ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    VOIP Vs VPN

    IT Discussion
    voip pbx telephony vpn security
    5
    45
    9.9k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • IT-ADMINI
      IT-ADMIN
      last edited by scottalanmiller

      Hi guys, i'm new in this forum
      i have a question about VOIP,
      let's have a look in my current situation, i have 2 location : main office and branch office connected together with site to site VPN, in the main office i have small network 25 computers (soft phones) and one IP PBX,
      in the branch office i have 8 computers (soft phones)
      the IP PBX in the main office is connected via ISDN connectivity (E1 10 channel)
      the computers in the branch were registered successfully in the IP PBX (which is located in the main)
      when i call an extension from the main to the branch or from the branch to the main i can hear the dial tone and the call is established but the problem is after the call was established i cannot hear anything in both sides and after a short time the call end automatically
      IP PBX : Ozeki Phone System XE
      VPN server : pfsense

      1 Reply Last reply Reply Quote 1
      • JaredBuschJ
        JaredBusch
        last edited by

        I have no idea on your PBX specifically, but you are likely not routing everything correctly. Either The VPN is not excluded from NAT or RTP was not routed correctly. More details of the network configuration would be needed to give a more realistic answer.

        1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller
          last edited by

          Is there any sort of firewall or limiting factors "inline" in the VPN? Typically a VPN will be a wide open channel between one location and the other, we would expect the two locations to act as if they were local. Is there NAT translation going on, perhaps? That will cause all kinds of issues.

          1 Reply Last reply Reply Quote 0
          • IT-ADMINI
            IT-ADMIN
            last edited by

            i'm using OpenVpn so i have a dedicated virtual NIC for VPN and all port are opened in this virtual NIC, as for RTP, how can i routed it correctly because really i didn't make anything regarding this protocol

            best regard

            scottalanmillerS 1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @IT-ADMIN
              last edited by

              @IT-ADMIN said:

              i'm using OpenVpn so i have a dedicated virtual NIC for VPN and all port are opened in this virtual NIC, as for RTP, how can i routed it correctly because really i didn't make anything regarding this protocol

              best regard

              How does the machines at each site route over the VPN?

              1 Reply Last reply Reply Quote 0
              • IT-ADMINI
                IT-ADMIN
                last edited by

                i have 2 different networks 192.168.1.0 in the main and 192.168.2.0 in the branch, so each pfsense box route between 2 different network

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @IT-ADMIN
                  last edited by

                  @IT-ADMIN said:

                  i have 2 different networks 192.168.1.0 in the main and 192.168.2.0 in the branch, so each pfsense box route between 2 different network

                  Any NAT going on or are both networks addressed publicly to each other?

                  1 Reply Last reply Reply Quote 0
                  • IT-ADMINI
                    IT-ADMIN
                    last edited by

                    in the beginning the branch box address the main box with it public ip, once the main box validate the key installed in the branch box the tunnel is forwarded automatically to openvpn interface which is virtual, in this virtual interface all port are opened
                    i hope i was clear

                    scottalanmillerS 1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @IT-ADMIN
                      last edited by

                      @IT-ADMIN said:

                      in the beginning the branch box address the main box with it public ip, once the main box validate the key installed in the branch box the tunnel is forwarded automatically to openvpn interface which is virtual, in this virtual interface all port are opened
                      i hope i was clear

                      What I am trying to determine is if every 192.168.1.x address can communicate directly with ever 192.168.2.x address. Can, say, 192.168.1.15 talk directly to 192.168.2.34? And vice versa?

                      1 Reply Last reply Reply Quote 0
                      • IT-ADMINI
                        IT-ADMIN
                        last edited by

                        No Mr Scott
                        unfortunately if 192.168.2.x want to talk to 192.168.1.x the following will happen : 192.168.2.x hit pfsense then pfsense route into 10.10.10.x then 10.10.10.x hit 10.10.10.1 (gateway of the branch pfsense) then 10.10.10.1 forward the packet internally into 192.168.1.x
                        soooooorry if i was not clear

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @IT-ADMIN
                          last edited by

                          @IT-ADMIN said:

                          No Mr Scott
                          unfortunately if 192.168.2.x want to talk to 192.168.1.x the following will happen : 192.168.2.x hit pfsense then pfsense route into 10.10.10.x then 10.10.10.x hit 10.10.10.1 (gateway of the branch pfsense) then 10.10.10.1 forward the packet internally into 192.168.1.x
                          soooooorry if i was not clear

                          That's your issue. There is no connection for the voice traffic. There is no means for the SIP connections to set up your RTP connections. SIP does not carry any traffic itself, it just handles setting up the calls - which can cause a handset to ring. But once you pick up the call SIP hands the call over to RTP. But since you don't have a connection between the two sites to talk to each other, SIP has no way to tell RTP where to send the voice traffic.

