DATAVO - LAN Requirements

LAN INFRASTRUCTURE REQUIREMENTS FOR HPBX SERVICES

 

DATAVO IS NOT RESPONSIBLE FOR THE CONFIGURATION OF INDIVIDUAL NETWORK DEVICES REQUIRED TO ENSURE CUSTOMER SERVICES FUNCTION PROPERLY.  THE FOLLOWING INFORMATION HAS BEEN PROVIDED TO ALLEVIATE THE POTENTIAL OF A FAILURE OR INCONSISTENT VOICE SERVICES AS A RESULT OF AN IMPROPERLY CONFIGURED LAN ENVIRONMENT.

 

IP ADDRESSING

The Customer is responsible for providing the proper static, public IPv4 addresses for all Datavo Hosted VoIP managed endpoints (Service test point, analog and digital device gateways) within the Customer Premises Network, typically only one to three addresses (later described as CustPubIP#1 through N). These addresses must be contiguous, and begin with an IP address that is a multiple of 4 or 8 in the last octet.

 

Customers are highly encouraged to provide a dedicated IEEE 802.1q Virtual LAN for all phone and HPBX service devices to intercommunicate within, in which case all phones will be provided private IPv4 addresses as part of the Service.  Customers providing a dedicated IEEE 802.1q Virtual LAN are required to heed all LAN equipment manufacturers’ best practices to mitigate common Ethernet attacks such as "VLAN Hopping" and "MAC Flooding" and provide security of the dedicated VLAN. Datavo is not responsible for Service issues arising from Customer’s failure to prevent OSI Layer 2-based attacks on VoIP endpoints.

 

Without a dedicated VLAN, the Customer will be required to provide valid IPv4 addresses to Datavo for all phones as well. IN SUPPORT OF FCC E9-1-1 REQUIREMENTS, THE IP RANGE USED FOR THE DATAVO HOSTED VOIP PHONES MUST BE BUILDING SPECIFIC (i.e. AN IP RANGE CAN NOT SPAN DIFFERENT PHYSICAL ADDRESSES). 

 

If the Customer chooses to employ static IPv4 addressing, then the Customer-provided IPv4 addresses, gateways, subnet masks must be provided to DATAVO prior to staging and installation of the endpoints.  If the Customer chooses to use the Dynamic Host Control Protocol (DHCP) to provide these Customer IP addresses dynamically, then the customer must ensure that any endpoint so configured will be granted an IP Address lease by the Customer’s DHCP server within 30 seconds of receiving a Request by a DATAVO Hosted VoIP endpoint.

 

REQUIREMENTS FOR QUALITY OF SERVICE

QoS is necessary in IP networks due to the fact that they are characterized by bursty traffic and "best-effort" delivery. This presents significant problems for real-time applications like voice and video. Best effort delivery may be acceptable for Web traffic or e-mail, but voice requires the maintenance of service within various performance parameters in order to achieve acceptable quality standards for business communications.  

 

DELAY OR LATENCY REQUIREMENTS

In order to have an intelligible conversation, the human voice has to stay within an end-to-end perceptual "delay budget" as recommended by the G729 specification.  The end-to-end (LAN and WAN) one-way delay budget for this service is 150 ms.

 

JITTER OR DELAY VARIATION REQUIREMENTS

The effect of jitter in a VoIP network is to increase both delay and packet loss. Jitter increases delay because a jitter buffer is used to smooth out the inter-arrival times of the voice packets. Voice quality will be affected if the Datavo requirement that the maximum jitter for voice traffic exceeds 50ms, and the average jitter exceeds 13 ms, for any single call.

 

PACKET LOSS REQUIREMENTS

When voice packets are lost during transport in IP networks, the result is a perceptual degradation in the quality of the end users’ conversation. Datavo requires that packet loss not exceed 1%

 

PACKET CLASSIFICATION AND MARKING

All voice packets transmitted via the Service are marked by either the end user device (e.g, IP phones) or PSTN gateways. The customer WAN and LAN components must preserve the setting in these packets, and should prioritize the transmission of traffic marked with these settings over both WAN and LAN, to maximize Voice over IP application performance. The packet markings in the Differentiated Code Services Point field are Per-Hop-Behavior Expedited-Forward (EF, decimal 46), for all real-time traffic. Web portal and HVS Toolbar traffic will be marked as Best Effort unless otherwise marked by the customer’s hosts or LAN infrastructure.

 

REQUIREMENTS FOR SECURITY

Premises network security is the responsibility of each Customer. The following guidelines have been developed to assist Datavo customers plan and implement integration of hosted IP telephony into their existing IT security framework. Customers are responsible for making the following configuration changes, as well as determining whether their existing firewalls/network security devices are technically capable of functioning securely for the voice application.

 

FIREWALLS/PERIMETER SECURITY

Datavo requires that sessions using the following ports and protocols be opened from outside any Customer firewall to specific inside devices in order to not interfere with the passage of voice traffic and the operation of Datavo- managed Hosted VoIP Service devices. These sessions will be initiated from the following Datavo-defined public IP addresses designated below, destined for one or more devices on the Customer’s network, with Customer-provided Public IPv4 addresses.

 

Protocol

Destination Port(s)

Originating IPs

SIP

5060/UDP&TCP

216.130.48.200

SIP

5050/UDP

216.52.233.70

RTP

16384-25386/UDP

216.52.233.72

HTTPS

443/TCP

216.52.233.66

SSH

22/TCP

216.52.233.179

SNMP

161/UDP

ECHO

ICMP

HTTPS

443/TCP

SSH

22/TCP

SNMP

161/UDP

ECHO

ICMP

 

It is required that all traffic received in response to valid sessions opened through the use of the Service will be passed through any Customer firewalls without payload modification or translation.

 

All other traffic transmitted by Datavo will be for sessions initiated from devices inside any Customer network security perimeter(s); should the Customer’s network security policies limit outbound traffic or inbound traffic in response to valid outbound sessions, additional policy modifications may be required as specified by Datavo for successful operation of the Service.

 

APPLICATION LAYER GATEWAYS

Datavo strongly recommends that customers disable inspection of SIP protocol traffic associated with the Service, in all customer-managed Application Layer Gateways, firewalls, and Network Address Translation devices.

 

Customers who choose to utilize a firewall, router or other device to inspect SIP protocol traffic must configure it to perform as a SIP-aware ALG, compliant with all SIP Methods contained in IETF RFC 3261, and any future SIP standards as deemed appropriate by Datavo in the enhancement of this Service. If the customer uses a private IP addressing scheme and uses NAPT (Network Address Port Translation) to conserve the use of public IP addresses, the customer’s firewall, or other device negotiating this translation, must also provide a SIP-aware translation, in accordance with Datavo specifications, to preserve proper performance of the Service.