- Cisco Unified Border Element Enterprise Protocol-Independent Features and Setup
- SIP-to-SIP Extended Feature Functionality for Session Border Controllers
- Bandwidth-Based Call Admission Control
- Interworking Between RSVP Capable and RSVP Incapable Networks
- Cisco Resource Reservation Protocol Agent
- SIP INFO Method for DTMF Tone Generation
- DTMF Events through SIP Signaling
- Call Progress Analysis Over IP-to-IP Media Session
- Codec Preference Lists
- AAC-LD MP4A-LATM Codec Support on Cisco UBE
- Multicast Music-on-Hold Support on Cisco UBE
- Network-Based Recording
- Video Recording - Additional Configurations
- TDoS Attack Mitigation
- Cisco Unified Communications Gateway Services--Extended Media Forking
- Dynamic Payload Type Interworking for DTMF and Codec Packets for SIP-to-SIP Calls
- iLBC Support for SIP and H.323
- DSP-Based Functionality on the Cisco UBE Enterprise Including Transcoding and Transrating
- Acoustic Shock Protection
- Noise Reduction
- SIP Ability to Send a SIP Registration Message on a Border Element
- SIP Profiles
- Session Refresh with Reinvites
- SIP Stack Portability
- VoIP for IPv6
- Interworking of Secure RTP calls for SIP and H.323
- Cisco UBE Support for SRTP-RTP Internetworking
- Support for SRTP Termination
- WebEx Telepresence Media Support Over Single SIP Session
- SIP SRTP Fallback to Nonsecure RTP
- Support for Software Media Termination Point
- Cisco Unified Communication Trusted Firewall Control
- Cisco Unified Communication Trusted Firewall Control-Version II
- Finding Feature Information
- Domain-Based Routing Support on the Cisco UBE
- URI-Based Dialing Enhancements
- Additional References
- Glossary
- Prerequisites for Cisco Unified Communications Trusted Firewall Control - Version III
- Restrictions for Enhanced Firewall Traversal for Cisco Unified Communications
- Information About Cisco Unified Communications Trusted Firewall Control - Version III
- How to Configure Cisco Unified Communications Trusted Firewall Control - Version III
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
- Prerequisites for Cisco Unified Communications Trusted Firewall Control - Version III
- Restrictions for Enhanced Firewall Traversal for Cisco Unified Communications
- Information About Cisco Unified Communications Trusted Firewall Control - Version III
- How to Configure Cisco Unified Communications Trusted Firewall Control - Version III
- Feature Information for Cisco Unified Communications Trusted Firewall Control - Version III
Prerequisites for Cisco Unified Communications Trusted Firewall Control - Version III
-
Ensure that you have the correct platform to support this feature. Cisco Unified Communications Trusted Firewall Control is supported on the Cisco 1861, 2801, 2811, 2821, 2851, 3825, and 3845 platforms.
Cisco IOS Release 15.1(2)T
All k9 images with voice support. Session Timer feature can run on any voice image and does not support the firewall traversal.
uc-base and securityk9 licenses on Cisco 29xx and 39xx platforms. Session Timer feature does not require securityk9 licenses.
Configuration Prerequisites
The trusted firewall traversal for Cisco Unified CME SIP line side endpoints can be configured using TRP. The TRP must be configured under voice service voip> stun with the following information:
The authorization agent-id and shared secret are mandatory commands and the CATlife and Keepalive interval are optional commands and can have default values
In addition, the stun-usage command must to be configured as firewall traversal by using CISCO-STUN-FLOWDATA under voice class stun-usage
For detail configuration steps, see: http://www.cisco.com/en/US/docs/voice_ip_comm/cucme/feature/guide/EnhancedTrustedFirewallControll.html
Restrictions for Enhanced Firewall Traversal for Cisco Unified Communications
Cisco IOS Release 15.1(2)T implements firewall traversal for media using STUN on TRP and is not supported for:
Information About Cisco Unified Communications Trusted Firewall Control - Version III
Before you configure Enhanced Firewall Traversal using STUN, you should understand the following concepts:
- Overview of Firewall Traversal for Cisco Unified Communications
- SIP Session Timer
- Firewall Traversal Deployment Scenarios
Overview of Firewall Traversal for Cisco Unified Communications
In previous releases, firewall traversal implemented a new framework for IOS firewall traversal on Cisco Unified CME and Cisco Unified Border Element for SIP trunks.
