Table Of Contents
Cisco Unified Communications Trusted Firewall Control - Version III
Prerequisites for Cisco Unified Communications Trusted Firewall Control
Restrictions for Enhanced Firewall Traversal for Cisco Unified Communications
Information About Enhanced Firewall Traversal for Cisco Unified Communications using STUN
Overview of Firewall Traversal for Cisco Unified Communications
Firewall Traversal Deployment Scenarios
Firewall Traversal for Soft Phone
Firewall Traversal for Wireless Phone
Firewall Traversal for Teleworker
How to Configure Firewall Traversal for Cisco Unified CME SIP Line Side Endpoints
Configuring Firewall Traversal for Cisco Unified CME SIP Line Side Endpoints
Configuration Examples for Cisco Unified CME SIP Line Side EndPoints
How to Configure Firewall Traversal for Cisco Unified CME SCCP Line Side Endpoints
Configuring Firewall Traversal for Cisco Unified CME SCCP Line Side Endpoints
Configuration Examples for Cisco Unified CME SCCP Line Side EndPoints
How to Configure SIP Session Timer
Configuration Examples for SIP Session Timer
Feature Information for Enhanced Firewall Traversal Cisco Unified CME
Cisco Unified Communications Trusted Firewall Control - Version III
First Published: July 20, 2010
Cisco Unified Communications Trusted Firewall Control pushes intelligent services onto the network through a Trusted Relay Point (TRP) firewall. TRP is a Cisco IOS service feature, which is similar to the Resource Reservation Protocol (RSVP) agent. Firewall traversal is accomplished using Session Traversal Utilities for Network Adress Translation (STUN) on a TRP colocated with a Cisco Unified Communications Manager Express (Cisco Unified CME), Cisco Unified Border Element, and Media Termination Points (MTP).
This release supports the following:
•Session Initiation Protocol (SIP) session timer fully in the following Call Control Agents:
–Time-division Multiplexing(TDM)-SIP Gateway
–Cisco Unified CME for SIP trunk
–Cisco Unified Border Element for both SIP to SIP and H.323 to SIP scenarios
•Unified Communication Trusted Firewall traversal for Cisco Unified CME SCCP line side and in CME as Survivable Remote Site Telephony (SRST) mode.
•Unified Communication Trusted Firewall traversal for Cisco Unified CME SIP line side and in CME as SRST mode.
Finding Feature Information in This Module
Your Cisco IOS software release may not support all of the features documented in this module. To reach links to specific feature documentation in this module and to see a list of the releases in which each feature is supported, use the "Feature Information for Enhanced Firewall Traversal Cisco Unified CME" section.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Contents
•Information About Enhanced Firewall Traversal for Cisco Unified Communications using STUN
•How to Configure Firewall Traversal for Cisco Unified CME SIP Line Side Endpoints
•Configuration Examples for Cisco Unified CME SIP Line Side EndPoints
•How to Configure Firewall Traversal for Cisco Unified CME SCCP Line Side Endpoints
•Configuring Firewall Traversal for Cisco Unified CME SCCP Line Side Endpoints
•How to Configure SIP Session Timer
•Configuring SIP Session Timer
•Feature Information for Enhanced Firewall Traversal Cisco Unified CME
Prerequisites for Cisco Unified Communications Trusted Firewall Control
•Ensure that you have the correct platform to support this feature. Cisco Unified Communications Trusted Firewall Control is supported on the Cisco 1861, 2801, 2811, 2821, 2851, 3825, and 3845 platforms.
•Cisco IOS Release 15.1(2)T
•All k9 images with voice support. Session Timer feature can run on any voice image and does not support the firewall traversal.
•uc-base and securityk9 licenses on Cisco 29xx and 39xx platforms. Session Timer feature does not require securityk9 licenses.
Restrictions for Enhanced Firewall Traversal for Cisco Unified Communications
Cisco IOS Release 15.1(2)T implements firewall traversal for media using STUN on TRP and is not supported for:
•RSVP flow support through the Firewall
•Traditional SRST mode
•H.323 trunk support for Unified Communication Trusted Firewall
•Media flow around on Cisco Unified Border Element
•IPv6
•IP Multicast
•Video calls on SCCP and SIP line side
Information About Enhanced Firewall Traversal for Cisco Unified Communications using STUN
Before you configure Enhanced Firewall Traversal using STUN, you should understand the following concepts:
•Overview of Firewall Traversal for Cisco Unified Communications
•Firewall Traversal for Soft Phone
•Firewall Traversal for Wireless Phone
Overview of Firewall Traversal for Cisco Unified Communications
In previous releases, firewall traversal implemented a new framework for IOS firewall traversal on Cisco Unified CME and Cisco Unified Border Element for SIP trunks.
