control how a SIP device behaves when it receives multiple IP addresses in a DNS response.
NOTE: A remote SIP message will be recognized as being addressed to MBG if the IP in the URI is one
that MBG owns, or the FQDN in the URI either resolves to an IP that MBG owns, or is one of the config-
ured “Allowed URIs” in the “SIP options” section of the Configuration tab.
WARNING: A SIP server requires functional DNS even if all devices are configured to use IP addresses
instead of FQDNs. MBG is no exception. Failure to provide MBG with a working DNS resolver or
preventing MBG from reaching the Internet DNS root servers can cause delays or failures in call setup.
SIP over TLS (port 5061) is the default setting on MiCollab Client SIP softphones. This setting may be
changed to SIP over TCP (port 5060) on the individual clients.
NOTE: This is a minimal configuration. Refer to Firewalls (DMZ deployment) for the full set of rules and
optional settings.
1. The ports listed here correspond to services that have been enabled on MBG.
24
FIREWALL CONFIGURATION FOR REMOTE SIP DEVICES
CHAPTER 4 REMOTE PHONE ACCESS
networks:
25
FIREWALL CONFIGURATION FOR REMOTE SIP DEVICES
CHAPTER 4 REMOTE PHONE ACCESS
26
FIREWALL CONFIGURATION FOR REMOTE SIP DEVICES
CHAPTER 4 REMOTE PHONE ACCESS
Failure to comply with any of the crucial items listed below will result in:
• Best-case scenarios: automatic fallback to NORMAL streaming.
• Worst-case scenarios: media issues requiring troubleshooting (including but not limited to: call setup
failures/timeouts, no-audio, one-way audio, no-video, one-way video, inability to place call on-hold,
inability to retrieve call from-hold, inability to transfer call).
Ensure your deployment meets these requirements on MBG:
Proper (audio/video) UDP RTP/SRTP port range This is in case automatic fallback to NORMAL
MUST be configured on MBG streaming happens which is always possible at
any given point whether establishing a call or
doing an operation on an existing one.
Sample port range (using default values
suggested in this document):
• UDP AUDIO port range: 20002-29999
• UDP VIDEO port range: 30000-30999
SRC call recording MUST be disabled SRC call recording cannot be used concurrently
with LOCAL streaming.
The router MUST be configured to properly This is in case automatic fallback to NORMAL
forward RTP/SRTP media packets in the port streaming happens which is always possible at
range configured on MBG between the DMZ and any given point whether establishing a call or
LAN networks doing an operation on an existing one.
Sample RTP/SRTP media port range to be
allowed for forwarding between DMZ and LAN
interfaces at all times (using default values
suggested in this document):
• UDP AUDIO port range: 20002-29999
• UDP VIDEO port range: 30000-30999
The router MUST be configured to properly Sample SIP signaling port range to be allowed for
forward UDP/TCP/TLS SIP signaling packets for forwarding between DMZ and LAN interfaces at
the ports configured on MBG between the DMZ all times (using default values suggested in this
and LAN networks at all times document):
• SIP UDP: 5060/udp
• SIP TCP: 5060/tcp
• SIP TLS: 5061/tcp
27
FIREWALL CONFIGURATION FOR REMOTE SIP DEVICES
CHAPTER 4 REMOTE PHONE ACCESS
Both SIP devices communicating together use Only SIP devices involved – NO MINET.
SIP
Both SIP users communicating together are Only UNIQUE SIP users are involved – a given
UNIQUE user cannot communicate with itself.
Both SIP users communicating together MUST LOCAL streaming is only currently possible with
have a single registration on any given physical users having a single registration on any given
device physical device – multiple concurrent users
registrations are NOT currently supported.
Both SIP devices communicating together have This typically means any private IPV4 RFC1918
IP addresses that are based on compatible LAN or the same public IPV4 non-RFC1918 WAN
networks as long as:
• No routers are present in-between devices
• No NAT is performed in-between devices
• No firewalls are present in-between devices
• No ALGs are present in-between devices
Both SIP devices communicating together are In other words SAME NAT can only exist if BOTH
allowed to use NAT ONLY through the same IP devices are located on the WAN side of the
address (but different port) router.
Both SIP devices communicating together are This is because LOCAL STREAMING does NOT
configured to use the same RTP/AVP or involve MBG translating the RTP/SRTP packets
RTP/SAVP protocol (NOT a mix of both) as a middle man (as NORMAL STREAMING
does).
Therefore both devices communicating together
must use ALL RTP or ALL SRTP but never a mix
of both.
Both SIP devices communicating together RFC4568 SRTP is the only specification
support RFC4568 SRTP (if SRTP is used) supported for SRTP by MBG.
Both SIP devices communicating together have One of the following RFC4568 SRTP cryptosuites
at least one RFC4568 SRTP cryptosuite in MUST be supported by BOTH devices (this is no
common (if SRTP is used) different from NORMAL STREAMING cases):
• AES_CM_128_HMAC_SHA1_80
• AES_CM_128_HMAC_SHA1_32
Both SIP devices communicating together have This is no different from NORMAL STREAMING
at least one codec in common cases.
Both SIP devices communicating together MUST This is in case NORMAL streaming is selected as
be properly configured to use the audio/video a fallback instead of LOCAL streaming.
UDP RTP/SRTP port range configured on MBG
28
FIREWALL CONFIGURATION FOR REMOTE SIP DEVICES
CHAPTER 4 REMOTE PHONE ACCESS
SIP persistent TLS signalling MUST be used in When using SIP UDP signalling MIV5000 PBX
order to allow SRTP streaming only supports RTP streaming – it does not
support SRTP streaming.
When using SIP TCP signalling MIV5000 PBX
only supports RTP streaming – it does not
support SRTP streaming.
This is due to the decision of the MIV5000 PBX
team not to fix MIVCK-3634 which, by current
design of the MIV5000 PBX, only supports SRTP
streaming when SIP persistent TLS signalling.
Therefore attempts to use SRTP ONLY
configuration when SIP UDP or SIP TCP are
used as the signalling transport protocol for any
given SIP device will cause call setups to fail – an
issue which would not otherwise be seen when
using NORMAL streaming since MBG performs
the B2BUA role of rewriting the SDP in that case.
KPML (Key Press Markup Language) MUST be PBX KPML functionality cannot be used
disabled concurrently with LOCAL streaming.
As of MBG 11.2 only the MIV5000 PBX is FULLY supported for LOCAL STREAMING (for example, for
both RTP and SRTP call flows). Following table provides details on other supported PBXes:
29
OVERVIEW
CHAPTER 5 SIP TRUNKING
SIP Trunking
Overview
A “SIP trunk” in the context of MBG is simply a pair of endpoints, defined by their IP addresses and
signaling ports. One of the endpoints is usually your ICP (MiVoice Business/3300 ICP, MiVoice Office
250, MiVoice MX-One, MiVoice Office 400, MiVoice Border Gateway, or Mitel 5000), and the other is your
SIP provider’s firewall or SBC. These endpoints can be classified by the following modes:
• Fixed Mode: Pair of endpoints manually configured by the MBG administrator (addresses/ports are
static).
• SRV Mode: Multiple endpoints automatically configured by MBG using the SIP Trunk Provider’s DNS
server without any MBG administrator intervention (addresses/ports are dynamic).
A trunk can have any number of “channels”, each of which corresponds to an active media stream. A
channel license is required for each active channel, so you will need enough channel licenses to cover
the maximum number of active calls.
NOTE: For video calls, MBG requires two-channel licenses as it uses two media streams.
As an analogy, an ISDN PRI link contains 23 B channels for audio and one D channel for signaling and
can carry a maximum of 23 simultaneous calls. This would be equivalent to a SIP trunk with 23 channel
licenses.
As of MBG 11.0:
• UDP, TCP and TLS transports in both Fixed and SRV mode are supported.
• transport protocol translation is not performed; that is, if TCP is selected as the transport protocol on
MBG, both, the ICP as well as the service provider must also be using TCP to match with MBG; there
cannot be any mismatch on each side of MBG. For example, there cannot be UDP on one end and
TCP on the other end.
• encrypted audio streaming (SRTP) is now supported in TRUNK scenarios independently on either side
of MBG:
– On the TRUNK side of MBG if the remote TRUNK endpoint provider supports it.
– On the ICP side of MBG if the remote ICP endpoint supports it.
NOTE: On the MiVoice Business (3300 ICP), the MBG is configured as an outbound proxy in the Network
Element form.
WARNING: In the 5.X releases, the SIP trunk connector listened on UDP port 5064 by default. As of MBG
6.0 the SIP connector can handle device endpoints and SIP trunks, so UDP port 5060 is used for both
devices and SIP trunks. The Legacy Connector can no longer be re enabled as of MBG 8.0. If UDP port
5064 is in use, then you will need to contact your SIP Trunk provider to have their equipment changed to
use MBG's UDP port 5060 before upgrading MBG to 8.0 or later.
WARNING: A SIP server requires functional DNS even if all devices are configured to use IP addresses
instead of FQDNs. MBG is no exception. Failure to provide MBG with a working DNS resolver or
preventing MBG from reaching the Internet DNS root servers can cause delays or failures in call setup.
