Deploy Yeastar P-Series Cloud PBX in Data Center (Basic)
You can deploy the Yeastar P-Series Cloud PBX in a Data Center.
Supported VM platform
Yeastar P-Series Cloud PBX can be deployed on the following VM platforms, which can
eliminate the cost of separate hardware.
- Microsoft Hyper-v
- KVM
- VMware
Note: Bochs is not supported.
Prerequisites
Before you begin, complete the following operations:- Understand the architecture
- Learn about the deployment architecture of Yeastar P-Series Cloud PBX.
- Plan resource
- Learn about the system requirements of the required servers.Tip: We provide a server calculator to help you calculate the required server configurations for the entire deployment of Yeastar P-Series Cloud PBX. For more information, see Server Calculator.
- Configure router settings
- Configure the following settings on the gateway router / firewall in the
network where the SBC Server and SBC Proxy Server reside.
- Allow PING requests from the LAN (Local Area Network) to ensure that the SBC Server and SBC Proxy Server can PING the gateway for connectivity checks.
- Disable SIP ALG (Application Layer Gateway) to avoid potential issues with VoIP calls.
Procedure
Important:
- All the servers use SINGLE Ethernet port.
- For private IP address of servers, avoid the
172.17.x.xand172.19.x.xIP ranges. - Make sure that all the servers can communicate with each other in both private network and public Internet.
- Set up your servers.You need to set up the following servers:
- A YCM Server
- An SBC Server
- An SBC Proxy Server
- A PBXHub Server
- Set up data disk for the servers.Note: You need to set up two additional data disks on the PBXHub Server for the storage of CloudPBX system data and recording files respectively.
- On the gateway router/firewall, configure NAT policies:
- For the YCM Server, SBC Server, and SBC Proxy Server, enable bidirectional Internet access, and ensure that the same public IP address is used for both inbound and outbound traffic.
- For the PBXHub Server, permit outbound connections only and block all inbound connections initiated from the Internet.