Improve company productivity with a Business Account.Sign Up

x
?
Solved

AllWorx Remote Phones and ASA configuration

Posted on 2011-09-30
4
Medium Priority
?
2,467 Views
Last Modified: 2012-05-12
I have an AllWorx 48x controller in a main office with a public IP address on the wAN port  in DMZ/Firewall mode.

I have another location that I am attempting to use the AllWorx 9212 IP phones.

I can get the registration fine without any changes to the ASA 5510 at theremote phone site.
Calls can be generated and received, however there is NO AUDIO in either direction.

Please assist me with using the ASDM tool to modify my current configuration.
I have attempted to use a separate Public IP address for a static NAT and ACL statements that work as afar as accessing the phones web server, but the audio won't work even when I restrict the RTP port range for the phone configuration and set it statically in ASA.

I want to be able to use minimal configuration on the ASA to support multiple remote phones.

Please help.
From AllWorx site:
The following ports must be opened on your remote firewall to allow traffic from the WAN to the LAN IP address of your Allworx Phone:

•UDP port 2088 (BLF Traffic)
•UDP port 5060 (sip registration)
•UDP ports 16384 to 16393 (RTP media streams-Audio)
0
Comment
Question by:NetManaged
  • 2
  • 2
4 Comments
 
LVL 29

Accepted Solution

by:
Alan Huseyin Kayahan earned 2000 total points
ID: 36899227
Whenever NAT is involved, VOIP is always problematic. Most probably, everything will work if you somehow manage to assign the public IP directly to Allworks controller.

And the following may help.
http://www.ccietalk.com/2009/08/03/cisco-asa-inspection-issues
0
 

Author Comment

by:NetManaged
ID: 36901251
MrHusy,

     I stated in my original question,"I have an AllWorx 48x controller in a main office with a public IP address on the WAN port  in DMZ/Firewall mode."
0
 

Author Comment

by:NetManaged
ID: 36913915
MrHusy, Points awarded for the link. That was what I needed to do.
Disable VoIP-related inspections. Life is good again.
0
 
LVL 29

Expert Comment

by:Alan Huseyin Kayahan
ID: 36916281
Great =], I interpreted the question as if the public IP was at firewall's interface and posted the link just incase if I misinterpreted.
0

Featured Post

The 14th Annual Expert Award Winners

The results are in! Meet the top members of our 2017 Expert Awards. Congratulations to all who qualified!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
This article is about building a VRF-Aware site to site VPN tunnels in Cisco CSR1000V router with IOS XE. There are two VRF-Aware Policy Based IPsec VPN tunnels configured on CSR1000V router one with NAT and another without NAT.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

579 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question