Avatar of s_sykes
s_sykesFlag for United States of America

asked on 

Sporadic audio on VOIP over VPN

I am trying to let our employees use our phone software at home.  Normally we do not do this, so I equipped them with a VPN login and the phone sofware and thought it would work.  They are able to make and receive calls, but not all calls have audio.  That is the strange part, it works some of the time, so I assume that my firewall/ vpn config is okay.  I have had more success with users on Verizon internet than on Comcast.

Is there a reason that RTP packets would flow in each direction for some calls but not others?  It seems like a routing or QoS problem.  It's very strange.  I can make 5 good calls and then 3 will fail.  I'm using an IPSEC vpn client and a softphone application.  It's seems like the SIP side (call setup) works just fine, but audio (RTP) comes and goes.  I tried lowering the firewall on my Comcast connection, but that didn't seem to help.

Thanks!
* Fortigate* sipVPNVoice Over IP

Avatar of undefined
Last Comment
arnold
Avatar of arnold
arnold
Flag of United States of America image

SIP_alg needs to be disabled on the user's side if possible.
Also VPN QoS needs to be prioritized
Most users have asynchronous data streams..
Avatar of s_sykes
s_sykes
Flag of United States of America image

ASKER

Any suggestions on how to disable SIP_alg or prioritize VPN QoS on the user side?  These are home Comcast modem/routers for the most part.
ASKER CERTIFIED SOLUTION
Avatar of arnold
arnold
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
VPN
VPN

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or travelling users access to a central organizational network securely. VPNs encapsulate data transfers using secure cryptographic methods and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

26K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo