Spaces:
Sleeping
Sleeping
Upload 2 files
Browse files- README (2).md +35 -0
- app (1).py +376 -0
README (2).md
ADDED
|
@@ -0,0 +1,35 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
title: Amazon Connect BYOC SBC Configuration Validator
|
| 3 |
+
emoji: π
|
| 4 |
+
colorFrom: blue
|
| 5 |
+
colorTo: green
|
| 6 |
+
sdk: gradio
|
| 7 |
+
sdk_version: 4.16.0
|
| 8 |
+
app_file: app.py
|
| 9 |
+
pinned: false
|
| 10 |
+
---
|
| 11 |
+
|
| 12 |
+
# Amazon Connect BYOC - SBC Configuration Validator
|
| 13 |
+
|
| 14 |
+
AI-powered validation tool for Session Border Controller configurations used with Amazon Connect Bring Your Own Carrier (BYOC).
|
| 15 |
+
|
| 16 |
+
## Features
|
| 17 |
+
|
| 18 |
+
- Detects 10+ common SBC misconfigurations
|
| 19 |
+
- Analyzes security, audio quality, and connectivity issues
|
| 20 |
+
- Provides confidence scores and root cause analysis
|
| 21 |
+
- Offers specific remediation steps
|
| 22 |
+
- Self-service validation before deployment
|
| 23 |
+
|
| 24 |
+
## Usage
|
| 25 |
+
|
| 26 |
+
1. Load an example configuration (broken or valid)
|
| 27 |
+
2. Or paste your own SBC configuration
|
| 28 |
+
3. Click "Validate Configuration"
|
| 29 |
+
4. Review findings and apply recommended fixes
|
| 30 |
+
|
| 31 |
+
## Built By
|
| 32 |
+
|
| 33 |
+
Philip Drammeh | [LinkedIn](https://www.linkedin.com/in/philipdrammeh)
|
| 34 |
+
|
| 35 |
+
Independent researcher specializing in AI-powered telecommunications operations and multi-agent LLM systems.
|
app (1).py
ADDED
|
@@ -0,0 +1,376 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
import gradio as gr
|
| 2 |
+
import re
|
| 3 |
+
|
| 4 |
+
# Known SBC Misconfiguration Detection Rules
|
| 5 |
+
def check_codec_issues(config):
|
| 6 |
+
"""Check for codec-related problems"""
|
| 7 |
+
config_lower = config.lower()
|
| 8 |
+
issues = []
|
| 9 |
+
|
| 10 |
+
# Check if only one codec
|
| 11 |
+
codec_keywords = ['opus', 'pcmu', 'pcma', 'g729', 'g711']
|
| 12 |
+
codec_count = sum(1 for c in codec_keywords if c in config_lower)
|
| 13 |
+
|
| 14 |
+
if codec_count == 1 and 'opus' in config_lower and 'pcmu' not in config_lower:
|
| 15 |
+
issues.append({
|
| 16 |
+
"finding": "Codec Mismatch - Only Opus configured, PCMU/PCMA missing",
|
| 17 |
+
"impact": "Leads to one-way audio or call setup failure for carriers requiring PCMU/PCMA. Media negotiation will fail when remote endpoint doesn't support Opus.",
|
| 18 |
+
"fix": "Add PCMU and PCMA codecs: codecs=pcmu,pcma,opus,g729",
|
| 19 |
+
"confidence": 0.92,
|
| 20 |
+
"root_cause": "Codec list not aligned between SIP trunk and carrier requirements",
|
| 21 |
+
"severity": "high"
|
| 22 |
+
})
|
| 23 |
+
|
| 24 |
+
return issues
|
| 25 |
+
|
| 26 |
+
def check_security_issues(config):
|
| 27 |
+
"""Check for security problems"""
|
| 28 |
+
config_lower = config.lower()
|
| 29 |
+
issues = []
|
| 30 |
+
|
| 31 |
+
# Check SRTP
|
| 32 |
+
if 'srtp=optional' in config_lower or ('srtp' not in config_lower):
|
| 33 |
+
issues.append({
|
| 34 |
+
"finding": "SRTP Not Enforced (Security Risk)",
|
| 35 |
+
"impact": "Media encryption not enforced. Voice traffic exposed to eavesdropping. Fails PCI-DSS and HIPAA compliance requirements.",
