If you want to use Setera OneCloud within a firewall-protected network, you will need to make some rules so that the Setera OneCloud PBX can communicate correctly with the devices within the network.
- In the Firewall settings, the IP range 185.255.33.208/28 must be whitelisted. This ensures that it is open to incoming and outgoing traffic, so that the Setera OneCloud services can function correctly.
- If the firewall supports SIP ALG or other kind of SIP/VoIP packet inspection, it must be disabled.
- For optimal call quality, it is recommended to set up a dedicated VLAN for voice traffic with QoS for all SIP traffic (if the corporate switch supports it).
Rules in detail
- General rules
- Mitel devices rules
- Snom devices rules
- Yealink devices rules
- Regole per dispositivi Grandstream
- OneConnect (Webphone) rules
- Mobile App rules
General rules
OUTGOING TRAFFIC | ||||
| Dest. IP(s) | Dest. Port(s) | Transport | Protocol | Comment |
| 185.255.33.208/28 | 443 | TCP | HTTPS | Service management |
| 185.255.33.208/28 | 5061 | TCP | SIPS (TLS) | SIP |
| 185.255.33.208/28 | 1024 - 65535 | UDP | RTP (SRTP) | Media/Speech |
| Any | 53 | TCP/UDP | DNS | |
| Any | 123 | UDP | NTP | |
Mitel devices rules
OUTGOING TRAFFIC | ||||
| Dest. IP(s) | Dest. Port(s) | Transport | Protocol | Comment |
| rcs.aastra.com rcs.mitel.com | 80/443 | TCP | HTTP(S) | Mitel redirector server |
| fw.setera.com 89.18.235.149/32 | 80/443 | TCP | HTTP(S) | SIP phone firmware repository |
Snom devices rules
OUTGOING TRAFFIC | ||||
| Dest. IP(s) | Dest. Port(s) | Transport | Protocol | Comment |
| secure-provisioning.snom.com | 443 | TCP | HTTPS | Snom Redirector and Provisioning Server |
| 185.255.33.208/28 | 9443 | TCP | HTTPS | OneCloud Settings Distribution for Snom |
| fw.setera.com 89.18.235.149/32 | 80/443 | TCP | HTTP(S) | SIP phone firmware repository |
Yealink devices rules
OUTGOING TRAFFIC | ||||
| Dest. IP(s) | Dest. Port(s) | Transport | Protocol | Comment |
| dm.yealink.com | 443 | TCP | HTTPS | Yealink settings & device management |
| dm.yealink.com | 8110 | TCP | DM Protocol | Yealink device management |
| ump.avsystem.cloud | 10301 | TCP | TR-069 ACS | TR-069 device management |
Yealink documentation for ports and IPs used by the provisioning service
Regole per dispositivi Grandstream
OUTGOING TRAFFIC | ||||
| Dest. IP(s) | Dest. Port(s) | Transport | Protocol | Comment |
| eu.gdms.cloud | 443 | TCP | HTTPS | Grandstream device management |
| ump.avsystem.cloud | 10302 | TCP | TR-069 ACS | TR-069 device management |
Grandstream documentation for ports and IPs used by the provisioning service
OneConnect (Webphone) rules
OUTGOING TRAFFIC | ||||
| Dest. IP(s) | Dest. Port(s) | Transport | Protocol | Comment |
| 188.118.43.65, 188.118.43.66, 188.118.43.129, 188.118.43.130 | 80/443 | TCP | HTTP(S) | Service management |
| 188.118.43.65, 188.118.43.129 | 10000-65535 | UDP | RTP / SRTP | Snom Settings Distribution |
Mobile App rules
| Sistema Operativo | Dest. Port(s) |
| Android | → Google Firebase Documentation |
| iOS | → Apple iOS Documentation |
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article