Configuring Firewalls, Security Devices, and Security Software when using Hubbub VoIP
mportant Note: This guide is intended for troubleshooting purposes. It should be referred to if you encounter issues such as being unable to make or receive calls, or experiencing no audio or one-way audio during all calls while using Hubbub VoIP service. If you are experiencing quality issues with media you should refer to the Hubbub VoIP and Call Quality guide.
Most Hubbub VoIP users have no issues receiving or making calls, but some problems can arise if your firewalls, Security Devices, and/or Security Software are not configured correctly.
Configurations for Network Administrators
To ensure a seamless operation of your Hubbub VoIP service, it’s crucial your firewall is configured to allow the necessary VoIP traffic. For individuals adept at firewall configuration, provided below are the necessary details regarding IP addresses, direction, ports, and protocols:
Note: If you are not the administrator of the firewalls involved then you should pass this guide on to the person or department responsible:
For Signalling (Required when using the installed Hubbub VoIP softphones):
- IP Addresses:
- 18.169.13.11
- 93.11.205.64
- Direction: Inbound and Outbound
- Ports: 5061
- Protocol: TCP
- ALP: SIP over TLS
- IP Addresses:
For RTP Media (Required for all Hubbub enabled VoIP systems):
- IP Addresses:
- 15.197.192.185
- 15.197.195.144
- 35.179.24.141
- 18.168.247.38
- Direction: Inbound and Outbound
- Ports: 15000-40000
- This means the whole range of ports from 15000 to 40000
- Protocol: UDP
- ALP:
- RTP with SDES encryption when using the installed softphone
- WebRTC using DLTS-SRTP when using the browser phone
Rules only required when your infrastructure has controls on outbound internet access.
It is always worth trying Hubbub VoIP without setting these rules unless you are sure you need them.
For Signalling (When users are using the browser based phone):
- Domain: sips.svc.hubbub.ai
- Direction: Outbound
- Ports: 443
- Protocol: TCP
- ALP: https upgraded to wss
For provisioning the configuration and automatic updates
- Domains:
- users.api.hubbub.ai
- providers.cloudsoftphone.com
- exports.cloudsoftphone.com
- primary.exports.cloudsoftphone.com
- update.cloudsoftphone.com
- Direction: Outbound
- Ports: 443
- Protocol: TCP
- ALP: https
- Domains:
For PUSH / Registration services on mobile apps
This rule is only needed when using Hubbub VoIP mobile softphones (IoS and Android) and not for the browser or desktop based phones
- Domains:
- frontend.meros.acrobits.cz
- reg.acrobits.cz
- Direction: Outbound
- Ports: 443
- Protocol: TCP
- ALP: https
- Domains:
For reliable calls to mobile apps
This rule is only needed when using Hubbub VoIP mobile softphones (IoS and Android) and not for the browser or desktop based phones
- IP addresses:
- 159.65.167.207, 159.65.186.176, 159.65.251.173, 159.65.252.186, 159.65.253.49, 159.89.179.103, 162.243.226.164, 165.227.65.164, 165.227.115.186, 165.227.182.9, 165.227.184.188, 165.227.190.186, 165.227.210.221, 165.227.223.68, 167.99.48.91, 167.99.119.203, 167.99.119.244
- 2604:a880:800:10::160:1, 2604:a880:0:1010::d31:1001, 2604:a880:800:a1::172e:b001, 2604:a880:800:10::69d:5001, 2604:a880:800:a1::1ad:1, 2604:a880:800:10::7e:d001, 2604:a880:800:10::790:4001, 2604:a880:800:a1::1777:f001, 2604:a880:800:10::292:1, 2604:a880:800:10::5db:1, 2604:a880:800:a1::176e:5001, 2604:a880:800:a1::1777:e001, 2604:a880:800:a1::176e:3001, 2604:a880:800:a1::172b:7001, 2604:a880:800:a1::174f:e001, 2604:a880:800:10::62b:1001, 2604:a880:800:10::72d:b001
- Direction: Outbound
- Ports TCP:443, 4998, 24998
- Ports UDP: 4998
- ALP: SIP over TLS
- IP addresses:
Notes:
- ALP – Application Layer Protocol – This is useful information for configuring many of the devices mentioned in the next section.