|
| 36 |
+
"fix": "Enforce SRTP encryption: srtp=required, crypto_suites=AES_CM_128_HMAC_SHA1_80",
|
| 37 |
+
"confidence": 0.97,
|
| 38 |
+
"root_cause": "Default configuration prioritizes compatibility over security",
|
| 39 |
+
"severity": "critical"
|
| 40 |
+
})
|
| 41 |
+
|
| 42 |
+
# Check TLS version
|
| 43 |
+
if 'tls_version=1.0' in config_lower or 'tls_version=1.1' in config_lower:
|
| 44 |
+
issues.append({
|
| 45 |
+
"finding": "Deprecated TLS Version (1.0 or 1.1)",
|
| 46 |
+
"impact": "Security vulnerability to downgrade attacks. Modern carriers reject TLS 1.0/1.1 connections, causing trunk registration failure.",
|
| 47 |
+
"fix": "Upgrade to TLS 1.2 minimum: tls_version=1.2, tls_min_version=1.2",
|
| 48 |
+
"confidence": 0.94,
|
| 49 |
+
"root_cause": "Legacy TLS version not updated after security advisories (RFC 8996)",
|
| 50 |
+
"severity": "critical"
|
| 51 |
+
})
|
| 52 |
+
|
| 53 |
+
return issues
|
| 54 |
+
|
| 55 |
+
def check_nat_issues(config):
|
| 56 |
+
"""Check for NAT traversal problems"""
|
| 57 |
+
config_lower = config.lower()
|
| 58 |
+
issues = []
|
| 59 |
+
|
| 60 |
+
if 'nat_traversal=disabled' in config_lower or 'nat' not in config_lower:
|
| 61 |
+
issues.append({
|
| 62 |
+
"finding": "NAT Traversal Disabled",
|
| 63 |
+
"impact": "One-way audio or no audio on calls traversing NAT boundaries. RTP packets cannot find return path. Critical for cloud-based SBCs.",
|
| 64 |
+
"fix": "Enable NAT traversal: nat_traversal=enabled, ice_support=enabled, stun_server=stun.l.google.com:19302",
|
| 65 |
+
"confidence": 0.93,
|
| 66 |
+
"root_cause": "NAT handling disabled or STUN/ICE not configured for cloud deployment",
|
| 67 |
+
"severity": "high"
|
| 68 |
+
})
|
| 69 |
+
|
| 70 |
+
return issues
|
| 71 |
+
|
| 72 |
+
def check_port_issues(config):
|
| 73 |
+
"""Check for port configuration problems"""
|
| 74 |
+
config_lower = config.lower()
|
| 75 |
+
issues = []
|
| 76 |
+
|
| 77 |
+
# Check if port is non-standard
|
| 78 |
+
if 'port=' in config_lower:
|
| 79 |
+
port_match = re.search(r'port=(\d+)', config_lower)
|
| 80 |
+
if port_match:
|
| 81 |
+
port = int(port_match.group(1))
|
| 82 |
+
if port != 5060 and port != 5061:
|
| 83 |
+
issues.append({
|
| 84 |
+
"finding": f"Non-Standard SIP Port ({port})",
|
| 85 |
+
"impact": "Most carriers expect SIP on port 5060 (UDP) or 5061 (TLS). Non-standard ports may be blocked by firewalls or rejected by carriers.",
|
| 86 |
+
"fix": "Use standard ports: port=5060 for UDP/TCP, port=5061 for TLS",
|
| 87 |
+
"confidence": 0.88,
|
| 88 |
+
"root_cause": "Custom port configuration during migration or testing",
|
| 89 |
+
"severity": "medium"
|
| 90 |
+
})
|
| 91 |
+
|
| 92 |
+
# Check RTP port range
|
| 93 |
+
if 'rtp_port_range' in config_lower:
|
| 94 |
+
range_match = re.search(r'rtp_port_range=(\d+)-(\d+)', config_lower)
|
| 95 |
+
if range_match:
|
| 96 |
+
start, end = int(range_match.group(1)), int(range_match.group(2))
|
| 97 |
+
range_size = end - start
|
| 98 |
+
if range_size < 1000:
|
| 99 |
+
issues.append({
|
| 100 |
+
"finding": f"Insufficient RTP Port Range ({range_size} ports)",
|
