Solved

Sip trunk between CUCM 8.5 and asterisk

Posted on 2014-04-26
2
2,679 Views
Last Modified: 2014-05-01
HI,

I want to add a SIP trunk between my asterisk and Cisco UCM 8.5. I read on some forums that it'll not work properly. Could you please advice the best procedure to do the same.

Thanks in advance.
0
Comment
Question by:vijaydawda
2 Comments
 
LVL 20

Accepted Solution

by:
José Méndez earned 500 total points
ID: 40025889
That wouldn't be true. I have configured trunks between the 2 just fine.

Add a new SIP trunk in callmanager pointing to Asterisk (I have tried this in version 1.8, not sure what will happen now that version 12 changed to pjsip stack). Use a SIP trunk security profile with an outbound transport of UDP. Unless you configure Asterisk with TCP, UDP will be the default. THis way you ensure that CM will talk over UDP as well.

CM will not attempt to register to Asterisk, and won't accept Asterisk to register with itself, so you won't need any type of registration parameters in Asterisk, but do remember to add a host= line with CM's IP.

Remember to reset the trunk in the CM side often until it works =)
0
 
LVL 1

Author Comment

by:vijaydawda
ID: 40025904
Thank you Mr. Willy,

Could you please provide me the step by step configuration
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
NBX V3000 Flashing Red Lights - What does this mean 5 63
Avaya IP Phones, SonicWall, Site to Site VPN 9 212
Cisco MRA Phones 4 92
voice vlan on meraki using 3CX 3 91
Every year the snow affects people and businesses. According to the Federation of Small Businesses (FSB), in 2009, UK businesses lost an estimated £1.2bn (http://news.bbc.co.uk/1/hi/business/7864804.stm) because of bad weather. This article was c…
Almost all Internet protocol telephones have built-in switches at the back that allow you to connect your personal computer to one port and use the other port to connect your phone to to a Cisco switch.   Why we need to connect the PC to the pho…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question