Skip to end of metadata
Go to start of metadata

On this page:

Overview

Onboard management provides an alternative to using the EMS.

In Appliance mode, the Sonus EMS is being replaced by WRTC EMA. The EMA application runs on the same server as WRTC Gateway. Once you install WRTC Gateway, you must be able to login to the EMA for node-level configurations. The EMA contains all the node-specific configuration elements similar to WRTC Configuration Manager in EMS. The EMA also displays the alarms and the statistics for an individual node. After saving the configuration, EMA pushes the configuration data only to the active WRTC node.

Before configuring WRTC through onboard management ensure all that WRTC instance is up and running. If installed in active-standby mode Lsync must be running.

Sample Node-Specific Configuration

You can create a new configuration for the WRTC active node through the EMA.

To create node specific configuration for an active node:

  1. Type https://wrtcnodeip:8443/ in the supported web browser.
     where, wrtcnodeip is the configured vitual IP address.

  2. Provide the username and password to login to the EMA.

The following is a sample configuration options for an active node. For more information on WRTC data model configuration profiles, refer to WRTC Configuration Manager.

Table : Sample Active Node Configuration

WRTC Data Model Fields Configurations
Globals
EMS Management Server
  • Select the management server port value as 443 and "Management Transport Type" as SECURE or NONSECURE. The default type is SECURE.
  • Click Save after modifying the transport type value.

Figure : EMS Management Server List

OAuth Server
  • Select the OAuth server port as 443, the transport type as SECURE or NONSECURE. The default transport type is SECURE. Select the TLS profile name from the drop-down list.
  • Delete an existing OAuth Server from the list by selecting delete  button.
  • Create a new OAuth Server by clicking New OAuth Server option.
  • Click Save after modifying the configured values.

Figure : OAuth Server

Figure : New OAuth Server

Websocket Server
  • Select the Websocket Port value as 9080, the transport type as SECURE or NONSECURE. The default transport type is SECURE. Select the TLS profile name from the drop-down list.
  • Delete an existing Websocket Server from the list by selecting delete  button.
  • Create a new Websocket Server by clicking New Websocket Server option.
  • Click Save after modifying the configured values.

Figure : Websocket Server List

Figure : New Websocket Server

OAuth Provider
  • To create a new OAuth Provider, select the OAuth Provider Name from the list that is, GOOGLE, FACEBOOK, or LINKEDIN. The OAuth Provider must be edited to match the ClientId, Client Secret, and Redirect URI specific to your node.
    For example, the redirect uri will be of the form https://<fqdnofyourwrtcnode>:443/callbackGoogle for Google. You can fetch the default clientid and client secret from the startup.json file that is shipped to you. For information on creating developer's account, refer to the OAuth Developer Account Creation.
  • Click Save after modifying the configured values.
  • Copy an existing OAuth Provider from the OAuth Provider List by clicking the Copy OAuth Provider
  • Delete an existing OAuth Provider from the list by selecting delete  button.

Figure : OAuth Provider List

Figure : OAuth Provider

Enterprise
  • Configure the FQDN of your Enterprise domain under the Sonus Enterprise, or create a new Enterprise by clicking on New Enterprise option.
  • To create a new Enterprise:
    • Provide the Enterprise name, mention the domain name attached to the enterprise in the "Enterprise Domain".
    • Select the Route Order option to determine whether registry or routing table to be looked up first for WRTC client originated calls.
    • Provide the Auth, CAC, Push Notification, SIP Signaling, Web Application, and Number Policy Profile that you have already created or can select the link as well to direct to the respective Profile List.
    • Provide the default Application Policy profile. Media Policy profile is not mandatory.
    • Provide the Administration Id and password, and Statistics Server URL configured to see the media-related statistics.
  • Click Save after modifying the configured values.
  • Copy an existing Enterprise as well from the Enterprise List by clicking the Copy Enterprise or delete an existing Enterprise from the list by selecting delete button.

Enterprise Domain must be the FQDN of the domain name attached to the enterprise.

Figure : Enterprise Profile List

 

Figure : New Enterprise

If not configured, the statistics reporting is considered to be disabled.

Enterprise URL
  • Select New Enterprise URLs option. In the "Enterprise URL" column mention the domain name attached to the enterprise, and the enterprise name (as listed in the Enterprise List) in the "Enterprise" column.

     

  • Click Save. You can copy an existing Enterprise URLs as well from the Enterprise URLs List by clicking the Copy Enterprise URLs or delete an existing Enterprise URLs from the list by selecting delete button.

Figure : Enterprise URLs

Rest Server

Select the rest server port value as 443 and "Transport Type" as SECURE or NONSECURE. The default transport type is SECURE.

Figure : Rest Server List

Http Server

Select the http server port value as 443 and select the TLS profile name from the drop-down list.