30
SEND OPTIONS KEEPALIVES
CHAPTER 5 SIP TRUNKING
NOTE: Ensure that this configuration is implemented for a resilient trunk configuration. Otherwise, in the
event that an ICP becomes unavailable, the secondary connection may not be active and calls may fail.
Bandwidth Requirements
Refer to Sizing Your Installation section.
On ICP “B”:
• Repeat steps 3, 4, and 5 (steps 1 and 2 are unnecessary because the network element information is
shared between ICPs).
On Other nodes in the cluster (for example, ICP “C”):
31
RESILIENT ICP CONFIGURATION
CHAPTER 5 SIP TRUNKING
• Provision each element in the cluster with IP trunks with route lists to ICP A and ICP B.
Alternative Programming
If you cannot use an FQDN to reach MBG "A" and "B", do the following to achieve resiliency:
1. On ICP A, create a Network Element Assignment for MBG A (as Type: Outbound Proxy) and another
for the SIP provider’s SBC (as Type: Other). Create a SIP Peer Profile for the SBC, specifying MBG
A as the Outbound Proxy.
2. On ICP B, add a Network Element Assignment for MBG B (as Type Outbound Proxy) and create
another SIP Peer Profile for the SBC, specifying MBG B as the Outbound Proxy.
3. On ICP A, program a Route List in ARS with SIP peer A and a route to ICP B as an alternate. Then
program ARS Digits Dialed.
4. On ICP B, program a Route List in ARS with SIP peer B and a route to ICP A as an alternate. Then
program ARS Digits Dialed.
32
RESILIENT TRUNK CONFIGURATION
CHAPTER 5 SIP TRUNKING
33
RESILIENT TRUNK CONFIGURATION
CHAPTER 5 SIP TRUNKING
The function of Transport protocol is to automate the provision for resiliency. Select SRV from the Trans-
port protocol drop-down to enable MBG to use SRV Trunking Mode for the Trunk Service Provider. When
this option is enabled, the Remote Trunk endpoint port and Remote Trunk endpoint address fields are
automatically configured and cannot be edited.
By default, this option is set to a non-SRV value (for example, UDP or TCP or TLS), and MBG uses Fixed
Trunking Mode for the Trunk Service Provider. With Fixed Trunking Mode, you will need to manually
configure the Remote Trunk endpoint port and Remote Trunk endpoint address fields.
MBG does not support transport protocol translation, which means, for example, if selecting TCP as the
transport protocol, the ICP end points as well as the service provider, needs to be using TCP. One end
cannot be UDP and the other end TCP.
Both SRV trunks and fixed trunks must use mutually exclusive addresses - a fixed trunk cannot use an IP
address (or an FQDN that resolves into an IP address) that is also listed in at least one of the records of
an SRV trunk service provider that is used by MBG and an SRV trunk that is used by MBG cannot use
an IP address that is listed as one for a fixed trunk.
34
DNS SUPPORT
CHAPTER 5 SIP TRUNKING
DNS Support
While the ICP can address MBG by its IP address, Mitel recommends the use of a fully-qualified domain
name (FQDN) in the public Domain Name System (DNS) that resolves to the public IP of the MBG server.
Advantage:
• The IP address of the MBG server can be changed, and the ICPs will not need to be reconfigured.
NOTE: An ICP SIP message will be recognized as being addressed to MBG if the IP in the URI is one that
MBG owns, or the FQDN in the URI either resolves to an IP that MBG owns, or is one of the configured
“Allowed URIs” in the “SIP options” section of the Configuration tab. Typically, the hostnames you add to
the “Allowed URIs” list will be for the SIP service provider's session border controller or service domain.
WARNING: A SIP server requires DNS functionality even if ICPs are configured to use IP addresses instead
of FQDNs. MBG is no exception. Failure to provide MBG with a working resolver or preventing MBG from
reaching the Internet DNS root servers can cause delays or failures in call setup.
SIP Adaptation
It becomes necessary to make specific changes to the service itself for meeting the requirements of
different providers to inter-operate between multiple SIP providers. One provider might want a header in
a particular format while another provider wants the same header in a different format. Adding patches to
the service itself in MBG to support such customized requests is not feasible because it requires too many
patches to be managed.
The SIP Adaptation feature makes support for customized requests easy to implement and scalable. SIP
Adaptation is done through a SIP Proxy that operates between two or more SIP endpoints. To accomplish
this, a plug-in architecture was created in MBG's core service. This architecture permits plugins to act on
SIP headers in MBG's SIP processing pipeline. An open-source scripting language, Lua, originally
intended for embedding in a software application to provide customizable scripting support, was used for
scripting the plugins. For information about scripting the plugins, see the MBG Lua API document in the
Create Pipeline page in the MBG interface.
The SIP Adaptation page displays any configured adaptation pipelines in the Pipeline information table.
This table is blank until you have created pipelines. Pipelines might have a global scope and apply to all
SIP traffic, or they may be tied to a particular SIP trunk. After you have created a pipeline, apply the pipe-
line globally across all SIP trunks, or to specific SIP Trunks.
35
FIREWALL CONFIGURATION FOR SIP TRUNKING
CHAPTER 5 SIP TRUNKING
NOTE: This is a minimal configuration. Refer to Appendix A: Firewall Configuration Reference for the full
set of rules and optional settings.
36
MITEL SECURE RECORDING CONNECTOR
CHAPTER 6 CALL RECORDING
Call Recording
The Mitel call recording solution encompasses multiple parts, including the MBG call recording service, a
compatible call recording application, call manager platform and devices. Call recorders vary in their
support of Mitel platforms and features. Configuring a solution line-up is beyond the scope of this docu-
ment. Consult your recording vendor or Mitel sales engineering. Refer to the MBG Online Help for detailed
information on the Call Recording Service.
MBG provides a service that allowss external Call Recording Equipment (CRE) to record audio calls:
• Secure Recording Connector(SRC): A Mitel proprietary service to record MiNET and SIP devices as
well as SIP trunks.
NOTE: WebRTC calls cannot be recorded.
Requirements
This section contains software/hardware requirements necessary to support the Secure Recording
Connector service.
37
PHONES/DEVICES
CHAPTER 6 CALL RECORDING
Phones/Devices
For a complete list of devices that are supported by the secure recording connector service of MBG,
please refer to the MBG Remote Phone Configuration Guide available at Mitel Document Center.
Firewall
The direction of the arrow indicates permission to initiate new traffic in that direction. These rules assume
a stateful firewall that will permit return traffic on an existing established connection.
The following connections must be configured:
38
WEBRTC GATEWAY SUPPORTED CONFIGURATIONS
CHAPTER 7 WEB REAL-TIME COMMUNICATION (WEBRTC)
ICP Support
The WebRTC gateway can be implemented with MiVoice Business, MiVoice MX-ONE, MiVoice Office
400, or MiVoice Office 5000 ICP. With a MiVoice Office 400, users can place anonymous calls over a SIP
trunk. With a MiVoice Business, MiVoice Office 5000, MiVoice MX-ONE, users can place anonymous
calls over a SIP trunk or log in as subscribers in order to place and receive calls and access the company
directory from an LDAP database.
NOTE: The WebRTC is only supported for IPv4.
39
FIREWALL CONFIGURATION FOR WEBRTC GATEWAY
CHAPTER 7 WEB REAL-TIME COMMUNICATION (WEBRTC)
Default web pages are provided by MBG. These can be used without modification, or new web pages can
be created that match the look and feel of the customer's website.
40
MICOLLAB CLIENT V6.0+
CHAPTER 8 ADDITIONAL APPLICATION REQUIREMENTS
MiContact Center
The following additional rules are required:
From the Internet to the MBG server:
• allow protocol TCP, destination ports 35001 – 35008 (inclusive), 36000 – 36004 (inclusive)
From the MBG server to the LAN:
41
WEB PROXY
CHAPTER 8 ADDITIONAL APPLICATION REQUIREMENTS
• allow protocol TCP, destination ports 80, 443, 1443, 5024 – 5026 (inclusive), 5030, 7001, 7003, 8083,
8084, 8188, 42440
Web Proxy
The following additional rules are required, at minimum:
From the Internet to the MBG server:
• allow protocol TCP, destination port 443
From the MBG server to the LAN server:
• allow protocol TCP, destination port 443
42
MICOLLAB AWV CONFERENCING
CHAPTER 8 ADDITIONAL APPLICATION REQUIREMENTS
43
SIP SECURITY
CHAPTER 9 ADDITIONAL SECURITY CONSIDERATIONS
SIP Security
MBG supports the following forms of SIP security:
• Transport Layer Security (TLS) on both, the SET side and ICP side, with the option to present a Mitel
built-in or a trusted third party certificate. TCP/TLS encrypts signaling between SIP devices, and is
recommended if you enable set-side SRTP security.
• Secure Real-time Transport Protocol (SRTP) on the ICP side as well as the SET side. SRTP provide
encryption, message authentication and integrity for the media stream between SIP devices and MBG.
• As of MBG 10.1 SRTP is supported for both TeleWorker SETs and TRUNK scenarios.
• As of MBG 11.0, SIP signaling for TRUNK scenarios is supported for all of UDP or TCP or TLS trans-
ports in Fixed and SRV mode.
