Solved

Configuring Cisco Phone System

Posted on 2014-09-25
3
378 Views
Last Modified: 2014-10-15
We received the following email from our SIP Trunk provider:

With the Cisco Call Manager w/ CUBE, the CUBE is not passing UPATE messages to the Call manager. Thus, the CUCM will disconnect the call after 30 minutes, since no UPDATE was received. The CUBE must remove the UPDATE in the "Allow-Header" field.

This command will remove the UPDATE from any request or response message type:

voice class sip-profiles 1
request ANY sip-header Allow-Header modify ", UPDATE" ""
response ANY sip-header Allow-Header modify ", UPDATE" ""

The "voice-class sip profiles 1" must be applied to the dial peer facing PAETEC.  In this example we are using dial-peer 9000

dial-peer voice 9000 voip
destination-pattern .T
voice-class codec 1
voice-class sip localhost  dns:astrial.pe.mcleodusa.net
voice-class sip outbound-proxy ipv4:xx.xx.xx.xx
voice-class sip early-offer forced
voice-class sip profiles 1
session protocol sipv2

So here are my questions:
1) We need to make these changes in the SRST device which is a which is a Cisco 2921/K9, correct?
2) The first part looks pretty straightforward, but what about the second set of instructions? I guess I need the Dial Peer explained to me and which IP address is supposed to be in the outbound proxy.
0
Comment
Question by:JesusFreak42
  • 2
3 Comments
 
LVL 20

Accepted Solution

by:
agonza07 earned 500 total points
ID: 40345445
How many routers do you have in place? SRST is not neccesarily the CUBE, although it usually is.

On the dial peers, just find the one with the "session protocol sipv2" pointing to your provider. There's probably not many, so if you want to sanitize and post I can tell you which one to use.

Probably best to sanitize and just post your config....
0
 

Author Comment

by:JesusFreak42
ID: 40346595
Does sanitize mean make private?
0
 
LVL 20

Expert Comment

by:agonza07
ID: 40346598
Just clean up your public IP addresses, remove usernames and passwords, etc. That way you dont post any identifying info online.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Simple Guest VLAN Help 17 36
VOIP: SIP vs. proprietary Broadview Networks Silnet ?? 12 44
Cisco prime 3 17
EIGRP Configuration 2 7
Article by: user_n
How Sip Phone (User Agent) works and communicates with sip servers 1.  There is a sip server and a sip registrar.  The sip server and sip registrar can be one server or two different servers. The sip registrar is the server on which it is record…
Exchange server is not supported in any cloud-hosted platform (other than Azure with Azure Premium Storage).
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now