Compatible Router List & General Router Configuration

General Router Setup and Configuration for the usage with the VoiceHost network

General Overview: Routers are typically the source of network issues related to the implementation of both our SIP trunks and our Cloud Platform. To ensure a network remains reliable, we recommend using the Technicolor TG582n TG589vn or TG588 for small office setups (<5 phones) and the Mikrotik range of routers (RouterOS) for deployments >10 phones or office setups requiring dual-WAN capabilities.

NOTE: The TG582n may not be suitable for PBX deployment due to difficulties port-forwarding to the PBX.

Most routers do not prioritise VoIP traffic (the Technicolor routers do this properly). Further to this, some routers actively disrupt the traffic coming through them, which further inhibits the phones' abilities to correctly route VoIP traffic. In addition, without prioritization of VoIP traffic on transmission, other devices on the network which use the available bandwidth may cause a drop in call quality. The settings below should be taken as a guide to configuring 3rd party routers. However, we cannot guarantee the success of these 3rd party routers, even when configured to have the settings below. If problems persist after these changes, we advise purchasing a recommended router.

"Free" routers provided by other ISPs may be either locked down to only their internet service or still accessible by them (meaning they can see everything you use it for). It also means that they can update it at any time, thereby resetting the main settings used to process VoIP packets. It is highly recommended to change it, even if the model number is the same.

General Router and Firewall Settings:
  • Disable SIP ALG
  • Disable SPI Firewall
  • Enable SIP Transformations (specific to Sonicwall)
  • Disable Consistent NAT (Specific to Sonicwall)
  • White-list our IPv4 addresses (contact support for info)
  • Update Firmware to latest recommended version based upon hardware
  • Do NOT open port 5060 (or the RTP ports) to any internet-based traffic (i.e. WAN links) unless you are explicitly filtering on the firewall or PBX based upon the public IP addresses of the platform. This is how SIP scanners identify systems to attempt to compromise them!

Router Compatibility

Compatible Routers

(Recommended and Supported)

Date Tested
Compatible Routers

(Limited Support - Firmware update required / SIP-ALG MUST BE DISABLED/Not Supported)

Date Tested
Incompatible Routers

(Broken for SIP usage on tested firmware)

Date Tested
Technicolor TG582n and TG589n (IPv6 compliant)2013/14Zyxel Range (AMG1302 Tested)2017Netgear DGN1000 (aka N150 ADSL2+) - INCOMING CALL FUNCTIONALITY BROKEN2016
Technicolor TG588v (IPv6 compliant)2017Draytek Vigor Series (Update Firmware & uncheck 'accept large fragmented UDP packets' within router settings)2014Netgear WNR1000 (aka N150 cable) - INCOMING CALL FUNCTIONALITY BROKEN2016
Mikrotik Routers (RouterOS based devices)2017PfSense (see additional help article)2015Sky Hub2018
Cisco RV042(G) / RV082 / RV016 / RV110W / RV180W / RV320 (All IPv6 compliant)2015WatchGuard (see additional help article)2015  
Cisco Integrated Services Routers (1900/2900/3900 series)2015Routers with VoIP DD-WRT/Tomato firmware2013  
  Virgin Media SuperHub  (stealth-update of the firmware by the ISP can break some settings)2015  
  BT HomeHub or BusinessHub (stealth-update of the firmware by the ISP can break some settings)2015  
  O2/Be Routers (stealth-update of the firmware by the ISP can break some settings)2015  
  Netgear DG834(g) | DGN2000 | DGN3500 | WNR20002016  
  TP-Link2014  
  D-Link2014  
  TalkTalk (D-link) (stealth-update of the firmware by the ISP can break some settings)2014  
  FritzBox2014  
  Speedtouch2014  
  Billion2014  
  ASUS (DSL-N16 & ASUS DSL-AC55U Tested) - Disable SIP-ALG by enabling SIP PASSTHROUGH under WAN settings)2016  
  Vyatta & Brocade (Disable SIP-ALG)2016  
  Huawei HG633 (TalkTalk Super Router) - (Disable SIP-ALG)2017  
  Sky Hub (SIP-ALG cannot be disabled so TLS must be forced for SIP Services.2018