Firewall and NAT Guide
Firewall and NAT Guide
Table of Contents
1. How to setup Firewall and NAT to work with Blue Jeans Network - page 2
Ports Used by Blue Jeans for H.323 and SIP Connections
2. Calling Blue Jeans from H.323 or SIP Room System - page 4
Dialing Direct with URI Dial String
3. Firewall/NAT Traversal Solutions - page 6
4. Firewall and NAT Configuration - page 8
The Problems of NAT and Firewalls for video conferencing
UDP Hole Punching
NAT (Network Address Translation)
H.323 and Firewalls
5. Blue Jeans POPs and Geo-location - page 12
6. H.323 Call Signaling Explained - page 14
H.323 Call Flow Explained
7. H.323 Gatekeepers - page 18
What is a H323 Gatekeeper for?
H.323 Gatekeeper functions
Gatekeepers can work in Direct or Routed Mode
8. SIP Call Flow Explained - page 21
9. STUN, TURN and ICE - page 23
STUN, TURN, ICE Explained
STUN (Session Traversal Utilities for NAT)
Symmetric NAT is Different
TURN (Traversal Using Relays around NAT)
ICE (Interactive Connectivity Establishment)
10. Border Controllers and Proxies - page 28
Cisco Cisco Video Communication Server (VCS)
Polycom Video Border Proxy (VBP) and LifeSize UVC Transit
11. Cisco VCS Configuration to Connect to Blue Jeans - page 31
12. SIP Proxy - page 33
13. Common Issues and How to Overcome Them - page 35
Content Sharing Replaces Main Video Stream
No Content Sharing
Call Drops at the Same Interval or Time Frame on Each Call Attempt
Call Drops Quickly or Call Never Establishes
Video or Audio is Poor Quality
14. Additional Information - page 42
Methods of Port Translation in NAT
More on Configuring Firewalls
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 1
How to setup Firewall and NAT to work with Blue Jeans Network
NAT (Network Address Translation) configuration has always been a challenge for video
conferencing. H.323/SIP embeds the IP address in the data payload so that when the packet is
de-encapsulated on the other end, the IP address that is presented is the endpoints IP. If the
endponts IP is an internal IP address (10.x, 172.x 192.x etc.) then the receiving system will try to
send packets to this non-routable addresse and the audio or video will fail and call may drop. This
is a common problem with H.323/SIP call signaling when the endpoint is on a private IP address.
Network Address Translation (NAT) primary job is to translate the private IP to a unique public IP.
This way the receiving endpoint will be presented the unique public IP address that it can send
back payload and reach the initiating endpoint. When NAT is not configured correctly problems
with connecting calls or issues with content sharing can be the result.
This document was created to increase your understanding and show you how to overcome the
related issues.
IP Range and Destination Ports Used by Blue Jeans for H.323 and SIP Connections:
1720 TCP Control Port (static) for Q.931 call signaling (H.225 protocol) used in setting-up and
terminating a call. Q.931 negotiates which dynamic port range to use between the endpoints for
H.245 Call Parameters, data, audio and video.
These ports MUST be allowed for Blue Jeans Network entire IP ranges (see below):
5000-5999 TCP - Dynamic - H.245 (Call Parameters)
5000-5999 UDP - Dynamic - RTP (Video Stream Data)
5000-5999 UDP - Dynamic - RTP (Audio Stream Data)
5000-5999 UDP - Dynamic - RTCP (Control Information)
Note:Blue Jeans has several POPs distributed globally. The call will beautomatically redirected
by geo-location to the closest POP to the endpoint or media egress point.Audio/video traffic will
be routed to any of above IP ranges based. Hence it's important that firewall ports are opened
against entire IP ranges.User end ports can be selected by Firewall or the endpoint.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 2
Calling Blue Jeans from H.323 or SIP Room System
To call Blue Jeans from H.323 or SIP based Room System - Figure 1
1. Dial the Blue Jeans IP address 199.48.152.152 or bjn.vc or [email protected] to reach the Blue
Jeans IVR (Interactive Voice Response). The suggested dialing speed is 1 Mbps or higher for
720p resolution. For "speed dialing" instructions, see Dialing Direct with URI Dial String,
below.
2. After connection is made with Blue Jeans IVR, enter your 'Meeting ID' or use 'pairing' code
panel that will appear.
3. You have two ways to enter the meeting from here:
Enter the Meeting ID and Passcode (if applicable) using your Room System remote, and
press # to submit, or,
Enter the 5 letter pairing code in the BJN Meeting Room field on your browser, and press
Connect (this process must be used if you plan on changing your layouts from the web app).
