Users Guide

Table Of Contents
941| Voice and Video Dell Networking W-Series ArubaOS 6.5.x| User Guide
Configuring Lync/Skype for Business ALG Status
Configure the controller to read Secure SIP signaling messages sent by the Lync/Skype for Business clients on
port 5061. You can enable or disable Stateful SIPS processing using the following CLI commands. This is
enabled by default.
Before you configure Lync/Skype for Business ALG status, disable classify-media. To disable classify-media, see
Disable Media Classification on page 944.
Enabling Lync/Skype for Business ALG
(host) (config) #no firewall disable-stateful-sips-processing
Disabling Lync/Skype for Business ALG
(host) (config) #firewall disable-stateful-sips-processing
Dynamically Open Firewall for UCC Clients using STUN
Prior to ArubaOS 6.4, the administrator explicitly added ACLs in the user role to allow Lync/Skype for Business
traffic on the controller. Starting with ArubaOS 6.4, the controller automatically allows firewall sessions for
Lync/Skype for Business voice and video calls. Firewall sessions for Lync/Skype for Business desktop-sharing
and file-transfer are not allowed. The administrator should manually open a range of TCP ports under the user
role to allow Lync/Skype for Business desktop-sharing and file-transfer traffic. To allow a specific range of ports
in the user role, refer the Microsoft Technet article which describes the port ranges used by Lync/Skype for
Business clients and servers.
Before media transmission, a Lync/Skype for Business client initiates a Session Traversal Utilities for NAT
(STUN) connectivity check. Sessions created by STUN are subjected to media classification that classifies the
media as Real-time Transport Protocol (RTP) or non-RTP. The firewall automatically allows the RTP session on
the controller and denies the non-RTP sessions. For the controller to accept STUN messages, you must allow
ICE-STUN based firewall traversal on the controller and allow UDP 3478 and TCP 443 ports in the user role.
Allowing ICE-STUN
To allow ICE-STUN based firewall traversal, issue the following CLI command:
(host) (config) #firewall allow-stun
Allowing UDP Port 3478
STUN uses UDP port 3478. To allow UDP port 3478 in the user role, issue the following CLI commands.
(host) (config) #user-role <STRING>
(host) (config-role) #ip access-list session stun
(host) (config-sess-stun)#any any udp 3478 permit
Allowing TCP Port 443
HTTP Secure (HTTPS)uses TCP port 443. To allow TCP port 443 in the user role, issue the following CLI
commands.
(host) (config) #user-role <STRING>
(host) (config-role) #ip access-list session https-acl
(host) (config-sess-stun)#any any svc-https permit
Configuring Per User Role Lync/Skype for Business Call Prioritization
In ArubaOS 6.3.x, you can configure the UCC call prioritization system-wide only. For example, Lync/Skype for
Business voice, video, and collaboration applications can be configured system-wide on the controller. Starting
with ArubaOS 6.4, an administrator can configure Lync/Skype for Business call prioritization on a per user-role
basis. With this feature, you can have one set of users have priority on real-time media traffic over another set