<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help with firewall/VOIP issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974951#M440119</link>
    <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; We have a Mitell Border Gateway in our DMZ configured to accept teleworker connections.&amp;nbsp; I have it all configured, but I get one way com errors on the Mitel border gateway when i try to place a call to a teleworker(phone set up outside the firewall).&amp;nbsp; The teleworker phone cannot hear audio from the internal phone. I was told by vendor all ports need to be open to the border gateway for it to function.&amp;nbsp; It seems that for some reason tcp traffic headed from the dmz to the outside are beng blocked and I dont know why. Should tha traffice be allowed by default?&amp;nbsp; What rule do I need to allow any traffic coming from my MGB IP to use any port to talk to any device on the outside network.&amp;nbsp; I already have a rule allowing all IP traffic in through the nat'd address fo the MBG.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:25:29 GMT</pubDate>
    <dc:creator>jasongring</dc:creator>
    <dc:date>2019-03-11T23:25:29Z</dc:date>
    <item>
      <title>Help with firewall/VOIP issue</title>
      <link>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974951#M440119</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; We have a Mitell Border Gateway in our DMZ configured to accept teleworker connections.&amp;nbsp; I have it all configured, but I get one way com errors on the Mitel border gateway when i try to place a call to a teleworker(phone set up outside the firewall).&amp;nbsp; The teleworker phone cannot hear audio from the internal phone. I was told by vendor all ports need to be open to the border gateway for it to function.&amp;nbsp; It seems that for some reason tcp traffic headed from the dmz to the outside are beng blocked and I dont know why. Should tha traffice be allowed by default?&amp;nbsp; What rule do I need to allow any traffic coming from my MGB IP to use any port to talk to any device on the outside network.&amp;nbsp; I already have a rule allowing all IP traffic in through the nat'd address fo the MBG.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974951#M440119</guid>
      <dc:creator>jasongring</dc:creator>
      <dc:date>2019-03-11T23:25:29Z</dc:date>
    </item>
    <item>
      <title>Help with firewall/VOIP issue</title>
      <link>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974952#M440120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I already have a rule allowing all IP traffic in through the nat'd address fo the MBG : This rule only allows Internet users to be able to reach MBG.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order for the MBG to go to internet, you may need to create additional access list and apply to DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For this, first you need to block the communication from MBG to internal network (for security purposes). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ex: your inside network 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list DMZ2IN deny ip host &lt;MBG ip=""&gt; 192.1168.10.0 255.255.255.255 &lt;/MBG&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ2IN permit ip host &lt;MBG ip=""&gt; any &lt;/MBG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group DMZ2IN in interface &lt;NAME of="" your="" dmz="" interface=""&gt;&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;If you do not have static NAT for MBG with public IP, you need to add nat(dmz) 1 0 0 as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this and post the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 20:47:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974952#M440120</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2012-07-02T20:47:59Z</dc:date>
    </item>
    <item>
      <title>Help with firewall/VOIP issue</title>
      <link>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974953#M440121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Mitel set up is as this:&amp;nbsp; Teleworker user in remote office with phone plugged into their local internet connection.&amp;nbsp; That phone is programmed to find a Mitel device at a certain routable IP. That IP is the outside nat'd IP of the Mitel Border gateway that sits in our DMZ.&amp;nbsp; That MBG also has to speak to the PBX ( in this case a Mitel 3300) that resides on out internal LAN. Mitel says that we need to the MBG is a firewall and it needs complete access both inside and outside.&amp;nbsp; So adding more security to its ability to get inside to talk to the PBX won't be helpful. If I set up a test "teleworker" in the DMZ it works fine so I know the one way communication is caused by outbound TCP traffice getting blocked from going outside which doesnt make sense to me since any traffice headed to a lesser security network should be allowed by default, correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 20:55:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974953#M440121</guid>
      <dc:creator>jasongring</dc:creator>
      <dc:date>2012-07-02T20:55:59Z</dc:date>
    </item>
    <item>
      <title>Help with firewall/VOIP issue</title>
      <link>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974954#M440122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vendors can say whatever they want but this is the more recomended way to set this up. We looked into similar setup (from Avaya) few minths bacl and&amp;nbsp; worked with no issues in test environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes.. I agree MBG definitely need to communicated with your PBX. You need to open only required ports to PBX IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ2IN&amp;nbsp; permit tcp/udp host &lt;MBG ip=""&gt;&amp;nbsp; &lt;PBXIP&gt; eq &lt;PORT&gt;&lt;/PORT&gt;&lt;/PBXIP&gt;&lt;/MBG&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ2IN deny ip host &lt;MBG ip=""&gt; 192.1168.10.0 255.255.255.255 &lt;/MBG&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ2IN permit ip host &lt;MBG ip=""&gt; any &lt;/MBG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is up to you on how you want to proceed but I prefer ASA to handle the security than a PC with some software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 21:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974954#M440122</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2012-07-02T21:04:38Z</dc:date>
    </item>
    <item>
      <title>Help with firewall/VOIP issue</title>
      <link>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974955#M440123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;MS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is pretty much how it is set up...&amp;nbsp; Yet Im still gettting one way com error on the ip phone and when i do test calls i cant seem to trap why they packets are not going outbound from the MBG to the outside. The tcp/udp traceroute on the mbg do come back as a success which makes it a bit more strange.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in line 1 extended permit ip host 172.16.1.2 any (hitcnt=3) 0x822c652c&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in line 2 extended permit object-group DM_INLINE_PROTOCOL_1 host 172.16.1.2 host 172.16.1.100 eq domain log debugging interval 300 0xddcbe2a8&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list DMZ_access_in line 2 extended permit udp host 172.16.1.2 host 172.16.1.100 eq domain log debugging interval 300 (hitcnt=1280) 0x0b8733f2&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in line 4 extended permit ip host 172.16.1.2 VOIP 255.255.255.0 log debugging interval 300 (hitcnt=13418) 0x9078b3a9&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in line 5 extended permit ip any any log debugging interval 300 (hitcnt=682664) 0xc651a8ad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 21:26:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974955#M440123</guid>
      <dc:creator>jasongring</dc:creator>
      <dc:date>2012-07-02T21:26:37Z</dc:date>
    </item>
    <item>
      <title>Help with firewall/VOIP issue</title>
      <link>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974956#M440124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you are doing great &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can see hitcounts from the MBG to the PBX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the teleworker is the one that is going to contact the MBG so the ASA is going to build on all of its table a connection for that communication, the ASA should be able to let the reply packets to go out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to see the running configuration ( Please remove the private info such as Ips, passwords,etc)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to see the access-list on the outside, the nat statements and the inspections you have on your firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 03:12:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-firewall-voip-issue/m-p/1974956#M440124</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-03T03:12:40Z</dc:date>
    </item>
  </channel>
</rss>

