When SIP-ALG is enabled, CP SBCs determine the endpoints are publicly addressed and therefore do not need frequent registration refreshes to keep the firewall port open between SBC and the endpoint. In this case, the firewall can close the port between Exitty and the device endpoint, causing an inability to receive incoming calls. The most common issues that result from enabled SIP-ALG when using Virtual Office applications include:
Additional SIP-ALG information and settings can be found at http://www.voip-info.org/wiki/view/Routers+SIP+ALG.
It is highly recommended you have your network or IT administrator or a qualified professional configure the following in your router or firewall.
ALG settings are typically found in the administration interface of the router, but each router’s configuration setup will differ. Check the manufacturer’s documentation to understand where to find and disable this setting in your device. (Please note that many routers will re-enable ALG by default if the router is ever reset or powered off then back on.)
The following are general guidelines for popular makes and models. If you don't see your router or manufacturer below, consult the manufacturer's documentation.
Add the following:
no ip firewall alg sip
Arris Gateway IP Address: 192.168.0.1
no inspect sip
On Cisco devices, SIP-ALG is referred to as SIP Fixup and is enabled by default on both routers and Pix devices. Because this is a default setting, no indication of it being "on" or "off" is visible in the configuration.
To disable SIP Fixup, issue the following commands:
General Routers
no ip nat service sip tcp port 5060 no ip nat service sip udp port 5060
Enterprise-Class Routers
no ip nat service sip tcp port 5060 no ip nat service sip udp port 5060
Pix Devices
no fixup protocol sip 5060 no fixup protocol sip udp 5060
config system session-helper
show system session-helper
(Look for the session instance that refers to SIP—likely to be #12)
Delete 12
(Or number corresponding to SIP reference)
General Linksys Guidelines
Linksys BEFSR41
When setting the Global Default UDP timeout value on a SonicWall firewall, you must still fix the pre-existing rules' individual UDP timeout values. New rules will inherit the Global Default. Increase the UDP timeout to the suggested 300 seconds both globally on the firewall and the specific out-bound firewall rule (or the default rule, as the case may be).