Hi all,
I just wanted to ask a very quick question about some of the functionality that the VoIP Security module performs. We have an ASG220 with firmware version 7.510.
We have a SIP server making an outbound call over the public internet. The third party that we are making the call to is rejecting the call (403 Forbidden), as the "Via" section of the call control packet contains an internal IP address.
I haven't seen any definitive documentation anywhere about what exactly the firewall modifies in the call control packets. Am I right in thinking that the firewall should be modifying the "Via" section of the call control packet from the internal IP address of the SIP server to the external IP address of the adapter that the call went out on? If this is what should be occurring, is there a configuration setting that we may have missed?
Configured as follows:
VoIP Security - SIP: Remote IP of third party and local IP present in both server and client network tables, both bound to a specified adapter (named 'SIP')
Network Security - NAT - Masquerading: Internal SIP network masquerading to 'SIP' adapter, using the primary address.
If there is anything obviously missing, or I have misunderstood the functionality that the VoIP Security module performs, your help/feedback would be very much appreciated.
Thanks in advance,
Adam Pollock.
This thread was automatically locked due to age.