Session Border Controller for UC Mobility

Similar documents
How to Install an Ingate E-SBC in Stand-alone Firewall mode or DMZ / LAN mode for an Aastra Teleworker Solution.

Spectrum Enterprise SIP Trunking Service NEC Univerge SV8100 IP PBX Configuration Guide

Spectrum Enterprise SIP Trunking Service NEC Univerge SV9100 IP PBX Configuration Guide

Application Note Configuration Guide for ShoreTel and Ingate

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide

SV9100 SIP Trunking Service Configuration Guide for Cable ONE Business

Application Note. Microsoft OCS 2007 Configuration Guide

Application Note Asterisk BE with SIP Trunking - Configuration Guide

Startup Tool TG - Getting Started Guide

Application Note Configuration Guide for ShoreTel and Ingate with PAETEC

Ingate Firewall & SIParator Product Training. SIP Trunking Focused

Application Note Asterisk BE with Remote Phones - Configuration Guide

Application Note Startup Tool - Getting Started Guide

Configuration Guide. For Use with AT&T s. IP Flexible Reach-Enhanced Features Service

Configuration Guide for Integration of Spectralink PIVOT with UNIVERGE 3C

Configuration Guide For Use with AT&T s IP Flexible Reach Service. Version 1/Issue 7. July 30, 2008

Configuration Guide. Ingate SIParator /Firewall E-SBC with Microsoft Office 365 Unified Messaging (UM)

Application Note. Ingate SIParator/Firewall for Remote Users in a Multitenant environment with

Installation & Configuration Guide Version 4.0

Following configurations are needed regardless of the recording technology being used.

ThinkTel ITSP with Registration Setup

: Microsoft. Updated : 7/24/2009 READ THIS BEFORE YOU PROCEED

NEC: SIP Trunking Configuration Guide V.1

ShoreTel, Ingate & Rogers Communications for SIP

v2.0 September 30, 2013

Abstract. Avaya Solution & Interoperability Test Lab

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1

Broadvox Fusion Platform Version 1.2 ITSP Setup Guide

FRAFOS ABC-SBC Generic SIP Trunk Integration Guide for ShoreTel 14.2

CUCM XO SIP Trunk Configuration Guide

Cisco Unified Communications Manager Trunks

Fusion360: Static SIP Trunk Programming Guide

MITEL SIP CoE Technical. Configuration Note. Configure Mitel MiVoice Office 6.1 SP1 PR2 for use with IntelePeer SIP Trunking. SIP CoE XXX

Draft Version. Setup Reference guide for KX-HTS Series (Tested with HTS32 Version 1.5) Peoplefone SIP Trunk service with External Router

EarthLink Business SIP Trunking. Shoretel IP PBX Customer Configuration Guide

Spectrum Enterprise SIP Trunking Service ShoreTel Shoregear 90 R14.2 Build (with Ingate SIParator) IP PBX Configuration Guide

ShoreTel IPPBX with InGate SIParator version 14.2

EarthLink Business SIP Trunking. Toshiba IPEdge 1.6 Customer Configuration Guide

Abstract. Avaya Solution & Interoperability Test Lab

Configure MiVoice Office SP1 with MBG for use with TelNet Worldwide SIP trunk services

EarthLink Business SIP Trunking. Allworx 6x IP PBX SIP Proxy Customer Configuration Guide

Network Configuration Guide

DMP 128 Plus C V DMP 128 Plus C V AT

Unofficial IRONTON ITSP Setup Guide

SBC Site Survey Questionnaire Forms

Spectrum Enterprise SIP Trunking Service NEC UNIVERGE 3C IP PBX Configuration Guide

EarthLink Business SIP Trunking. ShoreTel 14.2 IP PBX Customer Configuration Guide

Application Notes for Configuring EarthLink SIP Trunk Service with Avaya IP Office using UDP/RTP - Issue 1.0

Patton Electronics Co Rickenbacker Drive, Gaithersburg, MD 20879, USA tel: fax:

One-Voice Resiliency with SIP Trunking

Abstract. Avaya Solution & Interoperability Test Lab

Application Notes for Configuring CenturyLink SIP Trunking with Avaya IP Office Issue 1.0

Multiline Client (MLC) for BYOD

Smart IAD. User s Guide

Abstract. Avaya Solution & Interoperability Test Lab

TT11 VoIP Router 1FXS/1FXO TA User Guide

Connecting IP-PBX to BroadSoft's BroadCloud SIP Trunk using AudioCodes Mediant SBC

SBC Edge 2000 V5.0.1 IOT Skype for Business 2015 Intermedia SIP Trunk Application Notes

CCS-UC-1 SIP Endpoint with ShoreTel Connect System Configuration Guide Crestron Electronics, Inc.

