Solved

Transferring 4 VoIP phones to a different ISP

Posted on 2016-08-11
10
19 Views
Last Modified: 2016-11-02
At our remote location we are going to transfer our 4 VoIP phones from ISP A to ISP B. At the main location is the VoIP server that the remote phones connect to. The main location uses ISP A to connect to the remote location through a VPN tunnel, where the remote phones can connect to the VoIP server. My question is do we need to connect another router to ISP B to allow the VoIP phones to communicate with the main location server? And if so will need a special configuration to communicate with that server? Also do we need to create a VPN tunnel between Remote ISP B router to main ISP A router?

Any help would be greatly appreciated!
0
Comment
Question by:rcimasi
10 Comments
 
LVL 10

Expert Comment

by:ecarbone
ID: 41753163
I can't see why you would need to add anything special, but I suppose it depends on your configuration.

We have an Allworx IP Phone system at our main office.
Winstream is our ISP.

I have two remote workers. They work from home. One has Comcast as his ISP and the other has AT&T uverse as his ISP.

Both remote workers took their phones home, plugged them into their home router and the phones connected to the VoIP server right away.

The configuration to connect to the server, is pre-programmed into the phone. All it needs is an Internet connection and to make sure certain ports are not being blocked.
0
 
LVL 19

Expert Comment

by:n2fc
ID: 41753168
For a discussion of transferring VoIP to a new ISP see:
http://blog.voxox.com/blog/bid/341728/Moving-Your-VoIP-Phone-System-How-to-Prepare-for-a-Location-or-ISP-Change

Basically, it should be "plug & play"... As long as you have proper bandwidth at the new ISP and access to your router everything should just work "as-is"...
0
 

Author Comment

by:rcimasi
ID: 41753169
When you say home router do you mean the one the ISP provided?
0
 
LVL 10

Expert Comment

by:ecarbone
ID: 41753187
> When you say home router do you mean the one the ISP provided?

Yes. IP Phones are supposed to be plug-and-play.
0
 

Author Comment

by:rcimasi
ID: 41772253
Sorry for taking so long to comment but the phone technician finally came out. The technician moved the phones over to the new gateway. After this the phones could not reach the destination server because they were originally communicating through a VPN tunnel. He gave me a list of phone ports that needed to be opened and pointed to the outside ip address on the firewall. He told me that once this is done, the phones should be able to communicate with the server. Do you think this method will work and if so does anyone know any links that can help with port configurations on a Cisco ASA 5505? Thank you.
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 10

Expert Comment

by:ecarbone
ID: 41772407
So it sounds like the new configuration will NOT use a VPN?
0
 

Author Comment

by:rcimasi
ID: 41772411
Yes the new configuration will have to go outside of the VPN
0
 
LVL 20

Expert Comment

by:masnrock
ID: 41863925
You never did mention what type of phone system you're using. One approach would be to simply open up additional ports on the main location's firewall. A safer and better approach would be to put in a Session Border Controller that establishes a connection to the main location that the remote phones can utilize.
0
 

Accepted Solution

by:
rcimasi earned 0 total points
ID: 41863932
To resolve this issue we had to open up the correct ports for mitel on our main sites firewall. And allow the IP address from the remote gateway to NAT through the main locations firewall into the server.
0
 

Author Closing Comment

by:rcimasi
ID: 41869798
Had to use technical support and other means of research to figure our this resolution.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
Not sure what the best email signature size is? Are you worried about email signature image size? Follow this best practice guide.
In this tutorial viewers will learn how add a scalable full-width header using CSS3. Create a new HTML document with an internal stylesheet. Set a tiled background.:  Create a new div and name it Header. Position it with position:absolute at the top…
In this tutorial viewers will learn how to code links for mobile sites that, once clicked, send a call or text to a specified number. For a telephone link (once clicked, calls a number), begin with a normal "<a href=" link tag. For the href, specify…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now