cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
473
Views
0
Helpful
6
Replies

Outbound Dial-Peer from CME to UC540 not working

Sebast123
Level 1
Level 1

Dear Experts,

We have a HQ UC560 and new branch with 2811 router. These sites connected via VPN using fortigate.The connectivity between the sites is up and we are able to ping both the sites and the voice networks successfully.

I have configured the dial-peers on both the sites. The calls from HQ to the local branch are successful without any problem but when we dial from branch to the HQ, we get a fast busy signal. Below is the dial peer config 

HQ -

dial-peer voice 300 voip
 destination-pattern 3..
 session target ipv4:192.168.110.1
 dtmf-relay h245-alphanumeric
 no vad

 

Branch - 

 dial-peer voice 800 voip
 destination-pattern 8..
 session target ipv4:192.168.201.2
 dtmf-relay h245-alphanumeric
 no vad

 

Csim results from Branch  - 

csim start 891
csim: called number = 891, loop count = 1 ping count = 0

csim err csimDisconnected recvd DISC cid(786)
csim: loop = 1, failed = 1
csim: call attempted = 1, setup failed = 1, tone failed = 0

Kindly please advise. thanks.

 

1 Accepted Solution

Accepted Solutions

Hi, It is as suspected Toll Fraud App who rejected the call from BR site.

 

1076043: Oct 11 14:36:29.759: //282614/B639957688BC/CCAPI/cc_api_call_setup_ind_common:
   Set Up Event Sent;
   Call Info(Calling Number=308(TON=Unknown, NPI=Unknown, Screening=Not Screened, Presentation=Allowed),
   Called Number=807(TON=Unknown, NPI=Unknown))

 

1076047: Oct 11 14:36:29.763: //282614/B639957688BC/CCAPI/cc_process_call_setup_ind:
   >>>>CCAPI handed cid 282614 with tag 300 to app "_ManagedAppProcess_TOLLFRAUD_APP"
1076048: Oct 11 14:36:29.763: //282614/B639957688BC/CCAPI/ccCallDisconnect:
   Cause Value=21, Tag=0x0, Call Entry(Previous Disconnect Cause=0, Disconnect Cause=0)

 

 

you need to add BR GW IP address (192.168.110.1) to under 'voice service voip> ip address trusted list' as given below.

 

voice service voip
 ip address trusted list
  ipv4 192.168.110.1

 

For you reference: https://supportforums.cisco.com/document/46566/understanding-toll-fraud-enhancements-1512t

 

 

 

 

 

//Suresh Please rate all the useful posts.

View solution in original post

6 Replies 6

can you collect debug voice ccapi inout for a failed call from BR site GW?

//Suresh Please rate all the useful posts.

Dear Suresh,

 

Please find the attached debug output. thanks.

It seems, the call is rejected by HQ GW.

what is the IOS version of UC560? It may be because of Toll Fraud I suspect if it is 15.(1)2T or later.

can you collect the same debug (debug voice ccapi inout) from HQ GW this time please?

//Suresh Please rate all the useful posts.

Please find the attached debug output from UC560

Its UC500-ADVIPSERVICESK9-M, Version 15.1(2)T4, RELEASE SOFTWARE (fc1)

thanks.

 

Hi, It is as suspected Toll Fraud App who rejected the call from BR site.

 

1076043: Oct 11 14:36:29.759: //282614/B639957688BC/CCAPI/cc_api_call_setup_ind_common:
   Set Up Event Sent;
   Call Info(Calling Number=308(TON=Unknown, NPI=Unknown, Screening=Not Screened, Presentation=Allowed),
   Called Number=807(TON=Unknown, NPI=Unknown))

 

1076047: Oct 11 14:36:29.763: //282614/B639957688BC/CCAPI/cc_process_call_setup_ind:
   >>>>CCAPI handed cid 282614 with tag 300 to app "_ManagedAppProcess_TOLLFRAUD_APP"
1076048: Oct 11 14:36:29.763: //282614/B639957688BC/CCAPI/ccCallDisconnect:
   Cause Value=21, Tag=0x0, Call Entry(Previous Disconnect Cause=0, Disconnect Cause=0)

 

 

you need to add BR GW IP address (192.168.110.1) to under 'voice service voip> ip address trusted list' as given below.

 

voice service voip
 ip address trusted list
  ipv4 192.168.110.1

 

For you reference: https://supportforums.cisco.com/document/46566/understanding-toll-fraud-enhancements-1512t

 

 

 

 

 

//Suresh Please rate all the useful posts.

Thanks you much Suresh. Its working now. :) ta

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: