Cisco Meraki

Cisco Meraki

Current Status

Compatible

Suggestions

None

Comments

Meraki VoIP Best Practices

Generally speaking, it is best to stick to the following best practices when deploying a VoIP system on any network:

  • Segregate voice traffic to its own VLAN.
    Voice traffic tends to come in large amounts of two-way UDP communication. Since there is no overhead on UDP traffic ensuring delivery, voice traffic is extremely susceptible to bandwidth limitations, clogged links, or even just non-voice traffic on the same line. Separating out your voice traffic allows it to function independently of other network traffic, and allows for more granular control over different types of traffic.


 

  • Use traffic shaping to offer voice traffic the necessary bandwidth.
    Due to the relatively large amounts of data that voice uses on the network, it is important to ensure that your voice traffic has enough bandwidth to operate. As such, traffic shaping rules can be implemented to allow voice traffic to use additional bandwidth, or even limit other types of traffic to help out voice.
     
  • Use Quality of Service to maintain prioritization
    Many devices support Quality of Service (QoS) tags to maintain traffic priority across the network. It may be beneficial to tag your voice traffic with the appropriate tags, so it can be prioritized anywhere in the network in the event of a saturated link.


 

  • Understand firewall and NAT configurations
    In VoIP, there will typically be two types of flows: Bi-directional communication from phones to the Private Branch Exchange (PBX), and bi-directional communication directly between phone peers.  As such, it is highly important to understand what the expected flow of traffic will be and ensure that all firewalls have been configured accordingly.
    Furthermore, it is important to understand if traffic will pass through some form of NAT, and if so, what type of NAT is in use. The options and limitations of the network may make certain configuration types infeasible.
     
  • Avoid sending VoIP traffic over non-optimized links
    As discussed above, VoIP traffic is extremely sensitive to fluctuations in data transmission. As such, plan voice deployments to avoid sending VoIP traffic over links with limited bandwidth/environmental factors (wireless mesh), or over the WAN (lack of control, much more potential for failure).

 

How do I configure the MX?

A number of requirements/questions may be presented about the network.

  • Can Application-Level Gateway be enabled on the MX?
    ALG is a technology that allows stateful firewalls to dynamically assign ports and broker communication through a NAT. The MX security appliance is a full-featured stateful firewall that does not have any ALG functionality. 
     
  • Can the UDP timeout value be changed?
    The MX does have a simple UDP timer function, which will drop a traffic flow after an extended period of inactivity. This timer cannot currently be changed. However, a timeout would require both peers to be completely silent for an extended period of time in order to take effect. UDP communication between peers on an active call, for example, is highly unlikely to be dropped due to a timeout.
     
  • How are inbound connections handled?
    The MX is a stateful firewall, so most inbound communication will only be allowed as a response to an established outbound conversation. Inbound communication can be explicitly allowed by means of port forwarding or 1:1 NAT/1:Many NAT rules, whereby a specific internal device is associated with a public port/IP.
    For more information on port forwarding and NAT rules on the MX, please refer to the following articles:

Troubleshooting

The following section outlines some common VoIP issues that may arise, and some recommended troubleshooting steps to narrow down the issue.

Audio only goes one way

Consider that voice communication typically happens as two simultaneous UDP streams, one for each direction of communication. These are two separate streams, as opposed to a single two-way stream. If communication in one direction is not making it to the peer, then the symptom is usually that only one party can hear the other's audio.

To address this issue, check the following:

  • Trace the flow of traffic, and check any firewalls to ensure they are not blocking traffic.
  • If a stateful firewall like the MX is passing traffic between the two peers, ensure there are appropriate mechanisms in place to allow inbound communication (1:1 NAT, port forwarding, etc).
  • If it's unclear exactly where the traffic is being dropped, determine based on the symptoms which direction of traffic seems to be failing, and take packet captures at network hops to see where the flow stops.

Poor audio quality

Due to the sensitive nature of VoIP traffic, low voice quality (or "jitter") may be experienced due to interruptions in traffic flow or bandwidth limitations.
To improve voice quality, ensure that the following best practices are in place:

  • Make sure voice traffic is segregated to its own voice VLAN, so normal data cannot interfere.
  • Check the network's bandwidth limitations and ensure there's enough bandwidth (as recommended/required by the voice system).
  • Use traffic shaping/QoS where necessary, in the event that a link on the network is being saturated.
  • Take packet captures to get an idea of call quality, and where it is degraded. Many capture analysis tools, including Wireshark, have the ability to perform RTP analysis.

Take note of the "symptoms" exhibited in a poor-quality phone call. Specific traits of the call can help narrow down the issue. Please refer to this cisco guide for a breakdown of different call quality symptoms.

Phones can't get an IP address/configuration

Typically, VoIP equipment will get a dynamic configuration from a TFTP server or other service on the network. This will commonly be levied by a DHCP server, where leases to VoIP endpoints will include voice-specific DHCP options. In the event that the phone fails to connect to the network/get a working configuration, consider the following recommended steps:

  • If a separate voice VLAN is being used, ensure that phones are being put on the appropriate VLAN by means of an access port, voice VLAN configuration on the port, or even configured on the phone itself.
    • If this is being done, ensure that a DHCP server is up-and-running on that VLAN, and configured with the appropriate scope and options.
  • If phones have a working IP configuration on the network (or a static assignment is given for test purposes) and are told to get their VoIP configuration from some other server, ensure that the server is online and reachable from the voice VLAN.

Additional Resources

The following cisco articles provide additional information not covered in this article, and may be helpful as a reference:

    • Related Articles

    • Cisco RV180W

      Current Status:  Not recommended; use RV130 / RV130W Comments:  We suggest instead using the Cisco RV130 or RV130W.   **All routers and firewalls need to have the correct ports forwarded and Whitelisting configured for VOIP service, please click here ...
    • Cisco Pix

      Current Status Untested Suggestions Untested Comments The cisco pix firewall requires that in version 7.0 or later look at the “inspect” fields. (Prior to version 7 it was called “fixups” not “inspect”.) Make sure that the “inspect SIP” field is NO. ...
    • Cisco Routers (general)

      Current Status Compatible; may require changes Suggestions Confirm model with support. Comments The Cisco routers we have encountered appear to be quality devices that are compatible with VOIP service, but may require some changes.   **All routers ...
    • Grandstream GXW4501 Setup

      Prerequisites SIP Trunk credentials Description This document describes how to link a legacy PBX (e.g. Nortel, Shoretel, Cisco, Avaya, etc...) to a Grandstream PRI Gateway, the gateway then connects to Unitedcloud via a SIP Trunk and can process ...
    • Cisco/Linksys E1200

      Current Status Compatible Comments Suitable for small office of 2-5 phones   **All routers and firewalls need to have the correct ports forwarded and Whitelisting configured for VOIP service, please click here for more information.