General Router Setup and Configuration for the usage with the VoiceHost network
General Overview: Routers are typically the source of network issues related to the implementation of both our SIP trunks and our Cloud Platform. To ensure a network remains reliable, we recommend using the Technicolor TG582n TG589vn or TG588 for small office setups (<5 phones) and the Mikrotik range of routers (RouterOS) for deployments >10 phones or office setups requiring dual-WAN capabilities.
NOTE: The TG582n may not be suitable for PBX deployment due to difficulties port-forwarding to the PBX.
Most routers do not prioritise VoIP traffic (the Technicolor routers do this properly). Further to this, some routers actively disrupt the traffic coming through them, which further inhibits the phones' abilities to correctly route VoIP traffic. In addition, without prioritization of VoIP traffic on transmission, other devices on the network which use the available bandwidth may cause a drop in call quality. The settings below should be taken as a guide to configuring 3rd party routers. However, we cannot guarantee the success of these 3rd party routers, even when configured to have the settings below. If problems persist after these changes, we advise purchasing a recommended router.
"Free" routers provided by other ISPs may be either locked down to only their internet service or still accessible by them (meaning they can see everything you use it for). It also means that they can update it at any time, thereby resetting the main settings used to process VoIP packets. It is highly recommended to change it, even if the model number is the same.
General Router and Firewall Settings:
- Disable SIP ALG
- Disable SPI Firewall
- Enable SIP Transformations (specific to Sonicwall)
- Disable Consistent NAT (Specific to Sonicwall)
- White-list our IPv4 addresses (Telephony Users Only - See Here
- Update Firmware to latest recommended version based upon hardware
- Do NOT open port 5060 (or the RTP ports) to any internet-based traffic (i.e. WAN links) unless you are explicitly filtering on the firewall or PBX based upon the public IP addresses of the platform. This is how SIP scanners identify systems to attempt to compromise them!
(Recommended and Supported)
(Limited Support - Firmware update required / SIP-ALG MUST BE DISABLED/Not Supported)
(Broken for SIP usage on tested firmware)
|Technicolor TG582n and TG589n (IPv6 compliant)||2013/14||Zyxel Range (AMG1302 Tested)||2017||Netgear DGN1000 (aka N150 ADSL2+) - INCOMING CALL FUNCTIONALITY BROKEN||2016|
|Technicolor TG588v (IPv6 compliant)||2017||Draytek Vigor Series (Update Firmware & uncheck 'accept large fragmented UDP packets' within router settings)||2014||Netgear WNR1000 (aka N150 cable) - INCOMING CALL FUNCTIONALITY BROKEN||2016|
|Mikrotik Routers (RouterOS based devices)||2017||PfSense (see additional help article)||2015||Sky Hub||2018|
|Cisco RV042(G) / RV082 / RV016 / RV110W / RV180W / RV320 (All IPv6 compliant)||2015||WatchGuard (see additional help article)||2015|
|Cisco Integrated Services Routers (1900/2900/3900 series)||2015||Routers with VoIP DD-WRT/Tomato firmware||2013|
|Virgin Media SuperHub (stealth-update of the firmware by the ISP can break some settings)||2015|
|BT HomeHub or BusinessHub (stealth-update of the firmware by the ISP can break some settings)||2015|
|O2/Be Routers (stealth-update of the firmware by the ISP can break some settings)||2015|
|Netgear DG834(g) | DGN2000 | DGN3500 | WNR2000||2016|
|TalkTalk (D-link) (stealth-update of the firmware by the ISP can break some settings)||2014|
|ASUS (DSL-N16 & ASUS DSL-AC55U Tested) - Disable SIP-ALG by enabling SIP PASSTHROUGH under WAN settings)||2016|
|Vyatta & Brocade (Disable SIP-ALG)||2016|
|Huawei HG633 (TalkTalk Super Router) - (Disable SIP-ALG)||2017|
|Sky Hub (SIP-ALG cannot be disabled so TLS must be forced for SIP Services.||2018|