Why Prioritising VoIP Matters

VoIP traffic is light on bandwidth — roughly 80–88 Kbps per call — but extremely sensitive to latency, jitter, and packet loss. Even a short delay can lead to echo, choppy audio, or dropped calls.
A correct draytek voip qos configuration ensures your voice packets always get top priority, even when your network is under heavy load.

This guide walks you through a draytek qos setup for VoIP on all DrayTek Vigor models, from home routers to enterprise-grade devices. We’ll cover quick methods, advanced class-based setups, firmware variations, and troubleshooting tips.

1. Understanding DrayTek QoS for VoIP

DrayTek routers manage bandwidth using Quality of Service (QoS).
For VoIP, there are two main options:

  • First Priority for VoIP SIP/RTP — Quick, automatic bandwidth reservation for calls.
  • Class-based QoS — Fine-grained control, allowing multiple priority levels for different traffic types.

2. Pre-Setup Checklist

Before starting your draytek qos setup, make sure you have:

  • Router login details (default IP: 192.168.1.1)
  • Latest firmware (older versions may have different menus or missing features)
  • Accurate upload/download speeds from a wired speed test (values must be in Kbps)
  • VoIP provider port details
    • SIP: UDP 5060 (sometimes 5061)
    • RTP: UDP 16384–32767 (varies per provider)

3. Logging Into Your DrayTek Router

DrayTek Vigor 2927 login screen for starting the draytek voip qos setup.


Log into your DrayTek router at 192.168.1.1 to begin the QoS configuration process.

4. Enabling QoS on Your WAN Interface


Enable QoS for the WAN interface carrying VoIP traffic, then set accurate inbound/outbound bandwidth values.

Steps:

  1. Go to Bandwidth Management > Quality of Service.
  2. Tick Enable for the WAN interface used for VoIP.
  3. Enter Inbound and Outbound bandwidth (Kbps).
  4. Apply changes.

💡 Tip: Incorrect speeds will break QoS effectiveness.

5. Quick Method — First Priority for VoIP

DrayTek Vigor 2927 Quality of Service settings with First Priority for VoIP SIP/RTP enabled.


Enable “First Priority for VoIP” to automatically reserve bandwidth for SIP and RTP traffic.

Steps:

  1. Scroll to VoIP Prioritisation at the bottom of the QoS page.
  2. Tick Enable the First Priority for VoIP SIP/RTP.
  3. If your SIP server uses a different port, update SIP UDP Port.
  4. Click OK.

How it works:

  • Reserves 2 × 88 Kbps by default per call
  • Dynamically adjusts if call quality drops or more calls occur

6. Advanced Method — Class-Based DrayTek QoS Setup

DrayTek Vigor 2927 App QoS page showing service types including VoIP options for class-based setup.


Use App QoS to assign VoIP traffic to a high-priority class for more granular control.

Step A — Set Class Priorities

  • Go to Class Setup.
  • Assign Class 1 as High Priority.
  • Reserve ~10–20% upload bandwidth for Class 1.

Step B — Define VoIP Traffic

  • In App QoS, tick your VoIP apps or create custom rules for SIP and RTP ports.
  • Apply them to Class 1.

7. Model-Specific DrayTek VoIP QoS Setup Notes

Vigor 2760 / 2830 Series

  • Menu Path: Bandwidth Management > QoS
  • Setup Tip: These older DrayTek models don’t have App QoS. You’ll need to use the Filter Setup menu to create rules for SIP and RTP ports manually.
  • Ideal for small networks where simple prioritisation is enough.

Vigor 2860–2862 Series

  • Menu Path: Bandwidth Management > QoS / Class Setup
  • Setup Tip: Supports DSCP tagging, allowing the router to prioritise traffic based on packet markings from VoIP phones or PBX systems.
  • Useful in business environments with managed switches and VLANs.

Vigor 2765 / 2865 / 2927 Series

  • Menu Path: QoS Control + App QoS
  • Setup Tip: Newer firmware can auto-detect VoIP traffic for faster setup. You can still create manual rules for specific SIP/RTP ports if needed. Get the latest firmware from DrayTek.
  • Recommended for users who want both quick setup and the flexibility to fine-tune.

Vigor 3910 and Higher

  • Menu Path: Advanced QoS per VLAN
  • Setup Tip: Perfect for larger deployments. You can dedicate a VLAN to VoIP and apply QoS rules at the VLAN level for maximum reliability.
  • Best suited for high-density offices, call centres, and enterprise environments.

