User Tools

Site Tools


Port Forwarding

If you are using an IP phone to connect to Hamshack Hotline, you should never have to do port forwarding for your phone to operate. In fact, forwarding ports to your phone will leave your phone exposed to hackers and may cause undesirable operation. You could experience a host of unwanted calls from places other than Hamshack Hotline.

If you are running your own PBX Trunk, it might be possible that you would need to do some port forwarding for your Trunk circuit to work. As everyone's personal network design is different, it is impossible for us to determine if your particular PBX Trunk network setup would require it.

The following shows how to perform Port Forwarding for a PfSense firewall. While not everyone will be using PfSense, it will give you a basic understanding of what might be needed on your network to allow for your PBX Trunk circuit to connect to Hamshack Hotline.

pfSense HH Setup

SIP_IP_ADDRESS is the IP address of your phone on your network

Rule #1: ALLOW from WAN interface to SIP_IP_ADDRESS with UDP ports of 5060-5065

Rule #2: ALLOW from WAN interface to SIP_IP_ADDRESS with UDP ports of 10000-20000 for RTP traffic

pfSense v2.4.4 (depending on your software version, the steps/locations may vary slightly, but the rules remain the same)

System → Advanced → Firewall & NAT →
scroll down to TFTP Proxy
Hold down the 'Shift' key and click both 'WAN' and 'LAN'.
Release 'Shift' key.
Scroll to bottom of page and click 'Save'.

Then you will need to do the following:

Firewall → NAT → Port Forward (add/edit)
Interface: WAN (both rule #1 and #2)
Protocol: UDP (both rule #1 and #2)
Destination: Single host or alias SIP_IP_ADDRESS (both rule #1 and #2)
Destination port range: (rule #1) 5060 to 5065
Destination port range: (rule #2) 10000 to 20000
Redirect target IP: SIP_IP_ADDRESS
Redirect target port (rule #1) SIP
Redirect target port (rule #2) RTP

ts/port.forwarding.txt · Last modified: 2022/11/27 22:20 by kg6baj