

SNMP engineID is shared between units in ASA 9.13 and below. If one or all of your phones cannot get an IP address, they may say Network is down or Configuring, then you will need to contact your IT or a Cisco technician.Well, we monitor both of them (ifMIB, CPU, memory, etc), because it's not possible to monitor standby interfaces/memory by polling active (although see MIBs below).Port security can be setup on these Cisco devices to not allow a phone to use specific Ethernet ports on the firewall unless your IT or a Cisco technician adds the phone's MAC address to a trusted list.As long as all outbound traffic from the Intermedia devices is allowed, which it is by default on these Cisco devices, then creating firewall rules (ACLs) for the phones is usually unnecessary.

This reduces the time it takes for the phones to resolve domain names, which ensures the phones stay registered with our servers.DNS proxy/relay needs to be disabled so that the phones are told to use the efficient DNS servers instead of sending their DNS requests to the firewall or another local DNS server to then have the requests relayed to outside DNS servers.This is because many ISP DNS servers take too long to relay the Polycom phones' DNS lookup requests, which causes the phones to intermittently lose registration.If you have or plan to purchase Polycom phones, the DHCP server needs to instruct the phones to use efficient DNS servers, like Google's 8.8.8.8/8.8.4.4 or OpenDNS, as their Primary and Secondary DNS servers.The phones either need to be on the same subnet as the computers or on a separate subnet with their own compatible router. Disable Auto Voice VLAN if your ASA has this feature.

Your IT or a Cisco technician will need to add the following line to your Cisco firewall's configuration to disable SIP ALG and SIP packet filtering on the SIP ports the Intermedia devices use:.They usually require either plugging a computer into the Console port on the back on the firewall or connecting to the firewall using a remote administration service, like Telnet, if enabled.The ASA devices usually don't have a web interface.Intermedia cannot make the changes below for you.

