About CUBE High Availability on Cisco ASR 1000 Series Routers
CUBE supports two HA options on the Cisco ASR 1000 Series Aggregation Services Router:
-
Box-to-box Redundancy
-
Inbox Redundancy
The following table describes the Cisco ASR 1000 Series Router models supported for each redundancy type:
Redundancy Type |
Router Models |
Supported Cisco IOS-XE Release |
---|---|---|
Box-to-box |
|
Cisco IOS XE Release 3.11 onwards |
Inbox |
Cisco ASR 1006 Router |
Cisco IOS XE Release 3.11 onwards |
Note |
Cisco ASR 1006 supports both Box-to-box and Inbox redundancy. You cannot switch between these two modes dynamically. |
The following table provides details on the type of information that is preserved in different call types:
Call Type |
Transport Layer |
Call Preservation After Switchover |
---|---|---|
SIP-SIP |
UDP |
Both media and session signaling are preserved. |
SIP-SIP |
TCP/TLS |
Both media and session signaling are preserved using port 5060. |
SIP-H.323 |
TCP or UDP |
Only media is preserved. Session signaling is not preserved. |
H.323-H.323 |
TCP |
Inbox Redundancy
Inbox redundancy with Stateful Switchover (SSO) mechanism provides redundancy within the same device. Cisco ASR1006 supports the stateful failover from an active Enhanced Services Processor (ESP) to a standby and from an active Route Processor to a standby on the same box.
Box-to-Box Redundancy
Box-to-box redundancy enables configuring a pair of routers to act as back up for each other. In the router pair, the active router is determined based on the failover conditions. The router pair continuously exchange status messages. CUBE session information is checkpointed across the active and standby router. This enables the standby router to immediately take over all CUBE call processing responsibilities when the active router becomes unavailable.
Redundancy Group (RG) Infrastructure
A group of redundant interfaces form a Redundancy Group. The active and standby routers are connected by a configurable control link and data synchronization link. The control link is used to communicate the redundancy state for each router. The data synchronization link is used to transfer stateful information to synchronize the stateful database for the calls and media flows. Each pair of redundant interfaces is configured with the same unique ID number, also known as the Redundancy Interface Identifier (RII).
A Virtual IP address (VIP) is configured on interfaces that connect to the external network. All signaling and media is sourced from and sent to the Virtual IP address. External devices such as Cisco Unified Communication Manager, uses VIP as the destination IP address for the calls traversing through Cisco UBE.
The following figure shows the redundancy group configured for a pair of routers with a single outgoing interface.
PROTECTED Mode
The default failover redundancy behavior in a box-to-box HA pair is to reload the affected router to avoid out-of-sync conditions or Split brain. From release IOS XE 3.11 onwards, you can configure a Cisco ASR 1000 Series Router to transition into PROTECTED mode, which has the following features:
-
Bulk sync request, Call checkpointing, and incoming call processing are disabled.
-
You must manually reload a router in PROTECTED mode to come out of this state.
To enable the PROTECTED mode, use the no redundancy-reload command under voice service voip .
Network Topology
This section describes how to configure the following network topology. PSTN access uses an Active and Standby pair of routers in a SIP trunk deployment between a Cisco Unified Communications Manager (Unified CM) and a service provider SIP trunk.
In this topology, both Active and Standby routers have the same configuration and connects through a physical switch across same interfaces. The topology is mandatory for the CUBE High Availability (HA) to work. For example, the CUBE-1 and CUBE-2 interface toward WAN must terminate on the same switch. Use Multiple interfaces or subinterfaces on either LAN or WAN side. Also, one CUBE has a lower IP address across all three interfaces on the same CUBE paltform.
We recommend that you keep the following in mind when configuring this topology:
-
Connect the redundancy group control and data interfaces in the CUBE HA pair to the same physical switch to avoid any latency in the network.
-
The RG control and data interfaces of the CUBE HA pair can be connected through a back-to-back cable or using a switch as shown in figures Network Topology with switch between active and standby routers and Network Topology with crossover cable between active and standby routers. However, it is recommended to use Portchannel for the RG control and data interfaces for redundancy. A single connection using back-to-back cable or switch presents a single point of failure due to a faulty cable, port, or switch, resulting in error state where both routers are Active.
-
If the RG ID is the same for the two different CUBE HA pairs, keepalive interface for check-pointing the RG control and data, and traffic must be in a different subnet or VLAN.
Note
This recommendation is applicable only if you connect using a switch, not by back-to-back cables.
-
You can configure a maximum of two redundancy groups. Hence, there can be only two Active and Standby pairs within the same network.
Note
This recommendation is applicable only if you connect using a switch, not by back-to-back cables.
-
Source all signaling and media from and to the virtual IP address.
-
Always save the running configuration to avoid losing it due to router reload during a failover.
-
Virtual Routing and Forwarding
-
Define Virtual Router Forwarding (VRF) in the same order on both Active and Standby routers for an accurate synchronization of data.
-
You can configure VRFs only on the traffic interface (SIP and RTP). Do not configure VRF on redundancy group control and data interface.
-
VRF configurations on both the Active and Standby router must be identical. VRF IDs checkpoints for the calls before and after switchover (includes VRF-based RTP port range).
-
-
Manually copy the configurations from one router to the other.
-
Replicating the configuration on the Standby router does not commit to the startup configuration; it is the running configuration. You must run the write memory command to commit the changes that are synchronized from the Active router on the Standby router.
Considerations and Restrictions
The following is a list of further considerations and restrictions you should know before configuring this topology:
Considerations
-
Only active calls are checkpointed (Calls that are connected with 200 OK or ACK transaction completed).
-
When you apply and save the configuration for the first time, the platform must be reloaded.
-
For H.323, and TCP-based calls, media preservation is supported after the failover, but session signaling is not preserved.
-
If you have Cisco Unified Customer Voice Portal (CVP) in your network, we recommend that you configure TCP session transport for the SIP trunk between CVP and CUBE.
-
Upon failover, the previously active CUBE reloads by design.
-
CUBE uses the virtual IP address to communicate Smart Licensing information.
-
For SIP-SIP TLS calls, configure both the active and standby CUBE as trust points to a common external CA Server.
-
TCP sessions are not preserved during the failover. Remote user agents are expected to reestablish TCP sessions (using port 5060) before sending subsequent messages.
-
Call Admission Control (CAC) state is maintained through switchover. After Stateful Switchover, no calls are allowed if the CAC limit is reached before the switchover.
-
Up to six multimedia lines in the SDP are checkpointed for CUBE high availability. From Cisco IOS XE Release 3.17 onwards, SDP Passthru (up to two m-lines) calls are also checkpointed.
-
Survivability.tcl preservation is supported from Cisco IOS XE Release 3.17 onwards for Unified Customer Voice Portal (CVP) deployments.
-
SRTP-RTP, SRTP-SRTP, and SRTP Passthru are supported.
Note
Redundancy control traffic that is exchanged between CUBE-1 and CUBE-2 is not secured natively and displays SRTP encryption keys in cleartext. If SRTP is used, you must secure this traffic by configuring a transport IPsec tunnel between the two interfaces that are used as the redundancy control link.
-
Port channel is supported for both RG control data and traffic interfaces only from Cisco IOS XE 16.3.1 onwards.
-
LTI-based transcoder call flow preservation is supported from Cisco IOS XE Release 3.15 onwards and requires the same DSP module capacity on both active and standby in the same slot or subslot.
-
From release Cisco IOS-XE 3.11 onwards, upon failover, you can move the previously active CUBE to a PROTECTED state to avoid the reload.
-
While deploying High Availability pair with Application Centric Infrastructure (ACI), perform one of the following:
-
Disable IP data plane learning on the VRF.
Refer to IP Data-plane Learning for details.
-
Use an intermediate Layer 3 switch between the High Availability pair and the ACI deployment. This Layer 3 switch prevents the ACI from directly learning the CUBE IP address and its associated MAC addresses.
-
Restrictions
-
IPv6 is not supported.
-
All SCCP-based media resources (Conference bridge, Transcoding, Hardware MTP, and Software MTP) are not supported.
-
Cisco Unified Survivable Remote Site Telephony (Cisco Unified SRST) or TDM Gateway colocation on CUBE HA is not supported.
-
Routers connected through Metropolitan Area Network (MAN) Ethernet regardless of latency are not supported.
-
Out-of-band DTMF (Notify or KPML) is not supported post switchover. Only rtp-nte to rtp-nte and voice-inband to voice-inband DTMF works after the switchover.
-
Media-flow around and UC Services API (Cisco Unified Communications Manager Network-Based Recording) are not supported.
-
You cannot terminate Wide Area Network (WAN) on CUBE directly or Data HA on either side. Both active and standby routers must be in the same Data Center and connected to the same physical switch.
-
The Courtesy Callback (CCB) feature is not supported if a callback was registered with Cisco Unified Customer Voice Portal (CVP) and then a switchover was done on CUBE.
-
You cannot configure a secondary IP address for the interfaces.
-
If the redundancy group ID is same for the two different CUBE HA pairs, then the keepalive interface that is used for checkpointing RG control and data traffic must be in a different subnet or VLAN.
-
One CUBE must have lower IPs across all the three interfaces on the same CUBE platform. For instance, CUBE-1 must have lower IP addresses in Gig0/0/0 interface compared with CUBE-2 Gig0/0/0 interface.
-
CUBE box-to-box high availability requires same priority and threshold to be configured on both CUBE-1 and CUBE-2.