| 101 |
+
"impact": "Port exhaustion during high call volume (>50 concurrent calls). New calls fail with 'No RTP resources available'.",
|
| 102 |
+
"fix": f"Expand RTP port range to at least 1000 ports: rtp_port_range=10000-11000",
|
| 103 |
+
"confidence": 0.91,
|
| 104 |
+
"root_cause": "Default narrow port range not scaled for production load",
|
| 105 |
+
"severity": "medium"
|
| 106 |
+
})
|
| 107 |
+
|
| 108 |
+
return issues
|
| 109 |
+
|
| 110 |
+
def check_session_timer(config):
|
| 111 |
+
"""Check session timer settings"""
|
| 112 |
+
config_lower = config.lower()
|
| 113 |
+
issues = []
|
| 114 |
+
|
| 115 |
+
if 'session_expires' in config_lower:
|
| 116 |
+
timer_match = re.search(r'session_expires=(\d+)', config_lower)
|
| 117 |
+
if timer_match:
|
| 118 |
+
timer = int(timer_match.group(1))
|
| 119 |
+
if timer < 900:
|
| 120 |
+
issues.append({
|
| 121 |
+
"finding": f"Session Timer Too Short ({timer} seconds)",
|
| 122 |
+
"impact": "Long-duration calls terminated prematurely during brief network issues. Customer complaints about dropped calls after {timer//60} minutes.",
|
| 123 |
+
"fix": "Increase session timer: session_expires=1800, min_se=900",
|
| 124 |
+
"confidence": 0.86,
|
| 125 |
+
"root_cause": "Conservative timer settings from legacy PBX migration",
|
| 126 |
+
"severity": "medium"
|
| 127 |
+
})
|
| 128 |
+
|
| 129 |
+
return issues
|
| 130 |
+
|
| 131 |
+
def check_dtmf_issues(config):
|
| 132 |
+
"""Check DTMF configuration"""
|
| 133 |
+
config_lower = config.lower()
|
| 134 |
+
issues = []
|
| 135 |
+
|
| 136 |
+
if 'dtmf_relay=inband' in config_lower or 'dtmf' not in config_lower:
|
| 137 |
+
issues.append({
|
| 138 |
+
"finding": "DTMF Method Not Optimal",
|
| 139 |
+
"impact": "In-band DTMF unreliable with compressed codecs. IVR systems may not receive digits correctly, causing customer frustration in phone menus.",
|
| 140 |
+
"fix": "Use RFC2833 for DTMF: dtmf_relay=rfc2833 (preferred by most carriers)",
|
| 141 |
+
"confidence": 0.89,
|
| 142 |
+
"root_cause": "Default in-band DTMF not suitable for VoIP environments",
|
| 143 |
+
"severity": "medium"
|
| 144 |
+
})
|
| 145 |
+
|
| 146 |
+
return issues
|
| 147 |
+
|
| 148 |
+
def check_dns_issues(config):
|
| 149 |
+
"""Check DNS configuration"""
|
| 150 |
+
config_lower = config.lower()
|
| 151 |
+
issues = []
|
| 152 |
+
|
| 153 |
+
if 'dns_srv_lookup=disabled' in config_lower or 'dns_srv=disabled' in config_lower:
|
| 154 |
+
issues.append({
|
| 155 |
+
"finding": "DNS SRV Lookup Disabled",
|
| 156 |
+
"impact": "SBC cannot discover carrier SIP servers via DNS SRV records. Loses automatic failover and load balancing capabilities.",
|
| 157 |
+
"fix": "Enable DNS SRV resolution: dns_srv_lookup=enabled",
|
| 158 |
+
"confidence": 0.85,
|
| 159 |
+
"root_cause": "DNS SRV disabled to work around temporary DNS issues",
|
| 160 |
+
"severity": "low"
|
| 161 |
+
})
|
| 162 |
+
|
| 163 |
+
return issues
|
| 164 |
+
|
| 165 |
+
def analyze_configuration(config_text):
|
| 166 |
+
"""Comprehensive configuration analysis"""
|
| 167 |
+
|
| 168 |
+
if not config_text.strip():
|
| 169 |
+
return "Please enter a configuration to analyze."
