Select Page

1. Introduction


The purpose of this document is to offer guidelines to End Users on how the LAN & WAN environment should be configured in order to be able to run the Horizon service successfully their site.
Horizon is designed to work using public IP addressing for access and as such this provides more than just the provision of speech and signalling protocols; it also provides access to other publicly available services which Horizon requires to function correctly.
If an end user wish to utilise their access solution (WAN), they need to ensure that the solution can meet the requirements and functionality set out in this document. Failure to meet these requirements will result in quality and setup/support issues.

 

2. DNS / Firewall Configuration

DNS must resolve to the below IP addresses /ports open on the customer firewall.

Domain Name Record Type IP Address Ports Function
xsp.unlimitedhorizon.co.uk A 88.215.61.171

88.215.61.173

88.215.50.177

88.215.50.178

TCP 80, 443 Device provisioning, including soft clients and software downloads
dms.mypabx.co.uk A 88.215.60.165

88.215.60.167

TCP 80, 443 Soft client provisioning and software downloads
xsi.unlimitedhorizon.co.uk

xsi-int.unlimitedhorizon.co.uk

 

A 88.215.60.155

88.215.60.156

88.215.60.166

88.215.60.168

88.215.50.193

88.215.50.194

TCP 443 Soft clients, Integrator, TAPI
xsip1.unlimitedhorizon.co.uk A 88.215.60.156 TCP 443 Soft clients, Integrator, TAPI
xsit1.unlimitedhorizon.co.uk A 88.215.60.155 TCP 443 Soft clients, Integrator, TAPI
xsih1.unlimitedhorizon.co.uk A 88.215.50.193

 

TCP 443 Soft clients, Integrator, TAPI
xsij1.unlimitedhorizon.co.uk A 88.215.50.194

 

TCP 443 Soft clients, Integrator, TAPI
xsip2.unlimitedhorizon.co.uk A 88.215.60.166 TCP 443 Soft clients, Integrator, TAPI
xsit2.unlimitedhorizon.co.uk A 88.215.60.168 TCP 443 Soft clients, Integrator, TAPI
N/A A 127.0.0.1 TCP 21050 Tapi
clients.unlimitedhorizon.co.uk

URLs

https://clients.unlimitedhorizon.co.uk/receptionist

https://clients.unlimitedhorizon.co.uk/callcentre

 

A 88.215.60.162

88.215.60.163

TCP 443 Receptionist, Call Centre Clients
clientp.unlimitedhorizon.co.uk A 88.215.60.162 TCP 443 Receptionist, Call Centre Clients
clientt.unlimitedhorizon.co.uk A 88.215.60.163 TCP 443 Receptionist, Call Centre Clients
im.unlimitedhorizon.co.uk A 89.149.156.75 TCP 5222 Instant messaging and presence (for softphone clients)
www.gointegrator.com A 104.24.109.175 104.24.108.175 TCP 80, 443 Integrator
ntp.business-access.co.uk A 88.215.61.81
88.215.63.145
UDP 123 NTP for time/date display
europe.pool.ntp.org A 178.79.162.34

78.47.138.42

148.251.127.15

46.165.212.205

UDP 123 NTP for time/date display

Polycom

ldap.unlimitedhorizon.co.uk A 88.215.60.129

88.215.60.132

TCP 389, 636 Corporate Directory Service

2.1 Voice and Video Traffic

Voice and video traffic from all Horizon IP phones and soft-clients route via Horizon Access SBCs as defined below. Occasionally new Horizon Access SBCs will be added to the list and the change will be communicated via regular channels.

 

IP address Protocol and Ports Function
88.215.63.171 UDP 5060, TCP 5080 SBC SIP signalling
88.215.63.21 UDP 5060, TCP 5080 SBC SIP signalling
88.215.58.1 UDP 5060, TCP 5080 SBC SIP signalling
88.215.55.33 UDP 5060, TCP 5080 SBC SIP signalling
88.215.54.1 UDP 5060, TCP 5080 SBC SIP signalling
88.215.58.129 UDP 5060, TCP 5080 SBC SIP signalling
88.215.58.161 UDP 5060, TCP 5080 SBC SIP signalling
88.215.58.2 UDP 10000- 60000 SBC RTP Traffic
88.215.63.172 UDP 10000- 60000 SBC RTP Traffic
88.215.54.2 UDP 10000 – 60000 SBC RTP Traffic
88.215.55.34 UDP 10000 – 60000 SBC RTP Traffic
88.215.63.22 UDP 10000- 60000 SBC RTP Traffic
88.215.58.130 UDP 10000- 60000 SBC RTP Traffic
88.215.58.162 UDP 10000- 60000 SBC RTP Traffic
88.215.48.0 /25 UDP 5060, TCP 5080, UDP 10000- 60000 SBC SIP signalling, SBC RTP Traffic

