Which feature must you configure to open data-channel pinholes for voice packets that are sourced from a TRP within the WAN?

You are configuring a Cisco IOS Firewall on a WAN router that is operating as a Trusted Relay
Point (TRP) in a voice network. Which feature must you configure to open data-channel pinholes
for voice packets that are sourced from a TRP within the WAN?

You are configuring a Cisco IOS Firewall on a WAN router that is operating as a Trusted Relay
Point (TRP) in a voice network. Which feature must you configure to open data-channel pinholes
for voice packets that are sourced from a TRP within the WAN?

A.
CAC

B.
ACL

C.
CBAC

D.
STUN



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Tripi

Tripi

Correct !

STUN (Session Traversal Utilities for NAT) is a standardized set of methods and a network protocol to allow an end host to discover its public IP address if it is located behind a NAT. It is used to permit NAT traversal for applications of real-time voice, video, messaging, and other interactive IP communications. It is documented in RFC 5389. The STUN URI scheme is documented in RFC 7064. STUN is intended to be a tool to be used by other protocols, such as ICE.