ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Solved Elastix: phones lose registration

    IT Discussion
    freepbx elastix centos
    6
    46
    11.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JaredBuschJ
      JaredBusch
      last edited by

      @g.jacobse said:

      Confirmed. Switch as the other end of the VPN.

      Change the phones to use some port other than 5060 for the SIP registration.
      Make sure they are all different as you cannot reuse the same port behind a NAT and this issue is looking to me like that.

      coliverC 1 Reply Last reply Reply Quote 0
      • JaredBuschJ
        JaredBusch
        last edited by

        Well, that or make who ever runs the network figure out what is happening on their side.

        scottalanmillerS 1 Reply Last reply Reply Quote 1
        • coliverC
          coliver @JaredBusch
          last edited by

          @JaredBusch said:

          @g.jacobse said:

          Confirmed. Switch as the other end of the VPN.

          Change the phones to use some port other than 5060 for the SIP registration.
          Make sure they are all different as you cannot reuse the same port behind a NAT and this issue is looking to me like that.

          Would the usage of a STUN server solve this issue?

          scottalanmillerS JaredBuschJ 2 Replies Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @JaredBusch
            last edited by

            @JaredBusch said:

            Well, that or make who ever runs the network figure out what is happening on their side.

            That is proving difficult.

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @coliver
              last edited by

              @coliver said:

              Would the usage of a STUN server solve this issue?

              Should not be any NAT.

              JaredBuschJ 1 Reply Last reply Reply Quote 0
              • JaredBuschJ
                JaredBusch @coliver
                last edited by

                @coliver said:

                @JaredBusch said:

                @g.jacobse said:

                Confirmed. Switch as the other end of the VPN.

                Change the phones to use some port other than 5060 for the SIP registration.
                Make sure they are all different as you cannot reuse the same port behind a NAT and this issue is looking to me like that.

                Would the usage of a STUN server solve this issue?

                Yes, but you would have to set one up internally as they obviously have everything inside the VPN.

                1 Reply Last reply Reply Quote 0
                • JaredBuschJ
                  JaredBusch @scottalanmiller
                  last edited by

                  @scottalanmiller said:

                  @coliver said:

                  Would the usage of a STUN server solve this issue?

                  Should not be any NAT.

                  Should not be any NAT, but it sure is acting like it if everything is reporting the same MAC.

                  DashrenderD 1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller
                    last edited by

                    Yeah, that is very fishy.

                    1 Reply Last reply Reply Quote 0
                    • gjacobseG
                      gjacobse
                      last edited by

                      Statement I was given regarding the MACs

                      ...as an aside, this has nothing to do with the, or any, firewall.  This is normal layer2/layer3 handoff in any network...
                      
                      1 Reply Last reply Reply Quote 0
                      • NetworkNerdN
                        NetworkNerd
                        last edited by

                        To give background here, the Fortigate has a Juniper L3 switch connected to it. Supposedly the config on that guy has not changed, but I don't think we really know.

                        1 Reply Last reply Reply Quote 0
                        • DashrenderD
                          Dashrender @JaredBusch
                          last edited by Dashrender

                          @JaredBusch said:

                          @scottalanmiller said:

                          @coliver said:

                          Would the usage of a STUN server solve this issue?

                          Should not be any NAT.

                          Should not be any NAT, but it sure is acting like it if everything is reporting the same MAC.

                          Is that right? Wouldn't you always loose the originating MAC if you go through a router of any kind? i.e. a VPN?

                          JaredBuschJ 1 Reply Last reply Reply Quote 0
                          • JaredBuschJ
                            JaredBusch @Dashrender
                            last edited by

                            @Dashrender said:

                            Is that right? Wouldn't you always loose the originating MAC if you go through a router of any kind? i.e. a VPN?

                            It depends on the VPN. It can easily bridge at either Level 2 or Level 3. One will let everything pass through, the other would show the MAC form the bridge. Either way, as long as there is no NAT, it should not interfere. That is true.

                            Just the description of the problem fits more to a NAT scenario.

                            1 Reply Last reply Reply Quote 0
                            • gjacobseG
                              gjacobse
                              last edited by

                              Speaking with a 3rd party network tech who is one site. We have three phones aren't connecting - turns out that one of the POE ports was bad...

                              One is bad,.. more is likely. replace the switch!

                              1 Reply Last reply Reply Quote 1
                              • gjacobseG
                                gjacobse
                                last edited by

                                Looks like more than one port is bad as far as POE goes.

                                got down to it being either the phone itself or the port, but ports were 'testing' okay. Defaulted the three phones that were missing and they now have IP addresses where we can get to them and program them.

                                Sad news is that during all this,.. they broke the VPN and we can't get in.

                                Interestingly on that note, they have a Fortigate 60D at that site. they can't update the firmware to do the testing they need. Hmm.. Firmware update failed... make you wonder.

                                Glad to see we didn't lose three phones though. Losing a port on the Juniper is bad enough (just the POE side it seems)... but still.

                                1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller
                                  last edited by

                                  Wow, on a high end Juniper switch? That's more bad ports on a single Juniper than I've seen first hand on decades of use of Netgear!

                                  1 Reply Last reply Reply Quote 0
                                  • 1
                                  • 2
                                  • 3
                                  • 3 / 3
                                  • First post
                                    Last post