<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SIP through ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/3924515#M698360</link>
    <description>&lt;P&gt;dear,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did you managed to resolve your issue? i have the same and i m looking for advice?&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;</description>
    <pubDate>Sun, 15 Sep 2019 13:44:49 GMT</pubDate>
    <dc:creator>abdel1967</dc:creator>
    <dc:date>2019-09-15T13:44:49Z</dc:date>
    <item>
      <title>SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497595#M698339</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to allow SIP calls through a 5505 running version 8.2(2).&amp;nbsp; I've passed port 5060 through the firewall but now I'm seeing the RTP traffic blocked.&amp;nbsp; I read &lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008081042c.shtml#diag" target="_blank"&gt;this page&lt;/A&gt; and added this to my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect sip&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but it's not working.&amp;nbsp; No idea what else to do!&amp;nbsp; Any pointers or advice??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any help in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;-elliott-&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497595#M698339</guid>
      <dc:creator>elliott.barrere</dc:creator>
      <dc:date>2019-03-11T17:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497596#M698340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Elliot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using PAT?&lt;/P&gt;&lt;P&gt;The RTP is being blocked on the outside interface?&lt;/P&gt;&lt;P&gt;As a test, what happen if you permit IP on the outside ACL just to make sure that RTP works fine....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 17:43:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497596#M698340</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-14T17:43:48Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497597#M698341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico, thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, PAT is being used on the client side (the phone is currently behind a BSD firewall in my control, but it will be shipped elsewhere so we need to assume PAT will be used).&amp;nbsp; There is a static NAT entry on the server side (the server is behind the ASA).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see the packets getting dropped at the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jun 14 2010 10:21:11: %ASA-4-106023: Deny udp src outside:XXX.XXX.XXX.XXX/53191 dst inside:pbx-outside/14228 by access-group "outside_access_in" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and by adding this ACE I can make it work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip &lt;IP from="" above=""&gt; 255.255.255.255 pbx-outside 255.255.255.255&lt;/IP&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 17:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497597#M698341</guid>
      <dc:creator>elliott.barrere</dc:creator>
      <dc:date>2010-06-14T17:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497598#M698342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Elliot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If by permitting the traffic in the ACL it works, clearly the inspection is not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check if you need to add additional inspection to SIP:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_voicevideo.html#wp1204403"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_voicevideo.html#wp1204403&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 18:04:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497598#M698342</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-14T18:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497599#M698343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have all the defaults set; do I have to be more specific about what traffic to match?&amp;nbsp; I want the ASA to inspect all SIP traffic by default.&amp;nbsp; I have this in my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;# sh run class-map&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;# sh run policy-map&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;!&lt;BR /&gt;# sh run service-policy&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default-inspection-traffic line should match all SIP traffic on port 5060 right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 19:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497599#M698343</guid>
      <dc:creator>elliott.barrere</dc:creator>
