<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Voice Traffic behind ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643819#M604575</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. Exactly. Thanks Marcin &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need inspection to fixup the address from the inside interface to outside interface and vice versa and also open pin holes accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, make sure to issue "sh run service-policy" and make sure you see a line like this one below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy gobal_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should take care of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Dont' miss my ATE event &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;Starts January 3, 2011&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;A href="https://community.cisco.com/community/netpro/ask-the-expert"&gt;https://supportforums.cisco.com/community/netpro/ask-the-expert&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 26 Dec 2010 17:09:42 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-12-26T17:09:42Z</dc:date>
    <item>
      <title>Voice Traffic behind ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643815#M604570</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any known Issue for Voice Traffic on ASA 5520 running version 8.2, we are unable to pass voice traffic from inside to outside and vice-versa.&lt;/P&gt;&lt;P&gt;We tested connecting to SIP Gateway from insdie to outside but no luck and from outside to insdie its the same issue. We got Static NAT and ACL on inside and outside interface, is it something to do with default policy or Issue due to NAT.&amp;nbsp; Our Voice Gateway on inside network needs to communicate with Other Voice Gateway on Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please input&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;P&gt;Keven&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:27:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643815#M604570</guid>
      <dc:creator>keven.jones</dc:creator>
      <dc:date>2019-03-11T19:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: Voice Traffic behind ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643816#M604572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have sip inspection enabled?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issue "sh run policy-map" should be able to show you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Dec 2010 14:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643816#M604572</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-26T14:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: Voice Traffic behind ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643817#M604573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank You KS for the reply, here is the output of show run policy-map.&lt;/P&gt;&lt;P&gt;Do you advice me to check anything else.&lt;/P&gt;&lt;P&gt;( I recollect I had issue with EMSTP and I removed from here, in Pix 525 SMTP issue was resolved with fixup command )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run policy-map &lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect pptp &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt; class class_ftp&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Dec 2010 15:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643817#M604573</guid>
      <dc:creator>keven.jones</dc:creator>
      <dc:date>2010-12-26T15:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: Voice Traffic behind ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643818#M604574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Keven, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provided you're usuing standard port for skinny you can enabled this as first step &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect sip&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which is what Kureli meant.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're using NAT, ASA needs to inspect payload of SIP messaging.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Dec 2010 16:43:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643818#M604574</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-12-26T16:43:42Z</dc:date>
    </item>
    <item>
      <title>Re: Voice Traffic behind ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643819#M604575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. Exactly. Thanks Marcin &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need inspection to fixup the address from the inside interface to outside interface and vice versa and also open pin holes accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, make sure to issue "sh run service-policy" and make sure you see a line like this one below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy gobal_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should take care of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Dont' miss my ATE event &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;Starts January 3, 2011&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;A href="https://community.cisco.com/community/netpro/ask-the-expert"&gt;https://supportforums.cisco.com/community/netpro/ask-the-expert&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Dec 2010 17:09:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643819#M604575</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-26T17:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: Voice Traffic behind ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643820#M604576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks KS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its working like a champion.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Dec 2010 20:36:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-traffic-behind-asa/m-p/1643820#M604576</guid>
      <dc:creator>keven.jones</dc:creator>
      <dc:date>2010-12-26T20:36:16Z</dc:date>
    </item>
  </channel>
</rss>