Other Devices and Software
There are numerous other network devices and software applications that have the potential to interrupt VoIP traffic. Configuring these elements falls outside the scope of this document, however it is worth noting that if your network or host systems use any of these technologies you will need to ensure they are capable of routing the rules mentioned at the top of this document.
- Host-Based Firewalls (Software/OS Level): Potential blocking or limiting of VoIP traffic due to stringent rules or misconfigurations.
- Corporate Proxy Servers: Can interfere with VoIP traffic due to routing, filtering, or authentication mechanisms that may block or delay VoIP packets.
- Network Gateways or Next-Generation Firewalls (NGFW): Can interfere with VoIP traffic due to routing, filtering, or authentication mechanisms that may block or delay VoIP packets.
- Intrusion Prevention Systems (IPS): May block VoIP traffic if malicious activity is erroneously detected.
- Intrusion Detection Systems (IDS): False alarms could lead to manual intervention disrupting VoIP traffic.
- Anti-Virus and Anti-Malware Software: Potential blocking or delaying of VoIP traffic due to false positives.
- Virtual Private Networks (VPNs): Introduction of latency and jitter, detrimental to VoIP call quality. refer to the Hubbub VoIP and Call Quality guide.
- Content Filtering Systems: Possible blocking or delay of VoIP traffic if restrictive filters are applied.
- Quality of Service (QoS) Configurations: Incorrect settings could deprioritise VoIP traffic, impacting call quality. refer to the Hubbub VoIP and Call Quality guide.
- Network Address Translation (NAT) Devices: May cause issues with VoIP traffic if not configured for proper translation.
- Rate Limiting Devices: Bandwidth restrictions could negatively impact VoIP traffic.
- Data Loss Prevention (DLP) Systems: Potential blocking or delay of VoIP traffic if misconfigurations occur.
- Router and Switch Configurations: Incorrect configurations could hinder optimal VoIP traffic flow.
- Bandwidth Management Devices: Insufficient bandwidth allocation could affect VoIP call quality.
- Application Layer Gateways (ALGs): Potential interference with VoIP traffic if not properly configured.
- Encryption Devices: Encryption/decryption processing could introduce latency affecting VoIP traffic.
- Packet Shapers: Misconfiguration could deprioritize VoIP traffic, affecting network performance.
Advice for homeworkers
Important Note: If you are working from home and are facing calls with poor quality audio please refer to the Hubbub VoIP and Call Quality guide. This guide is for inability to make or receive calls and no, or one way, audio when making or receiving calls.
Step 1: Verify Internet Connection
Run our VoIP Speed Test Service:
- Visit Hubbub VoIP Speed Test
- https://www.callhandling.co.uk/resources/voip-speedtest/
If it doesn’t connect:
- Check your internet connection.
- Consider restarting your router.
- Contact your Internet Service Provider (ISP) for further assistance.
Step 2: Disable Firewall/Security Software Temporarily
Disable Security Tools:
- Temporarily disable any firewalls, antivirus programs, or other security software.
If this solves the issue:
- Add rules to allow the softphone to function.
- Consult your system’s guidelines or IT support for detailed instructions.
Step 3: Check VPN Configuration
VPN Deactivation:
- If you’re using a corporate VPN, try disabling it temporarily. (Note: Hubbub calls are still encrypted even without a VPN.)
If this resolves the problem:
- Forward this guide to your network administrator.
Step 4: Enable Outbound Calls on Hubbub
Check Outbound Calls Setting:
- Ensure outbound calls over Hubbub are enabled by emailing your company name and Hubbub username to clientsupport@callhandling.co.uk for verification.
If you still experience issues:
Step 5: Contact Support if Necessary
Contact Hubbub Support:
- Email clientsupport@callhandling.co.uk and provide the following:
- Your company name
- Hubbub username
- Time and dates of failed call attempts