<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IOS ZBF - VoIP Traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199119#M361290</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, sorry about the ASA thing, i'm used to work with'em.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide the logs you get from the router?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Feb 2013 18:26:21 GMT</pubDate>
    <dc:creator>jocamare</dc:creator>
    <dc:date>2013-02-27T18:26:21Z</dc:date>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199114#M361285</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm implementing a project where will have a DMVPN in a hub-spoke topology with ZBF on spoke ISR G2 routers. The CUCM will be in Data Center behind Hub Router.&lt;/P&gt;&lt;P&gt;I tried to configure ZBF in spoke routers allowing just signaling protocols to CUCM like sccp, mgcp, sip and h323 expecting that pinholes would be opened for RTP ports but it doesn't work. The source LAN RTP packet in spoke router was dropped and I needed to open the RTP UDP range ports to have VoIP comunication between two spoke sites.&lt;/P&gt;&lt;P&gt;Anyone have an experience with this kind of scenario or have any idea if this ZBF config should work in this implementation?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto keyring DMVPN &lt;/P&gt;&lt;P&gt;&amp;nbsp; pre-shared-key address 0.0.0.0 0.0.0.0 key cisco@123&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;crypto isakmp invalid-spi-recovery&lt;/P&gt;&lt;P&gt;crypto isakmp keepalive 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec security-association replay window-size 1024&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set 3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt; mode transport&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec profile DMVPN&lt;/P&gt;&lt;P&gt; set transform-set 3DES-SHA &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-any VPN-PROT&lt;/P&gt;&lt;P&gt; match protocol ftp&lt;/P&gt;&lt;P&gt; match protocol tftp&lt;/P&gt;&lt;P&gt; match protocol skinny&lt;/P&gt;&lt;P&gt; match protocol sip&lt;/P&gt;&lt;P&gt; match protocol h323&lt;/P&gt;&lt;P&gt; match protocol mgcp&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt;class-map type inspect match-all IN-VPN&lt;/P&gt;&lt;P&gt; match access-group name IN-VPN&lt;/P&gt;&lt;P&gt;class-map type inspect match-all IN-VPN-POLICY&lt;/P&gt;&lt;P&gt; match class-map VPN-PROT&lt;/P&gt;&lt;P&gt; match class-map IN-VPN&lt;/P&gt;&lt;P&gt;class-map type inspect match-all VPN-IN&lt;/P&gt;&lt;P&gt; match access-group name VPN-IN&lt;/P&gt;&lt;P&gt; match access-group name VPN-IN&lt;/P&gt;&lt;P&gt;class-map type inspect match-all VPN-IN-POLICY&lt;/P&gt;&lt;P&gt; match class-map VPN-PROT&lt;/P&gt;&lt;P&gt; match class-map VPN-IN&lt;/P&gt;&lt;P&gt;class-map type inspect match-any VOICE-PROT&lt;/P&gt;&lt;P&gt; match protocol skinny&lt;/P&gt;&lt;P&gt; match protocol sip&lt;/P&gt;&lt;P&gt; match protocol h323&lt;/P&gt;&lt;P&gt; match protocol mgcp&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt; match protocol user-rtp&lt;/P&gt;&lt;P&gt;class-map type inspect match-all IN-VOICE&lt;/P&gt;&lt;P&gt; match access-group name IN-VOICE&lt;/P&gt;&lt;P&gt;class-map type inspect match-all IN-VOICE-POLICY&lt;/P&gt;&lt;P&gt; match class-map VOICE-PROT&lt;/P&gt;&lt;P&gt; match class-map IN-VOICE&lt;/P&gt;&lt;P&gt;class-map type inspect match-all VOICE-IN&lt;/P&gt;&lt;P&gt; match access-group name VOICE-IN&lt;/P&gt;&lt;P&gt;class-map type inspect match-all VOICE-IN-POLICY&lt;/P&gt;&lt;P&gt; match class-map VOICE-PROT&lt;/P&gt;&lt;P&gt; match class-map VOICE-IN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect IN-VPN-POLICY&lt;/P&gt;&lt;P&gt; class type inspect IN-VOICE-POLICY&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect IN-VPN-POLICY&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;policy-map type inspect VPN-IN-POLICY&lt;/P&gt;&lt;P&gt; class type inspect VOICE-IN-POLICY&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect VPN-IN-POLICY&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security INSIDE&lt;/P&gt;&lt;P&gt;zone security MPLS&lt;/P&gt;&lt;P&gt;zone-pair security IN-VPN source INSIDE destination MPLS&lt;/P&gt;&lt;P&gt; service-policy type inspect IN-VPN-POLICY&lt;/P&gt;&lt;P&gt;zone-pair security VPN-IN source MPLS destination INSIDE&lt;/P&gt;&lt;P&gt; service-policy type inspect VPN-IN-POLICY&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Tunnel10&lt;/P&gt;&lt;P&gt; ip address 10.255.255.2 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; ip mtu 1408&lt;/P&gt;&lt;P&gt; ip hold-time eigrp 1 35&lt;/P&gt;&lt;P&gt; no ip next-hop-self eigrp 1&lt;/P&gt;&lt;P&gt; ip nhrp authentication cisco&lt;/P&gt;&lt;P&gt; ip nhrp map multicast dynamic&lt;/P&gt;&lt;P&gt; ip nhrp map multicast 192.168.100.2&lt;/P&gt;&lt;P&gt; ip nhrp map 10.255.255.1 192.168.100.2&lt;/P&gt;&lt;P&gt; ip nhrp network-id 1&lt;/P&gt;&lt;P&gt; ip nhrp holdtime 300&lt;/P&gt;&lt;P&gt; ip nhrp nhs 