44
OVERVIEW
CHAPTER 10 TRAFFIC SHAPING
Traffic Shaping
Overview
For small businesses with a simple setup to the Internet, sharing that upstream link between voice and
data can be problematic. Users in the middle of calls to the PSTN via SIP trunks, for example, will find the
voice quality of their calls greatly reduced if a member of the office were to suddenly start a large down-
load from the Internet. To mitigate these issues, MBG has the capability to prioritize the IP traffic that it is
handling. This technique is commonly known as traffic shaping.
To shape traffic, MBG must be in a position to handle all traffic to the organization’s upstream link; specif-
ically, it must be in gateway mode with a minimum of two network interfaces. In this mode, it can act as
the organization’s firewall. More commonly, however, the organization already has a firewall product of
some kind, and would like to deploy MBG and use traffic shaping with a minimum of disruption. This
“transparent” deployment is possible on servers with three network interfaces.
Using MSL 9.2+ the third interface can be put into bridged mode. The bridged interface can then be
connected to the WAN interface on the existing firewall. This configuration transparently places MBG
between the existing firewall and the WAN, and allows MBG to prioritize the organization’s traffic, without
requiring changes to the existing firewall.
Technical Details
Figure below illustrates the queuing discipline that MBG uses for traffic shaping. The hierarchical nature
of the algorithm allows lower priority queues to use tokens available in higher priority queues, which
means that when little VoIP traffic is available, lower priority data will not be unnecessarily constrained.
Thus, the customer can make full use of their available bandwidth to the Internet.
The categorization of high priority vs. low priority traffic is performed based on two criteria:
1. Source IP Address: If the source IP address of the traffic belongs to any of the network interfaces on
the MBG server, then it matches the first criteria. In other words, MBG must originate the traffic.
2. DSCP value: The second criteria of high priority traffic is a DSCP value of 46 decimal, 0x2E hex
(Expedited Forwarding). This value must be set on packets that are considered high priority. MBG will
set the value for its own VoIP-related traffic.
If both of these criteria are satisfied, then the traffic ends up in the high priority queue. Otherwise, it is
considered low priority and will only be permitted through the HTB queue if the high priority queue has
unused tokens.
This does mean that excessive high priority traffic can starve low priority data traffic. However, 10% of
available bandwidth is reserved for low priority traffic (if it is present), so it should not starve completely.
This reservation does not waste bandwidth: it can be “borrowed” by the high priority queue if no low
priority traffic is
45
TECHNICAL DETAILS
CHAPTER 10 TRAFFIC SHAPING
present.
46
OVERVIEW
CHAPTER 11 CLUSTERING
Clustering
Overview
Clustering in this context refers to the ability of multiple MBG servers to communicate with one another
via TCP, sharing data and providing the capability to manage multiple nodes thus joined as if they were
a single unit.
Clustering also provides load balancing for supported MiNet devices, making the job of distributing
devices across servers to share workload simple and effective. Set resiliency is also used within clus-
tering, so that supported MiNet sets which can persistently store up to four IP addresses will have their
resiliency list populated based on the cluster members. If a set loses its connection and cannot reconnect
to its own node, it will try the next IP address on its list until it has exhausted all IP addresses on the resil-
iency list.
Clustering relies on a mesh of TCP connections between the nodes in the cluster. TCP port 6809 must
be reachable between all nodes for cluster comms to be established. SSL/TLS is used to encrypt commu-
nications, so it is safe to use over the Internet.
Administrative access to each server in the cluster is required to establish a trust relationship between the
nodes. The trust model is based on the IP addresses used to establish cluster comms. Each node is
configured via the clustering tab to trust a connection coming in from a particular IP address. These
addresses are shared across the cluster, so they must be reachable by all nodes involved, and any use
of NAT will break the trust model. A summary of the steps to create a three-node cluster are shown below.
Refer to the MiVoice Border Gateway Blade Installation and Maintenance Guide for full instructions on
creating a cluster.
• Create the cluster from the master node, entering the IP address of the first slave node.
• Join the cluster from the first slave node, entering the IP address of the master node.
• Assuming no networking issues, the clustering tab will show established connections, and the slave
node will show a backlog of events from the master (or it will finish too quickly to be seen).
• Add a node on the master, entering the IP address of the second slave node
• At this time, the first slave will receive the same data regarding the second slave via cluster comms.
• Join the cluster on the second slave, entering the IP address of the master node.
• Assuming no networking issues, the clustering tab on all nodes should show the peer nodes for that
node.
• The three node cluster is now established.
NOTE: You can transform any member of a cluster into the master node. To do this, access the Clustering
tab of the selected slave node and then click Take Ownership.
Once cluster communications are established, the master node will “push” data to the slaves until they
are in sync with the master. Conflicting data is overwritten. When a slave joins the cluster, its existing
database is deleted and a new database is provided by the master.
47
CLUSTER ZONES
CHAPTER 11 CLUSTERING
Cluster Zones
A cluster zone is a non-overlapping subset of nodes within an existing cluster. All nodes start out in the
“Default” zone. The “Default” zone can be renamed but it cannot be deleted. It is easily identified because
it appears first in the zone list, and has no “delete” link. Nodes can be left in the default zone if additional
zoning is not required.
Additional zones can be created, and nodes can be moved to any zone. Zones can be created based on
geographic location, the intended purpose for the nodes, or whatever reason the admin chooses. The
purpose of zones is to provide device affinity.
By default all MiNet sets will be associated with the default zone. By editing the set, the set may have its
affinity changed to a different zone. The implications of this are as follows:
• A set’s load-balancing list of nodes will always favor nodes in its zone
• The last entry in the load-balancing list will be a node from the default zone
This feature was introduced to support geographically dispersed clusters. For example, if there are three
servers in North America and three in Asia, it makes little sense for Asian sets to be load balanced to North
America unless all of the Asian servers are unreachable. Using cluster zones, a “North America” zone
and an “Asia” zone could be created, and sets in Asia could be placed into the Asian zone. The sets in
each region would then prefer the nodes in their region, reducing network latency and bandwidth use.
Similarly, zones can be created to segregate devices by function, such as keeping trials users on a sepa-
rate node from regular users, or to split users by organizational group.
Node Weighting
Not all servers are created equal. If the hardware in the cluster is all equivalent, it is safe to leave the
weight of each node in the cluster at its default value of 100. This ensures evenly-distributed load
balancing.
To inform the cluster that a given node should handle more than an equal share of the load, increase its
weight. If the server should handle less, lower the weight. For instance, assume there is a cluster of three
nodes with weights of 50, 50, and 100. The two smaller servers (lower weights) will each handle roughly
one quarter of the total load, while the third server handles the remaining half of the load.
Weights are not percentages1; they are simply a ratio of relative server power. Weights of 100,100,100
are equivalent to weights of 1,1,1. However, if the sum of all weights is 100 (or close to it), they can be
treated as percentages of the total load and the system will behave as expected.
A weight of zero prevents any devices from connecting and will cause MBG to move all connected devices
to other nodes.
Expressed mathematically, the above is simply: sets_on_a_node = total_sets x ( node_weight / sum(
node_weights) )
NOTE: The distribution of devices will not be mathematically perfect. Some hysteresis is built in to the load-
balancing algorithm to prevent devices from being redirected too often in a vain attempt to perfectly
balance the cluster.
1. Note that using “total_sets = 100” in the formula below gives the percentage of total load handled by one node.
48
ADDITIONAL CONSIDERATIONS
CHAPTER 11 CLUSTERING
Note that weighting applies to zones, not to clusters. The “total load” is the load from devices configured
with the same zone as the node. (In a cluster with only the Default zone, this distinction can be ignored.)
As an example, consider a cluster with five nodes and two zones. Two servers are in the “North America”
zone and two servers are in the “Asia Pacific” zone. The remaining server is left in the Default zone.
The two North America servers are identical and have weights of 10. Each one will handle roughly one
half of the total load of devices configured for the North America zone. One of the Asia Pacific servers is
new and has more capacity; it has a weight of 20 and the other server has a weight of 10. The newer
server will handle twice as much load (roughly two thirds) as the other server (one third). The fifth server
handles 100% of the load in the Default zone, regardless of its weight.
WARNING: Not all devices can be load-balanced. See Additional Considerations for details.
Additional Considerations
While heterogeneous server capabilities are supported in a cluster thanks to the weighting mechanism,
this weighting only affects the number of connected devices on each server. The cluster communications
adds additional load on each server, so adding a node to the cluster does not, necessarily, linearly
increase the capabilities of the cluster.
Furthermore, if the master node is used as the initial point of contact for all devices, then it should not be
a “weak” server. There are many supported devices that do not support redirection, so the server they are
programmed to contact will be the only server that they connect to. Setting a low weight on the main node
will not change this. All SIP devices, MiNet softphones, and 5550 IP Console fall into this “non-redirect-
able” category. Such devices must be balanced manually by programming the devices to contact specific
nodes. Setting a low weight, or a weight of zero, on nodes that handle non-redirectable devices can help
with manual load balancing.