Allstream NGNSIP Security Recommendations

2015/04/13 11:41 1/22 UNIVERGE 3C

Draft Version. Setup Reference guide for KX-HTS Series (Tested with HTS824 Version 1.5) LCR SIP Trunk service with Built-in Router

Draft Version. Setup Reference guide for KX-HTS Series (Tested with HTS32 Version 1.5) VozTelecom SIP Trunk service with Built-in Router

2018/05/18 23:05 1/2 UNIVERGE 3C

Application Notes for TelStrat Engage Record Version 3.3 with Avaya Business Communication Manger Release 6.0 VoIP Recording Issue 1.

SBC Configuration Examples for Mediant SBC

Circuit #1 - PTC Lab Reference Circuit.

SBC Configuration Examples

Broadvox Fusion SIP Trunks Configuration Guide PBX Platform: KX-TDA50

Configuration Guide. for. Sipera IPCS 210/310/410/510 Version: 3.6. with. Nortel Communication Server 1000 Release 5.5

Installation & Configuration Guide Version 1.6

Application Notes for Configuring Computer Instruments e-ivr, as a SIP endpoint, with Avaya IP Office 500 V2 Issue 1.0

What is SIP Trunking? ebook

EarthLink Business SIP Trunking. Asterisk 1.8 IP PBX Customer Configuration Guide

4 Port IP-PBX + SIP Gateway System

Remote User - Mediatrix SBC on the Edge

AudioCodes OVR with SIP Trunking

Technical Configuration Notes

Avaya PBX SIP TRUNKING Setup & User Guide

Cisco Unified IP Phone Settings

Application Note. ShoreTel / Ingate / Verizon Business SIP Trunking. 09 June 2017 Version 1 Issue 2

Describe the EdgeMarc s VoIP Survivability facility; how it works and how it is configured.

Remote User - Mediatrix SBC on the Edge

IP Office Platform R11.0

MiCollab Engineering Guidelines

INTERFACE SPECIFICATION SIP Trunking. 8x8 SIP Trunking. Interface Specification. Version 2.0

Abstract. Avaya Solution & Interoperability Test Lab

Cisco SPA Line IP Phone Cisco Small Business

SPA400 Internet Telephony Gateway with 4 FXO Ports

Abstract. Avaya Solution & Interoperability Test Lab

WAN. System Networking Lab Table 1

Configuration Note Windstream SIP Trunk & Genesys Contact Center using AudioCodes Mediant SBC

Draft Version. Setup Reference guide for KX-HTS Series (Tested with HTS824 Version 1.5) Netia SIP Trunk service with External Router

Page 2 Skype Connect Requirements Guide

Abstract. Avaya Solution & Interoperability Test Lab

Application Notes for Revolabs FLX UC 1000 with Avaya Aura Communication Manager and Avaya Aura Session Manager Issue 1.0

Application Notes for Configuring Fonolo In-Call Rescue with Avaya IP Office Server Edition using SIP Trunks Issue 1.0

Mitel SIP CoE Technical Configuration

Release Notes. DRG SW R2N33 Release Notes

Configuring Hosted NAT Traversal for Session Border Controller

Transcription:

Session Border Controller for UC Mobility Ingate SIParator Quick Setup Guide NEC NEC Corporation NDA-31663 Issue 1

Liability Disclaimer NEC Corporation of America reserves the right to change the specifications, functions, or features, at any time, without notice. NEC Corporation of America has prepared this document for the exclusive use of its employees and customers. The information contained herein is the property of NEC Corporation of America and shall not be reproduced without prior written approval from NEC Corporation of America. UNIVERGE is a registered trademark of NEC Corporation. All other brand names and product names referenced in this document are trademarks or registered trademarks of their respective companies. 2015 NEC Corporation of America Communications Technology Group

i Contents Configuring the Ingate SIParator SBC for MC550 1-1 Ingrate SIParator Test General Information............................ 1-1 Ingate Business Account......................................... 1-1 PBX & Session Border Controller (SBC) tested........................ 1-2 Conditions and Limitations........................................ 1-2 Net Configuration............................................... 1-3 Ingate SIParator Programming..................................... 1-4