For more information on Cisco trusted firewall traversal, see: http://www.cisco.com/en/US/docs/voice_ip_comm/cucme/feature/guide/EnhancedTrustedFirewallControll.html
SIP Session Timer
The SIP Session Timer (RFC 4028) is the standard SIP keepalive mechanism that keeps the SIP session active. The SIP user agents send periodic re-INVITE or UPDATE requests (referred to as session refresh requests) to keep the session alive. The interval for the session refresh request is determined through a negotiation mechanism. Session Timer is used to allow SIP signaling through the IOS firewall. You must configure Access Control List (ACL) or partial SIP-Application Layer Gateway (ALG) on the Cisco IOS firewall to allow SIP signaling.
After signaling, a pinhole is created. The firewall starts an inactivity timer, so that in case the user agents crashes or reboots during the call or the BYE message is lost, it can remove its states when the timer starts.
For the Cisco Unified CME SIP line side, by default, the endpoint sends periodic REGISTER messages on port 5060.
•A partial SIP-ALG keeps track of the endpoint registration and keeps the signaling pinhole open as far as the registration is active.
•An ACL tracks the User Datagram Protocol (UDP) / Transmission Control Protocol (TCP) messages that travel across the signaling port and keeps the signaling pinhole open.
However, the Cisco Unified CME SIP trunks do not exchange periodic SIP messages.The Cisco IOS firewall control sessions times out if no SIP messages are exchanged. The timed out SIP over UDP sessions are re-established with the next SIP message (for example, BYE). Timed out SIP over TCP sessions are not re-established and the subsequent SIP messages (for example, BYE) will be dropped.
Restrictions and Limitations for SIP Session Timer
SIP session timer does not support the following:
•Media modifications in responses to locally sent ReINVITE for session refresh
•Session timer in early dialog UPDATE
Firewall Traversal Deployment Scenarios
This section provides the firewall traversal scenarios for the Cisco Unified CME line side endpoints.
Firewall Traversal for Soft Phone
For Cisco Unified CME line side, you can deploy an IOS firewall that can be colocated or non colocated with the Cisco Unified CME.
Figure 1 Soft Phone Communicating to Desktop Phones
This is a typical TRP-based trusted IOS firewall traversal deployment between a soft phone and the desk phones. In this scenario, a soft phone like CIPC in the data segment is registered to a Cisco Unified CME. When this soft phone communicates to a desktop IP phone in the voice segment that is registered to the same or different Cisco Unified CME, you can deploy an IOS firewall for the traffic sent between the desktop phone and the soft phone on the Cisco Unified CME line side.
Firewall Traversal for Wireless Phone
Figure 2 Wireless Phone Communicating to Wired Phones
In this scenario, the TRP-based trusted IOS firewall traversal is deployed between a wireless phone and desktop phones. A wireless (WiFi) phone like Cisco 792xG is registered to a Cisco Unified CME. When the wireless phone communicates to a wired phone that is registered to the same or different Cisco Unified CME, you can deploy an IOS firewall for the traffic sent between the wired and the wireless phone on the Cisco Unified CME line side.
Firewall Traversal for Teleworker
Figure 3 Teleworker Communicating to Central Office Desktop Phones
In this scenario, the teleworker phone is registered to a central or branch office and the Cisco Unified CME communicates to a phone which resides inside the central or branch office. You can deploy an IOS firewall for the traffic sent between the central/branch office and the teleworker phone on the Cisco Unified CME line side.
The teleworker can use the Transport Layer Security (TLS) and Secure Real-Time Protocol (SRTP) for making VoIP calls or establish a Virtual Private Network (VPN) tunnel to the central or branch office for making VoIP calls. In TLS/ SRTP case, the VPN engine/concentrator decrypts the signaling packets and passes the packets to the firewall for inspection. Hence, either a partial SIP ALG or ACL, along with TRP, can be deployed. In VPN case, the firewall will not have the key to decrypt the signaling packets. Hence, only ACL along with TRP can be deployed.