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 3
4. Blue Jeans then connects your room system to the meeting.
Note: When using Polycom RealPresence Mobile Version 3.1-44477, we suggest using the
following URI methods:
From a Polycom, Cisco/Tandberg, LifeSize and Mirial/ClearSea endpoint you can dial H.323
directly into a Blue Jeans meeting using the following format: <Meeting
ID>.<Passcode>@199.48.152.152 for example, if the meeting ID is 12345 and the passcode is
1111 the URI string will look like this [email protected]
Should your meeting not contain a passcode then simply dial <Meeting ID>@199.48.152.152 e.g.
[email protected]
Some older endpoints may not support the above dial string format. If you are experiencing issues
connecting to Blue Jeans using the above format please try one of the following:
<IP>##<MeetingID>#<Passcode> (example:199.48.152.152##12345#1111)
<IP>##<MeetingID>:<Passcode>
<MeetingID>:<Passcode>@<IP>
NOTE: When using SIP protocol, the Room System should be configured for TLS or TCP.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 4
Firewall/NAT Traversal Solutions
Home Networks
Small home networks will likely use 'port-forwarding' or UPnP. Most home networks do not have a
dedicated firewall and use a NAT router running PPoE (Point-to-Point Protocol over Ethernet) to
connect to their Internet Service Provider (ISP). Small home based routers (like Linksys, D-Link,
Actiontec, Apple, etc) can have public to private ports forwarded for internal private IP address.
UPnP is protocol for allowing this automatically.
Port Forwarding can be configured on the router so the needed ports for video conferencing are
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 5
passed from the home network's public IP to the private IP of the endpoint.
Universal Plug and Play (UPnP) permits networked devices to be able to automatically forward the
needed ports. UPnP can provide support for NAT Traversal by learning the translated IP address
and configure port mappings. Usually the initiation for this connection needs to begin from the
inside of the home network. Not all home routers support UPnP or have it enabled by default.
Security for port forwarding and UPnP are on the low side, but for a home network are usually
deemed adequate.
The security level is higher than what is commonly used on a residential home network.
If is important to understand how the network and video environment is setup to fully understand
the issues that can affect video conferencing.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 6
Firewall and NAT Configuration
Recomendations
Full-cone/ one-to-one/ Static NAT are recommended or have a suitable NAT traversal device
(like VCS-E or VBP)
If using Firewall recommended to open the ports manually with a separate policy/ accesslist
instead of instead of relying on protocol inspection or transformation
Firewall or NAT mechanism needs to allow for Blue Jeans IP/Port destination range
Ports on the user side can be selected by Firewall or the Video Endpoint
IP Range and Destination Ports Used by Blue Jeans for H.323 and SIP Connections:
1720 TCP Control Port (static) for Q.931 call signaling (H.225 protocol) used in setting-up and
terminating a call. Q.931 negotiates which dynamic port range to use between the endpoints for
H.245 Call Parameters, data, audio and video.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 7
5060 / 5061 TCP - SIP and TLS
These ports MUST be allowed for Blue Jeans Network entire IP ranges (see below):
5000-5999 TCP - Dynamic - H.245 (Call Parameters)
5000-5999 UDP - Dynamic - RTP (Video Stream Data)
5000-5999 UDP - Dynamic - RTP (Audio Stream Data)
5000-5999 UDP - Dynamic - RTCP (Control Information)
Some NAT devices only allow packets from the remote endpoint to reach the NATed endpoint.
This is often the case with enterprise NATs and this is called symmetric NATs (see STUN, TURN
and ICE section).
The firewall can then open the ports accordingly; and/or it singles out H.323 exchanges and
over-writes unroutable IP addresses in outbound packets with a static NAT routable public IP
address as the source and re- addresses inbound packets so they reach their destination.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 8
The Network Address Translation that is created on the firewall or by routers and is part of the
security fabric for an Enterprise. NAT also became popular due to the shortage of Internet IPv4
unique IP addresses to allow all of the devices to be directly connected to the Internet. Migrating to
IPv6 has the promise to resolve many of these issues, but likely will bring some new challeges.
That is a discussion for another time however. With NAT only the firewall or router is given a
publicly routable IP address. A NAT-mechanism works by associating a public address and port
with a private (non-routable) destination address and port.
This mapping is created when TCP SYN packet or first UDP packet is sent and is maintained as
long as the TCP connection or UDP flow are kept alive.
If the H.323/SIP endpoint is behind firewall on a private IP address, the firewall and endpoint need
to be properly configured. The private IP address that the endpoint is registered to will likely be a
non-routable address. If the H.323/SIP endpoint advertises this address to the recieving endpoint
you will likely endup with a dropped calls, "one-way" video or H.239 content sharing not working in
Dual Stream mode. The reason is the receiving endpoint will try to contact the sending endpoint at
this private IP address and will be unable to have proper communication.
