Skip to content

Commit 8e97630

Browse files
committed
853353 Describe the per-region SRV lookups for Communications Gateway
1 parent 9afb103 commit 8e97630

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

articles/communications-gateway/prepare-for-live-traffic.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,9 +41,12 @@ In some parts of this article, the steps you must take depend on whether your de
4141
1. Azure Communications Gateway is preconfigured to support the DigiCert Global Root G2 certificate and the Baltimore CyberTrust Root certificate as root certificate authority (CA) certificates. If the certificate that your network presents to Azure Communications Gateway uses a different root CA certificate, provide your onboarding team with this root CA certificate.
4242
1. The root CA certificate for Azure Communications Gateway's certificate is the DigiCert Global Root G2 certificate. If your network doesn't have this root certificate, download it from https://www.digicert.com/kb/digicert-root-certificates.htm and install it in your network.
4343
1. Configure your infrastructure to meet the call routing requirements described in [Reliability in Azure Communications Gateway](reliability-communications-gateway.md).
44-
1. Configure your network devices to send and receive SIP traffic from Azure Communications Gateway. You might need to configure SBCs, softswitches and access control lists (ACLs). To find the hostnames to use for SIP traffic:
45-
1. Go to the **Overview** page for your Azure Communications Gateway resource.
46-
1. In each **Service Location** section, find the **Hostname** field. You need to validate TLS connections against this hostname to ensure secure connections.
44+
1. Configure your network devices to send and receive SIP traffic from Azure Communications Gateway.
45+
* Depending on your network, you might need to configure SBCs, softswitches and access control lists (ACLs).
46+
* Your network needs to send SIP traffic to per-region FQDNs for Azure Communications Gateway. To find these FQDNs:
47+
1. Go to the **Overview** page for your Azure Communications Gateway resource.
48+
1. In each **Service Location** section, find the **Hostname** field. You need to validate TLS connections against this hostname to ensure secure connections.
49+
* We recommend configuring an SRV lookup for each region, using `_sip._tls.<regional-FQDN-from-portal>`. Replace *`<regional-FQDN-from-portal>`* with the per-region FQDNs that you found in the **Overview** page for your resource.
4750
1. If your Azure Communications Gateway includes integrated MCP, configure the connection to MCP:
4851
1. Go to the **Overview** page for your Azure Communications Gateway resource.
4952
1. In each **Service Location** section, find the **MCP hostname** field.

0 commit comments

Comments
 (0)