8. Advanced QoS Tuning

CLI Commands (Telnet/SSH):

qos setup -I [value]  # Min download bandwidth for non-VoIP traffic
qos setup -O [value] # Min upload bandwidth for non-VoIP traffic
qos setup -v 1 # Apply limits immediately when VoIP detected

DSCP Tagging:
If your phones mark packets with DSCP EF (46), enable DSCP-based QoS to automatically prioritise them.

VLAN Segregation:
Place VoIP devices on their own VLAN and apply per-VLAN QoS rules.

9. Testing Your Setup

  • Start a heavy download.
  • Make a VoIP call.
  • Audio should remain clear and uninterrupted.
  • Check QoS Status or Syslog for “VoIP calls detected.”

10. Troubleshooting

If calls are still choppy:

  • Check that bandwidth values match real speeds.
  • Reduce lower-priority traffic limits.
  • Disable SIP ALG if causing issues.

If rules don’t match traffic:

  • Ensure they’re applied to the correct WAN.
  • Confirm SIP/RTP ports are correct.

Whether you choose the quick First Priority option or a custom class-based draytek qos setup, these steps will ensure your draytek voip qos configuration delivers crystal clear calls under any network load.

DrayTek VoIP QoS – Frequently Asked Questions

What is DrayTek VoIP QoS?

DrayTek VoIP QoS is a Quality of Service configuration that prioritises SIP and RTP voice traffic on your network, ensuring clear and stable calls even when other devices are using bandwidth heavily.

How do I perform a DrayTek QoS setup for VoIP?

To set up VoIP QoS on a DrayTek router, log in to the web interface, enable QoS for the WAN interface, set accurate bandwidth values, and either enable “First Priority for VoIP” or configure class-based rules for SIP and RTP traffic.

Is First Priority for VoIP better than class-based QoS?

First Priority for VoIP is faster to set up and works well for most home and small office setups. Class-based QoS offers more control, letting you prioritise multiple traffic types alongside VoIP.

Which ports should I use for DrayTek VoIP QoS rules?

Most VoIP providers use SIP on UDP port 5060 and RTP on UDP ports 16384–32767. Always confirm the exact ports with your provider before setting up QoS rules.

Does DrayTek QoS affect all connected devices?

Yes. Once enabled, your DrayTek QoS setup will manage traffic for all devices on the network, prioritising VoIP packets while controlling lower-priority traffic during congestion.

Enabling QoS because of call issues?

If you’re having call issues it may also be NAT issues such as SIP ALG issues or because you haven’t enabled rport.

Why SIP ALG is the Hidden VoIP Killer

If you’ve ever experienced choppy VoIP calls, conversations where the other person can’t hear you, or the dreaded “dead silence” when you answer the phone, there’s a good chance you’ve run into one of the most common yet least obvious culprits: SIP ALG. This router feature, often buried deep in the settings, can cause symptoms like calls cutting off mid-sentence, no inbound calls ringing through, or frustrating one-way audio issues.

The problem? Many routers ship with SIP ALG enabled by default. While it was designed to help with VoIP call setup and NAT traversal, in practice it often rewrites data in a way that breaks more than it fixes. Most VoIP providers recommend disabling SIP ALG for a smoother, more reliable calling experience.

Think of it as a “helpful” friend who keeps rewriting your letters before they get sent—sometimes they improve the message, but more often they just make it unreadable.

what is sip alg

What is SIP ALG? (Plain English & Technical)

Plain English:
SIP ALG stands for Session Initiation Protocol Application Layer Gateway. It’s a router feature designed to help VoIP calls work behind firewalls and NAT (Network Address Translation) by inspecting and altering SIP packets as they pass through. In theory, it’s supposed to make sure your phone system can connect smoothly to the internet by “fixing” the addressing inside those packets.

Technical:
SIP ALG operates at the application layer, intercepting SIP signalling traffic, rewriting packet headers, and modifying the SDP (Session Description Protocol) payload. The intention is to solve NAT traversal problems by ensuring that private IP addresses inside SIP messages are replaced with the public IP of the router. Unfortunately, in many implementations, this process is buggy or overly aggressive, leading to broken call setup, missing audio streams, and dropped connections.

It’s worth noting that there are alternative, cleaner ways to handle NAT traversal without rewriting SIP headers at all. For example, rport ensures NAT reply routing is maintained while leaving the original SIP message intact—avoiding many of the problems caused by SIP ALG.

