03-22-2012 01:20 PM - edited 03-21-2019 05:33 AM
Hi,
I have a SIP truck setup with some DID's. Once second the calls will make it to thru two mintues late they will fail. It is very sporadic, can work for ten minutes or one hour. I have made sure port 5060 on the firewall is open and I have enabled keep NAT alive on the UC320. Any other ideas?
03-22-2012 01:45 PM
Hi Donald,
I would suggest enabling the SIP trunk logs on the UC320W (Status -> Support Tools -> Logs). Then next time an inbound call fails, check the logs and see if you see the inbound SIP INVITE message. If you don't see the invite, somehting is blocking it or the registration may have expired with the service provider. If you have the time of the failure, the SIP service provider might be able to tell you what happend to the call (error, etc). Check the firmware on any devices sitting WAN side of the UC320W and make sure it is up to date.
Chris
03-23-2012 06:11 AM
I have spoke with provider, they said their log show the call as failing. I have made sure port 5060 is open, I don't know what is causing this. This morning I tried to make serveral calls the would not go thru, it looks like if you make and outbound call then inbounds will work.
03-23-2012 02:58 PM
Donald,
If you can make an outbound call and then the inbound calls work then look at your firewall/NAT device. Couple comments for you to try.
Connect UC320W directly to public IP and see if inbound calls work consistantly.
Second setup to capture wireshark trace on public side of your firewall/NAT device and try inbound call and look for inbound invite message. Then confirm if UC320W received the inbound invite message. Most likely the port numbers are being changed and the inbound calls are not making it through the firewall/NAT device.
Regards,
Randy
03-27-2012 10:10 AM
Has anyone got the UC320 to work behind a firewall. It seems this unit has a mind of its own does what it wants.
03-27-2012 10:33 AM
Donald,
Are inbound calls still failing?
Earlier you mentioned you opened port 5060 on the firewall but another area to look at is if the firewall is changing the port number when the message is going through the device.
example:
UC320W Register message (port 5060) -> firewall -> Register message (port 62355) ->ITSP
Then check if inbound invite message has matching ports to allow the firewall to to pass the invite message to the UC320W. If the ports don't match up it is likely the firewall is blocking the inbound message.
Wireshark trace on both sides of the firewall would be benificial to diagnose the issue.
Regards,
Randy
03-28-2012 09:47 AM
I have resloved this issue, I have bypassed the firewall, which seems to address the problem.
03-29-2012 05:39 AM
Question..
Was this unit designed to be plug directly into your wan or reside behind a firewall. If it is not behind a firewall what kind of
vulnerability percautions were implemented in this unit.
04-02-2012 07:23 AM
Hi Donald,
The UC320 can be used in either scenario. The UC320 has technology to a allow NAT keepalive and to work with STUN servers. That said not all firewalls / SIP Application Layer Gateways (ALGs) behave the same. Suggest making sure the firewall firmware is the latest available and if you are still having problem, contacting the firewall vendor for support.
Chris
04-02-2012 07:39 AM
Once again, what are the vulnerabilities if not behind a firewall? This device was really design as an all in one, it does not work well with external firewalls, that is a given. So my question is was and still is... what security precautions are built in when the UC320 is connected directly to the WAN?
04-04-2012 05:49 AM
Is this unit safe attached directly to the WAN?
04-04-2012 07:36 AM
Hi Donald,
The UC320W has a built in basic firewall and LAN side IP addresses are NAPTed. As part of the test process the system is run through Cisco's exhaustive security test suites. That said, the device does not provide some of the advanced security services found in dedicated firewalls such as e-mail scanning, network based antivirus, stateful protocol examination, etc.
If there are more advanced security features that are required, I would suggest looking at the Cisco Security Appliance 500 series (SA500) or the Cisco ASA 5500 series.
Hope that helps.
Chris
04-05-2012 07:23 AM
Thank you that was the answer I was looking for. I am not depending on it as my main firewall, it is only routing my phones. I was never able to get it to work behind my sonicwall so I just want to be sure it does have basic firewall features built in, I know it is not a UTM.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide