We did this on the MT

set sip disabled=yes ports=5060,5061

What you are proposing will also block legitimate VOIP traffic thru the 
Mikrotik.

Regards.


Faisal Imtiaz
Snappy Internet & Telecom


On 10/13/2010 9:01 AM, Scott Piehn wrote:
> I am seeing in my MT firewall connections traffic that is flagged as
> sip, but the source port and destination port is the same 5060. Allot of
> the remote sites are not in the US.
> question: Will the following rule drop and good traffic. like actual
> phone calls
> X chain=forward action=drop protocol=udp src-port=5060 dst-port=5060
> ---------------------------------------------
> Scott Piehn
>
>
>
>
>
> --------------------------------------------------------------------------------
> WISPA Wants You! Join today!
> http://signup.wispa.org/
> --------------------------------------------------------------------------------
>
> WISPA Wireless List: [email protected]
>
> Subscribe/Unsubscribe:
> http://lists.wispa.org/mailman/listinfo/wireless
>
> Archives: http://lists.wispa.org/pipermail/wireless/


--------------------------------------------------------------------------------
WISPA Wants You! Join today!
http://signup.wispa.org/
--------------------------------------------------------------------------------
 
WISPA Wireless List: [email protected]

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to