ii Contents

iii Figures Figure Title Page 1-1 MC550 with Ingate SIParator NEC Test Lab Setup................. 1-3

iv Figures

1-1 1 Configuring the Ingate SIParator SBC for MC550 Ingate SIParator is a device that connects to an existing network firewall to seamlessly enable SIP Communications (Session Initiation Protocol). While traditional firewalls block SIP traffic, including missioncritical applications like Voice over IP, the SIParator resolves this problem by working in tandem with your current security solutions. Ingate SIParators are available in a range of models to meet the needs of the entire enterprise market. This guide will assist knowledgeable vendors with configuring the Ingate SIParator for MC550 use with the NEC SV8500/SV9500 Communications Server. It also provides sample entries for the required fields. Ingrate SIParator Test General Information For questions about software and hardware installation or other PBX configuration issues, refer to the corresponding SV8500 or SV9500 Data Programming Manual. These manuals can be downloaded from NEC's National Technical Assistance Center (NTAC) web site. You must have a valid dealer ID to access the documents. Ingate Business Account Contact your Ingate Business representative.

1-2 Configuring the Ingate SIParator SBC for MC550 PBX & Session Border Controller (SBC) tested a) SV8500 S8 4.19 & later b) SV9500 V1 4.19 & later c) MC550: 13.0.1073 & later d) VMWare ESXi: 5.5.0 e) Ingate SIParator: Software Firewall/SIParator 5.0.3 The above SV PBX system can be Appliance model/software model. NOTE Conditions and Limitations The Ingate SIParator provides for many different office environments. It can be set as a Stand-alone Session Border Controller (SBC), DMZ, DMZ/LAN, or WAN type, as well as being able to turn the Firewall mode on or off. The NEC MC550 testing performed was done using the SIParator as a Stand-alone SBC. The programming shown in this Quick Guide is for that configuration. For programming information and other documentation for the SIParator to use the SBC in a manner other than the basic Stand-alone, refer to Ingate's support site. On the SV8500 and SV9500 PBX, the Internal SIP Handler (InSIPH) does not support the RFC3261 Route set specifications. However, the Ingate looks for the Record Route (RR) information in the SDP Answer message before connecting media. As such, until RR support is provided by the InSIPH, the PBX must be set to include SDP in the INVITE to the MC550 station in the PCPro AUACL and AUACN commands. When assigning the AUACL or AUACN command with PCPro, it is recommended to use the following settings. The MC550 uses NEC MC550 as the User-Agent. Refer to the table below. CDN PARAM UAD 1 Register Expires 600 2 Multi-line Mode 0 3 Send INVITE with SDP (Note 1) 1 4 Hold Method 0 5 SIP-INFO 0 6 Send signal(*,#) of SIP-INFO 0 7 MWI 0 8 Name Display 1 9 Reject Unacceptable reinvite 0 10 Hold 2nd Call 0 11 Call Record Memory Clear 0 12 TONE[0] FE

Configuring the Ingate SIParator SBC for MC550 1-3 13 TONE[1] 7F 14 Nurse Call Display 0 15 Distinctive Ringing 0 16 Notice of URL 0 17 Notice of Connected Number 0 18 DNIS Notification of INVITE 0 19 DNIS and ANI Notification of INVITE 0 1. In the UC Mobility Installation Guide, it shows this parameter must be set to 0, but for the Ingate SBC connection only, this must be set to 1. NOTE Net Configuration Figure 1-1 MC550 with Ingate SIParator NEC Test Lab Setup Domain Controller DHCP, DNS, WINS 10.11.10.230 Voice Mail Server 10.11.10.232 x35700 Pilot # VMWare ESXi 5.5 10.11.10.246 SV9500 V01 4.19 LAN1 10. 11. 10.52 LAN2 10.11.10.50 SIPHandler 10.11.10.51 V-MGSIP SP-4058 01.05.00.00 LAN1 10.11.10.85 LAN2 10.11.50.79 SV8500 S/W: S8 04.19 LAN1 10.11.50.52 LAN2 10.11.50.50 SIPHandler 10.11.50.51 Switch 10.11.50.0 PBX Mgr / Wireshark 10.11.10.238 Ethernet 7x 8x 9x 10x 11x12x 7x 8x 9x 10x 11x 12x C 789101112 A 123456 1x 2x 3x A4x 5x 6x 1x 2x 3xB 4x 5x 6x Switch 10.11.10.0 ESXi Server Eth0 ESXi Server Eth1 Ethernet 7x 8x 9x 10x 11x 12x 7x 8x 9x 10x 11x 12x C 78910112 A 123456 1x 2x 3x A4x 5x 6x 1x 2x 3x B4x 5x 6x ` Switch 10.11.50.0 is performing this router function. This is not a separate, stand-alone router GW 10.11.10.1 GW 10.11.50.1 Switch 10.11.20.0 GW 10.11.20.1 NEC MG-SIP MG-SIP128 (on SV8500) SP-4058 01.05.00.00 LAN 1: 10.11.50.85 Ethernet 7x 8x 9x 10x 11x 12x 7x 8x 9x 10x 11x 12x C 78910112 A 123456 1x 2x 3x 4x 5x 6x 1x 2x 3x 4x 5x 6x A B NEC ITL Phone x35000 10.11.20.203 NEC ITL Phone NEC ITL Phone x35001 (ITL-32D-1) 10.11.20.204 x65000 10. 11.20.202 STATIONS: 3xxxx registered to SV 8500 6xxxx registered to SV 9500 NEC ITL Phone x67000 10.11.20.202 Ingate SIParator (v5.0.3) VMWare ESXi 5.5.0 10.11.10.10 MC550 x65058 10.11.70.196 65058 @MC550 a.sv8500 bc.prv ESXi Server Eth0 ESXi Server Eth1 Ethernet 7x 8x 9x 10x 11x 12x 7x 8x 9x 10x 11x 12x C 789101112 A 123456 1x 2x 3x A4x 5x 6x 1x 2x 3x B4x 5x 6x Switch/GW 10.11.70.0