|
| 170 |
+
|
| 171 |
+
# Run all checks
|
| 172 |
+
all_issues = []
|
| 173 |
+
all_issues.extend(check_codec_issues(config_text))
|
| 174 |
+
all_issues.extend(check_security_issues(config_text))
|
| 175 |
+
all_issues.extend(check_nat_issues(config_text))
|
| 176 |
+
all_issues.extend(check_port_issues(config_text))
|
| 177 |
+
all_issues.extend(check_session_timer(config_text))
|
| 178 |
+
all_issues.extend(check_dtmf_issues(config_text))
|
| 179 |
+
all_issues.extend(check_dns_issues(config_text))
|
| 180 |
+
|
| 181 |
+
# Build output
|
| 182 |
+
if not all_issues:
|
| 183 |
+
return """# β
Configuration Validation: PASSED
|
| 184 |
+
|
| 185 |
+
**Status:** No critical issues detected
|
| 186 |
+
|
| 187 |
+
**Summary:** Your SBC configuration follows Amazon Connect BYOC best practices. The configuration includes:
|
| 188 |
+
- β
Proper codec negotiation (PCMU/PCMA/Opus)
|
| 189 |
+
- β
SRTP encryption enforced
|
| 190 |
+
- β
TLS 1.2+ for signaling security
|
| 191 |
+
- β
NAT traversal enabled with ICE support
|
| 192 |
+
- β
Standard SIP ports (5060/5061)
|
| 193 |
+
- β
Adequate RTP port range for scaling
|
| 194 |
+
- β
Appropriate session timers
|
| 195 |
+
- β
RFC2833 DTMF for IVR compatibility
|
| 196 |
+
|
| 197 |
+
**Next Steps:**
|
| 198 |
+
1. Test with a trial call to verify audio quality
|
| 199 |
+
2. Monitor call metrics for 24-48 hours
|
| 200 |
+
3. Review Amazon Connect contact flow integration
|
| 201 |
+
|
| 202 |
+
**Need Help?** Contact AWS Support or your carrier's technical team for deployment assistance.
|
| 203 |
+
"""
|
| 204 |
+
|
| 205 |
+
# Issues found - categorize by severity
|
| 206 |
+
critical = [i for i in all_issues if i['severity'] == 'critical']
|
| 207 |
+
high = [i for i in all_issues if i['severity'] == 'high']
|
| 208 |
+
medium = [i for i in all_issues if i['severity'] == 'medium']
|
| 209 |
+
low = [i for i in all_issues if i['severity'] == 'low']
|
| 210 |
+
|
| 211 |
+
output = []
|
| 212 |
+
|
| 213 |
+
# Customer impact header
|
| 214 |
+
if critical or high:
|
| 215 |
+
output.append("# β οΈ Configuration Validation: ISSUES DETECTED\n")
|
| 216 |
+
output.append("**Customer Impact:** This configuration will likely cause audio quality issues, call failures, or security vulnerabilities in production.\n")
|
| 217 |
+
else:
|
| 218 |
+
output.append("# β οΈ Configuration Validation: WARNINGS\n")
|
| 219 |
+
output.append("**Status:** Configuration will work but has optimization opportunities.\n")
|
| 220 |
+
|
| 221 |
+
output.append(f"\n**Issues Found:** {len(all_issues)} ({len(critical)} critical, {len(high)} high, {len(medium)} medium, {len(low)} low)\n")
|
| 222 |
+
output.append("\n" + "="*80 + "\n\n")
|
| 223 |
+
|
| 224 |
+
# Show issues by severity
|
| 225 |
+
issue_num = 1
|
| 226 |
+
|
| 227 |
+
for severity_name, severity_list in [("π΄ CRITICAL", critical), ("π HIGH", high), ("π‘ MEDIUM", medium), ("βͺ LOW", low)]:
|
| 228 |
+
if severity_list:
|
| 229 |
+
output.append(f"## {severity_name} PRIORITY\n\n")
|
| 230 |
+
|
| 231 |
+
for issue in severity_list:
|
| 232 |
+