      <dc:date>2010-06-14T19:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497600#M698344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SIP inspection should inspect the signaling over 5060.&lt;/P&gt;&lt;P&gt;Do you have any of the following scenarios?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;The following limitations and restrictions apply when using PAT with SIP:&lt;/P&gt;&lt;A name="wp1439446"&gt;&lt;/A&gt;&lt;P class="pBu1_Bullet1"&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;If a remote endpoint tries to register with a SIP proxy on a network protected by the adaptive security appliance, the registration fails under very specific conditions, as follows:&lt;/P&gt;&lt;A name="wp1439448"&gt;&lt;/A&gt;&lt;P class="pBu2_Bullet2"&gt;–&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="17" /&gt;PAT is configured for the remote endpoint.&lt;/P&gt;&lt;A name="wp1439449"&gt;&lt;/A&gt;&lt;P class="pBu2_Bullet2"&gt;–&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="17" /&gt;The SIP registrar server is on the outside network.&lt;/P&gt;&lt;A name="wp1439450"&gt;&lt;/A&gt;&lt;P class="pBu2_Bullet2"&gt;–&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="17" /&gt;The port is missing in the contact field in the REGISTER message sent by the endpoint to the proxy server.&lt;/P&gt;&lt;A name="wp1439451"&gt;&lt;/A&gt;&lt;P class="pBu1_Bullet1"&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;If a SIP device transmits a packet in which the SDP portion has an IP address in the owner/creator field (o=) that is different than the IP address in the connection field (c=), the IP address in the o= field may not be properly translated. This is due to a limitation in the SIP protocol, which does not provide a port value in the o= field.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 19:10:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497600#M698344</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-14T19:10:38Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497601#M698345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I saw that in one of the articles I read but I was not sure what to make of it.&amp;nbsp; Assuming the "remote endpoint" means the SIP phone, then I don't believe I fall into that category:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* Yes, PAT is enabled on the firewall device that the phone is behind&lt;/P&gt;&lt;P&gt;* Yes, the SIP registrar server is on the external network, in relation to the SIP device&lt;/P&gt;&lt;P&gt;* No, I have verified that the port value is NOT missing in the REGISTER message received by the SIP registrar (Asterisk)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally, it is not registration that fails, it is the audio path.&amp;nbsp; The device can register to the server and make and receive calls, but audio is only one-way (it is not received by the other party).&amp;nbsp; I am sure this is due to the RTP stream being blocked by the firewall since a simple ACE can fix the problem.&amp;nbsp; Is there anything else we can try to make the SIP inspection work as it should?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 19:39:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497601#M698345</guid>
      <dc:creator>elliott.barrere</dc:creator>
      <dc:date>2010-06-14T19:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497602#M698346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Elliot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will really help if you can do two things:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Post a capture of the connection between the SIP endpoints (capture command)&lt;/P&gt;&lt;P&gt;2. Post a simple diagram just to ilustrate the scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 20:24:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497602#M698346</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-14T20:24:29Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497603#M698347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, here is a capture from the device (XXX is client IP, YYY is server):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;&lt;BR /&gt;1: 13:16:57.128396 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.60534 &amp;gt; YYY.YYY.YYY.YYY.5060: udp 1203&lt;BR /&gt;2: 13:16:57.129799 802.1Q vlan#2 P0 YYY.YYY.YYY.YYY.5060 &amp;gt; XXX.XXX.XXX.XXX.60534: udp 541&lt;BR /&gt;3: 13:16:57.270020 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.60534 &amp;gt; YYY.YYY.YYY.YYY.5060: udp 401&lt;/P&gt;&lt;P&gt;4: 13:16:57.292297 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.60534 &amp;gt; YYY.YYY.YYY.YYY.5060: udp 1388&lt;/P&gt;&lt;P&gt;5: 13:16:57.294235 802.1Q vlan#2 P0 YYY.YYY.YYY.YYY.5060 &amp;gt; XXX.XXX.XXX.XXX.60534: udp 460&lt;/P&gt;&lt;P&gt;6: 13:16:58.420144 802.1Q vlan#2 P0 YYY.YYY.YYY.YYY.5060 &amp;gt; XXX.XXX.XXX.XXX.60534: udp 476&lt;/P&gt;&lt;P&gt;7: 13:16:58.425240 802.1Q vlan#2 P0 YYY.YYY.YYY.YYY.5060 &amp;gt; XXX.XXX.XXX.XXX.60534: udp 460&lt;/P&gt;&lt;P&gt;8: 13:16:59.289184 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.60534 &amp;gt; YYY.YYY.YYY.YYY.5060: udp 730&lt;/P&gt;&lt;P&gt;9: 13:16:59.290130 802.1Q vlan#2 P0 YYY.YYY.YYY.YYY.5060 &amp;gt; XXX.XXX.XXX.XXX.60534: udp 427&lt;/P&gt;&lt;P&gt;10: 13:16:59.290298 802.1Q vlan#2 P0 YYY.YYY.YYY.YYY.5060 &amp;gt; XXX.XXX.XXX.XXX.60534: udp 524&lt;/P&gt;&lt;P&gt;11: 13:16:59.437126 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.60534 &amp;gt; YYY.YYY.YYY.YYY.5060: udp 893&lt;/P&gt;&lt;P&gt;12: 13:16:59.438408 802.1Q vlan#2 P0 YYY.YYY.YYY.YYY.5060 &amp;gt; XXX.XXX.XXX.XXX.60534: udp 427&lt;/P&gt;&lt;P&gt;13: 13:16:59.448981 802.1Q vlan#2 P0 YYY.YYY.YYY.YYY.5060 &amp;gt; XXX.XXX.XXX.XXX.60534: udp 546&lt;/P&gt;&lt;P&gt;14: 13:16:59.449271 802.1Q vlan#2 P0 YYY.YYY.YYY.YYY.5060 &amp;gt; XXX.XXX.XXX.XXX.60534: udp 552&lt;/P&gt;&lt;P&gt;15: 13:16:59.567643 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.60534 &amp;gt; YYY.YYY.YYY.YYY.5060: udp 613&lt;/P&gt;&lt;P&gt;16: 13:17:02.333204 802.1Q vlan#2 P0 YYY.YYY.YYY.YYY.5060 &amp;gt; XXX.XXX.XXX.XXX.60534: udp 744&lt;/P&gt;&lt;P&gt;17: 13:17:02.439079 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.60534 &amp;gt; YYY.YYY.YYY.YYY.5060: udp 382&lt;/P&gt;&lt;P&gt;18: 13:17:02.472204 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.57779 &amp;gt; YYY.YYY.YYY.YYY.12741: udp 68&lt;/P&gt;&lt;P&gt;19: 13:17:02.472341 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 28&lt;/P&gt;&lt;P&gt;20: 13:17:02.623548 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;21: 13:17:02.623655 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;22: 13:17:02.625883 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;23: 13:17:02.635907 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;24: 13:17:02.651058 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;25: 13:17:02.676753 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;26: 13:17:02.693415 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;27: 13:17:02.720925 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;28: 13:17:02.745902 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;29: 13:17:02.760901 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;30: 13:17:02.778875 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;31: 13:17:02.793400 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;32: 13:17:02.815860 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;33: 13:17:02.835909 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;34: 13:17:02.855821 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;35: 13:17:02.873551 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;36: 13:17:02.898391 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;37: 13:17:02.913542 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;38: 13:17:02.943356 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;P&gt;39: 13:17:02.955867 802.1Q vlan#2 P0 XXX.XXX.XXX.XXX.53658 &amp;gt; YYY.YYY.YYY.YYY.12740: udp 172&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The last packets continue on indefinitely until the call is hung up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The scenario is very simple:&amp;nbsp; the phone goes out through PAT to the internet, to the public IP of the server, which is NAT'd by the ASA to the server inside.&amp;nbsp; I've attached a PNG I made quickly with Gliffy as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 21:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497603#M698347</guid>
      <dc:creator>elliott.barrere</dc:creator>
      <dc:date>2010-06-14T21:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497604#M698348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you add this statement to the ASA: &lt;BR /&gt;access-list outside_access_in permit ip &lt;IP from="" above=""&gt; 255.255.255.255 pbx-outside 255.255.255.255&lt;BR /&gt;Then it works. &lt;BR /&gt;Without the ACL you get this error: &lt;BR /&gt;%ASA-4-106023: Deny udp src outside:XXX.XXX.XXX.XXX/53191 dst inside:pbx-outside/14228 by access-group "outside_access_in" [0x0, 0x0]&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the SIP call from the client behind the BSD firewall to a device behind the ASA?&lt;BR /&gt;This other party can hear you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jun 2010 03:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497604#M698348</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-15T03:28:34Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497605#M698349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;coto.fusionet wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you add this statement to the ASA: &lt;BR /&gt;access-list outside_access_in permit ip &lt;IP from="" above=""&gt; 255.255.255.255 pbx-outside 255.255.255.255&lt;BR /&gt;Then it works. &lt;BR /&gt;Without the ACL you get this error: &lt;BR /&gt;%ASA-4-106023: Deny udp src outside:XXX.XXX.XXX.XXX/53191 dst inside:pbx-outside/14228 by access-group "outside_access_in" [0x0, 0x0]&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the SIP call from the client behind the BSD firewall to a device behind the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;No, I have tried several other devices (IAX trunk to another Asterisk box, out through the PSTN, etc), none of which are behind the ASA.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;BR /&gt;This other party can hear you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Just the opposite, actually; the audio goes only from the outside party to the SIP device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jun 2010 04:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497605#M698349</guid>
      <dc:creator>elliott.barrere</dc:creator>
      <dc:date>2010-06-15T04:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497606#M698350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am also sure the problem is the RTP stream being blocked by the ASA due to the fact that an ACE fixes the problem.&lt;/P&gt;&lt;P&gt;But my question is, since the audio path is failing, the RTP stream should not flow through the ASA, since the SIP endpoint is behind the BDS Firewall and the called-party is somewhere else, or I'm missing something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jun 2010 15:14:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497606#M698350</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-15T15:14:28Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497607#M698351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The server behind the ASA is a SIP gateway; it places calls to devices on other media like IAX and TDM so the firewall has no impact on them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can place a call to a conference room located on the server itself and the audio path is still broken.&amp;nbsp; It is definitely the RTP path between the SIP device and the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&amp;nbsp; Anyone?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jun 2010 22:50:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497607#M698351</guid>