For more information on Cisco trusted firewall traversal, see: www.cisco.com/en/US/docs/voice_ip_comm/cucme/feature/guide/EnhancedTrustedFirewallControll.html
SIP Session Timer
The SIP Session Timer (RFC 4028) is the standard SIP keepalive mechanism that keeps the SIP session active. The SIP user agents send periodic re-INVITE or UPDATE requests (referred to as session refresh requests) to keep the session alive. The interval for the session refresh request is determined through a negotiation mechanism. Session Timer is used to allow SIP signaling through the IOS firewall. You must configure Access Control List (ACL) or partial SIP-Application Layer Gateway (ALG) on the Cisco IOS firewall to allow SIP signaling.
After signaling, a pinhole is created. The firewall starts an inactivity timer, so that in case the user agents crashes or reboots during the call or the BYE message is lost, it can remove its states when the timer starts.
For the Cisco Unified CME SIP line side, by default, the endpoint sends periodic REGISTER messages on port 5060.
A partial SIP-ALG keeps track of the endpoint registration and keeps the signaling pinhole open as far as the registration is active.
An ACL tracks the User Datagram Protocol (UDP) / Transmission Control Protocol (TCP) messages that travel across the signaling port and keeps the signaling pinhole open.
However, the Cisco Unified CME SIP trunks do not exchange periodic SIP messages.The Cisco IOS firewall control sessions times out if no SIP messages are exchanged. The timed out SIP over UDP sessions are re-established with the next SIP message (for example, BYE). Timed out SIP over TCP sessions are not re-established and the subsequent SIP messages (for example, BYE) will be dropped.
Restrictions and Limitations for SIP Session Timer
SIP session timer does not support the following:
SIP Session Timer on CUBE for SIP-SIP Call Flows
The following table shows who will be sending the session refresh requests for all combinations of User Agent Clients (UAC) / User Agent Server (UAS) support for session timer
S.No |
UAC Support |
UAS Support |
Command Line Interface Enabled on lN leg |
Command Line Interface Enabled on OUT leg |
Action |
---|---|---|---|---|---|
1 |
Yes |
Yes |
Yes |
Yes |
UAC/UAS will send the session refresh requests and the Call Control Agent will pass it across. |
2 |
Yes |
Yes |
No |
Yes |
|
3 |
Yes |
Yes |
Yes |
No |
|
4 |
Yes |
Yes |
No |
No |
UAC/UAS may send session refresh requests and the Call Control Agent will pass it across. |
5 |
Yes |
No |
Yes |
Yes |
If the incoming INVITE has no "refresher" or "refresher=uac", UAC will send the session refresh requests and the Call Control Agent will pass it across. The Call Control Agent will also start the session expiration timer on the IN LEG. If the incoming INVITE has "refresher=uas", the Call Control Agent will send the session refresh requests on the appropriate leg(s). |
6 |
Yes |
No |
No |
Yes |
|
7 |
Yes |
No |
Yes |
No |
|
8 |
Yes |
No |
No |
No |
UAC may send the session refresh requests and the Call Control Agent will pass it across. |
9 |
No |
Yes |
Yes |
Yes |
If the 2xx response from UAS has "refresher=uas", UAS will send the session refresh requests and the Call Control Agent will pass it across. The Call Control Agent will also start the session expiration timer on the OUT LEG. If the 2xx response from UAS has no "refresher" or has "refresher=uac", the Call Control Agent will the send session refresh requests on the appropriate call leg(s). |
10 |
No |
Yes |
No |
Yes |
|
11 |
No |
Yes |
Yes |
No |
|
12 |
No |
Yes |
No |
No |
UAS may send the session refresh requests and the Call Control Agent will pass it across. |
13 |
No |
No |
Yes |
Yes |
Call Control Agent will send the session refresh requests on the appropriate call leg(s). |
14 |
No |
No |
No |
Yes |
|
15 |
No |
No |
Yes |
No |
|
16 |
No |
No |
No |
No |
No session timer. |
Firewall Traversal Deployment Scenarios
This section provides the firewall traversal scenarios for the Cisco Unified CME line side endpoints.