In order to have successful calls when your H.323/SIP endpoint is on a private IP address is to
configure a "one-to-one" static NAT that translate the private IP address to a unique public IP
address. This is usually done at the firewall or using a transversal device like Cisco VCS-E (Video
Communication Server - Expressway), Polycom VBP (Video Border Proxy), Edgewater SBC,
Lifesize Transversal Server, etc.
There are two main reasons H.323 and firewalls sometimes don't get along:
1. The traffic requires a negotiated 'connection' on an unspecified higher UDP port. So a firewall
has to be configured to allow UDP traffic to these ports. BlueJeans uses TCP/UDP 5000 -
5999.
2. H.323 records the hosts' IP address in the payload of the packet. This causes problems if NAT
is involved, since the H.323 packets will contain the private IP and not the translated public IP.
A properly configured H.323 aware firewall can handle both of these challeges. If you are using
NAT, you must configure the H.323 aware firewall for static one-to-one NAT for H.323 traffic.
Outbound ports to the Blue Jeans Network IP ranges need to be configured and then inbound
traffic will be automatically allowed to go through once the pin hole is opened on stateful firewall.
Some issues seen also involve content sharing. Because H.239 (duo stream content sharing) is
usually blocked unless there is a NAT traversal device or NAT-aware mechanism in place. What
can happen is the H.239 content share can be transcoded replacing the main video and not
present itself as "dual stream."
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 9
H.323 and Firewalls
By configuring a one-to-one static NAT and enabling H.323 inspection it is possible to give the
firewall an awareness of the H.323 protocol, This will allow the firewall to manage the setup
exchanges so that it 'learns' the ports to be negotiated. The firewall can then open the ports
accordingly; and/or it singles out H.323 exchanges and over-writes unroutable IP addresses in
outbound packets with a static NAT routable public IP address as the source and re- addresses
inbound packets so they reach their destination.
The latest releases of most vendors' endpoints including Polycom, LIfeSize, Sony, Cisco/Tandberg
all support NAT and allow you to specify the external IP address of the selected endpoint. Please
investigate your User Guide for your H.323 endpoint for NAT settings.
Transversal Devices and Border Proxy Controllers like Cisco VCS -E, Polycom VBP or others can
also provide a means for endpoints to transverse the firewall and/or NAT boundaries.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 10
Blue Jeans POPs and Geo-location
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 11
H.323 Call Signaling Explained
Call Flow - H.323 Room System making outbound call to Blue Jeans - Figure 5
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 12
(MS), and opening logical channels (OLC), that is, creating media streams for audio, video,
and content.
This completes a required four-way H.245 protocol handshake before opening up the logical
channels for the session. After sendingTCS message a Master/Slave Determination (MSD), is
completed. The master in a call controls actions between the two H.323 devices. Example, if both
endpoints attempt to open incompatible media flows, the master takes action to reject the
incompatible flow. Once the TCS is complete between endpoints Logical Channels are Opened
and the session can proceed.
H.245 control channel is also used to transmit the Flow Control command, which is used by the
receiver to set an upper limit for the transmitter bit rate on any logical channel, and the Fast Video
Update (FVU) command, which is used by the receiver to request resending video frames that
were lost in the transmission. The FVU can be used to modify the bit rate when the receiver detects
high packet loss. Seeing lots of FVU messages in the H.323 call flow can be a good indication of
high packet loss.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 13
Media RTP H.245 - RTP/RTCP
When TCS and MSD are complete Logical Channels or Media flows are opened (OLC) and ACKs
are sent between endpoints. Logical Channels are basically multiplexed paths between the
endpoints used for data transfer. RTP/RTCP video and audio are sent over media port range 5000
- 5999 UDP negotiated by H.323 endpoints
RTP - Real-time Transport Protocol defines standardized packet format for delivering audio and
video over IP networks.
RTCP - Real Time Control Protocol is used to monitor transmission statistics and quality of service
(QoS) of multiple media streams. The primary function of RTCP is to provide feedback on the
quality of service being provided by RTP.
H.323 implements H.235 for secure connections which uses Advanced Encryption Standard
(AES). Endpoints can be set to None, Optional or Strict.
DTMF tones (Dual-tone multi-frequency signaling) are used to enter Meeting ID (and Passcode if
there is one) or activate other functions during the conference.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 14
H.323 Gatekeepers
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 15
Session Border Controller - work with addtional gateway device
Gatekeepers are optional in an H.323 network, but if a gatekeeper is present, endpoints must
use the services provided and follow the rules applied
If H.323 endpoint is registered to a Gatekeeper, it must ask the Gatekeeper permission to initiate
call using RAS (Registration, Admission and Status) messaging. RAS is usually located on port
1719 as part of the H.323 Protocol Suite. The H.323 endpoint initiating the call will send an
admission request ARQ to the gatekeeper. Gatekeeper will resolve the address of the remote
endpoint and give admission confirm message ACF. The intiating H.323 endpoint can then place
the call.