3. SBC Discovery

DNS SRV records are used to provide high availability service for Horizon IP phones and soft-clients. DNS SRV records resolve to two or more DNS A-records, which in turn resolve to IP addresses of Horizon Access SBCs. This mechanism provides each Horizon device with multiple SBCs to send or receive calls.

Domain Name Record Type Service Name Protocol Port Function
sipX.unlimitedhorizon.co.uk

 

Example

_sip._udp.sip1.unlimitedhorizon.co.uk
_sip._udp.sip9.unlimitedhorizon.co.uk

SRV sip UDP 5060 SRV Records for Horizon Voice Signalling Traffic

X Being the variable for any number (previous version showed 1-8)

siptX.unlimitedhorizon.co.uk

Example

_sip._tcp.sipt3.unlimitedhorizon.co.uk

SRV sip TCP 5080 SRV record for SIP ALG bypass for Horizon Desktop Clients
sipmX.unlimitedhorizon.co.uk

Example

_sip._tcp.sipm3.unlimitedhorizon.co.uk

SRV sip TCP 5080 SRV record for SIP ALG bypass for Horizon Mobile Clients
mobile-sipX.unlimitedhorizon.co.uk

 

Example

_sip._tcp.mobile-sip1.unlimitedhorizon.co.uk

SRV sip TCP 5080 SRV Records for Horizon Mobile Client Voice Signalling Traffic
nodex.sip.unlimitedhorizon.co.uk

 

Example

node4.sip.unlimitedhorizon.co.uk

 

A NA NA NA A Records for Horizon Voice Signalling Traffic

4. UDP Fragmentation during Horizon communications.

In some instances, the size of the UDP packets transmitted between the Horizon platform and customer handsets will exceed the default 1500-byte payload, when this happens packet fragmentation will occur. It is the responsibility of the Channel Partner and/or End User to ensure that any in path CPE is able to support UDP fragmentation. It is also advised that a check is made to confirm that any further applications/functions running on the CPE do not interfere with the reassembly of fragmented UDP packets.

If UDP fragmentation is not allowed on CPE network devices the following features may not function correctly.

  • BLF (Busy Lamp Field)
  • Feature Synchronisation (DND, Call Forward Busy, Call Forward Always & Call Forward Unreachable/No Answer)
  • Incoming calls to Horizon devices after a series of call forwards within the same Horizon Company

5. SIP ALG

SIP Application Layer Gateway (ALG) is common in many of today’s routers and in most cases enabled by default on enterprise, business and home broadband routers.  Its primary use is to prevent problems associated to the router’s firewalls by inspecting VOIP traffic packets, and if necessary, modifying them to allow connection to the required protocols or ports.

On many business and home class routers Active SIP ALG will cause a mixture of problems by adjusting or terminating Horizon traffic packets in such a manner that they are corrupted and cause issues with the service, manifesting in a range of intermittent issues such as; one-way audio, dropped calls, problems transferring calls, handset dropping registration and making or receiving internal calls.

SIP ALGs should be disabled on all CPE routers, we will not accept any faults or issues raised against Horizon if a SIP ALG is enabled.

For instructions on disabling this feature please refer to the specific router user guide. We have a limited selection of instructions for completing this via telnet which are available on the knowledge base under technical support > misc.

 

5.1 Desktop client SIP ALG bypass

Summary
For deployments featuring Horizon Desktop Client, on Windows and Mac OS, please ensure that firewalls allow access to Gamma SBCs on TCP port 5080. TCP 5080 is a non-standard port for SIP traffic so SIP ALGs will not inspect and alter the traffic.

Detail

Prior to January 2019 all Horizon Desktop clients used standard SIP protocol and port UDP 5060 to communicate with Horizon SBCs.

Due to its portability Horizon Desktop Client is often used in remote access situations, at home or on public internet connections where SIP ALG may be present and it is outside the user’s control to disable it.

From January 2019 Horizon Desktop client used new DNS SRV records as defined in the SBC Discovery section of this document. These records route SIP traffic to the Horizon Access SBCs via TCP 5080 first choice. TCP 5080 is a non-standard port for SIP traffic so SIP ALGs will not inspect and alter the traffic.

Between January 2019 and August 2019 Horizon Desktop client used DNS records to provide a fallback to UDP 5060 if TCP 5080 was blocked on the customer firewall. This is being phased out due to compatibility issues with the Desktop client.

From August 2019 the Horizon Desktop client will only send SIP signalling to the Horizon SBCs on TCP 5080.

6. Keep ALives

Handsets are pre-configured to send UDP keep-alive messages towards the Horizon platform every 45 seconds using the SIP port. These messages keep the firewall pin-holes open which ensures the success of incoming calls.

7. UDP NAT Timeout

Set UDP NAT Timeout > 572 seconds.

Some routers have been reported to close NAT pinholes despite Horizon phones sending keep-alives every 45 seconds. To protect against this occurring, it is recommended that UDP NAT Timeout on the router is set higher than the SIP registration refresh interval for Horizon phones. That is higher than 572 seconds.

8. NAT Port Translation

For Horizon handsets to register correctly, if using a router that requires setting up Dynamic Port Address Translation – Port Multiplexing option must be selected..

9. DNS

A public DNS service must be available to the Horizon handsets so that the domain names can be resolved to the associated IP addresses. SRV and A record types are used by the Horizon service. As best practice resilience of DNS needs to be considered hence both a primary and secondary DNS service should be configured as part of any deployment.

10. Handsets (Clients on customer network)

  • The phones require a DHCP address, hence must have access to a DHCP server.
  • (Fixed static IP’s are not supported).

NAT must be used and enabled for DHCP pool supplied to phones

 11. Support for Vlans

Both Cisco and Polycom phones provided as part of the Horizon service have CDP (Cisco Discovery Protocol) and LLDP (Link Layer Discover Protocol) enabled as default on delivery. Yealink Dect supports LLDP only . These protocols, CDP (Cisco proprietary), and LLDP including LLDP-MED (vendor neutral), are link layer protocols used by network devices for advertising their identities and capabilities in order to assist with management of the local area network environment, specifically VLAN segregation.

If you wish to support either of these functions for VLAN configuration/selection on the customer LAN, then you should enable the desired function on the customer’s network equipment and disable the alternative option. For example, if you wish to support CDP for a particular end user you should make sure LLDP is not configured as a live option on their network equipment and that CDP is enabled as a live option.

When using LLDP or CDP the Horizon phones will support and use any VLAN ID configured on the customer switching infrastructure (as part of the LLDP and CDP configuration) for both Voice and Data. If the customer wishes to daisy chain laptops or PC’s using the switch port on the Horizon phones, any traffic from this port will be entered into the data VLAN.

Example VLAN set up (using CDP/LLP)

Example Data VLAN: 20

Example Voice VLAN: 30

What we don’t support:

  • Fixed VLAN ID’s
  • Static VLAN assignment either directly from the phone or from the core network.
  • We cannot enable only one of the VLAN options (either CDP or LLDP). Both will always be enabled on Horizon phones and it is the customer’s responsibility to enable/disable the required function on their network.

Please be aware the Softphone Clients & ATA’s do not currently support VLAN .

12. Phon RTP Port Ranges

Horizon phones will send/receive RTP from the following port ranges:

Device RTP port min RTP port max
Mobile client (Android/iOS) Audio 8500 8599
Mobile client (Android/iOS) Video 8600 8699
Desktop client (Windows/Mac) Audio 8500 8599
Desktop client (Windows/Mac) Video 8600 8699
Polycom_xxx 2222 2268
Yealink_xxx 16384 16538
Cisco_122 16384 16482
Cisco_232 16384 16482
Cisco_501 16384 16538
Cisco_502 16384 16538
Cisco_504 16384 16538
Cisco_509 16384 16538
Cisco_525 16384 16482

Horizon Customer Configuration