<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-zone-based-firewall-for-voip/m-p/2601639#M197627</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;i know this is an old thread but just wondering how you resolved this austin ,&amp;nbsp; having the same issues here&lt;/P&gt;
&lt;P&gt;Paddi&lt;/P&gt;</description>
    <pubDate>Mon, 25 Apr 2016 11:19:00 GMT</pubDate>
    <dc:creator>paddi1972</dc:creator>
    <dc:date>2016-04-25T11:19:00Z</dc:date>
    <item>
      <title>Configuring Zone Based Firewall for VoIP</title>
      <link>https://community.cisco.com/t5/network-security/configuring-zone-based-firewall-for-voip/m-p/2601637#M197625</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am trying to configure zone based firewall (on a 2911 with the k9 security license) to pass VoIP traffic from my VoIP provider to an internal IP PBX (3CX) and vice versa. The way I have it setup currently is to permit all outgoing traffic from the internal network to the outside. For traffic coming from the WAN (G0/1 “Outside-Frontier” zone) I have allowed all traffic with destination port(s) TCP/UDP 5060 (SIP) and UDP 9001-9049 (RTP). However, even after explicitly allowing this traffic (via class-maps with ACL’s) I cannot seem to get voice traffic to pass through (I get a “no response” when attempting to make a call).&lt;/P&gt;&lt;P&gt;I know that my base configuration is correct because if I disable ZBF then I can make calls just fine and the firewall checker in 3CX&amp;nbsp;passes all of the RTP/SIP&amp;nbsp;ports. As soon as I apply the ZBF config I cannot even connect to my SIP provider/make a call.&lt;/P&gt;&lt;P&gt;I have tried all sorts of combinations of ACLs and class-maps/policy-maps but nothing seems to work other than allowing all IP traffic to pass the inside and outside zones (which defeats the purpose of ZBF).&lt;/P&gt;&lt;P&gt;My LAN diagram, running-config,&amp;nbsp;version info, and PBX port settings&amp;nbsp;are pasted below. I have omitted IP addresses and other unnecessary lines (like VPN configuration). I would really appreciate any and all advise on this.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/zbf-diagram.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;router#show ver&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Cisco IOS Software, C2900 Software (C2900-UNIVERSALK9-M), Version 15.2(4)M6, RELEASE SOFTWARE (fc2)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Technical Support: &lt;A href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Copyright (c) 1986-2014 by Cisco Systems, Inc.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Compiled Wed 19-Mar-14 19:23 by prod_rel_team&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ROM: System Bootstrap, Version 15.0(1r)M16, RELEASE SOFTWARE (fc1)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;router#show run&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Building configuration...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Current configuration : 13497 bytes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;! Last configuration change at 17:29:45 UTC Sat Jan 24 2015&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;version 15.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;service timestamps debug datetime msec&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;service timestamps log datetime msec&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;no service password-encryption&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;hostname router&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;boot-start-marker&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;boot-end-marker&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip cef&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip domain name invalid.lan&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip name-server x.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip name-server x.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;no ipv6 cef&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip ssh version 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;class-map type inspect match-any Outgoing-Mail-Class&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;match access-group name OUTGOING_MAIL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;class-map type inspect match-any Outgoing-FW-Exceptions-Class&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;match access-group name OUTGOING_FW_EXCEPTIONS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;class-map type inspect match-any Incoming-FW-Exceptions-Class&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;match access-group name INCOMING_FW_EXCEPTIONS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;class-map type inspect match-any Inside-&amp;gt;Outside-Comcast-Class&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;match protocol http&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;match protocol https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;match protocol dns&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;match protocol icmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;match class-map Outgoing-Mail-Class&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;policy-map type inspect Outside-Frontier-&amp;gt;Inside-Policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;class type inspect Incoming-FW-Exceptions-Class&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp; pass&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp; drop&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;policy-map type inspect Inside-&amp;gt;Outside-Comcast-Policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;class type inspect Inside-&amp;gt;Outside-Comcast-Class&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp; inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp; drop&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;policy-map type inspect Inside-&amp;gt;Outside-Frontier-Policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;class type inspect Outgoing-FW-Exceptions-Class&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp; pass&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp; drop&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;zone security Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;zone security Outside-Comcast&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;zone security Outside-Frontier&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;zone-pair security Inside-&amp;gt;Outside-Frontier source Inside destination Outside-Frontier&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;service-policy type inspect Inside-&amp;gt;Outside-Frontier-Policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;zone-pair security Inside-&amp;gt;Outside-Comcast source Inside destination Outside-Comcast&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;service-policy type inspect Inside-&amp;gt;Outside-Comcast-Policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;zone-pair security Outside-Frontier-&amp;gt;Inside source Outside-Frontier destination Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;service-policy type inspect Outside-Frontier-&amp;gt;Inside-Policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;interface Loopback0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;interface Embedded-Service-Engine0/0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;no ip address&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;shutdown&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;interface GigabitEthernet0/0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;description WAN interface (Comcast cable) for data&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;ip address x.x.x.x&amp;nbsp; x.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;zone-member security Outside-Comcast&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;shutdown&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;duplex auto&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;speed auto&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;interface GigabitEthernet0/1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;description WAN interface (Frontier DSL) for voice interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;ip address x.x.x.x x.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;ip nat outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;ip virtual-reassembly in&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;zone-member security Outside-Frontier&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;duplex auto&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;speed auto&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;interface GigabitEthernet0/2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;description Link to 3560 switch&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;ip address 10.10.1.1 255.255.255.252&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;ip nat inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;ip virtual-reassembly in&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;zone-member security Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;duplex auto&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;speed auto&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;no ip http server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip http authentication local&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip http secure-server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat pool dsl-nat x.x.x.xx.x.x.xnetmask x.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source list DSL_NAT_ACL pool dsl-nat overload&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static tcp 10.10.10.25 5060 x.x.x.x5060 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 5060 x.x.x.x5060 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static tcp 10.10.10.25 5090 x.x.x.x5090 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 5090 x.x.x.x5090 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static tcp 10.10.10.25 5901 x.x.x.x5901 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9000 x.x.x.x9000 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9001 x.x.x.x9001 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9002 x.x.x.x9002 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9003 x.x.x.x9003 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9004 x.x.x.x9004 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9005 x.x.x.x9005 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9006 x.x.x.x9006 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9007 x.x.x.x9007 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9008 x.x.x.x9008 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9009 x.x.x.x9009 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9010 x.x.x.x9010 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9011 x.x.x.x9011 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9012 x.x.x.x9012 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9013 x.x.x.x9013 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9014 x.x.x.x9014 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9015 x.x.x.x9015 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9016 x.x.x.x9016 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9017 x.x.x.x9017 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9018 x.x.x.x9018 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9019 x.x.x.x9019 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9020 x.x.x.x9020 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9021 x.x.x.x9021 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9022 x.x.x.x9022 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9023 x.x.x.x9023 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9024 x.x.x.x9024 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9025 x.x.x.x9025 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9026 x.x.x.x9026 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9027 x.x.x.x9027 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9028 x.x.x.x9028 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9029 x.x.x.x9029 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9030 x.x.x.x9030 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9031 x.x.x.x9031 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9032 x.x.x.x9032 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9033 x.x.x.x9033 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9034 x.x.x.x9034 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9035 x.x.x.x9035 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9036 x.x.x.x9036 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9037 x.x.x.x9037 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9038 x.x.x.x9038 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9039 x.x.x.x9039 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9040 x.x.x.x9040 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9041 x.x.x.x9041 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9042 x.x.x.x9042 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9043 x.x.x.x9043 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9044 x.x.x.x9044 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9045 x.x.x.x9045 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9046 x.x.x.x9046 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9047 x.x.x.x9047 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9048 x.x.x.x9048 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip nat inside source static udp 10.10.10.25 9049 x.x.x.x9049 extendable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip route 10.10.0.0 255.255.0.0 10.10.1.