Firewall Traversal for Soft Phone
For Cisco Unified CME line side, you can deploy an IOS firewall that can be collocated or non-collocated with the Cisco Unified CME.
This is a typical TRP-based trusted IOS firewall traversal deployment between a soft phone and the desk phones. In this scenario, a soft phone like CIPC in the data segment is registered to a Cisco Unified CME. When this soft phone communicates to a desktop IP phone in the voice segment that is registered to the same or different Cisco Unified CME, you can deploy an IOS firewall for the traffic sent between the desktop phone and the soft phone on the Cisco Unified CME line side.
Firewall Traversal for Wireless Phone
In this scenario, the TRP-based trusted IOS firewall traversal is deployed between a wireless phone and desktop phones. A wireless (WiFi) phone like Cisco 792xG is registered to a Cisco Unified CME. When the wireless phone communicates to a wired phone that is registered to the same or different Cisco Unified CME, you can deploy an IOS firewall for the traffic sent between the wired and the wireless phone on the Cisco Unified CME line side.
Firewall Traversal for Teleworker
In this scenario, the teleworker phone is registered to a central or branch office and the Cisco Unified CME communicates to a phone which resides inside the central or branch office. You can deploy an IOS firewall for the traffic sent between the central/branch office and the teleworker phone on the Cisco Unified CME line side.
The teleworker can use the Transport Layer Security (TLS) and Secure Real-Time Protocol (SRTP) for making VoIP calls or establish a Virtual Private Network (VPN) tunnel to the central or branch office for making VoIP calls. In TLS/ SRTP case, the VPN engine/concentrator decrypts the signaling packets and passes the packets to the firewall for inspection. Hence, either a partial SIP ALG or ACL, along with TRP, can be deployed. In VPN case, the firewall will not have the key to decrypt the signaling packets. Hence, only ACL along with TRP can be deployed
How to Configure Cisco Unified Communications Trusted Firewall Control - Version III
To configure Firewall traversal for Cisco Unified CME SIP line side endpoints, enable the stun-usage under:
- Configuring Firewall Traversal for Cisco Unified CME SIP Line Side Endpoints
- Configuring Firewall Traversal for Cisco Unified CME SCCP Line Side Endpoints
- Configuring SIP Session Timers
Configuring Firewall Traversal for Cisco Unified CME SIP Line Side Endpoints
Perform these tasks to configure firewall traversal.
1.
enable
2.
configure terminal
3.
voice register poolphone-tag
4.
voice-class stun-usagetag
5.
