Platform Guide

Teams Direct Routing SIP Troubleshooting

10 min read  ·  Updated April 2026

Microsoft Teams Direct Routing connects Teams to the PSTN via a certified Session Border Controller. When calls fail, the issues are almost always TLS certificate problems, SIP signaling mismatches, or codec configuration errors. Here's how to diagnose each one.

In this guide

1. How Teams Direct Routing works

Direct Routing connects Microsoft Teams Phone System to the PSTN via a certified SBC. The call flow: Teams client → Microsoft SIP proxy (sip.pstnhub.microsoft.com) → Your SBC (TLS/SRTP) → SIP trunk or PBX → PSTN.

All signaling between Teams and your SBC uses TLS on port 5061. Media uses SRTP. Teams supports SILK, G.722, G.711, G.729, and Opus codecs. The SBC must be on Microsoft's certified SBC list or Teams will refuse to connect.

2. SBC requirements for Direct Routing

3. TLS and certificate requirements

TLS certificate issues are the most common cause of Direct Routing failures. Requirements:

Requirement 01
Public CA signed — no self-signed
Teams only accepts certificates from public trusted CAs. Let's Encrypt, DigiCert, Comodo, and other public CAs work. Your internal enterprise CA will not work for the SBC certificate used with Teams — it must be publicly trusted.
Requirement 02
FQDN must match Teams configuration
The certificate CN or SAN must exactly match the FQDN you configured in the Teams Admin Center under Direct Routing. If your cert is for sbc.example.com, your Teams SBC record must also use sbc.example.com.
Requirement 03
Full certificate chain required
Your SBC must present the full certificate chain including intermediates. Teams validates the entire chain. A missing intermediate certificate causes TLS handshake failure even with a valid end-entity certificate.
; Test TLS from your SBC perspective openssl s_client -connect sip.pstnhub.microsoft.com:5061 -tls1_2 ; Verify your certificate chain openssl verify -CAfile /etc/ssl/certs/ca-certificates.crt your-sbc-cert.pem ; Check cert expiry openssl x509 -enddate -noout -in your-sbc-cert.pem

4. Common SIP failures in Direct Routing

Failure 01
503 from Microsoft — SBC not reachable
Teams cannot reach your SBC. Check that sip.pstnhub.microsoft.com can reach your SBC on port 5061. Verify your firewall allows inbound TLS on 5061 from Microsoft IP ranges (published in O365 IP address list). Check that your SBC responds to OPTIONS pings.
Failure 02
480 or 408 — No response from SBC
SBC is not responding to Teams INVITEs. Check SBC health, TLS configuration, and that the SBC is configured with the correct Teams SIP proxy addresses. Verify the SBC trunk pointing to Teams uses port 5061 with TLS.
Failure 03
488 — Codec mismatch
Teams negotiates SILK, G.722, G.711, G.729, and Opus. If your SIP trunk or downstream PBX only supports G.729 and your SBC is not transcoding, a 488 results. Configure your SBC to transcode to G.711 as a fallback.
Failure 04
Calls connect but no audio
SRTP key exchange failure or media bypass misconfiguration. Check that SRTP is enabled on the Teams-facing SBC leg. If using media bypass, verify the Teams client can reach the SBC directly on the RTP port range. Media bypass requires the SBC to have a publicly reachable media IP.

5. Media bypass troubleshooting

Media bypass allows Teams clients to send media directly to the SBC, bypassing Microsoft media processors. This reduces latency but requires the SBC to have a public IP reachable by Teams clients.

Media bypass requirements: SBC public IP must be in the Microsoft bypass allow list. Teams client must not be behind a symmetric NAT that blocks direct media. The SBC must advertise the correct public IP in the SDP.

If media bypass calls fail but non-bypass calls work: Disable media bypass as a test. If calls succeed, the issue is SBC public IP reachability from Teams clients. Check that the SBC's media IP in the SDP matches its public IP and that UDP RTP ports are open.

6. Diagnostic tools

Teams Admin Center: Direct Routing → Health Dashboard shows SBC status, OPTIONS ping health, and recent call failures with SIP response codes.

PowerShell:

; Get Direct Routing call records Get-CsOnlinePSTNUsage Get-CsOnlineVoiceRoute Get-CsOnlinePSTNGateway -Identity sbc.example.com ; Check SBC health Get-CsOnlinePSTNGateway | Select Identity, Enabled, SipSignalingPort, FailoverTimeSeconds

SBC-side capture: Capture SIP on the SBC for calls to/from Teams. Look for TLS handshake failures (no SIP messages after TCP connect), 4xx responses, and SDP codec lines to diagnose mismatches.

Frequently asked questions

What are the SIP requirements for Teams Direct Routing?

Teams Direct Routing requires: a certified SBC, TLS 1.2 on port 5061, a public CA-signed certificate matching the SBC FQDN in Teams admin, SRTP for all media, and the SBC must respond to OPTIONS pings from Microsoft SIP proxies. Self-signed certificates and plain RTP are not accepted.

How do I fix a 503 error in Teams Direct Routing?

A 503 from Teams Direct Routing means Teams cannot reach your SBC. Check that your firewall allows inbound TLS port 5061 from Microsoft IP ranges (published in the O365 IP list). Verify your SBC responds to OPTIONS pings from sip.pstnhub.microsoft.com. Check the Teams Admin Center Direct Routing health dashboard for specific error details.

How do I troubleshoot no audio in Teams Direct Routing?

No audio in Teams Direct Routing is usually a SRTP configuration issue or media bypass problem. Verify SRTP is enabled on the Teams-facing SBC leg. If using media bypass, check the SBC has a public IP reachable by Teams clients and that UDP RTP ports are open. Disable media bypass as a test — if audio works without bypass, the issue is direct media reachability.

Having Teams Direct Routing SIP issues?

Paste your SBC SIP trace into SIPSymposium. The analyzer identifies TLS failures, codec mismatches, SRTP configuration issues, and media bypass problems in Direct Routing deployments.

Analyze my trace Create free account
Related guides