Gatekeepers can manage or limit bandwith and enforce calling policies. When H.323 endpoints
regiseter with a single Gatekpeer this is called a zone. Gatekeepers can also "neighbor" with other
Gatekeepers or zones. This can use a Dialing Plan that allow inter-zone dialing so that two
endpoints in separate zones can still communicate with each other. This is the main way Legacy
video conferencing networks are managed.
Address Resolution enables two endpoints to contact each other without either endpoint having to
know the IP address of the other endpoint. In order for this to work all the endpoints involved would
need to be registered to Gatekeeper.
Gatekeepers resolve the addresses of the various H.323 endpoints registered to it and allows for
the facilitation of the Administrator's Dialing Plan. Since the Gatekeeper keeps track of all the
H.323 endpoints, users can dial endpoints using just an E.164 alias.
If placing a call to an endpoint on the outside of the network (Internet) it is important to understand
that the Gatekeeper must allow this call to proceed.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 16
SIP Call Flow Explained
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 17
7) 200 OK - indicates the request was successful
When analyzing SIP Call Flow you may see other Response codes that may or not indicate a
problem. You can look these up on the Internet.
Try http://en.wikipedia.org/wiki/List_of_SIP_response_codes
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 18
STUN, TURN and ICE
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 19
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 20
STUN, TURN, ICE Explained - Figure 7
Basically if your endpoint is behind a NAT it may need some external help to connect. That
external help is the STUN server. A STUN servers job is to provide NAT traversal (UDP hole
punching) by making your endpoint aware of its public IP address.
STUN, TURN, ICE are all protocols for solving the firewall/NAT traversal issue using intelligence in
the endpoint together with external servers (STUN and TURN servers). This is accomplished by a
pinholes (hole punching as it is known) being created in the NAT/firewall for SIP signaling and
media to pass through. The firewall must be configured to allow the endpoint to create the
necessary pinhole.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 21
A STUN server does one task. It checks the IP address and port of an incoming request and sends
it back to see it gets a response.
The NAT endpoint (running STUN protocol) initiates a connection to the STUN server and creates
binding. The STUN server inspects the IP address sends back a message containing the IP
address and port in its payload allowing the endpoint to client learn its public IP address and port.
The NAT endpoint that learns its public IP address and port can use this instead of its private
address in the SIP headers and RTP ports in the SDP.
Firewall/NAT MUST allow for this to work. Therefore, STUN cannot be used with 'symmetric' NATs.
Here is where relays using TURN comes into play.
STUN is not a fix-all. If the endpoint is behind a 'symmetric' NAT even though the public IP address
can be found by utilizing the STUN server, it likely cannot create a connection.
NAT (full cone NAT, restricted cone NAT, and port restricted cone NAT) do not change the source
port when making NAT connections. When a client accesses the Internet using 192.168.0.1:5672
(IP:source port) NAT changes the source IP to say 56.34.66.12 but keeps the port number the
same. For example 192.168.0.1:5672 to 56.34.66.12:5672. This is known as port preservation.
UDP hole punching will not work with symmetric NAT devices (also known as bi-directional NAT)
which tend to be found in most large corporate networks.
A symmetric NAT differs from other types of NAT as it does not keep the same port number, it
randomly generated new ones. This is known as ephemeral port that is a short-lived transport
protocol port. With a symmetic NAT the example would be 192.168.0.1:5672 to 56.34.66.12:5001.
Since symmetric NAT maps new ports to the found source IP, utilizing STUN server alone cannot
create the connection needed. The use of ephemeral ports for each communication renders NAT
port prediction impossible. This is where TURN servers come into play.
TURN servers have public addresses and can be contacted by peers (even when behind firewalls
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 22
TURN servers have public addresses and can be contacted by peers (even when behind firewalls
or proxies). TURN servers only relay media stream.
The TURN server is located on the public Internet (or ISP's network offered as a service). A NATed
TURN client asks this server to allocate a public address and port and "relay" packets to and from
that relayed address. The endpoint can use this instead of its private address in the SIP headers
and RTP ports in the SDP. TURN usually guarantees communication in most all NAT
configurations unless there is a firewall policy to prohibit using it. The connection does require a
bit more overhead and the media quality can be a bit lower.
Summary:
STUN server is used to get an external network address for NAT endpoint
TURN server is used to relay media traffic if direct (peer to peer) connection fails
ICE is the protocol that is used to facilitate the communication between endpoints and does
the connectivity checks
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 23
Border Controllers and Proxies
Cisco VCS-C provides video call and session control, registrations, and enhanced security for
video conferences. It also enables definitions such as routing, dial plans, and bandwidth usage,
while allowing organizations to define video call-management.To accomplish firewall transversal
to connect with endpoints outside the private network the Cisco VCS-E is required alongside
Cisco VCS Control. The Cisco VCS-E allows video traffic to traverse the firewall and requires
"transversal licences" to allow for connections to endpoints on the Internet. Proper configuration is
required for the "inside" endpoints to communicate with "outside" connections as well as a
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 24
properly configured firewall.