Configuration Prerequisites
The trusted firewall traversal for Cisco Unified CME SIP line side endpoints can be configured using TRP. The TRP must be configured under voice service voip> stun with the following information:
•Authorization agent-id
•Shared secret
•CAT life
•Keepalive interval
The authorization agent-id and shared secret are mandator commands and the CATlife and Keepalive interval are optional commands and can have default values.
In addition, the stun-usage command must to be configured as firewall traversal by using CISCO-STUN-FLOWDATA under voice class stun-usage
For detail configuration steps, see: http://www.cisco.com/en/US/docs/voice_ip_comm/cucme/feature/guide/EnhancedTrustedFirewallControll.html
How to Configure Firewall Traversal for Cisco Unified CME SIP Line Side Endpoints
To configure Firewall traversal for Cisco Unified CME SIP line side endpoints, enable the stun-usage under:
•Voice-register pool or voice-register template and apply under the voice register pool for SIP line side
This section contains the following procedures:
•Configuring Firewall Traversal for Cisco Unified CME SIP Line Side Endpoints
•Configuration Examples for Cisco Unified CME SIP Line Side EndPoints
Configuring Firewall Traversal for Cisco Unified CME SIP Line Side Endpoints
Perform these tasks to configure firewall traversal.
SUMMARY STEPS
1. enable
2. configure terminal
3. voice register pool phone-tag
4. voice-class stun-usage tag
5. end
DETAILED STEPS
Configuration Examples for Cisco Unified CME SIP Line Side EndPoints
This section provides the following sample configuration:
Router# show runBuilding configuration...!! Last configuration change at 14:20:02 IST Thu Mar 25 2010 by cisco! NVRAM config last updated at 15:10:47 IST Wed Mar 24 2010 by cisco!version 15.1service timestamps debug datetime msec localtime show-timezoneservice timestamps log datetime msec localtime show-timezoneno service password-encryption!hostname fidessrst!boot-start-markerboot system tftp://9.13.40.15/kartk/c3845-adventerprisek9_ivs-mz.0_2_0_20091205boot-end-marker!logging buffered 1000000no logging consoleenable secret 5 $1$GbsI$Ah0BLBHzFx4w/Hu7kyhrs1enable password cisco!no aaa new-model!no process cpu autoprofile hogclock timezone IST 5!dot11 syslogip source-route!no ip cef!no ip domain lookupip domain name yourdomain.comno ipv6 cef!multilink bundle-name authenticated!template 10!voice-card 0dspfarmdsp services dspfarm!voice service voipnotify redirect ip2potsno supplementary-service sip moved-temporarilyno supplementary-service sip referstunstun flowdata agent-id 1 boot-count 45stun flowdata shared-secret 7 14141B180F0B7B79772B3A26211C564450stun flowdata catlife 70 keepalive 30sipsession transport tcpregistrar server expires max 600 min 60!voice class stun-usage 1stun usage firewall-traversal flowdata!voice register globalmode cmesource-address 192.168.0.1 port 5060max-dn 100max-pool 100load 7971 SIP70.8-5-2SR1Sload 7970 SIP70.8-5-2SR1Sload 7961 SIP41.8-5-2SR1Sload 7960-7940 P0S3-8-12-00authenticate realm cisco.comtftp-path flash:create profile sync 0221764396482329!voice register dn 2number 999999pickup-group 333name 7970-2mwi!voice register dn 3number 777777pickup-group 333name 7970-3mwi!voice register dn 5number 2222name 7960-Camelot1mwi!voice register dn 6number 4444name 7960-Camelot2mwi!voice register dn 7number 6666name 7960-Camelot3mwi!voice register dn 8number 8888call-forward b2bua all 6666name 7960-Camelot4mwi!voice register dn 9number 101010call-forward b2bua all 1111name 7960-Camelot5mwi!voice register dn 10number 121212call-forward b2bua noan 6666 timeout 3name 7960-Camelot6mwi!voice register dn 11number 141414call-forward b2bua busy 1111name 7960-Camelot7huntstop channel 1mwi!voice register dn 50number 15253545name callgen-sip1mwi!voice register dn 51number 16263646name callgen-sip2mwivoice register template 10voice-class stun-usage 1softkeys connected Park Confrn Endcall Hold Trnsfer!voice register pool 2park reservation-group 1111id mac 0022.9059.81D9type 7970number 1 dn 2template 10codec g711ulaw!voice register pool 50id mac 0011.209F.5D60type 7960number 1 dn 