We did this on the MT set sip disabled=yes ports=5060,5061
What you are proposing will also block legitimate VOIP traffic thru the Mikrotik. Regards. Faisal Imtiaz Snappy Internet & Telecom On 10/13/2010 9:01 AM, Scott Piehn wrote: > I am seeing in my MT firewall connections traffic that is flagged as > sip, but the source port and destination port is the same 5060. Allot of > the remote sites are not in the US. > question: Will the following rule drop and good traffic. like actual > phone calls > X chain=forward action=drop protocol=udp src-port=5060 dst-port=5060 > --------------------------------------------- > Scott Piehn > > > > > > -------------------------------------------------------------------------------- > WISPA Wants You! Join today! > http://signup.wispa.org/ > -------------------------------------------------------------------------------- > > WISPA Wireless List: [email protected] > > Subscribe/Unsubscribe: > http://lists.wispa.org/mailman/listinfo/wireless > > Archives: http://lists.wispa.org/pipermail/wireless/ -------------------------------------------------------------------------------- WISPA Wants You! Join today! http://signup.wispa.org/ -------------------------------------------------------------------------------- WISPA Wireless List: [email protected] Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