The Cisco VCS Expressway uses SIP or H.460.18/19 for firewall traversal of signaling and media
across a range of ports. The Cisco VCS Expressway provides TURN relay services to Interactive
Connectivity Establishment (ICE)-enabled endpoints to allocate relays for the media components
of the call. The endpoints perform connectivity checks through ICE to determine how they will
communicate.
Cisco VCS can replace standalone H.323 gatekeeper or SIP proxy. Cisco VCS solution can allow
for SIP and H.323 interworking. Natively, H.323 and SIP endpoints cannot directly communicate.
With Cisco VCS deployed, video calls can be made between H.323 and SIP endpoints. This can
be done by creating a "transform" for call routing on the Cisco VCS Control.
There are three basic ways to bridge SIP and H.323 using multi-protocol conference server (like
Blue Jeans) or MCU, dual-stack endpoints (endpoint with ability to run both SIP and H.323
protocols) and signaling video conference gateways (like Cisco VCS).
Interworking
When using Cisco VCS for call control, the VCS provides a gateway functionality that allows
interoperability between endpoints using different protocols (interworking) like SIP/H323. In
general, this gateway feature of Cisco VCS works very well in most cases, but there are some
cases where interworking SIP/H323 may cause issues and strange behaviors, depending upon
which endpoints are involved on the call and the features negotiated.
Issues involving encryption negotiation, DTMF interoperability and content sharing can sometimes
be seen. This kind of problem is common when using VCS Expressway to internet integration,
where the endpoints have conferences with different companies and with so many different type of
video systems.
Considering the possibility of having these problems related to SIP/H323 interworking. Try to test
with interworking disabled using the native H.323/SIP protocol is issues arise.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 25
Cisco VCS Configuration to Connect to Blue Jeans
The following steps is a required one time setup for endpoint that registers to Cisco Video
Communication Server (VCS) to connect to Blue Jeans- Figure 12
Configure the Cisco VCS-Expressway to route calls to Blue Jeans. Make sure VCS has
theappropriate DNS server configured System -> DNS.
Make sureVCS is setup for dual network interfaces and the firewall rules are setup correctly, refer
to firewall requirement.
1. On VCS-Expressway -> VCS configuration -> Dial plan -> Configuration, set "Calls to
unknown IP addresses" to direct
2. Create a DNS zone to route outbound calls by going to VCS Configuration > Zones >New
DNS Zone and adding a zone
3. H.323 Mode set to On
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 26
4. SIP Mode set to On
5. On VCS-Control -> Dial plan -> Configuration, set "Calls to unknown IP addresses"and
configure Cisco VCS-Control to Indirect
Note: Cisco recommends that any SIP or H.323 fixup ALG (application-level gateway) or
awareness functionality be disabled on the NAT firewall. If enabled this could adversely
interfere with the VCS functionality. Full setup and configuration for Cisco VCS is beyond the
scope of this document. For more information please investigate the Cisco VCS Deployment
Guide.
Room Systems behind Firewalls configured with ALG can sometimes expereince random
audio issues as well!
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 27
SIP Proxy
The proxy server is the intermediate entity that acts as both a server and a client for the purpose of
making requests from other clients primarily doing the routing. Proxies are also used for enforcing
policy (example: is user allowed to make this call). A proxy interprets, and, if necessary, rewrites
specific parts of a request message before forwarding it.
The registrar is a server that accepts REGISTER requests and places the information it receives for
the domain it handles.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 28
The redirect server is a user agent server that generates 3xx responses to requests it receives,
directing the client to contact an alternate set of URIs.The redirect server allows SIP Proxy Servers
to direct SIP session invitations to external domains.
NOTE: In some cases the proxy server and registrar will run on the same server
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 29
Common Issues and How to Overcome Them
Likely Cause:
Because H.239 (duo stream content sharing) is usually blocked unless there is a NAT traversal
device or properly configured NAT-aware mechanism in place. If the H.323 endpoint advertises its
Private IP address to BlueJeans the H.239 content sharing will not working in Dual Stream mode.
The reason is the receiving endpoint will try to contact the sending endpoint at this private IP
address and will be unable to communicate properly.
Dual stream video (H.239) can only operate correctly when the video conferencing endpoint is
either NOT behind a NAT, NAT mechanism is properly configured or there is a NAT/FW traversal
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 30
device in place to proxy both signal and media, such as VCS, VBP or other Session Border
Controller.
