We have 2 Polycom 7000 at two sites . We can use the polycoms for video conferencing with no issues using our own internal IP addressing . However trying to use our public IP's from site to site gets us no where, the system rings but nothing on either end.
We have a NAT rule in place that directs the internal IP to go the public IP, we also added the ports associated with the Polycom using an access list:::
ip nat inside source static 10.27.131.30 12.16.xxx.xx (10.27.131.30 IP of Polycom)
access-list 101 permit tcp any any range 3230 3235 access-list 101 permit udp any any range 3230 3253
Is there anything else I need to specify to get this working with the public IP's?
When setting up our own VCs we usually go along the lines of - Allow any external address access to the public address it is NAT'd to. On the LAN side however, only allow the VC access to the ports it uses for calls. This was done on ASA.
object network VID_CONF host 10.27.131.30 ! object-group network ALL-VIDEO_CONF network-object object VID_CONF ! object-group service PROT-VIDEO_CONF tcp-udp port-object eq 7648 port-object range 3230 3242 port-object range 3230 3269 port-object range 3230 3285 port-object eq 1720
access-list inside_access_in extended permit tcp object-group ALL-VIDEO_CONF any object-group PROT-VIDEO_CONF
access-list Outside_access_in extended permit ip any object-group ALL-VIDEO_CONF
After some more investigation and trouble shooting I found that using the build in Polycom traceroute program - I try to traceroute back to the other Polycom(public IP) and it fails after hitting my gateway. The Polycom at site B does the same traceroute and it works fine, it gets all the way back to my public IP used for the Polycom.
I dont understand once its gets to the gateway it then drops? Its going out the same gateway as everything else on the network?
Discover how your network can power hybrid work with no compromise in security, agility, or experience.
Join us on Wednesday, February 23 at 10:00 AM PT / 1:00 PM ET for insights on innovations in Wi-Fi 6E, private 5G and more.
Hear from our panel of cus...
Listen: https://smarturl.it/CCRS9E3Follow us: https://twitter.com/CiscoChampion
Esports is booming and Cisco is taking a front seat in the future of Esports in a big way. Game publishers, professional teams, tournament organizers and venue owners ar...
Cisco recently announced the availability of the IOS-XE train – IOS-XE Cupertino 17.7.1. This is a standard maintenance release supporting switching, wireless, SP-Access, Routing as well as IoT (Internet of things) platforms with a sustaining support life...
What is AppQoE?
AppQoE is a WAN optimization stack and optimizes WAN traffic for different use cases for applications that are deployed on-prem or in cloud.
What are the benefits of using AppQoE?
AppQoE improves application experience by d...