                          You need a VPN tunnel from one site to the other. What you have is a VPN that is firewalled in the middle. VoIP isn't going to play nicely with that, there is no means of establishing the connection.

                          1 Reply Last reply Reply Quote 0
                          • IT-ADMINI
                            IT-ADMIN
                            last edited by

                            so what i understand is: i should configure pfs to forward VOIP traffic to it destination without any NATing,

                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @IT-ADMIN
                              last edited by scottalanmiller

                              @IT-ADMIN said:

                              so what i understand is: i should configure pfs to forward VOIP traffic to it destination without any NATing,

                              That doesn't work easily. VoIP is not a "forwarding" thing because you can't easily define the ports or the end points. Have you no means of creating a direct tunnel opening the two networks? That will make things a LOT easier. Plus faster.

                              If you HAVE to, yes, you can forward SIP and UDP 10,000 - 20,000 ports to your PBX and often this will work. But double NATing inside of your own network is going to be a continuous issue.

                              1 Reply Last reply Reply Quote 0
                              • IT-ADMINI
                                IT-ADMIN
                                last edited by

                                i'm very appreciated really
                                thanks alot for your time
                                i will try my best to get that done

                                see you again soon

                                best regard

                                1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller
                                  last edited by

                                  Good luck 🙂

                                  By far the easiest option will be to create a direct tunnel.

                                  NetworkNerdN 1 Reply Last reply Reply Quote 0
                                  • NetworkNerdN
                                    NetworkNerd @scottalanmiller
                                    last edited by

                                    @scottalanmiller said:

                                    Good luck 🙂

                                    By far the easiest option will be to create a direct tunnel.

                                    This is the way to go for sure. I can tell you I am running 4 sites (soon to be 5) from a single PBX at my main site, so if you're able to follow Scott's advice above, it can work very, very well for you. All of my sites are in the same metro area, and each remote site is connected via site-to-site vpn back to the main site. We have QoS configured at every firewall. And we do not filter / inspect SIP traffic as that can cause you a world of hurt.

                                    Lost_Signal773L 1 Reply Last reply Reply Quote 0
                                    • Lost_Signal773L
                                      Lost_Signal773 @NetworkNerd
                                      last edited by

                                      @NetworkNerd I'd like to point a few things. 1

                                      1. QoS over the internet means nothing. Your carrier is not going to respect your tags unless its on a P2P or MPLS circuit.
                                      2. Your carrier can't read tags on traffic if you encrypt it all together.
                                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                                      • Lost_Signal773L
                                        Lost_Signal773
                                        last edited by

                                        Wrapping real time UDP based protocals with TCP is in general a waste of bandwidth (your going to retransmit data that will actually make the quality worse if it is processed out of order).

                                        scottalanmillerS 1 Reply Last reply Reply Quote 1
                                        • scottalanmillerS
                                          scottalanmiller @Lost_Signal773
                                          last edited by

                                          @Lost_Signal773 said:

                                          Wrapping real time UDP based protocals with TCP is in general a waste of bandwidth (your going to retransmit data that will actually make the quality worse if it is processed out of order).

                                          Yeah, not a good idea.

                                          1 Reply Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller @Lost_Signal773
                                            last edited by

                                            @Lost_Signal773 said:

                                            @NetworkNerd I'd like to point a few things. 1

                                            1. QoS over the internet means nothing. Your carrier is not going to respect your tags unless its on a P2P or MPLS circuit.

                                            No, but QoS before it hits the Internet does the majority of what most people need. It is normally your own WAN link that is the choke point, not the open Internet. If it was, nothing we expect to work would work.

                                            NetworkNerdN 1 Reply Last reply Reply Quote 1
                                            • 1
                                            • 2
                                            • 3
                                            • 1 / 3
                                            • First post
                                              Last post