Skip to content
afurlani's profile

New Contributor

 • 

2 Messages

Wednesday, February 11th, 2015 8:00 AM

SMCD3G-CCR configuring to use with VOIP with Polycom VX410 Phones

I have been working with a customer who moved to a new office to setup everything for them.  The voip phones are not working right they can call out however no one can call in.  I have been on the phone with Polycom guys yesterday at that time Comcast had sent the wrong router it was the Netgear one so they have hooked up another last night the SMCD3G-CCR which is supposed to be good and work with these phone and voip.  I have tried everything to get them to work and still cannot dial in.  I have made sure the firewall setting were correct on the router where those two check boxes were checked.  I also added port forwarding to port 5060 to the IP address of one of the phones then rebooted the phone and still nothing.  Polycom tech says that he cannot see the phone on his end.  Please help!  Can anyone tell me what I need to do to get these guys phones working correctly.  Thanks for any help that you can provide!

 

Tony

Advocate

 • 

1.4K Messages

10 years ago

Hello afurlani and welcome,

 

If you are not a Comcast VoiceEdge customer then it might be prudent for you to check out the Polycom User guide which may be able to provide you assistance. Most VOIP devices have a main VOIP server device that the SIP phones will access for VOIP internal and external telephony functionality. These VOIP devices must also have a static IP address to make sure that the VOIP phones can consistently access, as well. If you could provide us more detail of your overal network environment we could provide additional assistance.

 

Look forward to hearing from you.

New Contributor

 • 

2 Messages

10 years ago

The Network is simple I just have the SMCD3G-CCr hooked up with the Polycom phones plugged into the router. I also have a Netgear Wireless router so that they could have wireless in the office. There are twp PC's and wireless printer very simple setup.  The IP address of the phone is 10.0.10.11.  The IP address of the Router is 10.1.10.1 which I can access with no issues.  DSCI sent me a document on the issue that is happening which is one way audio. I pasted that below if that helps at all.   I don't really understand this IP stuff.  Thanks for your help!  What other information do you need?

Tony

 

 

 

Configuration Notes

The following section has been documented to help the customer network administrator

facilitate the appropriate changes prior to an UCx demonstration or UCx deployment.

DSCI deploys the UCx product in such a way to reduce the amount of time a customer must

spend configuring their Security devices. Typically, a customer’s network is UCx ready if the

customer supports a security device (router or firewall) which performs basic NAT. General

network connectivity must be established prior to installing phones on the customer LAN. This

means that NAT/PAT should be functional and provide basic Internet browsing prior to installing

VoIP phones.

If a customer has locked down their network using IP Access Lists (ACL) or firewall policies, the

customer should verify the following ports are not restricted from making outbound connections

from the Customer’s LAN. The customer should not need to make any inbound allotments for

the proper functionality of the UCx product.

FTP.dsci-net.com

FTP TCP/20-21 outbound to host 204.11.148.130

Time.dsci-net.com

NTP TCP/123 outbound to host 204.11.148.0/24

SBC Charlestown Public

SIP TCP/5060 outbound to host 204.11.148.40

SIP UDP/5060 outbound to host 204.11.148.40

RTP UDP/60000-65535 to host 204.11.148.40

SBC Waltham Public

SIP TCP/5060 outbound to host 209.104.247.240

SIP UDP/5060 outbound to host 209.104.247.240

RTP UDP/60000-65535 to host 209.104.247.240

EWS1.dsci-net.com

HTTP TCP/80 outbound to 204.11.148.10

HTTPS TCP/443 outbound to 204.11.148.10

FTP TCP/20-21 outbound to 204.11.148.10

EWS2.dsci-net.com

HTTP TCP/80 outbound to 204.11.148.137

HTTPS TCP/443 outbound to 204.11.148.137

FTP TCP/20-21 outbound to 204.11.148.137

EWS3.dsci-net.com

HTTP TCP/80 outbound to 76.191.38.20

HTTPS TCP/443 outbound to 76.191.38.20

FTP TCP/20-21 outbound to 76.191.38.20

EWS4.dsci-net.com

HTTP TCP/80 outbound to 204.14.67.26

HTTPS TCP/443 outbound to 204.14.67.26

FTP TCP/20-21 outbound to 204.14.67.26

BroadCloud UC-One

XMPP TCP/5222 outbound to dscicorp.bc.im (currently 128.177.36.238)

XMPP TCP/1081 outbound to dscicorp.bc.im (currently 128.177.36.238)

HTTPS TCP/443 outbound to webmeet.dscicorp.com (currently 72.44.196.198)

CounterPath Bria

HTTP TCP/80 outbound to bria.dsci-net.com (currently 209.104.229.128)

HTTPS TCP/443 outbound to secure.counterpath.com (currently 64.34.98.132)

Manufacturers are adding features to their security devices which alter VoIP traffic as it

traverses the firewall. These devices attempt to mask the internal IP information required by the

ACME Packet to properly communicate with the UCx phone. For this reason, it is required to

disable all VoIP Application awareness features configurable on the firewall. Failure to do so

will cause one way audio issues and call route failures.