Why SIP ALG Exists (and When It Helps)

SIP ALG wasn’t invented to make life harder for VoIP users—it was originally designed to solve very real networking challenges. In certain environments, especially those with symmetrical NAT or with SIP servers that lack built-in NAT traversal mechanisms, VoIP traffic can fail outright without some form of packet modification.

By intercepting SIP signalling and rewriting the addresses inside, SIP ALG can, in theory, help phones and PBXs register successfully, even when they’re sitting behind tight corporate firewalls or in networks where the router is the only device aware of the public IP. In some rare edge cases—such as legacy SIP servers that aren’t NAT-aware—it can be the difference between a working call and no call at all.

These scenarios are increasingly uncommon thanks to modern SIP servers and features like STUN, ICE, and rport, but they do still exist. Knowing when SIP ALG helps—and when it hurts—separates network troubleshooting guesswork from informed, precise fixes.

How SIP ALG Breaks VoIP

While SIP ALG is meant to help, in practice it often causes more problems than it solves. Here are the most common ways it disrupts calls:

  1. Header Mangling
    SIP ALG may alter critical SIP headers such as Contact or Via. These changes can prevent a VoIP endpoint from properly registering with the server or cause inbound calls to fail completely.
  2. Incorrect SDP Rewriting
    By inserting the wrong IP addresses or ports into the Session Description Protocol (SDP), SIP ALG can send media streams to the wrong place. This is one of the leading causes of SIP ALG one-way audio—where you can hear the other party, but they can’t hear you (or vice versa).
  3. Port Mapping Confusion
    SIP ALG can create mismatched NAT bindings, causing signalling packets and RTP streams to arrive on ports the phone or PBX isn’t expecting. This often leads to dropped calls or failed media negotiation.
  4. Blocking Server-Side NAT Solutions
    Many modern VoIP providers implement their own NAT traversal techniques. SIP ALG can override or corrupt this process, interfering with solutions like rport or STUN, and breaking otherwise healthy call flows.

SIP ALG vs Other NAT Traversal Tools

SIP ALG is just one approach to solving NAT traversal issues—but it’s also the most invasive, since it rewrites packet data in-flight. Modern VoIP environments typically use less disruptive, standards-based methods. Here’s how they compare:

  • rport – Safe, signalling-only method that ensures NAT reply routing without altering SIP headers.
  • STUN – Lets devices discover their public IP address and port mapping so they can advertise correct details in SIP/SDP.
  • Keep-alives – Periodically send small packets to maintain an active NAT binding.
  • TURN – Relays media through an external server when direct peer-to-peer streams aren’t possible.
  • Outbound proxy – Centralises NAT traversal logic by routing all SIP signalling through a single, provider-controlled server.

Why These Alternatives Work Better
Where SIP ALG modifies SIP messages on the fly—risking broken headers and mangled media paths—tools like rport, STUN, and TURN operate within established SIP and RTP standards. They focus on ensuring packets reach their destination without altering the original signalling content.

For example, rport is specifically designed to fix reply routing issues by letting the server send responses to the correct external port, all without rewriting your SIP headers. STUN and keep-alives help devices maintain accurate connection details, while TURN and outbound proxies handle more restrictive environments by providing controlled relay points.

Together, these techniques provide reliable NAT traversal without the unpredictable side effects that make SIP ALG infamous in VoIP troubleshooting.

Best Practice – SIP ALG Off, These On

For most modern VoIP setups, the safest and most reliable configuration is to turn off SIP ALG and enable standards-based NAT traversal tools instead. Here’s the checklist we recommend:

  • Disable SIP ALG on your router to prevent packet rewriting.
  • Enable rport on your phones, PBX, or ATA to ensure correct NAT reply routing.
  • Use STUN or your provider’s outbound proxy so devices know their public IP and signalling path.
  • Keep-alives enabled to maintain stable NAT bindings and prevent call drops.

If you use Plexatalk preconfigured phones or adapters, SIP ALG is already off and NAT-friendly settings like rport, STUN, and keep-alives are enabled by default—no manual tweaks needed. That means you can skip the guesswork and get straight to clear, reliable calls. This being said… your router may have SIP ALG turned on.

