You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/communications-gateway/prepare-for-live-traffic.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,9 +41,12 @@ In some parts of this article, the steps you must take depend on whether your de
41
41
1. Azure Communications Gateway is preconfigured to support the DigiCert Global Root G2 certificate and the Baltimore CyberTrust Root certificate as root certificate authority (CA) certificates. If the certificate that your network presents to Azure Communications Gateway uses a different root CA certificate, provide your onboarding team with this root CA certificate.
42
42
1. The root CA certificate for Azure Communications Gateway's certificate is the DigiCert Global Root G2 certificate. If your network doesn't have this root certificate, download it from https://www.digicert.com/kb/digicert-root-certificates.htm and install it in your network.
43
43
1. Configure your infrastructure to meet the call routing requirements described in [Reliability in Azure Communications Gateway](reliability-communications-gateway.md).
44
-
1. Configure your network devices to send and receive SIP traffic from Azure Communications Gateway. You might need to configure SBCs, softswitches and access control lists (ACLs). To find the hostnames to use for SIP traffic:
45
-
1. Go to the **Overview** page for your Azure Communications Gateway resource.
46
-
1. In each **Service Location** section, find the **Hostname** field. You need to validate TLS connections against this hostname to ensure secure connections.
44
+
1. Configure your network devices to send and receive SIP traffic from Azure Communications Gateway.
45
+
* Depending on your network, you might need to configure SBCs, softswitches and access control lists (ACLs).
46
+
* Your network needs to send SIP traffic to per-region FQDNs for Azure Communications Gateway. To find these FQDNs:
47
+
1. Go to the **Overview** page for your Azure Communications Gateway resource.
48
+
1. In each **Service Location** section, find the **Hostname** field. You need to validate TLS connections against this hostname to ensure secure connections.
49
+
* We recommend configuring an SRV lookup for each region, using `_sip._tls.<regional-FQDN-from-portal>`. Replace *`<regional-FQDN-from-portal>`* with the per-region FQDNs that you found in the **Overview** page for your resource.
47
50
1. If your Azure Communications Gateway includes integrated MCP, configure the connection to MCP:
48
51
1. Go to the **Overview** page for your Azure Communications Gateway resource.
49
52
1. In each **Service Location** section, find the **MCP hostname** field.
0 commit comments