Jump to content

This is the support site for Andrews & Arnold Ltd, a UK Internet provider. Information on these pages is generally for our customers but may be useful to others, enjoy!

VoIP Firewall: Difference between revisions

no edit summary
(→‎NAT: fix brackets)
No edit summary
 
(One intermediate revision by one other user not shown)
[[File:Snom710.png|link=:Category:VoIP|Go to the VoIP Category]]
 
=== If you are not using public IP addresses (ie NAT): ===
Allowing appropriate SIP and RTP packets through a firewall is the key to reliable VoIP communication. It may be possible to achieve reliability using SIP Keep-Alive packets (every 120 seconds or so) and relying on phones using UDP hole punching for the audio channel, but firewall rules are more certain to work.
 
If your phone on private IP addresses (eg 192.168.x.x, 10.x.x.x) then you won't need to set up the firewall as you're not using pubic IP addresses.
This is what we suggest firewall-wise for VoIP customers:
 
Avoid using NAT where possible. If using NAT, the options are to tell the phone what its public IP address is (either by explicit configuration, or by specifying a STUN server to use - e.g. ''stun.aa.net.uk''), or to use a SIP Application Layer Gateway to rewrite SIP packets on the fly. Some NAT gateways provide an adequate SIP ALG (e.g. Technicolor TG582), and some devices provide NAT that works with the new call server (e.g. FireBrick FB2700FB2900 and many simple NAT routers). If NAT works, then well done, but if not we cannot guarantee to be able to make it work.
 
=== If you are using public IP addresses: ===
 
Allowing appropriate SIP and RTP packets through a firewall is the key to reliable VoIP communication. It may be possible to achieve reliability using SIP Keep-Alive packets (every 120 seconds or so) and relying on phones using UDP hole punching for the audio channel, but firewall rules are more certain to work.
 
This is what we suggest firewall-wise for VoIP customers: who have SIP devices (phones/PABXs etc) on public IP addresses.
 
{| class="wikitable"
!colspan="34"|Firewall Requirements on the AAISP VoIP Platform
|-
!
!Target Ports
!Source IPs ([[IPv6]])
!Source IPs (legacy)
|-
!SIP (IPv4)
|UDP 5060
|2001:8b0:0:30::5060:0/112
2001:8b0:5060::/48
|81.187.30.110 - 81.187.30.119
90.155.3.0/24
90.155.103.0/24
|-
!RTP
!SIP ([[IPv6]])
|UDP 50601024-65535
|2001:8b0:0:30::5060:0/112
2001:8b0:5060::/48
|-
!RTP (IPv4)
|UDP 1024-65535
|81.187.30.110 - 81.187.30.119
90.155.3.0/24
90.155.103.0/24
|-''
!RTP ([[IPv6]])
|UDP 1024-65535
|2001:8b0:0:30::5060:0/112
2001:8b0:5060::/48
|}
 
autoreview, Bots, Bureaucrats, editor, Interface administrators, reviewer, Administrators, upwizcampeditors
39

edits