49
RESILIENCY
CHAPTER 12 ADVANCED OPTIONS
Advanced Options
Resiliency
MiNet devices are protected with two forms of resiliency: "Run time" and "Boot time".
50
IP TRANSLATIONS
CHAPTER 12 ADVANCED OPTIONS
• DHCP: If the device does not have a Resiliency List or Teleworker IP, DHCP is used to obtain an IP
address.
For example, when a user reboots her MiNet device, the device will first check whether it has received a
Resiliency List. If the list has not yet been configured or downloaded, the device will then check whether
it has a Teleworker IP address. If the Teleworker IP address has not been configured, the device will
obtain an IP address from a DHCP server. ;
NOTE:
• Boot time resiliency can be used in either a clustered or non-clustered environment.
• In a clustered environment, Mitel recommends populating the Resiliency List with nodes in the cluster.
If the cluster is spread across a subnet boundary, include nodes from each subnet to prevent a single
point of failure.
IP Translations
Multiple servers deployed on the same DMZ need to each be addressable by individual public IPs so Tele-
worker clients can reach them. The IP addresses configured on their interfaces should be DMZ
addresses, most likely from the RFC 1918 range to prevent routing to or from the DMZ without specific
rules in the firewall and on the LAN. This presents a problem for MBG servers that need to stream to one
another.
Consider an example of two servers, server A and server B, both installed in a DMZ configuration on the
same DMZ.
Public IP DMZ IP
Set 1 connected to MBG-A calls set 2 connected to MBG-B. MBG-B intercepts the signaling and MBG-A
sees a request to stream from set 1 to the public IP of MBG-B. If MBG-A streams to MBG-B via its public
IP, there is a very strong possibility that the firewall will not permit the SRTP traffic to route back to the
DMZ that it originated from, resulting in audio problems. Furthermore, it is a waste of bandwidth on the
public side of the firewall to stream traffic out to it that is destined for a server on the same network once
the firewall’s NAT rules take effect.
The solution is simple. Both problems are solved by streaming directly from MBG-A's to MBG-B using
their DMZ addresses. Unfortunately MBG-A is not aware of the existence of MBG-B. This is the purpose
of the IP Translations feature.
In the MBG management GUI, choose Configuration and then IP Translations. In this example, the admin-
istrator would enter the following rule on MBG-A: Destination address: 66.46.21.12 Translation address:
192.168.0.6
Now when MBG-A encounters the IP address of 66.46.21.12 in the call setup, it translates it to
192.168.0.6 instead. For this to work in both directions, a reciprocal rule must be entered on MBG-B:
Destination address: 66.46.21.11 Translation address: 192.168.0.5
Now a two-way call is properly routable between the two servers.
51
STREAMING ADDRESSES
CHAPTER 12 ADVANCED OPTIONS
NOTE: This feature is suitable only for small numbers of servers. For N servers, each server requires a list
of N-1 translation rules. This becomes difficult to manage for larger values of N. An auto-population
feature, leveraging the clustering support, is being investigated for a future release.
Streaming Addresses
The MBG server will automatically determine the correct IP addresses to which endpoints must send their
(S)RTP, if the server has been put into a standard, supported configuration and the correct network profile
for that configuration has been chosen. See Services for full details on the supported configurations.
However, sometimes it is necessary to override the default streaming addresses, typically due to a
non-standard configuration. When the admin views the Network profiles (under the Configuration tab), the
current network profile will be shown with an interface to apply the supported network profiles.
Arbitrary addresses can be entered by selecting the Custom profile, if the “canned” configurations are not
suitable. These addresses are used during signaling to inform the endpoints where to send RTP. If they
are incorrect, there will be audio problems (typically one-way audio or no audio).
52
TFTP BLOCK SIZE
CHAPTER 12 ADVANCED OPTIONS
The Configuration tab holds the global master setting. This setting is used as the default, and should be
left on “Automatic” unless there is a pressing need to change it. Overrides can be placed on specific
devices and trunks as required. For example, certain wireless networks handle RTP streams using larger
(e.g. 40 ms) packets better than streams using smaller ones.
NOTE: The frame size override only affects the streams to and from devices. The ICP-side streaming is
always auto-negotiated. On SIP trunks, both WAN and ICP sides can be specified separately.
Compression Codecs
MiNet devices
If you are doing secure call recording and the 3rd-party call recording equipment (CRE) only supports
G.711 or G.729, you can restrict MBG to using those codecs. If you are not operating under these limita-
tions, you should allow MBG to use an unrestricted range of codecs.
In addition, to reduce the amount of bandwidth consumed on the Internet side of the connection, you can
force remote MiNet sets to use a specific codec. If bandwidth is not an issue, you can allow the sets to
select a codec independently. Note that if this option is enabled, compression licenses are required to
support transcoding from the Internet side to the ICP side of MBG.
SIP devices
If you are doing secure call recording and the 3rd-party call recording equipment (CRE) only supports
G.711 or G.729, you can restrict MBG to using those codecs. If you are not operating under these limita-
tions, you should allow MBG to use an unrestricted range of codecs.
1. Receipt of each block must be acknowledged before the next block is sent
53
SRTP PORT RANGE
CHAPTER 12 ADVANCED OPTIONS
DSCP
MBG allows configuration of a Differentiated Services Code Point (DSCP) to be inserted into the header
of ip packets. A separate value can be configured for signaling and media packets. This is one of the tools
available to help improve voice quality in some congested managed network environments.
As an example, consider a deployment with a managed WAN on the ICP side of MBG and the Internet
on the sets side of MBG. Now consider a situation where a managed WAN Service Level Agreement
(SLA) is purchased that divides traffic into classes, including an Expedited Forwarding (EF) queue with
priority over other traffic classes. In this situation, MBG can be configured to insert an EF value (46
decimal) for voice packets as they pass from the Internet to the ICP side so that they can be protected on
the managed WAN during periods of congestion.
If the remote VoIP devices are only using voice then the bandwidth purchased for the EF queue must be
large enough to accommodate the total number of concurrent voice streams passing through the MBG
from Internet to manage WAN. However, if the remote VoIP devices will also be using video in this
example, then the bandwidth purchased for the EF queue must account for both voice and video, keeping
in mind that a video call requires 10 to 20 times more bandwidth than a compressed audio call even when
devices are configured with the lowest bandwidth settings. Refer to section Determine Bandwidth
Requirements for guidance on calculating required bandwidth.
Alternatively, if the cost is prohibitive for provisioning enough EF queue bandwidth to support both voice
and video needed for the deployment, then MBG should not be configured to insert an EF value (46
decimal) for voice/video packets. The reason for this is to prevent video passing through the MBG from
impacting voice on a managed WAN where EF bandwidth has only been provisioned for voice. A future
release of MBG will support configuring different values for voice and video to address this scenario.
Recommended settings when enough EF queue bandwidth has been provisioned to support both voice
and video:
• voice/video: 46 decimal (Expedited Forwarding)
• signaling: 24 decimal (Class Selector 3)
Recommended settings when enough EF queue bandwidth has been provisioned to support voice only:
• voice: 46 decimal (Expedited Forwarding)
54
DSCP
CHAPTER 12 ADVANCED OPTIONS
55
DETERMINING LINE SIZE FOR LARGE SITES
CHAPTER 13 SIZING YOUR INSTALLATION
56
DETERMINE CALL EQUIVALENTS
CHAPTER 13 SIZING YOUR INSTALLATION
The site will need 9 lines to handle the load. In MBG terms, this is 9 simultaneous calls. The number of
simultaneous calls is the key value in determining MBG resource requirements.
For the call center example:
• λ = 3333.3, μ = 6, P(b) = 0.01
• c = 583
The call center would require 583 lines (and agents) to handle the call volume. Again, this is 583 simul-
taneous calls going through the MBG.
Example:
4 MiNet sets all in calls with other parties, plus 2 SIP trunk calls, and two of the calls being tapped, all
using G.711, would constitute:
CPU use = (4 MiNet calls – 2 tapped) + 2 SIP trunk + 2 tapped
= 2 untapped + 2 trunk + 2 tapped
= 2 + 2 + 2*1.5
= 7 calls
57
DETERMINE BANDWIDTH REQUIREMENTS
CHAPTER 13 SIZING YOUR INSTALLATION
• At 6 calls per hour Control stream bandwidth requirement is 20 Kbps peak for each 12 remote devices,
and 1 Kbps idle for each remote device.
• The calculation below does not include bandwidth required for features such as paging. If group paging
is enabled for teleworkers, an additional RTP stream should be provisioned for each remote member
of the paging group.
• Whenever possible, transcoding should be performed by the ICP rather than the MiVoice Border
Gateway, as this typically provides improved voice quality.
• If the mix of codecs in use cannot be reliably estimated, it is safest to assume G.711 for all calls.
NOTE: The actual bandwidth available will likely be less than the amount of bandwidth the ISP advertises.
; Also, the amount of available bandwidth may fluctuate throughout the day based on usage patterns of
other subscribers.
The best way to determine the amount of available bandwidth is to use a speed test tool, preferably one
provided by a third party rather than the ISP themselves – buyer beware.
G.711 Calculation
Bandwidth = number of users * idle control stream requirement
+ number of calls * RTP requirement
+ number of users / 12 * peak control stream bandwidth
For the teleworker example of 20 remote users:
20 * 1 Kbps + 9 * 80 Kbps + 20/12 * 20 Kbps
= 773 Kbps
For the call center example of 1000 remote agents:
1000 * 1 Kbps + 583 * 80 Kbps + 1000/12 * 20 Kbps
58
DETERMINE BANDWIDTH REQUIREMENTS
CHAPTER 13 SIZING YOUR INSTALLATION
G.729a Calculation
Bandwidth = number of users * idle control stream requirement
+ number of calls * RTP requirement
+ number of users / 12 * peak control stream bandwidth
For the teleworker example:
20 * 1 Kbps + 9 * 24 Kbps + 20/12 * 20 Kbps
= 270 Kbps
For the call center example:
1000 * 1 Kbps + 583 * 24 Kbps + 1000/12 * 20 Kbps
= 16659 Kbps or 16.27 Mbps
Video Calculation
Some VoIP devices support video as well as voice, and extra bandwidth must be provisioned if video calls
will be made. Although the exact bandwidth required depends on the content of the image, number of
frames per second (fps), the codec and compression selected, and the video resolution, the list below
gives approximations for some typical video streams.
This list shows the bandwidth required for video streams from some Mitel devices contrasted with band-
width required for other types of media streams.
NOTE: A video call requires 10 to 20 times more bandwidth than a compressed audio call even when
configured with the lowest bandwidth settings.
59
DETERMINE BANDWIDTH REQUIREMENTS
CHAPTER 13 SIZING YOUR INSTALLATION
The Internet bandwidth provisioned at the MBG server must take into account the maximum number of
simultaneous video calls from the remote devices and applications.
When a MiVoice Video Unit initiates a video conference it will also serve as the video bridge for the confer-
ence. For example, a MiVoice Video Unit that is acting as a video bridge for a 4 party conference will
require three times the video bandwidth and three times the audio bandwidth required by a MiVoice Video
Unit that is only a participant in the conference.
Video calls between MiCollab Client 6.0 and MiVoice Video Unit 2.0 are supported through MBG but they
do not negotiate bandwidth at the time of writing. For example, a MiCollab Client on the Internet will
receive video at the rate configured on a MiVoice Video Unit on the LAN even if the MiCollab Client is
configured to use low bandwidth. This will be rectified in a future release of MiCollab Client and/or MiVoice
Conference/Video Unit.
MiCollab Audio, Web and Video Conferencing between AWV clients via the MiCollab AWV Conferencing
server is also supported through MBG. The bandwidth usage per video stream is configurable on the
AWV client. An additional consideration is that an AWV client can receive multiple video streams, one for
each video participant in the conference. That number can be reduced at the AWV client by minimizing
or closing video windows.
For details and current values, see the engineering guidelines for the devices/applications referenced as
examples here (available in Mitel Document Center).
Fax Calculation
A fax call made over a SIP trunk or to a SIP device supporting fax will be either a G.711 voice stream or
a T.38 fax session. For the purposes of bandwidth calculations, consider both cases to be an 80 kbps
G.711 stream.
60
HARDWARE SELECTION
CHAPTER 13 SIZING YOUR INSTALLATION
Hardware Selection
Installations with less than or equal to 500 users and up to 100 simultaneous streams can select any
server on the MSL Qualified Hardware List. Larger sites can use the Call Equivalents obtained in section
Determine Call Equivalents to determine the necessary number of servers.
61
MICOLLAB CLIENT AND MICOLLAB AWV CONFERENCING REQUIREMENTS
CHAPTER 13 SIZING YOUR INSTALLATION
NOTE: Although MIR web-proxy connections may not be currently available, this is a planned activity, so
future deployments that include MIR and Speech Analysis should calculate the required number of ports
in advance.
If the number of required ports exceeds 5000, then alternative deployment strategies are deployed.
1. Increase the number of MBGs and split the load, e.g., via DNS, or
2. Assign specific MBGs for specific functions, e.g., MiCollab MBG separate from Contact Center MBG
3. Deploy MBG specifically for web-proxy capabilities
62
MICONTACT CENTER SOFTPHONE REQUIREMENTS
CHAPTER 13 SIZING YOUR INSTALLATION
The collaboration bandwidth is in addition to that required for voice communications. Refer to Additional
Application Requirements for the relevant firewall rules.
Table 13.1:Bandwidth Requirements for MiCollab AWV Conferencing Collaboration
The “MBG Server Port Used” column indicates the port on which MBG listens, on its Internet-facing side,
for the incoming connection. The “Default Destination Port” is the port on the MiContact Center server to
which MBG routes the connection. Additional MiContact Center connections were added over multiple
releases and as of MBG 8.0 also includes MBG Server TCP ports 35001 to 35008 inclusive. Refer to
MiContact Center for firewall configuration instructions.
Bandwidth requirements will vary depending on the type of activity being performed. During installation of
the client, software is downloaded and installed. The client periodically checks for updates and may down-
load and install them. The bandwidth required by these tasks is not included in the tables below; it is
assumed to be part of the bandwidth used by the user's PC.
63
MICONTACT CENTER SOFTPHONE REQUIREMENTS
CHAPTER 13 SIZING YOUR INSTALLATION
When a user first launches the MiContact Center client and selects devices to view, there is a database
transfer. The size of the database depends on the objects selected, as follows:
• 1 Queue (Q) = 65 KB
• 1 Agent (A) = 39 KB
• 1 Employee = 20 KB
• 1 Extension = 17 KB
• 1 Network Monitor (NM) (1 x MiVoice Business) = 56 KB
Refer to the following table to determine the size and download time for the database at various line
speeds.
# of
Devic Data 512 1024 1.54 2.048 10
es Config Size Kbps Kbps Mbps Mbps Mbps
5 1Q, 1A 1Ex, 1Em, 1NM 157.6 00:00: 00:00: 00:00: 00:00: 00:00:
KB 02 01 01 00 00
50 15Q, 11A, 11Ex, 12Em, 2NM 303.2 00:00: 00:00: 00:00: 00:00: 00:00:
KB 04 02 01 01 00
100 25Q, 25A, 22Ex, 25Em, 3NM 348.8 00:00: 00:00: 00:00: 00:00: 00:00:
KB 06 03 02 01 00
500 200Q, 100A, 92Ex, 100Em, 8NM 1.304 00:00: 00:00: 00:00: 00:00: 00:00:
MB 20 10 06 05 01
1500 500Q, 300A, 385Ex 300Em 15NM 3.528 00:00: 00:00: 00:00: 00:00: 00:00:
MB 55 27 18 13 02
5000 2086Q, 2379A, 247Ex, 322Em, 14.24 00:03: 00:01: 00:01: 00:00: 00:00:
16NM MB 42 51 13 55 11
8100 3036Q, 4379A, 247Ex, 322Em, 22.72 00:05: 00:02: 00:01: 00:01: 00:00:
16NM MB 55 57 57 28 18
NOTE: The use of traffic shaping (to prioritize RTP ahead of other packets) could be used to prevent data
transfers, such as the initial DB transfer above, from affecting calls in progress.
The table below provides bandwidth requirements for a typical MiContact Center configuration at various
call rates, in addition to the bandwidth required for voice communications.
64
MICONTACT CENTER SOFTPHONE REQUIREMENTS
CHAPTER 13 SIZING YOUR INSTALLATION
NOTE: This is a guideline only. Actual results may differ depending on the MiContact Center configuration.
65
LICENSING
CHAPTER 14 VIRTUAL MBG CONSIDERATIONS
Licensing
The standard MBG base kit cannot be used to run an instance of vMBG. The “MiVoice Border Gateway
Virtual Appliance” base kit (part number 54005339) must be used instead. An existing base kit can be
converted.
WARNING: If the wrong base kit is used, the vMBG will have no licenses.
Upgrades
A virtual MBG can be upgraded just like a physical MBG, by visiting the MSL Blades panel and down-
loading the update from Mitel Software Download Center. Alternately, an MBG CD, available from Mitel
MiAccess, can also be used via the VMware console.
MSL can also be upgraded either with the MSL ISO image available from Mitel MiAccess, or by clicking
on the ServiceLink blade upgrade in the MSL Blades panel.
From time to time, Mitel releases new OVA files on Mitel MiAccess. The OVA must be used for initial
deployment of a vMBG, but can also be used for upgrades by following the procedure below:
1. Back up1 the current MBG using the application's back-up button.
2. Deploy the new OVA
3. Restore the backup file using the application's restore button
66
HOST SERVER REQUIREMENTS
CHAPTER 14 VIRTUAL MBG CONSIDERATIONS
Hardware
For information concerning hardware requirements and server capacities in VMware and Hyper-V deploy-
ments, refer to the Virtual Appliance Deployment Guide.
Software
For information concerning software requirements in VMware and Hyper-V deployments, refer to the
Virtual Appliance Deployment Guide.
High-Availability
As with physical MBG servers, high-availability is achieved through MBG clustering. However, with virtual
hardware, there is an additional consideration. To avoid a single point of failure, Mitel recommends using
VMware anti-affinity rules to prevent all cluster nodes from running on the same physical host hardware.
See the Virtual Appliance Deployment Guide for details.