1-4 Configuring the Ingate SIParator SBC for MC550 Ingate SIParator Programming There are numerous screens in the SIParator Web GUI for programming. The information below shows only those screens or partial screens where data was changed from the default setting. The programming steps shown below assume you have already performed the basic installation. Refer to Ingate's document Ingate SIParator /Firewall for Virtual Machines for the initial installation that will enable you to use the SIParator Web GUI to set the following data. Step 1 Step 2 Basic Configuration section > Basic Configuration tab > Policy For Ping To the SIParator: The default data is to never reply to ping. It is recommended to set this to reply to ping to all IP addresses during installation. Once installation is completed and the SIParator Session Border Controller (SBC) is operating correctly, you can change this setting so the SBC does not reply to all pings. Basic Configuration section > Basic Configuration tab > DNS Servers: Input the IP Address of the DNS server the SBC should use if needed.

Configuring the Ingate SIParator SBC for MC550 1-5 Step 3 Step 4 Basic Configuration section > Access Control tab > Configuration Transport: Assign the server Ethernet port that is used to access the SBC via HTTP. This parameter will have data assigned from your initial installation in order for you to be using the Web GUI. However, some changes you may make in the Networks Section will void this setting, and you will need to come back here and select the new setting. For example, if this is currently showing the data/name of Ethernet Port 0, and you change the Name at Step 11 below, you will need to come back here and select the new setting. Basic Configuration section > Access Control tab > Configuration Transport: Assign the server Ethernet port that is used to access the

1-6 Configuring the Ingate SIParator SBC for MC550 SBC via SSH. For our example, we assigned the WAN port to be able to access the SBC via SSH. NOTE The HTTP, HTTPS, and SSH fields allow only a single server Ethernet connection, each to be assigned for programming access. We recommend assigning at least two of these protocols for access and use different server Ethernet connections. If you assign HTTP only and that server hardware port becomes defective, you have no way to program the SBC to use another server hardware port, even if the server is equipped with more than two Ethernet connections. Best practice would be to have three or more Ethernet connections where you initially have two for the LAN/WAN connections and use the 3rd as another internal network connection and set that as HTTPS or SSH. That way, no programming access ability is set on the WAN side. Step 5 Step 6 Basic section > Access Control tab > Configuration Allowed Via Interface: This field shows the server's Ethernet ports SIParator discovered during the initial Virtual Machine installation of the SIParator software. While the Active/Inactive state of the Ethernet ports are set in the Network section under the corresponding Eth# tab, this parameter shows you the last state set and allows you to change it. You don't want to set your SBC programming to a Ethernet connection you forgot to turn on. Basic section > Access Control tab > Configuration Computers: Assign the IP address (IPA) of the computer(s) allowed to program the SBC. In our example, we set to allow all IPAs to use both the HTTP & SSH protocols. This is okay for initial setting for getting the SBC up and running. However, it is recommended to fine-tune this setting after everything is working. For better security, you may want to allow only one or two specific IPAs for the different Ethernet connections you assigned in this section. If the HTTP, HTTPS, and/or SSH are on different networks, you can click on Add new rows to add different IPA access entries for those protocols. Step 7 Basic Configuration section > SIParator Type tab > Type of SIParator: No default data changes were made here; just wanted to point out where you would go to change the functionality of the SIParator SBC. It can be set as Stand-alone, DMZ, DMZ/LAN, or WAN type, as well as being able to turn the Firewall mode on or off.

