----- Last Packet Received for this User ----- ----- Last Diagnostic information for this User -----resFE_MITOSFW_NET_SOCK_CONNECTIONLOST: Connection lost----- Current state -----STUN: STUN FailureRegistration: init----- Connection List: -----[0]: peerAddr=217.0.149.240:5060 TCP proxy=***.primary.companyflex.de:0 type=Provider Number of User(s)=1 [1]: peerAddr=217.0.149.16:5060 TCP proxy=***.primary.companyflex.de:0 type=Provider Number of User(s)=1 [2]: peerAddr=217.0.150.16:5060 TCP proxy=***.primary.companyflex.de:0 type=Provider Number of User(s)=1 Local TCP-port: 0Remote TCP-addr:
Interface Source Source Port Destination Destination Port NAT Address NAT Port Static PortWAN PBX_Host tcp/* * tcp/5060 WAN address * YES
Interface Source Source Port Destination Destination Port NAT Address NAT Port Static PortWAN PBX_Host * * * WAN address * YES
Quote from: Monviech on October 25, 2023, 11:28:58 amThat sounds like an issue with a stale state. The next time it happens, instead of rebooting the OPNsense, try to look at "Firewall: Diagnostics: States" and check if there are open states that went stale. You can delete them individually, or on "Actions" "Reset state table".
That sounds like an issue with a stale state. The next time it happens, instead of rebooting the OPNsense, try to look at "Firewall: Diagnostics: States" and check if there are open states that went stale. You can delete them individually, or on "Actions" "Reset state table".
If that was the problem, you could tune the behavior of states in the firewall rules that allow the traffic of the Port Forward/Outbound NAT rules (For example faster timeouts) or change it globally in:"Firewall: Settings: Advanced - Miscellaneous - Firewall Optimization"
That sounds like an issue with a stale state. The next time it happens, instead of rebooting the OPNsense, try to look at "Firewall: Diagnostics: States" and check if there are open states that went stale. You can delete them individually, or on "Actions" "Reset state table".If that was the problem, you could tune the behavior of states in the firewall rules that allow the traffic of the Port Forward/Outbound NAT rules (For example faster timeouts) or change it globally in:"Firewall: Settings: Advanced - Miscellaneous - Firewall Optimization"
I think that apart from tuning the firewall to keep the connections open for a bit longer (which would correspond to "conservative"), you could also try if you can find a setting in your PBX for "keep-alive period" and set this to something low like 30 seconds.The problem with SIP over UDP is that it is "connectionless". The outgoing UDP packets pass the firewall, but the opposite direction has to be kept open in order to allow signaling an incoming call. This can be done by telling the firewall to keep it open for a bit longer or by just keeping the SIP connection alive by telling the PBX to poll more often (aka keep-alive). Some providers allow to use SIP over TCP, which does not have this problem.
----- Configuration Data -----provider name: Telekom CompanyFlex SIP-Trunkuser name: +49XXXauthorization user name: +49XXX@tel.t-online.dedomain name: tel.t-online.detransport protocol: tcptransport security: Traditionalmedia security: RTP onlyproxy: tel.t-online.de:0registrar: tel.t-online.de:0expiration time: 540outbound proxy: XXX.primary.companyflex.de:0STUN: not used