67
CHANGING A CLUSTER NODE'S IP ADDRESS
CHAPTER 15 SOLUTIONS TO COMMON PROBLEMS
3. Reconfigure the address via the MSL console, and follow the prompts to reboot.
4. Add the node on the master, and join the server to the cluster.
68
PHYSICAL HARDWARE
CHAPTER 16 PERFORMANCE CHARACTERISTICS AND LIMITS
Physical Hardware
CPUs: Dual Hex Core Intel® Xeon® CPU E5-2667 (Sandy Bridge) 2.9 GHz with Hyperthreading
Memory: 32 GB
Network: Gigabit (For details, see the note following the “MBG Capacities” table on the next page)
OS: Mitel Standard Linux
For information concerning supported hardware servers for the MiVoice Border Gateway, refer to the MSL
Qualified Hardware List that is available in Mitel Document Center.
Virtual Hardware
Two deployment configurations are available—Small Business and Enterprise. For information
concerning the capacities available with each configuration, refer to the Virtual Appliance Deployment
Guide in Mitel Document Center.
69
MBG CAPACITIES – DEVICE (MINET & SIP) AND TRUNKING (SIP)
CHAPTER 16 PERFORMANCE CHARACTERISTICS AND LIMITS
Regist Concur
Syste ered rent
m Server Protoc Devic ;G.711 Call Netw
Type Size ol es Calls Rate ork Network Card*
70
MBG CAPACITIES – DEVICE (MINET & SIP) AND TRUNKING (SIP)
CHAPTER 16 PERFORMANCE CHARACTERISTICS AND LIMITS
Regist Concur
Syste ered rent
m Server Protoc Devic ;G.711 Call Netw
Type Size ol es Calls Rate ork Network Card*
NOTE:
• The capacity for concurrent calls is dependent on the network interface controller (NIC) being used.
The maximum number of concurrent calls that can be sustained is directly dependent on the perfor-
mance of the NIC that is installed on the server. In performance testing done by Mitel, bandwidth was
typically not an issue (i.e. a 1GB NIC of any type was able to sustain 6 ccs and testing was done
successfully with various 1GB and 10GB NICs). NICs with an on-board processor (such as the Intel
82599ES 10GB NIC shown above) can sustain over twice the number of concurrent calls than those
without, such as the Broadcom BCM5719 10GB NIC. The Broadcom BCM5719 10GB NIC can Mitel
tested could only sustain 1,600 concurrent calls compared to 3325 by the Intel 82599ES NIC. Mitel
recommends the NIC selection be done with the expected traffic levels (concurrent calls) in mind.
• SIP Trunk Capacity is tested with zero registered devices. For a mixed-use system (SIP trunks and
SIP or MiNet devices), use the MiNet Set Capacity figures.
71
MBG CAPACITIES – WEBRTC
CHAPTER 16 PERFORMANCE CHARACTERISTICS AND LIMITS
NOTE:
• The capacities listed above require MBG to be dedicated to WebRTC calls. If the system is being used
for other purposes, such as SIP trunking or call recording, the capacities will be reduced.
• Mitel recommends the use of Professional Services for any deployments with an expected number of
concurrent WebRTC users greater than 500. This allows the appropriate deployment topology to be
recommended.
• Transcoding video can be CPU intensive. To prevent your system from experiencing issues, instruct
your users to limit the number of video calls that they place at any one time. Alternatively, enable
transcoding only if your implementation includes devices which require it, such as the Mitel MiVoice
Video Phone (UC360).
72
MBG SYSTEM CAPACITIES
CHAPTER 16 PERFORMANCE CHARACTERISTICS AND LIMITS
Max Routing Rules 50000 Physical Enterprise Up to 50,000 routing rules can be
configured on a single MBG.
Maximum SIP 500 Physical Enterprise Up to 500 SIP trunks can be
Trunks configured on a single MBG.
Maximum PBX 500 Physical Enterprise Up to 500 PBXs can be connected to
Connections a single MBG.
Maximum 6 Any Up to 6 MBG nodes can be clustered
Clustered MBGs in a single cluster. The cluster must
be configured as 5+1, with one MBG
reserved for redundancy.
Maximum Devices 25,000 @ 6 ccs Physical Enterprise An MBG cluster of 6 nodes supports
in a Cluster per device up to 25,000 devices (5 x 5,000
50,000 @ 3 ccs devices, with one node reserved for
per device redundancy) at 6 ccs per device, or
up to 50,000 devices (5 x 10,000
devices with one node reserved for
redundancy) at 3 ccs per device.
73
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
74
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
TCP 443 LAN -> Server Local Server Management. Allow inbound and outbound packets on
(HTTPS) TCP port 443 between the MBG Server and the LAN to allow for
management of the server. HTTPS access to the manager on the
external interface must also be explicitly enabled from the
server-manager interface. The firewall should be configured to limit
HTTPS access to desired management hosts.
TCP 443 Internet -> Remote Server Management (Optional). Allow inbound and outbound
(HTTPS) Server packets on TCP port 443 between the MBG server and the Internet to
allow remote management of the server, if required. HTTPS access
to the manager on the external interface must also be explicitly
enabled from the server manager interface. The firewall should be
configured to limit HTTPS access to desired management hosts.
TCP 22 LAN -> Server Remote SSH access (Optional). If the admin wishes to administer the
(SSH) MBG server remotely via the command line from the LAN, this rule is
required.
TCP 22 Internet -> Remote SSH access (Optional). If the admin wishes to administer the
(SSH) Server MBG server remotely via the command line over the Internet, this rule
is required.
Clustering
TCP 6809 Between Cluster Comms. If making use of clustering in MBG, this port must be
servers in a open between the servers in the cluster to permit them to
cluster communicate with one another.
Voice and Video Communications for MiNET Devices, SIP Devices and SIP Trunking
UDP Internet -> Teleworker Analyzer Port. Allow incoming access to UDP port 20000
20000 Server for the Teleworker Network Analyzer tool to run its diagnostics test.
UDP Internet -> Voice Communications. Allow incoming traffic on UDP ports 20002 to
20002-299 Server 29999 from all streaming devices on the LAN and the Internet.
99 LAN -> Server Misconfiguration here is a common cause of one-way audio issues.
(Configura Note that the port boundary values (20002 to 29999) are configurable
ble in in the MBG interface.
MBG port Mitel recommends keeping the default range when possible and
range avoiding the 50000-50999 range to reduce conflicts with other
panel) applications.
UDP Internet -> Video Communications. Allow incoming traffic on UDP ports 30000 to
30000-309 Server 30999 from all streaming devices on the LAN and the Internet.
99 LAN -> Server Misconfiguration here is a common cause of one-way video issues.
(Configura Note that the port boundary values (30000 to 30999) are configurable
ble in in the MBG interface.
MBG port Mitel recommends keeping the default range when possible and
range avoiding the 50000-50999 range to reduce conflicts with other
panel) applications.
75
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
UDP 1024 Server -> LAN Voice and Video Communications. Allow outgoing SRTP on UDP
- 65535 Server -> ports greater than, or equal to 1024 from the server to all streaming
(RTP) Internet devices on the LAN and the Internet. Misconfiguration here is a
common cause of one-way audio problems. Note that as of release
7.0, MBG defaults to using even-numbered ports for RTP, leaving the
odd-numbered ports for RTCP. The Internet portion of this rule can be
safely omitted in the absence of Internet traffic.
MiNET 52xx/53xx/69xx Basic
UDP Internet -> TFTP server. Allow access to UDP port 20001 to allow MiNET
20001 Server devices to download their firmware and applications using TFTP
LAN -> Server
TCP 6800, Server -> LAN MiNet Call Control. Allow incoming and outgoing packets for TCP
6801 and Server -> ports 6801 (MiNet-SSL) and 6802 (MiNet-Secure V1) between the
6802 ICP(s) server and the Internet. Allow incoming and outgoing packets for TCP
ports 6800 (unencrypted MiNet), 6801 and 6802 between the server
and the LAN and the server and the ICP(s). The LAN rule can be
omitted if there are no IP sets on the LAN but ensure that the ICP(s)
can communicate with the server’s public address.
TCP 6801 Internet -> MiNet Call Control. Same as above. Port 6800 should not be used on
and 6802 Server the Internet as it is unencrypted. Port 6802 is not required with an
Enhanced Security deployment.
TCP 3998, Internet -> SAC Connection Support. Allow incoming TCP from the Internet to
6881 Server the MBG server, on ports 3998 and 6881, to support applications and
web browsing, respectively, on the 5235, 5330, 5340 and Navigator
sets. There is an additional LAN rule that follows this to complete the
support.
TCP 3998, Server -> SAC Connection Support. Allow bidirectional TCP traffic on port 3999
3999 and ICP(s) to/from the ICP(s). This is to support the applications on the 5235,
6881 5330, 5340 and Navigator sets. Note: 3998 and 6881 require an
additional, MBG server on the LAN to which the Internet-facing server
is daisy-chained.
TCP 80 Server -> LAN SAC Connection Support (Optional). Allow TCP port 80 from the
Server -> server to the Internet, and to the LAN, to support web browsing on the
Internet 5235, 5330, 5340 and Navigator sets. Also required to the Internet to
allow browsing of the Internet from the set.