end
DETAILED STEPS
Example: Cisco Unified CME SIP Line Side EndPoints
This section provides the following sample configuration:
Device# show run Building configuration... ! ! Last configuration change at 14:20:02 IST Thu Mar 25 2010 by cisco ! NVRAM config last updated at 15:10:47 IST Wed Mar 24 2010 by cisco ! version 15.1 service timestamps debug datetime msec localtime show-timezone service timestamps log datetime msec localtime show-timezone no service password-encryption ! hostname fidessrst ! boot-start-marker boot system tftp://9.13.40.15/kartk/c3845-adventerprisek9_ivs-mz.0_2_0_20091205 boot-end-marker ! logging buffered 1000000 no logging console enable secret 5 $1$GbsI$Ah0BLBHzFx4w/Hu7kyhrs1 enable password cisco ! no aaa new-model ! no process cpu autoprofile hog clock timezone IST 5 ! dot11 syslog ip source-route ! no ip cef ! no ip domain lookup ip domain name yourdomain.com no ipv6 cef ! multilink bundle-name authenticated ! template 10 ! voice-card 0 dspfarm dsp services dspfarm ! voice service voip notify redirect ip2pots no supplementary-service sip moved-temporarily no supplementary-service sip refer stun stun flowdata agent-id 1 boot-count 45 stun flowdata shared-secret 7 14141B180F0B7B79772B3A26211C564450 stun flowdata catlife 70 keepalive 30 sip session transport tcp registrar server expires max 600 min 60 ! voice class stun-usage 1 stun usage firewall-traversal flowdata ! voice register global mode cme source-address 192.168.0.1 port 5060 max-dn 100 max-pool 100 load 7971 SIP70.8-5-2SR1S load 7970 SIP70.8-5-2SR1S load 7961 SIP41.8-5-2SR1S load 7960-7940 P0S3-8-12-00 authenticate realm cisco.com tftp-path flash: create profile sync 0221764396482329 ! voice register dn 2 number 999999 pickup-group 333 name 7970-2 mwi ! voice register dn 3 number 777777 pickup-group 333 name 7970-3 mwi ! voice register dn 5 number 2222 name 7960-Camelot1 mwi ! voice register dn 6 number 4444 name 7960-Camelot2 mwi ! voice register dn 7 number 6666 name 7960-Camelot3 mwi ! voice register dn 8 number 8888 call-forward b2bua all 6666 name 7960-Camelot4 mwi ! voice register dn 9 number 101010 call-forward b2bua all 1111 name 7960-Camelot5 mwi ! voice register dn 10 number 121212 call-forward b2bua noan 6666 timeout 3 name 7960-Camelot6 mwi ! voice register dn 11 number 141414 call-forward b2bua busy 1111 name 7960-Camelot7 huntstop channel 1 mwi ! voice register dn 50 number 15253545 name callgen-sip1 mwi ! voice register dn 51 number 16263646 name callgen-sip2 mwi voice register template 10 voice-class stun-usage 1 softkeys connected Park Confrn Endcall Hold Trnsfer ! voice register pool 2 park reservation-group 1111 id mac 0022.9059.81D9 type 7970 number 1 dn 2 template 10 codec g711ulaw ! voice register pool 50 id mac 0011.209F.5D60 type 7960 number 1 dn 50 voice-class stun-usage 1 codec g711ulaw ! voice register pool 51 id mac 0011.209F.5D60 type 7960 number 1 dn 51 voice-class stun-usage 1 codec g711ulaw license udi pid CISCO3845-MB sn FOC12373868 archive log config hidekeys username cisco password 0 cisco ! redundancy ! ip ftp username test ip ftp password test123 ! ! interface GigabitEthernet0/0 description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$ ip address 7.9.9.120 255.255.0.0 duplex auto speed auto media-type rj45 no keepalive no cdp enable ! interface GigabitEthernet0/1 ip address 192.168.0.1 255.255.255.0 duplex auto speed auto media-type rj45 no cdp enable ! ip forward-protocol nd ip http server no ip http secure-server ip http timeout-policy idle 60 life 86400 requests 10000 ! ip route 0.0.0.0 0.0.0.0 7.9.0.1 ip route 9.13.7.0 255.255.255.0 9.13.7.1 ip route 9.13.7.0 255.255.255.0 9.13.38.1 ip route 9.13.40.0 255.255.255.0 9.13.38.1 ip route 10.104.56.0 255.255.255.0 192.168.0.35 ! arp 10.104.56.54 0024.81b5.3302 ARPA ! ! control-plane ! call treatment on ! voice-port 0/0/0 ! voice-port 0/0/1 ! ! mgcp fax t38 ecm ! gateway timer receive-rtp 1200 ! sip-ua ! ! alias exec showrtp show policy-map type inspect zone-pair sessions ! line con 0 exec-timeout 0 0 login local line aux 0 line vty 0 4 access-class 23 in privilege level 15 login local transport input telnet line vty 5 15 access-class 23 in privilege level 15 login local transport input telnet ! exception data-corruption buffer truncate scheduler allocate 20000 1000 end
Configuring Firewall Traversal for Cisco Unified CME SCCP Line Side Endpoints
To configure Firewall traversal for Cisco Unified CME SCCP line side endpoints, enable the stun-usage under:
Note | MTP should be enabled under ephones for SCCP CME line side endpoints |
1.