50voice-class stun-usage 1codec g711ulaw!voice register pool 51id mac 0011.209F.5D60type 7960number 1 dn 51voice-class stun-usage 1codec g711ulawlicense udi pid CISCO3845-MB sn FOC12373868archivelog confighidekeysusername cisco password 0 cisco!redundancy!ip ftp username testip ftp password test123!!interface GigabitEthernet0/0description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$ip address 7.9.9.120 255.255.0.0duplex autospeed automedia-type rj45no keepaliveno cdp enable!interface GigabitEthernet0/1ip address 192.168.0.1 255.255.255.0duplex autospeed automedia-type rj45no cdp enable!ip forward-protocol ndip http serverno ip http secure-serverip http timeout-policy idle 60 life 86400 requests 10000!ip route 0.0.0.0 0.0.0.0 7.9.0.1ip route 9.13.7.0 255.255.255.0 9.13.7.1ip route 9.13.7.0 255.255.255.0 9.13.38.1ip route 9.13.40.0 255.255.255.0 9.13.38.1ip route 10.104.56.0 255.255.255.0 192.168.0.35!arp 10.104.56.54 0024.81b5.3302 ARPA!!control-plane!call treatment on!voice-port 0/0/0!voice-port 0/0/1!!mgcp fax t38 ecm!gatewaytimer receive-rtp 1200!sip-ua!!alias exec showrtp show policy-map type inspect zone-pair sessions!line con 0exec-timeout 0 0login localline aux 0line vty 0 4access-class 23 inprivilege level 15login localtransport input telnetline vty 5 15access-class 23 inprivilege level 15login localtransport input telnet!exception data-corruption buffer truncatescheduler allocate 20000 1000endHow to Configure Firewall Traversal for Cisco Unified CME SCCP Line Side Endpoints
To configure Firewall traversal for Cisco Unified CME SCCP line side endpoints, enable the stun-usage under:
•Ephone or ephone-template and apply under the ephone for SCCP line side
This section contains the following procedures:
•Configuring Firewall Traversal for Cisco Unified CME SIP Line Side Endpoints
•Configuration Examples for Cisco Unified CME SIP Line Side EndPoints
Configuring Firewall Traversal for Cisco Unified CME SCCP Line Side Endpoints
Note MTP should be enabled under ephones for SCCP CME line side endpoints
Perform these tasks to configure firewall traversal.
SUMMARY STEPS
1. enable
2. configure terminal
3. ephone phone-tag
4. mtp
5. voice-class stun-usage tag
6. end
DETAILED STEPS
Configuration Examples for Cisco Unified CME SCCP Line Side EndPoints
This section provides the following sample configuration:
Router#show runBuilding configuration...!! Last configuration change at 14:20:02 IST Thu Mar 25 2010 by cisco! NVRAM config last updated at 15:10:47 IST Wed Mar 24 2010 by cisco!version 15.1service timestamps debug datetime msec localtime show-timezoneservice timestamps log datetime msec localtime show-timezoneno service password-encryption!hostname fidessrst!boot-start-markerboot system tftp://9.13.40.15/kartk/c3845-adventerprisek9_ivs-mz.0_2_0_20091205boot-end-marker!logging buffered 1000000no logging consoleenable secret 5 $1$GbsI$Ah0BLBHzFx4w/Hu7kyhrs1enable password cisco!no aaa new-model!no process cpu autoprofile hogclock timezone IST 5!dot11 syslogip source-route!no ip cef!no ip domain lookupip domain name yourdomain.comno ipv6 cef!multilink bundle-name authenticated!template 10!voice-card 0dspfarmdsp services dspfarm!voice service voipnotify redirect ip2potsno supplementary-service sip moved-temporarilyno supplementary-service sip referstunstun flowdata agent-id 1 boot-count 45stun flowdata shared-secret 7 14141B180F0B7B79772B3A26211C564450stun flowdata catlife 70 keepalive 30sipsession transport tcpregistrar server expires max 600 min 60!voice class stun-usage 1stun usage firewall-traversal flowdata!!license udi pid CISCO3845-MB sn FOC12373868archivelog confighidekeysusername cisco password 0 cisco!redundancy!ip ftp username testip ftp password test123!!interface GigabitEthernet0/0description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$ip address 7.9.9.120 255.255.0.0duplex autospeed automedia-type rj45no keepaliveno cdp enable!interface GigabitEthernet0/1ip address 192.168.0.1 255.255.255.0duplex autospeed automedia-type rj45no cdp enable!ip forward-protocol ndip http serverno ip http secure-serverip http timeout-policy idle 60 life 86400 requests 