Figure : HTTP Server List

Profiles

Authorization Profile
  • auth1 and auth2 are the default Authorization profiles. Modify an existing Authorization profile or create a new Authorization profile by clicking on New Authorization Profile option, and then select the flags (True/False) to specify whether to enable authentication from a list of OAuth2 or LDAP providers. Click Save.
  • The Authorization Profile includes "OAUTH Providers" and "LDAP Providers". You can select the OAuth2 provider or the LDAP provider you want the authentication from. For example, to select the OAuth Provider as "FACEBOOK", you must first select the Authorization Profile from the drop-down menu and then, select "FACEBOOK" from the OAUTH Provider drop-down menu. Click Save.
  • Copy an existing Authorization Profile from the Authorization Profile List by clicking the Copy Authorization Profile or delete an existing Profile from the list by selecting delete button.

For more information on Authentication and Authorization, refer to Authentication and Authorization.

Figure : Authorization Profile

Figure : New Authorization Profile

Figure : OAUTH Providers

CAC Profile
  • cac1 and cac2 are the default CAC profiles. You can modify an existing CAC profile by configuring the enterprise and user session limits, application types, and by enabling or disabling audio, video, data calls.
    CAC policy can be applied at user level as well as enterprise level. Application list is also enabled as part of CAC.
  • You can also create a new CAC profile by clicking on New CAC Profile option. Provide the name, Enterprise Session Limits, User Session Limits, and List of applications. Click Save.

  • All types of calls are allowed by default.

    • If audio calls are disabled (by selecting True), video calls are disabled automatically.

    • If video calls are enabled (by selecting False), audio calls are enabled automatically.

For more information on Call Admission Control Policy, refer to Call Admission Control Policy.

  • You can copy an existing CAC Profile from the CAC Profile List by clicking the Copy CAC Profile or delete an existing Profile from the list by selecting delete button.

Figure : CAC Profile

Figure : New CAC Profile

Number Profile
  • Select New Number Profile option to assign a number. Numbers can be assigned from Number pool to make browser to browser or browser to SIP call. You can assign maximum of 31 digits number.
    For "Anonymous" user, number can be assigned from the Guest Number pool.

    The default values do not have a range.
    Number pool range must be configured to assign numbers. Enter a profile name, assign a number to the profile name from the Number pool, and set "Use number as SIP Id" as True.
  • Click Save.

This configuration is required only for initial setup.

  • Figure : Number Profile

    You can copy an existing Number Profile from the Number Profile List by clicking the Copy Number Profile or delete an existing Profile from the list by selecting delete button.

TLS Certificate Management

Select Monitoring > Dashboard > Certificate Profile. The Certificate Management screen is displayed:

Figure : Certificate Manager

 

The TLS Certificate Management includes Keystore and Truststore Certificates.

The following table provides parameter description of the TLS Certificate Management profile:

 

Parameter
Description
Name Indicates the name of the Keystore or Truststore certificate.

Type

Specifies the certificate type. 
Valid From and Valid To Specifies the duration the certificate would be valid to use.
Owner The third party who owns the certificate.
Logging Profile

The logging profile allows you to change log related information at each vertical.

Select All > WRTC Data Model > Profiles > Logging Profile. The Logging Profile screen is displayed:

Figure : Logging Profile

 

The following table provides parameter description of logging profile:

 

Parameter
Description
ALL All the logs corresponding to an event is logged.

FINEST

The finest logs corresponding to an event is logged.
INFO The information corresponding to an event is logged.
OFF The corresponding event logs are turned off.
SEVERE The severe logs corresponding to an event is logged.
WARNING All the warnings corresponding to an event is logged.
Alarms
Alarms

Select Monitoring > Alarms > Alarms.

Figure : Alarms

Only sonusWRTCVirtualIPPlumbedUpNotification and sonusWRTCPeerNodeNotReachableNotification alarms are supported for EMA.

Statistics
Statistics

Select Monitoring > Stats > Stats.

Figure : WRTC Statistics

 

On selecting a specific Stats the corresponding information is displayed immediately.

Node Configuration for SIP Communication

To initiate voice or video call to a non-WebRTC user, WRTC routes the call through SBC. For SIP Signaling interworking, you can update the node configuration as follows:

  1. Type https://wrtcnodeip:8443/ in the supported web browser.
     where, wrtcnodeip is the configured vitual IP address.
  2. Enter the username and password to login to the EMA.
  3. Select the SIP Signaling Profile under Profiles object in "WRTC Data Model".

    1. Modify an existing SIP Signaling Profile, or create a new one by clicking on SIP Signaling Profile option. 

      In the name column, enter a name for your profile, set the "SIP Registration Enabled" and "Use Telephone Number Towards SIP" values, and enter the value for Registration Duration. The default values of "SIP Registration Enabled" and "Use Telephone Number Towards SIP" are True.

      Figure : SIP Signalling Profile

      Click Save.

