Solved

Cisco SIP through a Firewall

Posted on 2010-08-23
3
1,095 Views
Last Modified: 2012-05-10
I have a Cisco SIP trunk going to Exchange UM on a different segment through a Juniper firewall. If I limit the FW policy to SIP (5060), calls do not go through. I am also seeing a lot of traffic on some hugh UDP ports once the session is initiated. How do I find the range that it is going to use so I can open this up?
0
Comment
Question by:centricC
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 10

Expert Comment

by:Larry Larmeu
ID: 33504729
Your SIP trunk provider should provide the ports.
0
 

Author Comment

by:centricC
ID: 33504738
My SIP trunk is coming from my Cisco CallManager.
0
 

Accepted Solution

by:
centricC earned 0 total points
ID: 33506603
I looked up the ports in Cisco's documentation and added them to the rule. Everything works fine.
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In my office we had 10 Cisco 7940G IP phones that were useless as they were showing PROTOCOL APPLICATION INVALID when started. I searched through Google and worked for a week continuously on those phones, and finally got them working. This is a di…
Although VoiceOver IP has been around for a while, internet connections have only recently become fast enough to provide good call quality. Now, VoIP has become a real option for businesses looking at ways to improve their business model. In this ar…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question