output.append(f"### Issue #{issue_num}: {issue['finding']}\n\n")
|
| 233 |
+
output.append(f"**π Confidence:** {issue['confidence']:.0%} | ")
|
| 234 |
+
output.append(f"**π― Root Cause:** {issue['root_cause']}\n\n")
|
| 235 |
+
output.append(f"**π₯ Customer Impact:**\n{issue['impact']}\n\n")
|
| 236 |
+
output.append(f"**β
How to Fix:**\n```\n{issue['fix']}\n```\n\n")
|
| 237 |
+
output.append("-"*80 + "\n\n")
|
| 238 |
+
issue_num += 1
|
| 239 |
+
|
| 240 |
+
# Action items
|
| 241 |
+
output.append("## π Recommended Actions\n\n")
|
| 242 |
+
if critical:
|
| 243 |
+
output.append("1. **URGENT:** Address all critical issues before deploying to production\n")
|
| 244 |
+
if high:
|
| 245 |
+
output.append("2. Fix high-priority issues to prevent customer-impacting audio problems\n")
|
| 246 |
+
if medium:
|
| 247 |
+
output.append("3. Optimize medium-priority items for better call quality and reliability\n")
|
| 248 |
+
|
| 249 |
+
output.append("\n**Testing Checklist:**\n")
|
| 250 |
+
output.append("- [ ] Make test call and verify two-way audio\n")
|
| 251 |
+
output.append("- [ ] Test DTMF input in IVR menu\n")
|
| 252 |
+
output.append("- [ ] Verify TLS handshake with carrier\n")
|
| 253 |
+
output.append("- [ ] Confirm NAT traversal in cloud environment\n")
|
| 254 |
+
|
| 255 |
+
return "".join(output)
|
| 256 |
+
|
| 257 |
+
# Example configurations
|
| 258 |
+
BROKEN_CONFIG = """transport=udp
|
| 259 |
+
port=5060
|
| 260 |
+
codecs=opus
|
| 261 |
+
srtp=optional
|
| 262 |
+
nat_traversal=disabled
|
| 263 |
+
tls_version=1.0
|
| 264 |
+
session_expires=90
|
| 265 |
+
dtmf_relay=inband
|
| 266 |
+
rtp_port_range=10000-10100
|
| 267 |
+
dns_srv_lookup=disabled"""
|
| 268 |
+
|
| 269 |
+
VALID_CONFIG = """transport=tcp
|
| 270 |
+
port=5061
|
| 271 |
+
codecs=pcmu,pcma,opus,g729
|
| 272 |
+
srtp=required
|
| 273 |
+
crypto_suites=AES_CM_128_HMAC_SHA1_80
|
| 274 |
+
nat_traversal=enabled
|
| 275 |
+
ice_support=enabled
|
| 276 |
+
stun_server=stun.l.google.com:19302
|
| 277 |
+
tls_version=1.2
|
| 278 |
+
tls_min_version=1.2
|
| 279 |
+
cipher_suites=ECDHE-RSA-AES256-GCM-SHA384
|
| 280 |
+
session_expires=1800
|
| 281 |
+
min_se=900
|
| 282 |
+
dtmf_relay=rfc2833
|
| 283 |
+
rtp_port_range=10000-20000
|
| 284 |
+
dns_srv_lookup=enabled
|
| 285 |
+
media_anchoring=enabled"""
|
| 286 |
+
|
| 287 |
+
def load_broken_config():
|
| 288 |
+
return BROKEN_CONFIG
|
| 289 |
+
|
| 290 |
+
def load_valid_config():
|
| 291 |
+
return VALID_CONFIG
|
| 292 |
+
|
| 293 |
+
# Create Gradio interface
|
| 294 |
+
with gr.Blocks(theme=gr.themes.Soft(), title="Amazon Connect BYOC - SBC Configuration Validator") as demo:
|
| 295 |
+
|
| 296 |
+
gr.Markdown("""
|
| 297 |
+
# π Amazon Connect BYOC Configuration Validator
|
| 298 |
+
### Self-Service SBC Configuration Analysis
|
| 299 |
+
|
| 300 |
+
**For Amazon Connect Customers Using Bring Your Own Carrier (BYOC)**
|
| 301 |
+
|
| 302 |
+
Validate your SBC configuration before connecting to Amazon Connect. This tool automatically detects
|
| 303 |
+
common misconfigurations that cause audio issues, call failures, and security vulnerabilities.
|
| 304 |
+
""")
|
| 305 |
+
|
| 306 |
+
with gr.Row():
|
| 307 |
+
with gr.Column(scale=1):
|
| 308 |
+
gr.Markdown("### π Your SBC Configuration")
|
| 309 |
+
config_input = gr.Textbox(
|
| 310 |
+
label="Paste your configuration here",
|
| 311 |
+
lines=20,
|
| 312 |
+
placeholder="Example:\ntransport=tcp\nport=5061\ncodecs=pcmu,pcma,opus\nsrtp=required\nnat_traversal=enabled\n...",
|
| 313 |
+
)
|
| 314 |
+
|
| 315 |
+
with gr.Row():
|
| 316 |
+
broken_btn = gr.Button("π Load Example: Common Mistakes", variant="secondary", size="sm")
|
| 317 |
+
valid_btn = gr.Button("β
Load Example: Best Practice Config", variant="secondary", size="sm")
|
| 318 |
+
|
| 319 |
+
analyze_btn = gr.Button("π Validate Configuration", variant="primary", size="lg")
|
| 320 |
+
|
| 321 |
+
gr.Markdown("""
|
| 322 |
+
**Quick Start:**
|
| 323 |
+
1. Click an example button to see how validation works
|
| 324 |
+
2. Paste your actual SBC configuration
|
| 325 |
+
3. Click "Validate Configuration"
|
| 326 |
+
4. Follow recommendations to fix any issues
|
| 327 |
+
""")
|
| 328 |
+
|
| 329 |
+
with gr.Column(scale=1):
|
| 330 |
+
gr.Markdown("### π Validation Results")
|
| 331 |
+
output = gr.Markdown()
|
| 332 |
+
|
| 333 |
+
# Button actions
|
| 334 |
+
broken_btn.click(fn=load_broken_config, outputs=config_input)
|
| 335 |
+
valid_btn.click(fn=load_valid_config, outputs=config_input)
|
| 336 |
+
analyze_btn.click(fn=analyze_configuration, inputs=config_input, outputs=output)
|
| 337 |
+
|
| 338 |
+
gr.Markdown("""
|
| 339 |
+
---
|
| 340 |
+
## About This Validator
|
| 341 |
+
|
| 342 |
+
This tool checks for 10+ common SBC misconfigurations in Amazon Connect BYOC deployments:
|
| 343 |
+
|
| 344 |
+
**Security Issues:**
|
| 345 |
+
- Weak or missing SRTP encryption
|
| 346 |
+
- Deprecated TLS versions (1.0/1.1)
|
| 347 |
+
- Unsecure cipher suites
|
| 348 |
+
|
| 349 |
+
**Audio Quality Issues:**
|
| 350 |
+
- Codec mismatches causing one-way audio
|
| 351 |
+
- NAT traversal problems in cloud environments
|
| 352 |
+
- Incorrect DTMF signaling for IVR systems
|
| 353 |
+
|
| 354 |
+
**Connectivity Issues:**
|
| 355 |
+
- Non-standard SIP ports
|
| 356 |
+
- Session timer misconfigurations
|
| 357 |
+
- DNS SRV lookup disabled
|
| 358 |
+
- Insufficient RTP port ranges
|
| 359 |
+
|
| 360 |
+
**Confidence Scores:** Each finding includes an AI-powered confidence score (85-97%) and specific remediation steps.
|
| 361 |
+
|
| 362 |
+
**Who Should Use This:**
|
| 363 |
+
- AWS customers setting up Amazon Connect BYOC
|
| 364 |
+
- Telecom engineers configuring SBCs for cloud connectivity
|
| 365 |
+
- Operations teams troubleshooting audio quality issues
|
| 366 |
+
- Compliance teams validating security configurations
|
| 367 |
+
|
| 368 |
+
---
|
| 369 |
+
|
| 370 |
+
π‘ **Pro Tip:** Run this validator before submitting support tickets. Most BYOC issues can be resolved by following these recommendations.
|
| 371 |
+
|
| 372 |
+
Built by Philip Drammeh | [LinkedIn](https://www.linkedin.com/in/philipdrammeh)
|
| 373 |
+
""")
|
| 374 |
+
|
| 375 |
+
if __name__ == "__main__":
|
| 376 |
+
demo.launch()
|