EasyManua.ls Logo

Alcatel-Lucent AOS-W 6.5.3.x - Page 949

Alcatel-Lucent AOS-W 6.5.3.x
1160 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
The port range is from 1024 to 65535.
The Web Skype4B listening port is automatically permitted by the firewall. The user does not have to explicitly
define a firewall policy to permit this port.
3. Click Apply.
In the CLI
Use the following command:
(host) (config) #web-server profile
Listen Lync XML messages on HTTP:
(host) (Web Server Configuration) #web-skype4b-listen-port http <listen-port>
Or
Listen Lync XML messages on HTTPS:
Before configuring the switch to receive Lync/Skype for Business SDN Interface messages using HTTPS, a server
certificate must be generated and installed on the switch. Server certificate can be generated either by the switch or
Certificate Authority (CA). For more information, see Obtaining a Server Certificate on page 855.
(host) (Web Server Configuration) #web-skype4b-listen-port https <listen-port>
To verify if the port is automatically permitted by the firewall, use the following command:
(host) #show firewall-cp
Configuring Lync/Skype for Business ALG Status
Configure the switch to read Secure SIP signaling messages sent by the Lync/Skype for Business clients on port
5061. You can enable or disable Stateful SIPS processing using the following CLI commands. This is enabled by
default.
Before you configure Lync/Skype for Business ALG status, disable classify-media. To disable classify-media, see
Disable Media Classification on page 952.
Enabling Lync/Skype for Business ALG
(host) (config) #no firewall disable-stateful-sips-processing
Disabling Lync/Skype for Business ALG
(host) (config) #firewall disable-stateful-sips-processing
Dynamically Open Firewall for UCC Clients using STUN
Prior to AOS-W 6.4, the administrator explicitly added ACLs in the user role to allow Lync/Skype for Business
traffic on the switch. Starting with AOS-W 6.4, the switch automatically allows firewall sessions for Lync/Skype
for Business voice and video calls. Firewall sessions for Lync/Skype for Business desktop-sharing and file-
transfer are not allowed. The administrator should manually open a range of TCP ports under the user role to
allow Lync/Skype for Business desktop-sharing and file-transfer traffic. To allow a specific range of ports in the
user role, refer the Microsoft Technet article which describes the port ranges used by Lync/Skype for Business
clients and servers.
Before media transmission, a Lync/Skype for Business client initiates a Session Traversal Utilities for NAT
(STUN) connectivity check. Sessions created by STUN are subjected to media classification that classifies the
media as Real-time Transport Protocol (RTP) or non-RTP. The firewall automatically allows the RTP session on
the switch and denies the non-RTP sessions. For the switch to accept STUN messages, you must allow ICE-
STUN based firewall traversal on the switch and allow UDP 3478 and TCP 443 ports in the user role.
AOS-W 6.5.3.x | User Guide Voice and Video | 949

Table of Contents