How to Disable SIP ALG (Router Brand Guide)

Disabling SIP ALG varies by router brand. Use the links below to jump directly to your model’s instructions:

Netgear | TP-Link | Asus | DrayTek | Mikrotik | BT Hub | Virgin Hub | Others

Netgear

  • Log in to your Netgear router’s admin panel (usually at 192.168.0.1 or 192.168.1.1).
  • Go to Advanced > Setup > WAN Setup.
  • Look for SIP ALG or Enable SIP ALG.
  • Uncheck/disable, then save settings and reboot the router.

Asus

  • Access the Asus router interface (192.168.1.1).
  • Go to Advanced Settings > WAN > NAT Passthrough.
  • Find SIP Passthrough and set it to Disable.
  • Apply and restart the router.

DrayTek

  • Log into the DrayTek web interface.
  • Go to NAT > ALG or Applications (model dependent).
  • Untick SIP ALG.
  • Save and reboot.

Mikrotik

  • Connect via Winbox or web interface.
  • Go to IP > Firewall > Service Ports.
  • Locate SIP and disable it.
  • Apply changes.

BT Hub

  • Some BT Hub models do not allow disabling SIP ALG through the interface.
  • If unavailable, you may need to:
    • Use a separate VoIP-friendly router.
    • Put the BT Hub in bridge/modem mode and connect your own router.

Virgin Hub

  • Virgin Media Hubs do not allow SIP ALG to be disabled.
  • Workarounds:
    • Enable modem mode and connect a router that supports disabling SIP ALG.
    • Use a separate VoIP gateway/router.

Others (Cisco, Zyxel, Ubiquiti, etc.)

  • Cisco: Disable SIP ALG in voice service voip settings via CLI.
  • Zyxel: Turn off SIP ALG in NAT > ALG settings.
  • Ubiquiti: In UniFi Controller, disable SIP ALG under Firewall > Settings > SIP.

What If I Can’t Disable SIP ALG?

Some routers don’t expose a toggle for SIP ALG, or their “off” setting still interferes with VoIP. If you can’t disable it, try these proven workarounds:

Workarounds

  • Use TLS to mask SIP signalling from ALG
    • Switch your phones/PBX to SIP over TLS (for signalling) so the router can’t read/modify headers.
    • Pair TLS with SRTP for encrypted media when supported.
    • Tip: Ensure server certificates and ports are correctly configured (often TCP 5061 for TLS).
  • Change the router to one without ALG (or with a better implementation *recommended*)
    • Use a VoIP-friendly router that lets you fully disable SIP ALG and supports rport, STUN, keep-alives, and outbound proxy.
    • If your ISP router allows it, enable modem/bridge mode and place your own router behind it.
  • Place the VoIP device in the router’s DMZ
    • DMZ can bypass ALG manipulation by sending unsolicited inbound replies straight to the device.
    • Security note: Only use DMZ for a dedicated VoIP device (not a PC), keep firmware updated, and restrict services to SIP/RTP.
    • Still use strong passwords and allowlists where possible.

Good to know: Plexatalk supplies VoIP-friendly routers and adapters preconfigured — SIP ALG is off and NAT-safe settings (rport, STUN/keep-alives, outbound proxy) are enabled, so you don’t need to tweak anything.

SIP ALG and Security Implications

Although SIP ALG was never designed as a security feature, its packet inspection and modification can have knock-on effects for network security — both positive and negative.

Potential Benefits

  • By rewriting SIP headers, SIP ALG can, in theory, hide internal IP addresses from the public internet.
  • Some implementations will drop malformed SIP packets, acting as a very basic filter against certain malformed traffic.

Security Risks

  • Firewall Pinholes: In poorly implemented ALGs, the automatic opening of RTP ports can create unnecessary exposure, allowing malicious traffic in.
  • Reduced Transparency: Because ALG modifies packets, it can make troubleshooting and monitoring more difficult — potentially letting suspicious traffic patterns go unnoticed.
  • Bypassing Intended Policies: Some enterprise firewalls rely on predictable packet structures for policy enforcement; ALG’s rewriting can unintentionally bypass or break these rules.

The takeaway? SIP ALG is not a replacement for VoIP security best practices. Proper security comes from TLS/SRTP encryption, strong authentication, and well-configured firewalls. If anything, disabling SIP ALG and relying on standards-compliant NAT traversal tools gives you a more predictable, auditable security posture.

Real-World Cases: When SIP ALG Helps (and When It Hurts)

Case 1 – The Legacy PBX in a Corporate LAN
A manufacturing company still ran an early-2000s SIP-based PBX that had no NAT awareness. With symmetrical NAT in place, calls simply failed without ALG rewriting headers. In this scenario, enabling SIP ALG restored basic call functionality — though long-term, replacing the PBX was the real fix.

