All,
I hope somebody here can help us identify and hopefully stop the traffic we see coming from an AES box we have.
First of all, I have no experience with Avaya. I am a network admin and the voip system has always been under management by external parties.
Recently we have added additional logging which showed that traffic (syn packets) from our AES was hitting our firewal. The AES constantly tries to setup a session with 192.168.42.1 on port 10001.
We have asked our 3rd party who manages our system to look into it but without luck. Also Avaya support have gone through all configurations and could not say what this is and how to disable it.
Only thing they could mention is that the IP 192.168.42.1 is the default IP for another Avaya product, IP Office if I can recall correctly. But that product we have never used in our environment.
I hope somebody here can provide us with more info and knows how to stop this.
Thank you in advance,
Wim Terstegen
I hope somebody here can help us identify and hopefully stop the traffic we see coming from an AES box we have.
First of all, I have no experience with Avaya. I am a network admin and the voip system has always been under management by external parties.
Recently we have added additional logging which showed that traffic (syn packets) from our AES was hitting our firewal. The AES constantly tries to setup a session with 192.168.42.1 on port 10001.
We have asked our 3rd party who manages our system to look into it but without luck. Also Avaya support have gone through all configurations and could not say what this is and how to disable it.
Only thing they could mention is that the IP 192.168.42.1 is the default IP for another Avaya product, IP Office if I can recall correctly. But that product we have never used in our environment.
I hope somebody here can provide us with more info and knows how to stop this.
Thank you in advance,
Wim Terstegen
Comment