Preview only show first 10 pages with watermark. For full document please download

Video Conference Endpoint Firewall Configuration

   EMBED


Share

Transcript

Video conference endpoint Firewall Configuration In order to effectively use all the functionality offered by Ubiety, certain network access requirements are needed for user devices (tablets, smartphones, laptops, etc), video (VTC) endpoints and Microsoft Lync Deployments. This is especially important for secured environments that have outbound traffic restriction policies on their networks. This guide assumes standard ports are being used on your unit. Please adjust if customizations have been made. This guide assumes that all outbound IP has been allowed from the video endpoint to the internet for call setup and media traversal to enable calls both to the endpoint and from the endpoint to Ubiety. If you are using an endpoint not listed here, please contact support for help sourcing instructions and testing your endpoint. General Firewall Configuration for Ubiety In order to effectively use all the functionality offered by Ubiety, certain network access requirements are needed for user devices (tablets, smartphones, laptops, etc), video (VTC) endpoints and Microsoft Lync Deployments. This is especially important for secured environments that have outbound traffic restriction policies on their networks. These are generic rules that will work with the majority of manufacturers and models. We have provided more specific requirements for individual manufacturers if a reduced range of ports specific to your situation are desired. Type Protocol H.323 TCP/1720 Source 174.36.253.44 208.43.236.162 159.8.240.22 Destination Your endpoint Comments H.323 Call setup (Q.931 call Setup) SIP 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint SIP TCP (unencrypted) and SIP TLS (encrypted) Call Setup 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint RTP Media – audio and video streams Must be bi-directional TCP/5060-5061 H.323 UDP/1024-65000 SIP Cisco Telepresence Endpoints (incl. Tandberg) For Cisco Telepresence and Tandberg endpoints, the following firewall configuration is required in your environment. Please ensure endpoints using NAT to access the internet are configured correctly. See here for more details. Type Protocol H.323 TCP/1720 Source 174.36.253.44 208.43.236.162 159.8.240.22 Destination Your endpoint Comments H.323 Call setup (Q.931 call Setup) H.323 TCP/15000-19999 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint H.323 call setup (Q 931 / H.225 Signaling) SIP 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint SIP TCP (unencrypted) and SIP TLS (encrypted) Call Setup 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint RTP Media – audio and video streams Must be bi-directional TCP/5060-5061 H.323 UDP/50000-54999 SIP Polycom HDX, VSX + Group Series Endpoints For Polycom HDX, VSX and Group series endpoints, the following firewall configuration is required in your environment. Please ensure endpoints using NAT to access the internet are configured correctly. See here for more details. Type Protocol H.323 TCP/1720 Source 174.36.253.44 208.43.236.162 159.8.240.22 Destination Your endpoint Comments H.323 Call setup (Q.931 call Setup) H.323 TCP/3230-3243 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint H.323 call setup (Q 931 / H.225 Signaling) SIP TCP/5060-5061 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint SIP TCP (unencrypted) and SIP TLS (encrypted) Call Setup H.323 UDP/3230-3285 SIP 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint RTP Media – audio and video streams Must be bi-directional Lifesize Endpoints For Lifesize endpoints, the following firewall configuration is required in your environment. This assumes you do not have a Lifesize Cloud / Clearsea registration. If this is the case, no rules are required, clearsea will perform traversal. Please ensure endpoints using NAT to access the internet are configured correctly. See more here for icon and here for express/team/passport. Type Protocol H.323 TCP/1720 Source 174.36.253.44 208.43.236.162 159.8.240.22 Destination Your endpoint Comments H.323 Call setup (Q.931 call Setup) SIP 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint SIP TCP (unencrypted) and SIP TLS (encrypted) Call Setup 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint RTP Media – audio and video streams Must be bi-directional TCP/5060-5061 H.323 UDP/ 60000-64999 SIP Avaya Radvision Endpoints For Radvision Scopia and XT endpoints, the following firewall configuration is required in your environment. Please ensure endpoints using NAT to access the internet are configured correctly. See here for more details. Type Protocol H.323 TCP/1720 Source 174.36.253.44 208.43.236.162 159.8.240.22 Destination Your endpoint Comments H.323 Call setup (Q.931 call Setup) H.323 TCP/3230-3248 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint H.323 call setup (Q 931 / H.225 Signaling) SIP TCP/5060-5061 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint SIP TCP (unencrypted) and SIP TLS (encrypted) Call Setup SIP TCP/5070 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint BFCP - video content (presentation) signaling. Must be bi-directional 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint RTP Media – audio and video streams Must be bi-directional H.323 UDP/3230-3305 SIP InFocus Mondopad Endpoints For Mondopad endpoints, the following firewall configuration is required in your environment. Note this is not a configuration guide for sharing or annotation features, please see the InFocus guide for more comprehensive details. Please ensure endpoints using NAT to access the internet are configured correctly. See here for more details. Type SIP Protocol TCP/5060-5061 Source 174.36.253.44 208.43.236.162 159.8.240.22 Destination Your endpoint Comments SIP TCP (unencrypted) and SIP TLS (encrypted) Call Setup SIP UDP/ 25000-35000 174.36.253.44 208.43.236.162 159.8.240.22 Your endpoint RTP Media – audio and video streams Must be bi-directional