Configuring the Ingate SIParator SBC for MC550 1-7 Step 8 Network section > Networks and Computers tab > Networks and Computers: Networks and Computers are assigned here. What we show

1-8 Configuring the Ingate SIParator SBC for MC550 is more than you may require, and is more than the testing required. However, in case you use your SBC for more than the Stand-alone Mode with MC550, it is a good idea to see how this area can be set up. Some parameters in this SBC allow an item to be entered once so you group items to only need a single entry. For example, the Dot(xx)nw" networks may be set to use different Interfaces but you need to assign them within the same surrounding. By grouping them all under LAN, you can use LAN as the entry for those parameters. If those Dot(xx)nw networks use the same Interface and you are allowing all endpoints on those subnets, like shown in the example, they all could have made as a single entry with the Lower Limit set to 10.11.10.0, and the Upper Limit set at 10.11.50.255. The PBX Internal SIP Handle (InSIPH) is listed separately, even though the 10.11.10.0-10.11.10.255 is already defined; so that if we want to set any parameters specifically for the InSIPH that we may not want to apply across the entire subnet, we can use InSIPH or its IPA in those parameters instead of LAN or Dot10nw. Keep in mind that this document is just a quick guide to get your Ingate SIParator working for the MC550. It does not go through all the details of how the SBC can be used or how to set its security controls tighter. Refer to the Ingate Support site where there are numerous How to guides tailored to specific areas of installation and functionality of the SIParator. Step 9 Network section > Default Gateways tab > Main Default Gateways: Assign the default gateway on the WAN side of the SBC and the Interface that is used to get there. For our example, the DMZ is on the 10.11.70.0 network (as assigned under the Network and Computers tab, with Eth1 set with an IPA 10.11.70.2 (this will be assigned under the Eth1 tab). The gateway for that subnet is 10.11.70.1. As such, 10.11.70.1 is assigned here.

Configuring the Ingate SIParator SBC for MC550 1-9

1-10 Configuring the Ingate SIParator SBC for MC550 Step 10 Step 11 Step 12 Network section > Eth0 tab > General: Assign the Name you want for this Interface and set to Active if it is to be active. You can also leave the default name of Ethernet0. For our example, we called Eth0 Inside, so that we know that server interface connects to the internal network. Back at Step 8, you can see under the Interface/VLAN column it is easy to see what Networks and Computers were assigned to the Inside (Internal) or Outside (External) interfaces. Network section > Eth0 tab > Directly Connected Networks: Assign the name and IPA for this interface of the SBC. If selecting DHCP under the Address Type field, do not assign data in the DNS Name or IP Address field. For our example, we chose SBC LAN just to make it easier to know we are referring to the internal network side of the SBC. If you refer back to Step 3 you can see how this made it easy to know what we were choosing for our HTTP access. Note that if you make any changes here, you will need to go back to Step 3 (and or Step 4) to select the new entry if you assigned this interface for HTTP, HTTPS, or SSH access. Network section > Eth0 tab > Static Routing: Assign the networks that are accessed through this side of the SBC but are not directly connected (direct of via VLAN). You must tell the SBC the IPA of the gateway/router that information for those networks are to be sent to. For our example, only the 10.11.10.0 network is directly connected. The other internal networks can only be accessed through the 10.11.10.1 gateway.

Configuring the Ingate SIParator SBC for MC550 1-11

1-12 Configuring the Ingate SIParator SBC for MC550 Step 13 Step 14 Step 15 Network section > Eth1 tab > General: Assign the Name you want for this Interface and set to Active if it is to be active. You can also leave the default name of Ethernet1. For our example, we called Eth1 Outside so that we know that server interface connects to the external network. Back at Step 8, you can see under the Interface/VLAN column it is easy to see what Networks and Computers were assigned to the Inside (Internal) or Outside (External) interfaces. Network section > Eth1 tab > Directly Connected Networks: Assign the name and IPA for this interface of the SBC. If selecting DHCP under the Address Type field, do not assign data in the DNS Name or IP Address field. For our example, we chose SBC WAN just to make it easier to know we are referring to the internal network side of the SBC. If you refer back to Step 4 you can see how this made it easy to know what we were choosing for our SSH access. Note that if you make any changes here, you will need to go back to Step 4 (and or Step 3) to select the new entry if you assigned this interface for HTTP, HTTPS, or SSH access. Network section > Eth1 tab > Static Routing: Data you assigned in Step 9 will already be shown here. If there are networks that are accessed through this side of the SBC, but must use a different gateway, you must tell the SBC the IPA of the gateway/router that information for those networks is to be sent to.