enable
2.
configure terminal
3.
ephonephone-tag
4.
mtp
5.
voice-class stun-usagetag
6.
end
DETAILED STEPS
Example: Cisco Unified CME SCCP Line Side EndPoints
This section provides the following sample configuration:
Device#show run Building configuration... ! ! Last configuration change at 14:20:02 IST Thu Mar 25 2010 by cisco ! NVRAM config last updated at 15:10:47 IST Wed Mar 24 2010 by cisco ! version 15.1 service timestamps debug datetime msec localtime show-timezone service timestamps log datetime msec localtime show-timezone no service password-encryption ! hostname fidessrst ! boot-start-marker boot system tftp://9.13.40.15/kartk/c3845-adventerprisek9_ivs-mz.0_2_0_20091205 boot-end-marker ! logging buffered 1000000 no logging console enable secret 5 $1$GbsI$Ah0BLBHzFx4w/Hu7kyhrs1 enable password cisco ! no aaa new-model ! no process cpu autoprofile hog clock timezone IST 5 ! dot11 syslog ip source-route ! no ip cef ! no ip domain lookup ip domain name yourdomain.com no ipv6 cef ! multilink bundle-name authenticated ! template 10 ! voice-card 0 dspfarm dsp services dspfarm ! voice service voip notify redirect ip2pots no supplementary-service sip moved-temporarily no supplementary-service sip refer stun stun flowdata agent-id 1 boot-count 45 stun flowdata shared-secret 7 14141B180F0B7B79772B3A26211C564450 stun flowdata catlife 70 keepalive 30 sip session transport tcp registrar server expires max 600 min 60 ! voice class stun-usage 1 stun usage firewall-traversal flowdata ! ! license udi pid CISCO3845-MB sn FOC12373868 archive log config hidekeys username cisco password 0 cisco ! redundancy ! ip ftp username test ip ftp password test123 ! ! interface GigabitEthernet0/0 description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$ ip address 7.9.9.120 255.255.0.0 duplex auto speed auto media-type rj45 no keepalive no cdp enable ! interface GigabitEthernet0/1 ip address 192.168.0.1 255.255.255.0 duplex auto speed auto media-type rj45 no cdp enable ! ip forward-protocol nd ip http server no ip http secure-server ip http timeout-policy idle 60 life 86400 requests 10000 ! ip route 0.0.0.0 0.0.0.0 7.9.0.1 ip route 9.13.7.0 255.255.255.0 9.13.7.1 ip route 9.13.7.0 255.255.255.0 9.13.38.1 ip route 9.13.40.0 255.255.255.0 9.13.38.1 ip route 10.104.56.0 255.255.255.0 192.168.0.35 ! arp 10.104.56.54 0024.81b5.3302 ARPA ! control-plane ! call treatment on ! voice-port 0/0/0 ! voice-port 0/0/1 ! ! mgcp fax t38 ecm ! sccp local GigabitEthernet0/1 sccp ccm 192.168.0.1 identifier 1 version 7.0 sccp ! gateway timer receive-rtp 1200 ! sip-ua ! telephony-service sdspfarm units 3 sdspfarm transcode sessions 12 sdspfarm tag 2 HwConference sdspfarm tag 3 mtp00230471e381 video srst mode auto-provision all srst ephone template 1 srst dn line-mode dual max-ephones 262 max-dn 500 ip source-address 192.168.0.1 port 2000 service directed-pickup gpickup max-conferences 8 gain -6 call-park system application moh music-on-hold.au transfer-system full-consult create cnf-files version-stamp 7960 Mar 24 2010 15:09:20 ! ephone-template 1 voice-class stun-usage 1 mtp ! ephone-template 3 voice-class stun-usage 1 ! ephone-dn 1 dual-line number 1000 name vg1port1 ! ephone-dn 2 dual-line number 2000 name vg1port2 ! ephone-dn 3 dual-line number 3000 name vg2port1 ! ephone-dn 4 dual-line number 4000 name vg2port2 call-forward all 3000 ! ephone-dn 5 dual-line number 1111 name sccpcamelot1 ! ephone-dn 6 dual-line number 3333 name sccpcamelot2 ! ephone-dn 7 dual-line number 717818919 description 717818919 name 717818919 ! ephone-dn 8 dual-line number 6000 label 6000 description 6000 name 6000 ! ephone-dn 9 dual-line number 5000 label 5000 description 5000 name 5000 ! ephone-dn 10 dual-line ! ephone-dn 11 dual-line ! ephone-dn 13 dual-line number 919886087486 name blacforestvg0 ! ephone-dn 14 dual-line number 919886087487 name blacforestvg1 ! ephone-dn 15 dual-line number 919886087488 name blacforestvg2 ! ephone-dn 16 dual-line number 919886087489 name blacforestvg3 ! ephone-dn 41 dual-line number 9876 conference meetme preference 1 no huntstop ! ephone-dn 42 dual-line number 9876 conference meetme preference 2 no huntstop ! ephone-dn 43 dual-line number 9876 conference meetme preference 3 no huntstop ! ephone 1 voice-class stun-usage 1 device-security-mode none mac-address FCAC.3BAE.0000 max-calls-per-button 2 mtp type anl button 1:1 ! ephone 2 voice-class stun-usage 1 device-security-mode none mac-address FCAC.3BAE.0001 max-calls-per-button 2 mtp type anl button 1:2 ! ephone 3 voice-class stun-usage 1 device-security-mode none mac-address FCAC.3BAC.0000 max-calls-per-button 2 type anl button 1:3 ! ephone 4 voice-class stun-usage 1 device-security-mode none mac-address FCAC.3BAC.0001 max-calls-per-button 2 mtp type anl button 1:4 ! ephone 5 voice-class stun-usage 1 device-security-mode none mac-address 1234.1234.1111 max-calls-per-button 2 mtp type 7960 button 1:5 ! ephone 6 voice-class stun-usage 1 device-security-mode none mac-address 1234.1234.3333 ephone-template 3 max-calls-per-button 2 codec g729r8 dspfarm-assist mtp type 7960 button 1:6 ! ephone 7 device-security-mode none mac-address FCAC.3B79.0001 ephone-template 1 max-calls-per-button 2 type anl button 1:14 ! ephone 8 device-security-mode none mac-address 001B.D584.E274 ephone-template 1 button 1:7 ! ephone 9 device-security-mode none mac-address FCAC.3B7F.0001 ephone-template 1 button 1:8 ! ephone 10 device-security-mode none mac-address FCAC.3B7F.0000 ephone-template 1 button 1:9 ! ephone 11 device-security-mode none mac-address FCAC.3B79.0002 ephone-template 1 max-calls-per-button 2 type anl button 1:15 ! ephone 13 device-security-mode none mac-address FCAC.3B79.0000 ephone-template 1 max-calls-per-button 2 type anl button 1:13 ! ephone 14 device-security-mode none mac-address FCAC.3B79.0003 ephone-template 1 max-calls-per-button 2 type anl button 1:16 ! alias exec showrtp show policy-map type inspect zone-pair sessions ! line con 0 exec-timeout 0 0 login local line aux 0 line vty 0 4 access-class 23 in privilege level 15 login local transport input telnet line vty 5 15 access-class 23 in privilege level 15 login local transport input telnet ! exception data-corruption buffer truncate scheduler allocate 20000 1000 end
Configuring SIP Session Timers
Configuring SIP Sesion Timer Globally
Perform these tasks to configure SIP session timer globally.
