I’d Tunnel you’re traffic between your endpoint routers using GRE or GRE and IPSEC if you want security also. GRE is VERY to configure on Cisco routers and it’s an open standard so other router vendors should work too. Using access-lists to pick out your h323 traffic you want to encapsulate (i.e. VoIP traffic between two endpoints) in a GRE Tunnel that’s unencapsulated on the other side. No ISP I know of would block a GRE or IPSEC tunnel for fear their blocking “legit” data traffic.
If they are, simple, change ISPs.
my isp did the same thing to us. We had to switch ports. But the GRE tunnel idea is genius, i never thought of that (Duhhh!!!) I can do that in several of my pops to keep the local isp spies from sneaking up on us.
VPN tunneling is working fine with Quintum and ATA 186 from several places. Keep those pesky ISP away, and you do not have to go trought gatekeepers anymore. The internal I.P. does not change inside the VPN.
ll your remote locations are now stationary I.P. address, like they were static, but without the price.
Viewing 9 posts - 1 through 9 (of 9 total)
The forum ‘Voice over IP’ is closed to new topics and replies.