10.255.255.1&lt;/P&gt;&lt;P&gt; ip nhrp registration no-unique&lt;/P&gt;&lt;P&gt; zone-member security MPLS&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1368&lt;/P&gt;&lt;P&gt; no ip split-horizon eigrp 1&lt;/P&gt;&lt;P&gt; tunnel source 192.168.101.2&lt;/P&gt;&lt;P&gt; tunnel mode gre multipoint&lt;/P&gt;&lt;P&gt; tunnel key 1&lt;/P&gt;&lt;P&gt; tunnel path-mtu-discovery&lt;/P&gt;&lt;P&gt; tunnel protection ipsec profile DMVPN shared&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; ip address 192.168.101.2 255.255.255.252&lt;/P&gt;&lt;P&gt; zone-member security MPLS&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; full-duplex&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt; zone-member security INSIDE&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router eigrp 1&lt;/P&gt;&lt;P&gt; network 10.255.255.0 0.0.0.255&lt;/P&gt;&lt;P&gt; network 192.168.10.0&lt;/P&gt;&lt;P&gt; no auto-summary&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.101.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended IN-VOICE&lt;/P&gt;&lt;P&gt; permit ip 192.168.10.0 0.0.0.255 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;ip access-list extended IN-VPN&lt;/P&gt;&lt;P&gt; permit ip 192.168.10.0 0.0.0.255 10.123.45.0 0.0.0.255&lt;/P&gt;&lt;P&gt;ip access-list extended VOICE-IN&lt;/P&gt;&lt;P&gt; permit ip 192.168.0.0 0.0.255.255 192.168.10.0 0.0.0.255&lt;/P&gt;&lt;P&gt;ip access-list extended VPN-IN&lt;/P&gt;&lt;P&gt; permit ip 10.123.45.0 0.0.0.255 192.168.10.0 0.0.0.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:06:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199114#M361285</guid>
      <dc:creator>PauloHirakawa</dc:creator>
      <dc:date>2019-03-12T01:06:15Z</dc:date>
    </item>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199115#M361286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you specify the signaling protocol and the IOS code version on the router?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, can you provide the logs you get from the ASA? &lt;/P&gt;&lt;P&gt;Make sure the "ip inspect log drop-pkt" is applied before getting'em.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 21:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199115#M361286</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-02-26T21:31:38Z</dc:date>
    </item>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199116#M361287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The signaling protocol is skinny and the IOS version is 15.2(4)M2 with data, sec and uc license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no ASA in topology, I have just made the tests with IOS zone based firewall in two spoke routers with IP phones in each LAN. The log message that appears in the router is a drop log of RTP packets on inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The signaling is ok, the phone rings on the other phone through VPN but when complete the call, there is no voice. Since the router is inspecting skinny, my thought was that the IOS ZBF would open dinamically the RTP ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;phone1----IOS ZBF R1----VPN----HUB-ROUTER----CUCM----HUB-ROUTER----VPN----IOS ZBF R2----phone2----signaling ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;phone1----IOS ZBF R1----VPN----IOS ZBF R2----phone2---- RTP nok&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 13:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199116#M361287</guid>
      <dc:creator>PauloHirakawa</dc:creator>
      <dc:date>2013-02-27T13:05:27Z</dc:date>
    </item>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199117#M361288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you add this to the class-map?&lt;/P&gt;&lt;P&gt;"match protocol rtp audio"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A while ago I had the same problem as you and I couldn't match RTP Audio on that router so i thought it wasn't possible. But later on another router I could do it...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 15:28:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199117#M361288</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2013-02-27T15:28:11Z</dc:date>
    </item>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199118#M361289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since it's a class-map type inspect, I have no option to include rtp audio into class-map. I configure a port-map including the rtp range, but I think in this situation all these ports will be open on IOS ZBF. The idea was that IOS ZBF recognized the signaling protocol and opened the RTP ports dinamically.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 16:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199118#M361289</guid>
      <dc:creator>PauloHirakawa</dc:creator>
      <dc:date>2013-02-27T16:44:41Z</dc:date>