Fix:
Always make sure H.239 content sharing is enabled on H.323 endpoint to establish dual stream/
separate Presentation channel. Please check the Admin guide of that specific model for the
endpoint for this setting.
1. Implement NAT/FW traversal solution so that H.239 channel can be opened cross NAT/FW.
2. Put end point temporarily in DMZ with public ip without going through NAT/FW.
Check Firewall and NAT-aware mechanism. A one-to-one static NAT is required. You may try
turning on H.323 inspection on H.323 aware firewall if no transversal device is being used.
Polycom Endpoints
When you dial into a Blue Jeans meeting from a Polycom endpoint you may experience one of the
following:
No video received from Blue Jeans
Green artifacts across the screen
Issues sending/receiving content via H.239
This typically occurs when your Polycom endpoint has the option "Basic Mode" enabled,
which uses the legacy codecs G.711 (audio) and H.261 (video).
To turn off this configuration, log into your Polycom web admin interface, and go to:
1. Admin Settings
2. Network
3. Call Settings, and
4. Uncheck "enable Basic Mode"
On HDX systems running firmware version 3.0.3 or higher this option is now called "Diagnostic
Mode" and can be found in the following menu:
1. Admin Settings
2. Network
3. Call Preference, and
4. Uncheck "Diagnostic Mode"
NOTE: Some models like Polycom HDX and Group Series have a setting called "SIP keep alive
messages, which can help to create pinhole on some Firewalls in order to allow separate content
channel for media coming from Blue Jeans .
You may need to reboot the endpoint for the new settings to take effect. Once you reconnect to the
meeting your endpoint should begin using the G.722 (audio) and H.264 (video) codecs.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 31
meeting your endpoint should begin using the G.722 (audio) and H.264 (video) codecs.
When placing a call/re-dialing, ensure that the Call Quality is set to 1024 or higher.
Endpoint Settings
In case of dual monitors, please check if in the Admin settings that the endpoint is correctly
configured to show the Content and Main Video on separate monitors.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 32
No Content Sharing - Figure 15
Symptom:
User tries to share content (H.239) and either nothing happens, you only see self-view or a black
screen appears on receiving endpoint where the content should be displayed.
Likely Cause:
Receiving endpoint may be improperly configured for NAT or firewall is blocking content share.
What may be happening is the receiving endpoint is advertising a private address and sending
endpoint is sending shared content to this private address that cannot be reached. Possible
decode issue if you see black screen where content should display.
Fix:
Always make sure H.239 content sharing is enabled on H.323 endpoint.
Check Firewall and NAT-aware mechanism. Turn on H.323 inspection on H.323 aware firewall if
no transversal device is being used.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 33
Some Firewalls H323 ALG setting limit the session to 2 (audio/video) which could prevent content
from working properly. Check to re-configure Firewall.
NOTE: In some rare scenarios the firewall pinhole mechanism may block the content media. When
a video call is initiated from the endpoint, the audio and video channels are established from
internal private network to external public network (Internet) and so the return traffic from public to
private network is trusted and pinholes are created to traverse it. However the content is entirely
new media traffic coming from Blue Jeans (public network) to the endpoint on private network,
which may get blocked by firewall.
Call Drops at the Same Interval or Time Frame on Each Call Attempt
Symptom:
Call connects but drops in the exact same amount of time. If all endpoints are dropping calls at
exactly the same interval, please check firewall UDP time-out.
Likely Cause:
UDP Timeout setting on firewall is set too short. What may be happening is that the firewall is
stopping the UDP Media traffic and causing the call to drop. Calls that drop at exactly 2 hours are a
common issue with some Cisco Firewalls where the UDP Timeout is not configured properly for
video conferencing.
There is also a 'keep-alive' sent by H.323 endpoint that can be discarded by firewalls. Keep-Alive
settings can have a similar result in dropping calls. Some firewalls will close port 1720 if it does not
see any traffic after an H.323 call has been established. This action generally will drop the call.
Fix:
Adjust UDP Timeout on firewall to longer time. It is recommended to set the UDP time out to the
maximum allowed time (3 or 4 hours on some firewalls). It is important to be aware of any UDP
Timeout setting that may exist on firewall. This setting can end calls pre-maturely.
Adjust the 'keep-alive' interval on the H.323 endpoint. Investigate that the firewall is allowing the
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 34
'keep-alive' message to get thru.
Likely Cause:
Firewall is blocking outgoing call or H.323 endpoint is not connected to network. Typically occurs
when TCP port 1720 for call setup is open, but the TCP and UDP port range 5000-5999 for flow
control and media are being blocked by a firewall.
Possible NAT issue if call connects and drops within 30 seconds. Usually this is where the H.323
endpoint is advertising only its private IP address to Blue Jeans. The return media cannot reach
the H.323 endpoint and after less than 30 seconds or so the call will be dropped as the endpoint
does not receive any media. This is almost always due to NAT being improperly setup.
Fix:
Make sure H.323 endpoint is properly connected to network. Can you call any other endpoint?
Check firewall and NAT-aware mechanism. A one-to-one static NAT is required. Turn on H.323
inspection on H.323 aware firewall if no Transversal Device is not being used.
May need to monitor Firewall or perform a packet capture to see if the call dialed is leaving your
network.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 35
Video or Audio is Poor Quality
Symptom:
Poor video or audio quality seen or heard on H.323 or SIP room system.
Likely Causes:
This can be due to high packet loss. There could be an mismatch on the switch ports or bandwidth
restriction that is causing the high packet loss. Firewall can be doing a deep packet inspection or a
filtering is occuring on local network (Websense, BlueCoat, etc). Low bitrates can also cause lower
quality video.
If your endpoint is behind a restrictive firewall, your connection to Blue Jeans service is likely over
TCP relay. This restricts video bandwidth and tends to produce a lower quality call than one
without relay. Allowing UDP packets through directly to Blue Jeans Network can improve the
quality.
If video quality seems to be the issue make sure that the endpoint is using H.264 video codec (if it
has this capability). Video endpoint using H.261 can suffer from a poorer quality.
If the video is flickering or pulsating this can be due to many FVU (Fast Video Updates) where the
endpoint receives corrupted video packets it cannot properly decode so it requests a new Intra
Frame (complete image) from Blue Jeans. This is usually caused by packet loss. Every time a new
Intra Frame is received it generates this flickering or pulsating effect can be very distracting.
Fix:
1. Make sure the following network firewall configurations are in place to allow:
Allow TCP 5000 - 5999
Allow UDP 5000 5999
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 36
199.48.152.0/22
31.171.208.0/21
103.20.59.0/24
103.255.54.0/24
8.10.12.0/24
165.254.117.0/24
NOTE: Some firewalls, such as Palo Alto Networks, prefer to filter network traffic based on the Fully
Qualified Domain Name (FQDN). If this applies to your firewall configuration please use the
following FQDN in order to connect to Blue Jeans: bjn.vc
2. Set speed/duplex settings to 100/full for the endpoint LAN (via the web interface) and the
network switch port LAN. ("Auto negotiation" unfortunately does not often work as you would
expect with video units. With the deployment of 1000/full switches being more common, many
video units only do 100/full and leaving them to AUTO/AUTO results many times in speed/duplex
mismatches)
3. If your local network bandwidth is capping at 1Mb, adjust the room system's call rate/speed to
768Kbps,or even 512Kbps. For HD resolution the user should be using a call speed at least 786 to
about 1152kbps or more.
4. To see if the packet loss is happening on all video calls (not just with Blue Jeans), please make
calls to test calls to another public endpoint such as Polycom's video test number page (IP address
140.242.250.205). If you see similar issues with packet loss ask your IT team to investigate
possible packet loss causes within your local network. They might try running an MTR or Trace
Route to see where the packet loss is occurring. If the packet loss is shown to be out on Internet
you may have to open a support ticket with your Internet Service Provider (ISP). An excess of too
many hops can also be a factor and should be discussed with your ISP.
5. If a filtering issue is suspected, check to make sure that an exception has been added to the
"filtering" solution. Check to make sure that no deep packet inspection is enabled for video
conferencing packets.
6. If low bitrate is suspected to be can causing a lower quality video we suggest you disable the
Dynamic Bandwidth setting (Polycom) on the endpoint. Make sure if using a Polycom room system
that Basic or Dynamic Mode is NOT enabled as this will cause your room system to use H.261
video codec and G.711 audio codec that may yield poorer quality than what is preferred.
7. Check to make sure that the video endpoint is using H.264 video codec. Polycom endpoints can
be set to Basic or Diagnostic Mode (depending on software version) where it forces the use of
H.261 video codec. Disabling this Basic or Diagnostic Mode will allow endpoint to use higher
quality video codec like H.264.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 37
Additional Information
1. Full-cone NAT (one-to-one NAT) is the only type of NAT where the port is permanently open and
allows inbound connections from any external host. This type of NAT is also known as port
forwarding and is the least restrictive type of NAT. The only requirement is that the connection
comes in on a specific port (the one you opened). The port numbers do not have to be the same.
The internal private address and port is mapped to an external public address and port. Packets
from internal IP address:port are sent through to external IP address:port.
Any external host can send packets to the external IP address:port and reach the endpoint on the
internal IP address:port. The IP address is translated, but the port number is preserved.
2. Address-restricted-cone NAT works in the same way as a full-cone NAT but applies additional
restrictions based on IP address. The internal client must first have sent packets to external IP
address before it can receive packets from from external endpoint. The only requirement is that
packets come in on the mapped port and from an IP address that the internal client has sent
packets to.
