Method for voice signal to break through firewall and network address converter
A technology of network address and firewall, which is applied in the field of tunnel-based voice signaling penetration through firewall and NAT, and can solve problems hindering the application of IP voice technology
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] Due to the shortage of IP addresses and the consideration of network security by network users, they generally need to establish their own private network, and set up NAT devices between the private network and the public network to complete the data exchange between the public and private networks. At this time, the access mode of the IP voice access device is as follows: image 3 As shown, multiple IP voice access devices (AG) are connected to NAT, and NAT is directly connected to MGC; when communicating, the media gateway controller opens a common port for the communication of VoIP packets; the voice access device communicates with the media The gateway controller sends a connection request to a specified port, and establishes a channel for VoIP message transmission; the voice access device loads the VoIP message to be sent with a VoIP type flag header and then encapsulates it into a normal communication message, and then transmits it from the above channel. Send to ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 