Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Remote Users Voice Issues 2

Status
Not open for further replies.

robspwing

IS-IT--Management
Oct 29, 2008
232
US
Thanks in advance. I am running the IPO 500 Manager 6.2 (14).
IPO = 4.2(14), Voice Mail Pro.

My remote users connect via VPN (Cisco) and then they log into their Phone Manager Softphone.

The problem that all of them (3 right now) are stating is this: (names have been changed to protect the identity of the Avaya victim)

"Billy Jean just tried to call me. I couldn't hear her. I called her back and don't think she could hear me. Ive had a couple of voice mails interrupt me while I was leaving a message stating that either I was not speaking or they could not hear me."

Any ideas?



Rob

Doc, we better back up. We don't have enough road to get up to 88.
 
FYI...I did "reboot" the Avaya IPO 500 over the weekend..still the same issue.

Rob

Doc, we better back up. We don't have enough road to get up to 88.
 
Further troublshooting seems to be that the remote users' incoming calls are okay, it is only outgoing calls that the person they are calling cannot hear them.

Rob

Doc, we better back up. We don't have enough road to get up to 88.
 
Do you have allow direct media path ticked on the Extn for the softphone user? :)

ACS - IP Office Implement

"What the Crocodile Hat....was that?
 
No. Should that only be checked for my remote users?

Rob

Doc, we better back up. We don't have enough road to get up to 88.
 
No, leave it unchecked, having it on causes issues like this that's all. Do you have a suitable IP route in the system to allow traffic to the VPN router, have you removed the H323 fixups on the Cisco?



ACS - IP Office Implement

"What the Crocodile Hat....was that?
 
Thanks for the info amriddle01 --se below my questions to your questions

Do you have a suitable IP route in the system to allow traffic to the VPN router ---- Is this the Avaya system that you are referring to?



, have you removed the H323 fixups on the Cisco --- Is this from the Router, ASA(firewall), or switch?




Rob

Doc, we better back up. We don't have enough road to get up to 88.
 
IP route in the IP office, also I think you may need the following in you ASA box to stop it messing with the voice traffic:
policy-map global_policy
class inspection_default
no inspect h323 h225
no inspect h323 ras

ACS - IP Office Implement

"What the Crocodile Hat....was that?
 
Also I seem to remeber that HSM (another mamber) when using 4.2.14 had odd issues with H323 traffic, you may want to consider the latest 4.2 or R5 and see if that helps :)

ACS - IP Office Implement

"What the Crocodile Hat....was that?
 
on the ASA I have:

policy-map global_policy
class inspection_default


I don not have anything referencing

h323 h225
or
h323 ras



Rob

Doc, we better back up. We don't have enough road to get up to 88.
 
You need to add those entries, by adding them it removes the function (they used to be called fixups onm PIX) :)

ACS - IP Office Implement

"What the Crocodile Hat....was that?
 
What firmware does you ASA has? I needs to on 7.X

Configure Basic H.323 Inspection

By default, the configuration includes a policy that matches all default application inspection traffic and applies inspection to the traffic on all interfaces (a global policy). Default application inspection traffic includes traffic to the default ports for each protocol. You can only apply one global policy. Therefore, if you want to alter the global policy, for example, to apply inspection to non-standard ports or to add inspections that are not enabled by default, you need to either edit the default policy or disable it and apply a new one. For a list of all default ports, refer to the Default Inspection Policy.

1.Issue the policy-map global_policy command.

ASA5510(config)#policy-map global_policy
2.Issue the class inspection_default command.

ASA5510(config-pmap)#class inspection_default
3.Issue the inspect h323 command.

ASA5510(config-pmap-c)#inspect h323 h225
ASA5510(config-pmap-c)#inspect h323 ras


Avaya_Red.gif

___________________________________________
It works! Now if only I could remember what I did...

Dain Bramaged
___________________________________________
 
if the ASA comes with v8 ASA software (all the new ones ive had recently do) then all the inspect maps are off / no present. however, you still need to disable the global time outs of h323 and tcp / udp

set them to 0:00 then uncheck them. leaving them unchecked without zeroing out the time will leave them on their default timers.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top