      <dc:creator>elliott.barrere</dc:creator>
      <dc:date>2010-06-15T22:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497608#M698352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the bump, but I'm really at a loss here.&amp;nbsp; Anyone have any ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jun 2010 22:57:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497608#M698352</guid>
      <dc:creator>elliott.barrere</dc:creator>
      <dc:date>2010-06-17T22:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497609#M698353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure what break it.&lt;/P&gt;&lt;P&gt;8.2. does not have serious SIP bugs, so I am not sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If SIP signaling and RTP pass through the firewall I would try to enable "debug sip" and see the signaling and the pinholes the ASA is opening and see if there is something that is not working properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps a little.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jun 2010 20:30:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497609#M698353</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-06-18T20:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497610#M698354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi PK,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the advice, unfortunately I have tried "debug sip" and I see nothing on the console!&amp;nbsp; Is there anything that could be preventing me from seeing the logs?&amp;nbsp; I have set "logging console debug".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jun 2010 20:46:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497610#M698354</guid>
      <dc:creator>elliott.barrere</dc:creator>
      <dc:date>2010-06-18T20:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497611#M698355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Him, if sip inspection is not kicking in then the pinholes will not be opened.&lt;/P&gt;&lt;P&gt;You have sip inspection enabled haven't you?&lt;/P&gt;&lt;P&gt;Does "show service-policy" show counters for sip?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jun 2010 21:26:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497611#M698355</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-06-18T21:26:03Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497612#M698356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have tried to enable it by configuring it in my class-map.&amp;nbsp; I now see counters for SIP in "show service-policy" but they are empty, even after I make a call.&amp;nbsp; Still seeing the RTP ports blocked too (I have tried "debug sip" and "debug rtp" and I see nothing on the console when making calls)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;# sh service-policy &lt;BR /&gt;&lt;BR /&gt;Interface inside:&lt;BR /&gt;&amp;nbsp; Service-policy: global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: sip , packet 0, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;BR /&gt;&lt;BR /&gt;Interface outside:&lt;BR /&gt;&amp;nbsp; Service-policy: global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: sip , packet 0, drop 0, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;BR /&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jun 2010 21:53:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497612#M698356</guid>
      <dc:creator>elliott.barrere</dc:creator>
      <dc:date>2010-06-18T21:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497613#M698357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, the inspection is not kicking in.&lt;/P&gt;&lt;P&gt;Can you "clear local &lt;IP address=""&gt;" for the ip that has the issue? And try to pass sip again t see counters increment?&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;Make sure you have tcp port 5060 in your sip packets and they are hitting the ASA.&lt;/P&gt;&lt;P&gt;Also give us the "sh run policy-map" and "sh run class-map"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jun 2010 22:19:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497613#M698357</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-06-18T22:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: SIP through ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497614#M698358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, now we're getting somewhere!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I first tried running "clear local &lt;IP&gt;" and that didn't work (didn't seem to be doing anything) but a "clear local" with no args cleared out the whole state table and now the SIP counters are updating and I see channel information with "show sip".&amp;nbsp; I will have to wait until I'm in the office on Monday to see if the audio path is actually coming up now, but I have hope at this point &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help so far!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jun 2010 00:19:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sip-through-asa-5505/m-p/1497614#M698358</guid>
      <dc:creator>elliott.barrere</dc:creator>
      <dc:date>2010-06-19T00:19:49Z</dc:date>
    </item>
  </channel>
</rss>