Once an internal internal address:port is mapped to an external address:port packets from internal
address:port are sent through external address:port.
An external host can send packets to internal address:port by sending packets to external
address:port ONLY if internal address:port has previously sent a packet to host.
4. Symmetric NAT applies restrictions exactly the same way as a port-restricted cone NAT but
handles the NAT translation quite differently. Other types of NAT do not change the source port
when making connections. This is called port preservation. Symmetric NAT will radomly change
the port numbers and this creates some unique challenges for video conferencing.
Each request from the same internal IP address and port to a specific destination IP address and
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 38
port is mapped to a unique external source IP address and port; if the same internal host sends a
packet even with the same source address and port but to a different destination, a different
mapping is used. Only an external host that receives a packet from an internal host can send a
packet back.
Full-cone NAT is the most permissive and Symmetric NAT is the most restrictive.
Configuring Firewalls
This is for example only. Depending on your firewall and network this may be different and should
be used to help basic understanding only. Please contact your firewall vendor for the proper
configuration needed for your specific firewall.
Sample Cisco ASA firewall for H323 conferencing (Depending on software version this may vary).
1. Create an IP Service Group - You can use any naming convention. Example: BlueJeans
From the ASDM configuration tool, click on Configuration, Firewall, and then Access Rules
Click on the Services tab from the menu which appears on the right, and then click Add and
select Service Group
Enter a Group Name, such as H323-Group. A description can be entered if desired, but not
necessary
Click the radial button Create new member. Create three new services, configure these
services with the following parameters (making sure to click Add after creating service):
NOTE: Typically ASAs have a predefined service for TCP 1720, so you may see TCP h323 listed.
2. Create Network Objects - defining a host for both the internal private IP address as well as the
external public IP address.
From the ASDM configuration tool, click on Configuration, Firewall, and then Access Rules
Click on the Addresses tab from the menu, then click Add and select Network Object
Enter a name and description for your object (if no name is entered then the IP address will
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 39
display). Two objects must be created for each system to allow endpoint to make and receive
calls through the ASA, one reflecting the internal IP configuration, and one reflecting the
external IP the system will be translated to. After entering this information you should have
completed Network Objects. Now move on to NAT Rules.
3. Define NAT Rules - Static NAT (need to create a one-to-one static NAT)
From the ASDM configuration tool, click on Configuration, Firewall, and then Access Rules
Add Static NAT Rule for the inside interface translated to the outside interface and click OK
4. Define Access Rules - theses rules are to allow inbound traffic thru the outside interface where
Source: = any Destination: <BlueJeans Object>
From the ASDM configuration tool, click on Configuration, Firewall, and then Access Rules
Click Add, and then Add Access Rule
Configure the Access Rule:
Example ONLY:
Interface: Inside
Action: Permit
Source: Any
Destination: Any
Configure the Service and select the H323-Group configured and click OK. In order to create
the Access Rule which will allow traffic to traverse the firewall from External to Internal, repeat
the steps above, but ensure the Interface is set to Outside.
Example ONLY:
Action: Permit
Source: Any
Destination: Any
Service: H323-Group
NOTE: With the later versions of Cisco ASA firewalls there are no fixup protocols to configure;
however, common issues noted with many Cisco ASA models relate to their use of fixup protocols.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 40
however, common issues noted with many Cisco ASA models relate to their use of fixup protocols.
It is important to ensure that you disable the following if they are enabled on your ASA. Fixup
Protocol H323, Fixup Protocol H323, RAS Fixup Protocol H323 H225
NAT support for SIP may be enabled by default on port 5060. If this feature has been disabled,
perform this task to re-enable NAT support for SIP. To disable the NAT support for SIP, use the no
ip nat service sip command. Please investigate your firewall admin guide for more information.
You need to create an access list for all of the Blue Jeans IP ranges.
Note: When a Cisco VCS Expressway is depolyed, Cisco recommends that any SIP or H.323
fixup ALG (application-level gateway) or awareness functionality be disabled on the NAT firewall.
If enabled this could adversely interfere with the VCS functionality. Several room system vendors
also recommend to not use ALG as it can potenially cause intermittent issues with audio. It is not
recoommeded to use ALG for video conferencing.
Application Firewalls
An application level firewall can control access to and from a specific application or service. It is
built to control all network traffic on any OSI layer up to the application layer. These type of
firewalls are typically seen running on a OS X, Windows or Linux computers, but can also be a
stand-alone specialized appliance or even cloud-based solution that has several features not
found on standard 'network layer' firewalls.
These application firewalls monitor all input/output and service calls for a particular application.
They are configured by choosing the application and setting what that application is allowed to do
in simple terms.
Firewall Setup and NAT Configuration Guide for H.323 / SIP Room Systems - 41