web statisticsweb stats

Business Phone Systems

Previous Thread
Next Thread
Print Thread
Rate Thread
Joined: Sep 2008
Posts: 23
Member
OP Offline
Member
Joined: Sep 2008
Posts: 23
Has anyone ever configured a Cisco ASA to work with an ITP-5021D phone that is outside the network?

Scenario: ITP-5021D phone is at a remote location and I am attempting to set it up so that I can put my public IP when configuring 'Server IP' in the phone.

I have an ACL set on the ASA to allow the Static Public address to a Service group I have called 'Samsung_VOIP' (Which allows 5000-5003, 6000, 6100, 9000-9001 TCP ports). I have setup a NAT Rule that translates the public address to the MGI64. Could it be another TCP/UDP port I am missing? help Can anyone point me in the right direction?..I am pulling my hair out to figure this out.

Much Oblige,

Jimmy

Atcom VoIP Phones
VoIP Demo

Best VoIP Phones Canada


Visit Atcom to get started with your new business VoIP phone system ASAP
Turn up is quick, painless, and can often be done same day.
Let us show you how to do VoIP right, resulting in crystal clear call quality and easy-to-use features that make everyone happy!
Proudly serving Canada from coast to coast.

Joined: Sep 2008
Posts: 23
Member
OP Offline
Member
Joined: Sep 2008
Posts: 23
Update: Got the phone to connect, but now when I make a call from ITP phone, I can't hear anything (From either phone) Gonna do some more research.

Joined: May 2007
Posts: 1,218
Member
Offline
Member
Joined: May 2007
Posts: 1,218
The one-way audio is a result of either ports being blocked or not setting up the system for "Public with Firewall."

NOTE: You need to open ports for both the MCP and MGI.

static (inside,outside) tcp <OUTSIDE IP> 5003 <MCP IP> 5003 netmask 255.255.255.255
static (inside,outside) tcp <OUTSIDE IP> 5090 <MCP IP> 5090 netmask 255.255.255.255
static (inside,outside) tcp <OUTSIDE IP> 6000 <MCP IP> 6000 netmask 255.255.255.255
static (inside,outside) tcp <OUTSIDE IP> 6100 <MCP IP> 6100 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 6000 <MCP IP> 6000 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 6100 <MCP IP> 6100 netmask 255.255.255.255
static (inside,outside) tcp <OUTSIDE IP> 9000 <MGI IP> 9000 netmask 255.255.255.255
static (inside,outside) tcp <OUTSIDE IP> 9001 <MGI IP> 9001 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 9000 <MGI IP> 9000 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 9001 <MGI IP> 9001 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30000 <MGI IP> 30000 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30001 <MGI IP> 30001 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30002 <MGI IP> 30002 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30003 <MGI IP> 30003 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30004 <MGI IP> 30004 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30005 <MGI IP> 30005 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30006 <MGI IP> 30006 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30007 <MGI IP> 30007 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30008 <MGI IP> 30008 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30009 <MGI IP> 30009 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30010 <MGI IP> 30010 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30011 <MGI IP> 30011 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30012 <MGI IP> 30012 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30013 <MGI IP> 30013 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30014 <MGI IP> 30014 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30015 <MGI IP> 30015 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30016 <MGI IP> 30016 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30017 <MGI IP> 30017 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30018 <MGI IP> 30018 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30019 <MGI IP> 30019 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30020 <MGI IP> 30020 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30021 <MGI IP> 30021 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30022 <MGI IP> 30022 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30023 <MGI IP> 30023 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30024 <MGI IP> 30024 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30025 <MGI IP> 30025 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30026 <MGI IP> 30026 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30027 <MGI IP> 30027 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30028 <MGI IP> 30028 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30029 <MGI IP> 30029 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30030 <MGI IP> 30030 netmask 255.255.255.255
static (inside,outside) udp <OUTSIDE IP> 30031 <MGI IP> 30031 netmask 255.255.255.255

Joined: May 2007
Posts: 1,218
Member
Offline
Member
Joined: May 2007
Posts: 1,218
Oops... I just realized I didn't include the ACL.

access-list incoming extended permit tcp any host <OUTSIDE IP> eq 5003
access-list incoming extended permit tcp any host <OUTSIDE IP> eq 5090
access-list incoming extended permit tcp any host <OUTSIDE IP> eq 6000
access-list incoming extended permit tcp any host <OUTSIDE IP> eq 6100
access-list incoming extended permit udp any host <OUTSIDE IP> eq 6000
access-list incoming extended permit udp any host <OUTSIDE IP> eq 6100
access-list incoming extended permit tcp any host <OUTSIDE IP> eq 9000
access-list incoming extended permit tcp any host <OUTSIDE IP> eq 9001
access-list incoming extended permit udp any host <OUTSIDE IP> eq 9000
access-list incoming extended permit udp any host <OUTSIDE IP> eq 9001
access-list incoming extended permit udp any host <OUTSIDE IP> range 30000 30031

Joined: Jun 2005
Posts: 574
Member
Offline
Member
Joined: Jun 2005
Posts: 574
Believe it might be as simple as setting phone
to public with firewall as cit explains

Joined: Sep 2008
Posts: 23
Member
OP Offline
Member
Joined: Sep 2008
Posts: 23
Thanks for the help gentlemen! It's slowly coming together!

I am getting voice now, but the quality is awful (Sometimes). The remote site is using FIOS (Verizon's fiber network, 20MB up and 10MB down) and locally we are using a Cable connection which is about 6 or 7 up and 3 to 4 down, so I wouldn't think that broadband would be the issue.

Sometimes the voice quality is great and sometimes I can't even hear the caller and the caller can't hear me..weird. I will continue to tinker..

Thanks for all your input!!

Jimmy


Moderated by  nameless, pvj 

Link Copied to Clipboard
Forum Statistics
Forums84
Topics94,284
Posts638,771
Members49,765
Most Online5,661
May 23rd, 2018
Popular Topics(Views)
211,457 Shoretel
188,314 CTX100 install
187,087 1a2 system
Newest Members
Nadisale, andreww, gohunt, Darrick, telecopippo
49,764 Registered Users
Top Posters(30 Days)
Toner 23
teleco 5
jc2it 4
dans 3
C5Z 2
Who's Online Now
0 members (), 139 guests, and 280 robots.
Key: Admin, Global Mod, Mod
Contact Us | Sponsored by Atcom: One of the best VoIP Phone Canada Suppliers for your business telephone system!| Terms of Service

Sundance Communications is not affiliated with any of the above manufacturers. Sundance Phone System Forums - VOIP & Cloud Phone Help
©Copyright Sundance Communications 1998-2024
Powered by UBB.threads™ PHP Forum Software 7.7.5