Cisco IOS firewall won't allow h323 connections

I've got a Cisco 2851 router that acting as a firewall. It's running IOS 12.4 and I'm using the IOS firewall in it. My problem is I can't get h323 (specifically for polycom video conferencing) to work properly while passing throught he device. All other traffic in either direction works as advertised. I've disabled the ACLs and the inspect statments, and the problem stays. Any thoughts?
LVL 1
HSBSupportAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

SorensonCommented:
In your inspect statments were you inspecting h323?  Can you post a sanatized config that you were trying?  If you are doing PAT, it will not work without the inspects.
0
HSBSupportAuthor Commented:
Below is the inspect section of the config, and the setup of the interface. The access-list has the correct ports open to the VC units, and each video conference units has a static public IP that is NATed. To add to this, I've setup a test router with a PC on either side running VC software. The router is exactly the same as the the one we're having issues with, right down to using the same configuration. Just after the router boots, I can creata a connection between te two PCs using the software, after the router runs for about 10 - 15 minutes, I can no longer create the same connection.

Insepct statments (I know the sessions are set really high. Just haven't cut them back yet)
ip inspect max-incomplete high 10000
ip inspect max-incomplete low 9000
ip inspect one-minute high 6000
ip inspect one-minute low 5000
ip inspect tcp max-incomplete host 250 block-time 0
ip inspect name Inspect-g1 cuseeme
ip inspect name Inspect-g1 dns
ip inspect name Inspect-g1 ftp
ip inspect name Inspect-g1 https
ip inspect name Inspect-g1 icmp
ip inspect name Inspect-g1 imap
ip inspect name Inspect-g1 pop3
ip inspect name Inspect-g1 netshow
ip inspect name Inspect-g1 rcmd
ip inspect name Inspect-g1 realaudio
ip inspect name Inspect-g1 esmtp
ip inspect name Inspect-g1 sqlnet
ip inspect name Inspect-g1 streamworks
ip inspect name Inspect-g1 tftp
ip inspect name Inspect-g1 vdolive
ip inspect name Inspect-g1 rtsp
ip inspect name Inspect-g1 tcp
ip inspect name Inspect-g1 udp
ip inspect name Inspect-g1 h323
ip inspect name Inspect-g1 h323callsigalt
ip inspect name Inspect-g1 h323gatestat


Interface config (we're using a 4 port module inorder to gain more ports for all the connections we needed)
interface Vlan19
 description InternetLink
 bandwidth 9216
 ip address 165.166.5.130 255.255.255.128
 ip access-group ACL_OUT2 in
 ip verify unicast reverse-path
 no ip unreachables
 ip nbar protocol-discovery
 ip nat outside
 ip inspect Inspect-g1 out
 ip virtual-reassembly
 no ip route-cache cef
 service-policy output COL_OUT-MPLS
0
HSBSupportAuthor Commented:
After a few days and long hours with TAC....

The fix was reverse route maps and ACLs to keep the h323 traffic out of NAT.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Software Firewalls

From novice to tech pro — start learning today.