10000!ip route 0.0.0.0 0.0.0.0 7.9.0.1ip route 9.13.7.0 255.255.255.0 9.13.7.1ip route 9.13.7.0 255.255.255.0 9.13.38.1ip route 9.13.40.0 255.255.255.0 9.13.38.1ip route 10.104.56.0 255.255.255.0 192.168.0.35!arp 10.104.56.54 0024.81b5.3302 ARPA!control-plane!call treatment on!voice-port 0/0/0!voice-port 0/0/1!!mgcp fax t38 ecm!sccp local GigabitEthernet0/1sccp ccm 192.168.0.1 identifier 1 version 7.0sccp!gatewaytimer receive-rtp 1200!sip-ua!telephony-servicesdspfarm units 3sdspfarm transcode sessions 12sdspfarm tag 2 HwConferencesdspfarm tag 3 mtp00230471e381videosrst mode auto-provision allsrst ephone template 1srst dn line-mode dualmax-ephones 262max-dn 500ip source-address 192.168.0.1 port 2000service directed-pickup gpickupmax-conferences 8 gain -6call-park system applicationmoh music-on-hold.autransfer-system full-consultcreate cnf-files version-stamp 7960 Mar 24 2010 15:09:20!ephone-template 1voice-class stun-usage 1mtp!ephone-template 3voice-class stun-usage 1!ephone-dn 1 dual-linenumber 1000name vg1port1!ephone-dn 2 dual-linenumber 2000name vg1port2!ephone-dn 3 dual-linenumber 3000name vg2port1!ephone-dn 4 dual-linenumber 4000name vg2port2call-forward all 3000!ephone-dn 5 dual-linenumber 1111name sccpcamelot1!ephone-dn 6 dual-linenumber 3333name sccpcamelot2!ephone-dn 7 dual-linenumber 717818919description 717818919name 717818919!ephone-dn 8 dual-linenumber 6000label 6000description 6000name 6000!ephone-dn 9 dual-linenumber 5000label 5000description 5000name 5000!ephone-dn 10 dual-line!ephone-dn 11 dual-line!ephone-dn 13 dual-linenumber 919886087486name blacforestvg0!ephone-dn 14 dual-linenumber 919886087487name blacforestvg1!ephone-dn 15 dual-linenumber 919886087488name blacforestvg2!ephone-dn 16 dual-linenumber 919886087489name blacforestvg3!ephone-dn 41 dual-linenumber 9876conference meetmepreference 1no huntstop!ephone-dn 42 dual-linenumber 9876conference meetmepreference 2no huntstop!ephone-dn 43 dual-linenumber 9876conference meetmepreference 3no huntstop!ephone 1voice-class stun-usage 1device-security-mode nonemac-address FCAC.3BAE.0000max-calls-per-button 2mtptype anlbutton 1:1!ephone 2voice-class stun-usage 1device-security-mode nonemac-address FCAC.3BAE.0001max-calls-per-button 2mtptype anlbutton 1:2!ephone 3voice-class stun-usage 1device-security-mode nonemac-address FCAC.3BAC.0000max-calls-per-button 2type anlbutton 1:3!ephone 4voice-class stun-usage 1device-security-mode nonemac-address FCAC.3BAC.0001max-calls-per-button 2mtptype anlbutton 1:4!ephone 5voice-class stun-usage 1device-security-mode nonemac-address 1234.1234.1111max-calls-per-button 2mtptype 7960button 1:5!ephone 6voice-class stun-usage 1device-security-mode nonemac-address 1234.1234.3333ephone-template 3max-calls-per-button 2codec g729r8 dspfarm-assistmtptype 7960button 1:6!ephone 7device-security-mode nonemac-address FCAC.3B79.0001ephone-template 1max-calls-per-button 2type anlbutton 1:14!ephone 8device-security-mode nonemac-address 001B.D584.E274ephone-template 1button 1:7!ephone 9device-security-mode nonemac-address FCAC.3B7F.0001ephone-template 1button 1:8!ephone 10device-security-mode nonemac-address FCAC.3B7F.0000ephone-template 1button 1:9!ephone 11device-security-mode nonemac-address FCAC.3B79.0002ephone-template 1max-calls-per-button 2type anlbutton 1:15!ephone 13device-security-mode nonemac-address FCAC.3B79.0000ephone-template 1max-calls-per-button 2type anlbutton 1:13!ephone 14device-security-mode nonemac-address FCAC.3B79.0003ephone-template 1max-calls-per-button 2type anlbutton 1:16!alias exec showrtp show policy-map type inspect zone-pair sessions!line con 0exec-timeout 0 0login localline aux 0line vty 0 4access-class 23 inprivilege level 15login localtransport input telnetline vty 5 15access-class 23 inprivilege level 15login localtransport input telnet!exception data-corruption buffer truncatescheduler allocate 20000 1000endHow to Configure SIP Session Timer
This section contains the following procedures:
•Configuring SIP Session Timer
•Configuration Examples for SIP Session Timer
Configuring SIP Session Timer
Perform these tasks to configure SIP session timer.