Configuring the Ingate SIParator SBC for MC550 1-13 Step 16 Step 17 SIP Services section > Basic tab > SIP Module: Enable the SIP Module of the SBC. SIP Services section > Basic tab > SIP Media Port Range: If needed, change the port range the SBC should use for SIP Media streams. Default is 58024-60999.

1-14 Configuring the Ingate SIParator SBC for MC550 Step 18 SIP Services section > Interoperability tab > Remove Via Headers: Assign the SV8500/SV9500 Internal SIP Handler (InSIPH) IPA.

Configuring the Ingate SIParator SBC for MC550 1-15 Step 19 SIP Services section > Interoperability tab > URI Encoding: The default data is Always encrypt URIs. Change this to Use registration. Step 20 SIP Services section > Interoperability tab > Remove Headers in 180 Responses: The current SV8500/SV9500 Internal SIP Handler (InSIPH) does not support the Route set specification of RFC3261. Select Remove Record-Route and Contact headers in 180 responses.

1-16 Configuring the Ingate SIParator SBC for MC550 Step 21 SIP Services section > Interoperability tab > Keep User-Agent Header When Acting as B2BUA: Select Keep existing User-Agent header.

Configuring the Ingate SIParator SBC for MC550 1-17 Step 22 Step 23 SIP Services section > Interoperability tab > Force username in registered Contact: Select Yes. SIP Services section > Interoperability tab > Hide our Record-Route header: Select Add new rows and enter the address of the InSIPH.

1-18 Configuring the Ingate SIParator SBC for MC550 Step 24 Step 25 SIP Services section > Sessions and Media tab > Session Configuration: The default is 14400 seconds. We used 180 for testing but you may want to set this to 1800. SIP Services section > Sessions and Media tab > Media Configuration: The default is Lock IP address and port to first sender. Change this to Allow multiple sender IP addresses and ports.

Configuring the Ingate SIParator SBC for MC550 1-19 Step 26 SIP Services section > Sessions and Media tab > Detect codec changes: The default is Detect only changes to the first payload type listed. Change this to Detect changes to all payload types (except dynamic).

1-20 Configuring the Ingate SIParator SBC for MC550 Step 27 Step 28 Step 29 SIP Services section > Remote SIP Connectivity tab > Remote NAT Traversal: Enable Remote NAT Traversal SIP Services section > Remote SIP Connectivity tab > NAT keepalive method: Default is Use both OPTIONS and short registration timers. This causes the phones to re-register every 40 seconds (or whatever value is assigned for NAT timeout for UDP ) as the keepalive/heartbeat. That creates triple the amount of keepalive messages than just using the OPTIONS messages as the heartbeat. SIP Services section > Remote SIP Connectivity tab > Media Route: Default is Route media directly between clients behind the same NAT. Select Always route media through the SIParator.

Configuring the Ingate SIParator SBC for MC550 1-21 Step 30 Step 31 SIP Services section > Remote SIP Connectivity tab > Unconditional NAT Traversal: Default is Only use Remote NAT Traversal when the client looks NATed. Select Always use Remote NAT Traversal. SIP Services section > Remote SIP Connectivity tab > Unconditional NAT Traversal Interfaces: Select Add new rows and choose your Outside/WAN connection. Step 32 SIP Traffic section > Filtering tab > Default Policy For SIP Requests: Default is Local only. Select Process all.

1-22 Configuring the Ingate SIParator SBC for MC550 Step 33 SIP Traffic section > Routing tab > DNS Override For SIP Requests: This is where the SBC is told to relay messages from the Domain MC550a.SV8500bc.prv to the InSIPH. No need to do a DNS Lookup.

For additional information or support on this NEC Corporation product, contact your NEC Corporation representative.

NEC NEC Corporation Ingate SIParator Quick Guide for MC550 NDA-31663, Issue 1