Cisco PIX Firewalls

Cisco’s Fixup performs application layer modifications which are not desirable for DSCI’s VoIP.

There are two global Fixup commands which must be disabled to allow the SIP protocol to

traverse the security device unchanged.

All other commands, to include session timers, should be left at their default. Administrators

should note that if a “clear xlate” is performed, UCx phones will cease to function correctly, until

they are rebooted or the phones re-register.

Config t

no fixup protocol sip 5060

no fixup protocol sip udp 5060

Cisco ASA Firewalls

Like Cisco’s PIX Firewall, the ASA version needs to have SIP ALG services disabled.

To determine whether the Cisco PIX or Cisco ASA security appliance is configured to support

inspection of sip packets, log in to the device and issue the CLI command show service-policy |

include sip. If the output contains the text Inspect: sip and some statistics, then the device has

SIP inspection enabled. The following example shows a Cisco ASA with SIP inspection

enabled:

asa#show service-policy | include sip

Inspect: sip, packet 123612, drop 23, reset-drop 0

Config t

policy-map global_policy

class inspection_default

no inspect sip

Cisco IOS Routers (Using NAT/PAT)

It is recommended that IP Reflexive ACLs are enabled to ensure valid two-way communication

is not restricted. Reflexive ACLs will allow dynamic port mappings for SIP and RTP to occur

when using PAT.

Newer IOSs have a NAT Service which performs packet modification much like fixup for Cisco

Firewalls which needs to be disabled. Administrators should note that if a “clear ip nat

translation *” is performed, UCx phones will cease to function correctly, until they are rebooted

or re-register.

Config t

No ip nat service sip udp port 5060

IP Inspect is part of Cisco’s Firewall feature set and is not supported.

Adtran Total Access (Using NAT/PAT)

Adtran routers which have “ip firewall” enabled should have the following two global

configuration entries disabled

Config t

no ip firewall alg h323

no ip firewall alg sip

Juniper Netscreen 5-GT

The Netscreens have a Denial of Service (DoS) feature for UDP traffic which should be

disabled. If this feature triggers, VoIP traffic will be blocked, causing call termination. Netscreen

v5.3.0r1.0 (Firewall+VPN) was tested and certified by DSCI as a supported Security Device.

Security Mode: trust-untrust

ALG SIP: DISABLED

UDP Flood Protection: DISABLED

SonicWall SonicOS

The following SonicWall settings should be set to allow for UCx Phones to properly

communicate through the firewall.

Enable Consistent NAT: DISABLED

Enable SIP Transformations: DISABLED

Enable H.323 Transformations: DISABLED

FortiGate Firewalls

The following FortiGate Firewall Session Helper must be removed to disable the firewall’s ability

to manipulate SIP traffic.

show sys session-helper

#find the SIP helper ID #

config sys session-help

#delete #

end

More hardware configuration notes will be added as additional equipment is certified.

 

Advocate

 • 

1.4K Messages

10 years ago

Hi Tony,

 

Please see my comments below. Thanks much.

 

 

 

The Network is simple I just have the SMCD3G-CCr hooked up with the Polycom phones plugged into the router. I also have a Netgear Wireless router so that they could have wireless in the office. There are twp PC's and wireless printer very simple setup. 

 

Does this NetGear Wireless Router directly support VOIP? If it does, then you will need to conect NetGear for the VOIP configuration settings. If it does not support VOIP, then you will need check out this link and contact the VoiceEdge folks to see if this service is for you. If the Comcast VoiceEdge service is not for you, then you need to use this site to obtain Polycom support. Generally speaking about VOIP, the way it works is you must have some type of VOIP Server-like device that you VOIP phones interconnect with via a static IP address. When a VOIP phone want to initiate a call, it send an Enet packet with a SIP embedded subpacket that performs the overall VOIP call handling functionality. VOIP phones do not just plug into any wireless router without that device having VOIP server support.  You VOIP phones must be registered within the VOIP server for them to work directionally at all. Most VOIP companies have dedicated virtual PBX capability that handles all external call processing.

 

 

The IP address of the phone is 10.0.10.11.  The IP address of the Router is 10.1.10.1 which I can access with no issues.  DSCI sent me a document on the issue that is happening which is one way audio. I pasted that below if that helps at all.   I don't really understand this IP stuff.  Thanks for your help!  What other information do you need?

Tony

 

Honestly, I would recommend that you contact the Comcast VoiceEdge group to see if what they have to offer if for you.  http://business.comcast.com/VoiceEdge‎ (888) 751-9584