SUMMARY STEPS
1. enable
2. configure terminal
3. voice service voip
4. sip
5. min-se string session-expires string
6. session refresh
7. dial-peer voice tag voip
8. voice-class sip session refresh [system]
9. end
DETAILED STEPS
Configuration Examples for SIP Session Timer
This section provides the following sample configuration:
Router# show runshow running-configBuilding configuration...Current configuration : 2284 bytes!! Last configuration change at 13:50:48 IST Sun Mar 14 2010! NVRAM config last updated at 16:21:46 IST Fri Mar 12 2010!version 15.1service timestamps debug datetime msecservice timestamps log datetime msec localtime show-timezoneno service password-encryption!hostname CUBE1-Fides3!boot-start-markerboot-end-marker!!logging buffered 1000000no logging console!no aaa new-modelno process cpu autoprofile hogclock timezone IST 5!ip source-route!ip cef!no ip domain lookupip domain name yourdomain.comno ipv6 cefmultilink bundle-name authenticated!voice service voipallow-connections sip to sipsipmin-se 90 session-expires 100session refresh!voice-card 0!license udi pid CISCO2821 sn FHK1143F0UKarchivelog confighidekeysno memory liteusername cisco privilege 15 secret 5 $1$p0H/$eUuiG4gFjfFQFVvUzoDd3/!redundancy!ip ftp username testip ftp password test123!interface GigabitEthernet0/0description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$ip address 7.9.9.106 255.255.0.0duplex autospeed autono cdp enable!interface GigabitEthernet0/1no ip addressshutdownduplex autospeed autono cdp enable!ip forward-protocol nd!ip http serverip http access-class 23ip http authentication localip http timeout-policy idle 60 life 86400 requests 10000ip route 0.0.0.0 0.0.0.0 7.9.0.1!control-plane!mgcp fax t38 ecm!!dial-peer voice 100 voiphuntstopdestination-pattern 1000000000b2buasession protocol sipv2session target ipv4:7.9.9.9incoming called-number 2000000000voice-class sip session refreshcodec g711ulaw!sip-uaretry invite 2!!gatekeepershutdownline con 0exec-timeout 0 0line aux 0line vty 0 4access-class 23 inprivilege level 15login localtransport input telnetline vty 5 15access-class 23 inprivilege level 15login localtransport input telnet!exception data-corruption buffer truncatescheduler allocate 20000 1000endSession Timer Call Flows
Table 1 shows who will be sending the session refresh requests for all combinations of User Agent Clients (UAC) / User Agent Server (UAS) support for session timer.
Additional References
The following sections provide references related to the Enhanced Firewall Traversal using STUN feature.
Related Documents
Standards
Standards TitleNo new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
—
MIBs
RFCs
RFCs TitleNo new or modified RFCs are supported by this feature, and support for existing RFCs has not been modified by this feature.
—
Technical Assistance
Feature Information for Enhanced Firewall Traversal Cisco Unified CME
Table 2 lists the release history for this feature.
Not all commands may be available in your Cisco IOS software release. For release information about a specific command, see the command reference documentation.
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which Cisco IOS, and Cisco IOS XE, software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note Table 2 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2010 Cisco Systems, Inc. All rights reserved.