UDP Port Server -> ICPs HTML application autopopulation support (Optional). To permit MBG
20001 to autopopulate HTML applications from the ICPs, bidirectional traffic
from a random UDP port on MBG to UDP port 20001 on the ICPs
must be permitted.
MiNET 69xx Series enhanced feature support – MiNET Generic Plus
76
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
TCP 6881 Internet -> MiNet 69xx series IP Phones avatar, enhanced application or
Server external LDAP server support (Optional). Allow incoming TCP from
the internet to the MBG server on port 6881 to support avatars,
enhanced applications or external LDAP server access on 6920,
6930, and 6940.
TCP 389 Server -> LAN MiNet 69xx Series Phones (Optional). To enable 6920, 6930, 6940
phones to access the company directory, this port must be permitted
from the Server to the LDAP database server on the LAN.
TCP 80 Server -> MiNet 69xx series IP Phones avatar support. Allow MiVoice Border
MiCollab Server Gateway to connect to the MiCollab server to retrieve avatars for
6920, 6930, 6940.
TCP 80 or Server -> MiNet 69xx series IP Phones enhanced application support
TCP 443 Application (Optional). Allow MiVoice Border Gateway to connect to the
Server application server to provide enhanced features on 6920, 6930, 6940.
MiNET 5550 IP Console and MiVoice Business Console (pre release 9.0) Support – MiNET
Generic Plus
TCP 6806 Internet -> IP Console Support and MiVoice Business Console (Optional).
Server
TCP 1606 Server -> LAN IP Console Support and MiVoice Business Console (Optional).
TCP 6807 Internet -> IP Console and MiVoice Business Console Support for presence
Server (Optional).
TCP Server -> LAN IP Console and MiVoice Business Console Support for presence
18100 (MiCollab (Optional).
Server)
TCP 443 Server -> LAN
IP Console Support and MiVoice Business Console (Optional).
MiVoice Business Console Support (release 9.0+) - MiNET Generic Plus
TCP Internet -> MiVoice Business Console support (Optional). Allow the MiVoice
36008 Server Business Console to connect to the MiCollab Client server for
presence information
TCP Server -> LAN MiVoice Business Console support (Optional). Allow the MiVoice
36008 Business Console to connect to the MiCollab Client server for
presence information
TCP 443 Server -> LAN IP Console Support and MiVoice Business Console (Optional).
SIP Devices - Generic
UDP 53 Server -> DNS DNS. The server requires DNS for correct operation of SIP.
server
77
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
UDP 5060 Server <-> ICPs SIP UDP Support. If the SIP connector is enabled, then this port is
Server <-> required for non-encrypted SIP signaling between MBG and the set,
Internet between MBG and the ICP
TCP 5060 Server <-> SIP TCP Support. Open this port for SIP signaling over TCP between
Internet MBG and SIP devices that have been updated to use TCP to port
Server <-> ICPs 5060. This port may also be opened between MBG and the ICPs.
TCP 5061 Server <-> SIP TCP/TLS Support. This port is required for SIP signaling between
Internet MBG and SIP devices that have been configured to use TCP/TLS to
Server <-> ICPs port 5061 (the default client configuration). This port may also be
opened between MBG and the ICPs.
SIP Devices - Mitel 68xx phones with MX-ONE (Optional)
UDP 53 Server -> DNS DNS. The server requires DNS for correct operation of SIP.
server
TCP 5061 Internet -> Support for Mitel 68xx/69xx SIP phones. This port is required for
Server encrypted SIP signaling between Mitel 68xx phones and MBG
TCP 5060 Server -> LAN Support for Mitel 68xx SIP phones. This port is required for SIP
or UDP signaling between MBG and MX-ONE
5060
TCP Internet -> Support for Mitel 68xx phones with MX-ONE (Optional). This port
22223 Server must be permitted to enable encrypted XML connections from
Internet-based 68xx phones to the server.
TCP Server -> LAN Support for Mitel 68xx phones with MX-ONE (Optional). This port
22222 must be permitted to enable unencrypted XML connections from the
server to the LAN-based MiVoice MX-ONE ICP.
TCP 4431 Internet -> Support for Mitel 68xx SIP phones with configuration server
Server (Optional). This port must be permitted to enable connections from
Internet-based 68xx phones to the server.
TCP 80 or Server -> LAN Support for Mitel 68xx SIP phones with configuration server
TCP 443 (Optional). This port must be permitted to enable HTTP (TCP 80) or
HTTPS (TCP 443) connections from the server to the LAN-based
MiVoice MX-ONE configuration server.
SIP Device - Mitel 68xx/69xx Phones with MiVoice Office 400 (Optional)
UDP 53 Server -> DNS DNS. The server requires DNS for correct operation of SIP.
server
UDP 69 Server -> LAN Support for Mitel 68xx/69xx phones with MiVoice Office 400
(Optional). This port must be permitted to allow MBG to fetch initial
startup.cfg, melody wave files and language files from MiVoice Office
400.
78
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
TCP 80 Internet -> Support for Mitel 68xx/69xx phones with MiVoice Office 400
Server (Optional). This port must be permitted to allow phones to retrieve
their initial startup.cfg, root certificates, melody wave files and
language files from MBG.
TCP 5061 Internet -> Support for Mitel 68xx/69xx SIP phones with MiVoice Office 400
Server (Optional). This port is required for encrypted SIP signaling between
Mitel 68xx phones and MBG
TCP 5061 Server -> LAN Support for Mitel 68xx/69xx SIP phones with MiVoice Office 400
or TCP (Optional). Either TCP 5060 or TCP 5061 (encrypted) is required for
5060 SIP signaling between Mitel 68xx/69xx and MiVoice Office 400.
TCP 4431 Internet -> Support for Mitel 68xx/69xx phones with MiVoice Office 400
Server (Optional). This port must be permitted to enable encrypted XML
connections from Internet-based phones to the server.
TCP 443 Server -> LAN Support for Mitel 68xx/69xx phones with MiVoice Office 400
(Optional). This port must be permitted to enable encrypted XML
connections from MBG to MiVoice Office 400. This port is also
required for access to Self Service Portal
TCP 443 Internet -> Support for Mitel 68xx/69xx phones with MiVoice Office 400
Server (Optional). This port must be permitted to allow end users to access
the MiVoice Office 400 Self Service Portal via Remote Proxy.
SIP Device - MiVoice Conference Phone (Optional) See SIP devices – Generic Plus
TCP Internet -> Mitel MiVoice Conference Phone (Optional). The UC360 connects to
35010 Server the MBG on TCP port number 35010 to securely access an Active
Directory server on the Customer’s LAN.
TCP 389 Server -> LAN MiVoice Conference Phone (Optional). To enable Conference Phone
users to access the company directory, this port must be permitted
from the Server to the LDAP database server on the LAN.
SIP Trunking
UDP 53 Server -> DNS DNS. The server requires DNS for correct operation of SIP.
server
UDP 5060 Server <-> ICP SIP UDP Support. If your SIP trunking provider supports SIP UDP
Server <-> enable this port for non-encrypted SIP signaling between MBG and
Internet the provider and between MBG and the ICP
TCP 5060 Server <-> SIP TCP Support. If your SIP trunking provider supports SIP TCP,
Internet Server enable this port for non-encrypted SIP signaling between MBG and
-<-> ICP the provider and between MBG and the ICP
TCP 5061 Server <-> SIP UDP Support. If your SIP trunking provider supports SIP TLS,
Internet Server enable this port for encrypted SIP signaling between MBG and the
-<-> ICP provider and between MBG and the ICP
79
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
80
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
UDP Internet -> WebRTC Voice and Video Communications. Allow incoming media
32000 to Server on ports 32000 to 32500 from all streaming devices on the Internet to
32500 the Server. Note that the port boundary values (32000 to 32500) are
(configura configurable in MBG interface.
ble in
MBG
interface)
UDP Server -> LAN WebRTC Voice and Video Communications. Allow incoming media
33000 to on ports 33000 to 33500 from the Server to the LAN. Note that the
33500 port boundary values (33000 to 33500) are configurable in MBG
(configura interface.
ble in
MBG
interface)
Remote Proxy (Optional)
UDP 53 Server -> DNS. The server requires DNS to look up the IP address of the
(DNS) Corporate DNS internal server to proxy traffic to. See the MBG Installation and
server Maintenance Guide for details.
TCP 443 Internet -> Web Proxy client connections (Optional). If using the Web Proxy
(HTTPS) Server Server application, traffic must be permitted between the Internet and the
-> LAN proxy in the DMZ. The following applications are supported:
MiCollab (MiCollab, MiCollab Client, MiCollab Unified Messaging,
MiCollab Client Deployment Unit, MiCollab AWV Conferencing,
Google Calendar Integration to AWV)
MiVoice Business
MiCollab Client
MiCollab Unified Messaging
Open Integration Gateway
MiCloud Management Portal
TCP 443 Server -> LAN Web Proxy client connections (Optional). If using the Web Proxy
(HTTPS) application, traffic must be permitted to and from the LAN to the proxy
on the DMZ.
