Configuring Firewall Rules to Allow Incoming OVOC Traffic

If the device needs to communicate with AudioCodes OVOC, and you have configured at least one rule in the device's Firewall table, you also need to add firewall rules that permit (allow) incoming traffic from OVOC.

These OVOC-related firewall rules are required only if have configured other firewall rules in the Firewall table. If you haven't configured any rules, the device allows all incoming traffic (including from OVOC) by default and the below firewall configuration is not required.

Firewall Rules to Allow Traffic from OVOC

Index

Source IP

Source Port

Prefix Length

Start Port

End Port

Protocol

Use Specific Interface

Interface Name

Action Upon Match

Packet Size

Byte Rate

Byte Burst

0

Various rules for basic traffic.

...

N

N+1 (SNMP)

<OVOC IP address>

1161

32

161

161

udp

Enable

OAM_IF

Allow

0

0

0

N+2 (NTP)

<OVOC IP address>

123

32

0

0

udp

Enable

<interface configured for NTP>

Allow

0

0

0

N+3 (HTTP)

<OVOC IP address>

80

32

0

 

0

tcp

Enable

<interface configured for file transfer>

Allow

0

0

0

N+4 (HTTPS)

<OVOC IP address>

443

32

0

0

tcp

Enable

<interface configured for file transfer>

Allow

0

0

0

N+5 (QoE)

<OVOC IP address>

5000

32

0

 

0

tcp

Enable

<interface configured for QoE>

Allow

0

0

0

N+6 (QoE-secured)

<OVOC IP address>

5001

32

0

0

tcp

Enable

<interface configured for QoE>

Allow

0

0

0

N+7 (default - drop)

0.0.0.0

0

0

0

65535

Any

Disable

--

Block

0

0

0