Solved

wireshark on Avaya ip phone

Posted on 2014-04-04
4
1,195 Views
Last Modified: 2014-04-10
I captured the traffic for an Avaya VoIP phone with Wireshark. the user phone (10.10.10.100) is calling another user on the remote site (10.10.30.100). I am not sure I understand the flow of UDP. I don't see the conversation between 10.10.10.100 and 10.10.20.100. I only see the conversation between 10.10.10.100 and 10.10.20.1 (the IP Office). 10.10.10.100 and 10.10.20.1 are on the same location.
0
Comment
Question by:leblanc
  • 2
4 Comments
 
LVL 57

Assisted Solution

by:giltjr
giltjr earned 334 total points
Comment Utility
i"m pretty sure that the phones don't directly talk to each other.  The "conversation" goes through the VOIP server.

Just like with "land line" type phone systems.  Just like PBX systems, the phones don't directly connect to each other, they go through the PBX.
0
 
LVL 1

Author Comment

by:leblanc
Comment Utility
So is it possible to see the IP address of the phone that it is communicating with?
0
 
LVL 57

Assisted Solution

by:giltjr
giltjr earned 334 total points
Comment Utility
You would have to do a packet capture in a way that you would see all traffic to/from the VOIP server.

However, unless you filter on both phones IP addresses, that means you would see ALL VOIP traffic.

Oh, UDP flow.  There is NONE.  UDP is a through over your should and hope it gets there protocol.  Just because you see a UDP datagram go from hostA to hostB, does not mean that you will see one coming back from hostB to hostA.  

UDP is a very unreliable protocol from a network point of view.  Any "reliability" must be handled by the application as the network does NOT provide any for UDP.
0
 

Accepted Solution

by:
dssisupport earned 166 total points
Comment Utility
This can also be affected by the Avaya switch programming. There is a parameter in the Avaya Signaling Group configuration called Direct IP-IP Audio Connections?. If it is set to Yes then the two stations will communicate directly. If it is set to No then both sides go through the PBX connection.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now