MiCollab Client (Optional) – See MiNET or SIP Devices for Softphone Plus
TCP 443 Internet -> MiCollab Client support (Optional). To permit the MiCollab Client to
Server connect to the MiCollab Client server for credentials, this port must be
Server -> LAN permitted.
TCP Internet -> MiCollab Client support (Optional). To permit the MiCollab Client to
36008 Server connect to the MiCollab Client server for presence information, this
Server -> LAN port must be permitted.
MiCollab AWV Conferencing
81
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
TCP 443 Internet -> MiCollab AWV Conferencing ConnectionPoint traffic with a dedicated
(HTTPS) Firewall second IP address (Optional).
This traffic will arrive on TCP port 443 and be forwarded to the Proxy
at the port configured in the Proxy interface to handle it.
The Proxy then forwards this traffic to port 4443 on the LAN.
TCP Firewall -> MiCollab AWV Conferencing ConnectionPoint traffic with a dedicated
<4443> Server second IP address (Optional).
ConnectionPoint traffic from the Internet to each port configured to
receive ConnectionPoint traffic in the Web Proxy must be permitted.
The actual port number is defined when the administrator enables the
“Listen port for MiCollab AWV (two WAN IPs)” on the Web Proxy. Port
4443 is recommended.
TCP 4443 Internet -> MiCollab AWV Conferencing ConnectionPoint traffic with a dedicated
Server TCP port and one IP address (Optional).
The actual port number is defined when the administrator enables the
“Listen port for MiCollab AWV (one WAN IP)” on Web Proxy. Port
4443 is recommended.
TCP 4443 Server -> LAN MiCollab AWV Conferencing ConnectionPoint traffic (Optional).
If using MiCollab AWV Conferencing through the Web Proxy, traffic to
this destination port must be permitted between the proxy on the
DMZ and the server on the LAN.
For deployment using a dedicated TCP port and one IP address, use
the port configured under the “Listen port for MiCollab AWV (one
WAN IP)” on Web Proxy. Port 4443 is recommended.
MiContact Center (Optional) – See MiNET Support for Softphone Plus
TCP 80 Internet -> Certificate Management (Optional). On any server hosting clients that
Server make use of MiSSL Tunnel with a client certificate (MiCollab Client,
CIS, and so on), this port must be open to the Internet to permit the
web service to submit a certificate signing request (CSR), check on
the status of that request, and download the certificate. Also needed
for CREs to register with SRC control interface.
TCP Internet -> MiContact Center Support (Optional). To enable use of the MiContact
36000 Server Center solution, this port must be permitted from the Internet to the
server.
TCP Internet -> MiContact Center Support (Optional). To enable use of the MiContact
36003 Server Center solution, this port must be permitted from the Internet to the
server.
TCP 5025 Server -> LAN MiContact Center Support (Optional). To enable use of the MiContact
Center solution, this port must be permitted from the server to the
Contact Center server on the LAN.
TCP Internet -> MiContact Center Support (Optional). To enable use of the MiContact
36001 Server Center solution, this port must be permitted from the Internet to the
server.
82
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
TCP 443 Server -> LAN MiContact Center Support (Optional). To enable use of the MiContact
Center solution, this port must be permitted from the server to the
Contact Center server on the LAN.
TCP Internet -> MiContact Center Support (Optional). To enable use of the MiContact
36002 Server Center solution, this port must be permitted from the Internet to the
server.
TCP 5024 Server -> LAN MiContact Center Support (Optional). To enable use of the MiContact
Center solution, this port must be permitted from the server to the
Contact Center server on the LAN.
TCP Internet -> MiContact Center Support (Optional). To enable use of the MiContact
36004 Server Center solution, this port must be permitted from the Internet to the
server.
TCP 5026 Server -> LAN MiContact Center Support (Optional). To enable use of the MiContact
Center solution, this port must be permitted from the server to the
Contact Center server on the LAN.
TCP Internet -> MiContact Center Support (Optional). To enable use of the MiContact
35001 Server Center solution, this port must be permitted from the Internet to the
server.
TCP 5030 Server -> LAN MiContact Center Support (Optional). To enable use of the MiContact
Center solution, this port must be permitted from the server to the
Contact Center server on the LAN.
TCP Internet -> MiContact Center Support (Optional). To enable use of the MiContact
35002 Server Center solution, this port must be permitted from the Internet to the
server.
TCP 7001 Server -> LAN MiContact Center Support (Optional). To enable use of the MiContact
Center solution, this port must be permitted from the server to the
Contact Center server on the LAN.
TCP Internet -> MiContact Center Support (Optional). To enable use of the MiContact
35003 Server Center solution, this port must be permitted from the Internet to the
server.
TCP 7003 Server -> LAN MiContact Center Support (Optional). To enable use of the MiContact
Center solution, this port must be permitted from the server to the
Contact Center server on the LAN.
TCP Internet -> MiContact Center Support (Optional). To enable use of the MiContact
35004 Server Center solution, this port must be permitted from the Internet to the
server.
TCP 8083 Server -> LAN MiContact Center Support (Optional). To enable use of the MiContact
Center solution, this port must be permitted from the server to the
Contact Center server on the LAN.
83
GLOSSARY
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
TCP Internet -> MiContact Center Support (Optional). To enable use of the MiContact
35005 Server Center solution, this port must be permitted from the Internet to the
server.
TCP 8084 Server -> LAN MiContact Center Support (Optional). To enable use of the MiContact
Center solution, this port must be permitted from the server to the
Contact Center server on the LAN.
TCP Internet -> MiContact Center Support (Optional). To enable use of the MiContact
35006 Server Center solution, this port must be permitted from the Internet to the
server.
TCP Server -> LAN MiContact Center Support (Optional). To enable use of the MiContact
42440 Center solution, this port must be permitted from the server to the
Contact Center server on the LAN.
TCP Internet -> MiContact Center Support (Optional). To enable use of the MiContact
35007 Server Center solution, this port must be permitted from the Internet to the
server.
TCP 1433 Server -> LAN MiContact Center Support (Optional). To enable use of the MiContact
Center solution, this port must be permitted from the server to the
Contact Center server on the LAN.
Glossary
84
GLOSSARY
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
G.711 ITU-T codec audio standard, specifying an audio signal with a 3.4 KHz bandwidth
(ordinary analog voice signal) over an A-law and μ-law digitized, linear PCM at 64Kbps. In
G.711, encoded voice is already in the correct format for digital voice delivery in the PSTN
or through PBXs.
G.729 This ITU-T standard describes CELP compression where voice is coded into 8-Kbps
streams. The two variations of this standard (G.729A and G.729A Annex A) differ mainly in
computational complexity; both provide speech quality similar to 32-Kbps ADPCM.
ICP IP Communications Platform
IETF Internet Engineering Task Force. The official specification documents of the Internet
Protocol suite are defined by the Internet Engineering Task Force (IETF) and the Internet
Engineering Steering Group (IESG ). These specifications are recorded and published as
standards track RFCs. (See RFC).
IP Internet Protocol (RFC 1122 Section 3.)
IPSec Internet Protocol Security
ISP Internet Service Provider
MBG MiVoice Border Gateway
MCA Mitel Collaboration Advanced; now named MiCollab Audio, Web and Video Conferencing
MiNet Mitel Network Layer Protocol. A signaling protocol used to transport messages between
the PBX and all Mitel IP phones. MiNet is encapsulated in TCP.
MSL Mitel Standard Linux. The standard Linux distribution used and maintained by Mitel as a
platform for all applications
NAT Network Address Translation. A technique for translating one set of IP addresses, often
private, to another set, often public (RFC 1631)
PPP Point-to-Point Protocol
PPPoA Point to Point Protocol over ATM
PPPoE PPP over Ethernet
PPTP Point-to-Point Tunneling Protocol
QoS Quality of Service
RFC Request For Comments. A standards document for the public Internet. RFCs are
produced by the IETF and its working groups, as well as other bodies, to define and ratify
new Internet standards and changes to existing standards. RFCs must first be published
as Internet Drafts.
RTP Real-time Protocol (RFC 1889)
SIP Session Initiation Protocol (RFC 3261 et al.)
SRC Secure Recording Connector
SRS SIP Recording Server
85
GLOSSARY
CHAPTER 17 APPENDIX A: FIREWALL CONFIGURATION REFERENCE
86
MBG in traditional Teleworker configuration 3
MBG as Internet Gateway (no enterprise firewall) 4
MBG deployed in a DMZ 5
MBG providing NAT traversal for Multi-instance MiVoice Business 6
MBG as a Gateway for Broadview Networks silhouette 7
MBG Deployed on the LAN for Call Recording 8
Recording Teleworker Sets 9
Daisy-chained MBGs for enhanced security 11
Daisy-chained MBGs to save bandwidth 12
Multiple downstream MBGs 13
Example of a remote site 18
WebRTC Gateway and Web Pages Topology 40
The Hierarchical Token Bucket Queue 46
© Copyright 2021, Mitel Networks Corporation. All Rights Reserved. The Mitel word and logo are trademarks of Mitel Networks
Corporation, including itself and subsidiaries and authorized entities. Any reference to third party trademarks are for reference only and Mitel
mitel.com makes no representation of ownership of these marks.