1.
enable
2.
configure terminal
3.
voice service voip
4.
sip
5.
min-sestringsession-expiresstring
6.
session refresh
7.
end
DETAILED STEPS
Example: SIP Session Timer
This section provides the following sample configuration:
Device# show run show running-config Building configuration... Current configuration : 2284 bytes ! ! Last configuration change at 13:50:48 IST Sun Mar 14 2010 ! NVRAM config last updated at 16:21:46 IST Fri Mar 12 2010 ! version 15.1 service timestamps debug datetime msec service timestamps log datetime msec localtime show-timezone no service password-encryption ! hostname CUBE1-Fides3 ! boot-start-marker boot-end-marker ! ! logging buffered 1000000 no logging console ! no aaa new-model no process cpu autoprofile hog clock timezone IST 5 ! ip source-route ! ip cef ! no ip domain lookup ip domain name yourdomain.com no ipv6 cef multilink bundle-name authenticated ! voice service voip allow-connections sip to sip sip min-se 90 session-expires 100 session refresh ! voice-card 0 ! license udi pid CISCO2821 sn FHK1143F0UK archive log config hidekeys no memory lite username cisco privilege 15 secret 5 $1$p0H/$eUuiG4gFjfFQFVvUzoDd3/ ! redundancy ! ip ftp username test ip ftp password test123 ! interface GigabitEthernet0/0 description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$ ip address 7.9.9.106 255.255.0.0 duplex auto speed auto no cdp enable ! interface GigabitEthernet0/1 no ip address shutdown duplex auto speed auto no cdp enable ! ip forward-protocol nd ! ip http server ip http access-class 23 ip http authentication local ip http timeout-policy idle 60 life 86400 requests 10000 ip route 0.0.0.0 0.0.0.0 7.9.0.1 ! control-plane ! mgcp fax t38 ecm ! ! dial-peer voice 100 voip huntstop destination-pattern 1000000000 b2bua session protocol sipv2 session target ipv4:7.9.9.9 incoming called-number 2000000000 voice-class sip session refresh codec g711ulaw ! sip-ua retry invite 2 ! ! gatekeeper shutdown line con 0 exec-timeout 0 0 line aux 0 line vty 0 4 access-class 23 in privilege level 15 login local transport input telnet line vty 5 15 access-class 23 in privilege level 15 login local transport input telnet ! exception data-corruption buffer truncate scheduler allocate 20000 1000 end
Configuring SIP Session Timer on a Dial-Peer
Perform these tasks to configure SIP session timer at the dial peer level.
1.
enable
2.
configure terminal
3.
dial-peer voicetagvoip
4.
voice-class sip session refresh
5.
end
DETAILED STEPS
Feature Information for Cisco Unified Communications Trusted Firewall Control - Version III
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Feature Name |
Releases |
Feature Information |
---|---|---|
Cisco Unified Communications Trusted Firewall Control - Version III |
15.1(2)T |
Cisco Unified Communications Trusted Firewall Control using STUN pushes intelligent services into the network through Trust Relay Point (TRP). The following commands were introduced or modified: session refresh, and voice-class sip session refresh. |
Cisco Unified Communications Trusted Firewall Control - Version III |
Cisco IOS XE Release 3.6S |
Cisco Unified Communications Trusted Firewall Control using STUN pushes intelligent services into the network through Trust Relay Point (TRP). In Cisco IOS XE Release 3.6S, this feature was implemented on the Cisco Unified Border Element (Enterprise) The following commands were introduced or modified: session refresh, and voice-class sip session refresh. |