  4. Select the SIP Peer under Globals object in "WRTC Data Model". The SIP Peer List is displayed.

    1. Modify an existing SIP Peer, or create a new one by clicking on New SIP Peer option. 

      In the "SIP Peer Name" column enter a name for your SIP peer (SBC), in the SIP IP address column mention the SIP SIG IP address of the SBC server, in the "SIP Peer Port" mention the port number of the SBC server, and the "SIP Peer Transport Type" such as UDP.

      Figure : SIP Peer

    2. Click Save to save the configuration.

    3. Copy an existing SIP Peer from the SIP PeerList by clicking the Copy SIP Peer or delete an existing SIP Peer from the list by selecting delete  button.

  5. Select the Routing Label under Globals object in "WRTC Data Model" and then, click on New Routing Label. Provide a Routing Label Id and select the Routing Label State as True.

    1. Click Save.

    2. Copy an existing Routing Label from the Routing LabelList by clicking the Copy Routing Label or delete an existing Routing Label from the list by selecting delete  button.

    3. Select Data rows for Routing Label Route.

      To create a new data rows you must first select the Routing label from the drop-down, and then click the New Data rows for Routing Label Route option. Provide the Routing Label Name and in the SIP Peer column provide the SIP peer name (SBC) as mentioned in the SIP Peer.

      Figure : Routing Label

    4. Click Save.

    5. Copy an existing Data rows for Routing Label Route from the Data rows for Routing Label RouteList by clicking the Copy Data rows for Routing Label Route or delete an existing Data rows for Routing Label Route from the list by selecting delete  button.

  6. Select the Route under Globals object in "WRTC Data Model" and then, click on New Route.

    1. Provide the Number Prefix which is the SIP end-point number, Domain, Enterprise, and Routing Label.

      Figure : Route

      Maximum of 30 digits number is supported for a SIP end-point.

      It is recommended to create a default route ( prefix * and suffix *) to the registered SBC, for sending REGISTER/falling back to the default route when match is not found.

    2. Click Save to route the call.

    3. Copy an existing Route from the Route List by clicking the Copy Route or delete an existing Route from the list by selecting delete button.

  7. Select System Timers under Profiles object in "WRTC Data Model".

    1. Edit an existing System Timers Profile with SIP Keep Alive Interval.

    2. Click Save.

      The DBReconnectionInterval parameter is not used in this release.

      Figure : System Timers Profile

For more information on Browser to SIP Communication, refer to Browser-to-SIP Communication.

The SBC interworking with the WRTC must have the following configurations:

  • DTLS support for security.
  • ICE-Lite or Full-ICE configuration required for NAT traversal.
  • SMM Rules defined

For more information, refer to the SBC 5.1 documentation for Configuring SBC for WRTC.

Node Configuration for Multiple Point of Presence

  1. Type https://wrtcnodeip:8443/ in the supported web browser.
     where, wrtcnodeip is the configured vitual IP address.
  2. Provide the username and password to login to the EMA.
  3. Select the Application Profile under Profiles object in "WRTC Data Model". The Application Profile List is displayed.

    Figure : Application Profile List

  4. Modify an existing application profile, or create a new one by clicking on New Application Profile option. 

    In the "Application Profile Name" column provide a name for your application, edit the Peer-to-Peer Conference Max. Participants and Group Chat Max. Participants with the number of available participants, select the Call Forking Type either Parallel or Sequential, the Call Forking Policy from the drop-down list, and Preferred Terminating Device Type from the drop-down list.

    For more information on Multiple point of presence feature, refer to Multiple Point of Presence Support.

    Figure : Creating a New Application Profile

    The Device Capability Based Filtering option is not used in the current release.

  5. Click Save. You can copy an existing Application Profile by clicking the Copy Application Profile or delete an existing application profile from the list by selecting delete  button.

Node Configuration for GCM Support in WRTC

  1. Type https://wrtcnodeip:8443/ in the supported web browser.
     where, wrtcnodeip is the configured vitual IP address.
  2. Provide the username and password to login to the EMA.
  3. Select the Push Notification Profile under Profiles object in "WRTC Data Model". The Push Notification Profile List is displayed.

    Figure : Push Notification Profile List

  4. Modify an existing Push Notification profile, or create a new one by clicking on New Push Notification Profile option. 

    In the "Name" column provide a name for your application, enter the "Sender ID" which is a unique numerical value created when the API project is configured (given as "Project Number" in the Google Developers Console). The sender ID is used in the registration process to identify the app server (WRTC gateway) that is permitted to send messages to the client app. Enter the API key obtained while configuring the API project, it is saved on the WRTC server and gives WRTC server authorized access to the Google services.

    1. Enable incoming call and message notification by selecting "True" from the given option.

      For more information on GCM feature, refer to Google Cloud Messaging Support in WRTC.

      Figure : Creating a New Push Notification Profile

    2. Click Save.
    3. Copy an existing Push Notification Profile by clicking the Copy Push Notification Profile or delete an existing application profile from the list by selecting delete  button.

After configuring the WRTC node, click Apply Saved Changes and Close to save the configuration.

The EMS is now ready to push configuration data to the WRTC node.