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip route 0.0.0.0 0.0.0.0 x.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip access-list standard DSL_NAT_ACL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;remark Perform PAT from inside to the DSL interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit 10.10.0.0 0.0.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip access-list extended INCOMING_FW_EXCEPTIONS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;remark Allow SIP and RTP from from any source to any destination&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit tcp any any eq 5060&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 5060&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9001&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9002&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9003&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9004&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9005&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9006&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9007&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9008&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9009&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9010&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9011&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9012&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9013&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9014&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9015&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9016&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9017&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9018&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9019&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9020&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9021&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9022&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9023&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9024&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9025&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9026&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9027&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9028&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9029&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9030&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9031&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9032&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9033&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9034&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9035&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9036&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9037&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9038&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9039&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9040&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9041&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9042&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9043&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9044&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9045&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9046&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9047&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9048&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit udp any any eq 9049&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip access-list extended OUTGOING_FW_EXCEPTIONS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;remark Allow all outgoing IP traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;permit ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ip access-list extended OUTGOING_MAIL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;remark Allow any internal host to send outgoing mail over TCP 8889&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;permit tcp any eq 8889 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;control-plane&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;end&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;3CX IP PBX port&amp;nbsp;settings&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/3cxports.png" class="migrated-markup-image" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3CX firewall checker&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/fw-checkfailed.png" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:23:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-zone-based-firewall-for-voip/m-p/2601637#M197625</guid>
      <dc:creator>Austin Rivet</dc:creator>
      <dc:date>2019-03-12T05:23:22Z</dc:date>
    </item>
    <item>
      <title>Hi. Try to add the following</title>
      <link>https://community.cisco.com/t5/network-security/configuring-zone-based-firewall-for-voip/m-p/2601638#M197626</link>
      <description>&lt;P&gt;Hi. Try to add the following to your "&lt;SPAN style="font-size: 12px;"&gt;Outgoing-FW-Exceptions-Class" class map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&lt;SPAN style="font-size:14px;"&gt;match protocol skinny&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;match protocol sip (or sip-tls)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jan 2015 10:05:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-zone-based-firewall-for-voip/m-p/2601638#M197626</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-01-25T10:05:26Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/configuring-zone-based-firewall-for-voip/m-p/2601639#M197627</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;i know this is an old thread but just wondering how you resolved this austin ,&amp;nbsp; having the same issues here&lt;/P&gt;
&lt;P&gt;Paddi&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2016 11:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-zone-based-firewall-for-voip/m-p/2601639#M197627</guid>
      <dc:creator>paddi1972</dc:creator>
      <dc:date>2016-04-25T11:19:00Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/configuring-zone-based-firewall-for-voip/m-p/2601640#M197628</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I did end up figuring this out, though we no longer use this phone system... hopefully I can help you out anyway.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There were a few issues specific to my deployment / environment:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1. ZBF was blocking outgoing UDP traffic from my PBX&lt;/P&gt;
&lt;P&gt;2. ZBF was blocking incoming RTP traffic from my VoIP provider&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Starting with issue one, my PBX seemed to be sending traffic on random UDP ports, so ZBF was blocking the outgoing traffic from my PBX. I created a rule allowing any UDP traffic from my PBX to any external address. Once I did this calls started coming through. However, I was having one-way audio issues. This brings me to issue number two.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Some VoIP providers have media proxies (used for RTP traffic) that you can whitelist the IP. Other VoIP providers do not, so there is no way to whitelist RTP traffic from specific IPs. In my case, the VoIP provider was not using media proxies, so there was no way to permit RTP from only specific IPs. Once I allowed RTP traffic from any external IP to my PBX I started getting audio both ways, and the firewall checker passed.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So in summary, what worked for me:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-Allow all outbound UDP traffic from my PBX to any external address&lt;/P&gt;
&lt;P&gt;-Allow inbound RTP from any external to my PBX.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;My recommendation to you is to do the following:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Lock down SIP - if at all possible, only allow SIP from the IP address(es) of your VoIP provider. Leaving SIP open to anyone on the Internet is a sure way for your system to be compromised.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Adjust your RTP rules per your VoIP provider's documentation - if they have media gateway's/proxies, then only allow RTP from the IP of those proxies/gateway's. If they do not have media gateway's/proxies or you have external VoIP extensions, then you will need to open up RTP to your PBX from any external IP.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Allow UDP from your PBX to any external - I don't necessarily recommend this, but if you are having trouble even after adjusting your SIP and RTP rules then you might need to look at the traffic coming from your PBX to see if it is sending UDP traffic on random or unusual ports that is being blocked by ZBF. Wireshark might be useful here.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Below is a sample config that might be a good starting place for you.&lt;/P&gt;
&lt;P&gt;# ZBF Config&lt;/P&gt;
&lt;P&gt;zone security Inside&lt;BR /&gt;zone security Outside-Frontier&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended INCOMING_FW_EXCEPTIONS&lt;BR /&gt; remark Pass (without inspection) any traffic defined in this ACL from the outside to the inside&lt;BR /&gt; permit tcp host xx.xx.xx.xx host 10.10.10.25&amp;nbsp;eq 5060&amp;nbsp;&lt;BR /&gt; permit udp host xx.xx.xx.xx host 10.10.10.25&amp;nbsp;eq 5060&lt;BR /&gt; permit udp any host 10.10.10.25 range 9000 9049&lt;BR /&gt; exit &lt;BR /&gt;!&lt;BR /&gt;ip access-list extended OUTGOING_FW_EXCEPTIONS &lt;BR /&gt;remark Pass (without inspection) any traffic defined in this ACL from the inside to the outside&lt;BR /&gt; permit tcp any host&amp;nbsp;xx.xx.xx.xx&lt;BR /&gt; permit udp any host&amp;nbsp;xx.xx.xx.xx&lt;BR /&gt; permit udp host 10.10.10.25 any&lt;BR /&gt; exit &lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any Inside-&amp;gt;Outside-Frontier-Class&lt;BR /&gt; match protocol http&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol ssh&lt;BR /&gt; match protocol pop3&lt;BR /&gt; match protocol pop3s&lt;BR /&gt; exit&lt;BR /&gt;class-map type inspect match-any Outgoing-FW-Exceptions-Class &lt;BR /&gt; match access-group name OUTGOING_FW_EXCEPTIONS&lt;BR /&gt; exit&lt;BR /&gt;class-map type inspect match-any Incoming-FW-Exceptions-Class &lt;BR /&gt; match access-group name INCOMING_FW_EXCEPTIONS&lt;BR /&gt; exit&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect Inside-&amp;gt;Outside-Frontier-Policy&lt;BR /&gt; class type inspect Inside-&amp;gt;Outside-Frontier-Class&lt;BR /&gt; inspect&lt;BR /&gt; exit&lt;BR /&gt; class type inspect Outgoing-FW-Exceptions-Class&lt;BR /&gt; pass&lt;BR /&gt; exit&lt;/P&gt;
&lt;P&gt;exit&lt;BR /&gt;policy-map type inspect Outside-Frontier-&amp;gt;Inside-Policy&lt;BR /&gt; class type inspect Incoming-FW-Exceptions-Class&lt;BR /&gt; no drop&lt;BR /&gt; pass&lt;BR /&gt; exit&lt;BR /&gt;!&lt;BR /&gt;zone-pair security Inside-&amp;gt;Outside-Frontier source Inside destination Outside-Frontier&lt;BR /&gt; service-policy type inspect Inside-&amp;gt;Outside-Frontier-Policy&lt;BR /&gt; exit&lt;BR /&gt;zone-pair security Outside-Frontier-&amp;gt;Inside source Outside-Frontier destination Inside &lt;BR /&gt; service-policy type inspect Outside-Frontier-&amp;gt;Inside-Policy&lt;BR /&gt; exit&lt;BR /&gt;!&lt;BR /&gt;interface g0/1&lt;BR /&gt; zone-member security Outside-Frontier&lt;BR /&gt;interface g0/2&lt;BR /&gt; zone-member security Inside&lt;BR /&gt; exit&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2016 23:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-zone-based-firewall-for-voip/m-p/2601640#M197628</guid>
      <dc:creator>Austin Rivet</dc:creator>
      <dc:date>2016-04-25T23:39:25Z</dc:date>
    </item>
  </channel>
</rss>