    </item>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199119#M361290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, sorry about the ASA thing, i'm used to work with'em.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide the logs you get from the router?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 18:26:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199119#M361290</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-02-27T18:26:21Z</dc:date>
    </item>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199120#M361291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I haven't saved this log, but it seems like this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%Fg W-6-DROP_PKT: DroppinOther session 192.168.10.5:21388&amp;nbsp; 192.168.20.5:19544 on zone-pair IN-VPN class class-default due to DROP&amp;nbsp; action found in policy-map with ip ident 486&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2013 13:34:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199120#M361291</guid>
      <dc:creator>PauloHirakawa</dc:creator>
      <dc:date>2013-02-28T13:34:10Z</dc:date>
    </item>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199121#M361294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="position: absolute; top: -1999px; left: -1988px;"&gt;class-map type inspect match-any VPN-PROT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="position: absolute; top: -1999px; left: -1988px;"&gt;class-map type inspect match-any VPN-PROT&lt;/P&gt;&lt;P&gt;class-map type inspect match-any VPN-PROT&lt;/P&gt;&lt;P&gt;match protocol rtsp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2013 23:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199121#M361294</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-01T23:15:50Z</dc:date>
    </item>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199122#M361296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you but it does not work. The problem is the same, RTSP Real Time Streaming Protocol does not work in RTP udp range 16384 - 32767 for voice communication that is being blocked by zone based firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 17:18:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199122#M361296</guid>
      <dc:creator>PauloHirakawa</dc:creator>
      <dc:date>2013-03-04T17:18:12Z</dc:date>
    </item>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199123#M361300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, this is weird.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class-map type inspect match-any VPN-PROT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;match protocol ssp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, do you see any logs or information refering to this problem on the CUCM?&lt;/P&gt;&lt;P&gt;What are the phones and CUCM versions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 19:58:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199123#M361300</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-04T19:58:03Z</dc:date>
    </item>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199124#M361303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nothing yet. CUCM is running 8.6.2 version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The signaling through CUCM is ok, both phones register and rings when making the test calls, just the voice packets are dropped by ZBF.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When configuring a port-map with rtp in class-map it works normally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip port-map user-rtp port udp from 16384 to 32768 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-any VOICE-PROT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol user-rtp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 20:36:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199124#M361303</guid>
      <dc:creator>PauloHirakawa</dc:creator>
      <dc:date>2013-03-04T20:36:02Z</dc:date>
    </item>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199125#M361305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you share the output of the " &lt;STRONG&gt;show policy-map&amp;nbsp; type inspect IN-VPN-POLICY zone-pair sessions&lt;/STRONG&gt;"&amp;nbsp; while testing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 22:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199125#M361305</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-04T22:01:04Z</dc:date>
    </item>
    <item>
      <title>IOS ZBF - VoIP Traffic</title>
      <link>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199126#M361308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, the devices that I used to do the lab are not available anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help, I'll post again when I do the implementation on the customer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Mar 2013 17:31:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zbf-voip-traffic/m-p/2199126#M361308</guid>
      <dc:creator>PauloHirakawa</dc:creator>
      <dc:date>2013-03-06T17:31:45Z</dc:date>
    </item>
  </channel>
</rss>