Case 2 – The Modern Hosted VoIP Deployment
A marketing agency moved to a cloud VoIP service with rport, STUN, and keep-alives already enabled by the provider. SIP ALG was left on in their Netgear router, resulting in intermittent one-way audio and dropped calls. Disabling ALG fixed the issue immediately — no other changes needed.

Case 3 – The ISP-Locked Router
A small business using an ISP-supplied hub found SIP ALG could not be disabled. Outbound calls worked, but inbound calls often went straight to voicemail. Switching the hub to modem mode and adding a VoIP-friendly router with ALG disabled resolved the problem and improved call quality.

These examples underline the rule of thumb: ALG can help in very specific, usually outdated setups, but it’s far more likely to interfere in modern VoIP environments.

SIP-ALG FAQ’s

Do all routers have SIP ALG?

No. Many consumer and ISP-supplied routers include SIP ALG (often enabled by default), but not all do, and implementations vary widely between brands and firmware versions.

Will disabling SIP ALG break anything else?

Generally, no. Disabling SIP ALG simply stops the router from rewriting SIP/SDP messages. Other services are unaffected. If your network relied on ALG to work around strict NAT, you can use rport, STUN, keep-alives, or your VoIP provider’s outbound proxy instead.

Is SIP ALG the same as SIP passthrough?

No. SIP ALG actively modifies SIP traffic, whereas SIP passthrough usually means the router allows SIP traffic to pass untouched or opens related ports. Some vendors confuse the terminology, so check whether the feature rewrites headers—if it does, it’s effectively ALG.

Can my ISP turn it off for me?

Sometimes. Some ISP routers allow support staff to disable ALG remotely or enable modem/bridge mode. Others don’t offer this option at all. If they can’t switch it off, use your own VoIP-friendly router in place of—or in addition to—the ISP’s equipment.

Does SIP ALG affect video calls or just audio?

It can affect both. SIP controls call setup for voice and video, and RTP carries the media streams. SIP ALG header or SDP rewriting can cause one-way audio, frozen video, or failed call setup for either media type.

Why do some routers have SIP ALG turned on by default?

It was originally intended to help older SIP systems that couldn’t handle NAT traversal on their own. Many manufacturers still enable it by default for “compatibility,” even though modern VoIP setups work better without it.

How do I know if SIP ALG is causing my VoIP problems?

Typical symptoms include one-way audio, calls dropping after a fixed time, missed inbound calls, and registration failures. You can confirm by disabling SIP ALG temporarily and testing call quality—or by using a packet capture to see if headers are being rewritten.

What’s the safest alternative to SIP ALG?

Using rport, STUN, keep-alives, or your provider’s outbound proxy. These methods comply with SIP standards and maintain NAT traversal without altering SIP signalling content.

Can SIP ALG be disabled on all routers?

No. Some routers (especially ISP-branded ones) don’t provide a SIP ALG toggle. In those cases, you can use modem/bridge mode, replace the router, or use workarounds like TLS encryption for signalling.

Does SIP ALG make VoIP more secure?

No. SIP ALG is not a security feature—it’s a NAT traversal helper. It doesn’t encrypt calls or protect against attacks; in fact, it can reduce reliability by modifying packets unexpectedly.

SIP ALG was created to solve older networking problems, but in today’s VoIP environments it’s more often a source of dropped calls, one-way audio, and frustrating troubleshooting sessions. While it can help in rare edge cases, most modern systems work best when SIP ALG is disabled and standards-based NAT traversal tools take its place.

With Plexatalk, you can skip the headaches. We supply preconfigured, tested hardware with SIP ALG disabled and NAT-safe settings enabled, including rport, STUN, keep-alives, and outbound proxy support. That means your VoIP setup works reliably right out of the box — even on tricky networks.

Contact us if you want a VoIP solution that works from day one, without the trial-and-error.

Introduction — What Is rport? Why Can NAT Break VoIP?

If you’ve ever set up VoIP and run into problems where:

  • Incoming calls don’t ring unless you’ve just made an outgoing call
  • Calls connect, but you get one-way audio (you can hear them, but they can’t hear you)
  • Calls drop after exactly 30, 60, or 120 seconds
  • Your VoIP phone or app unregisters for no apparent reason

…then you’ve likely encountered a NAT traversal issue.

What is rport? VoIP NAT issues and how we get around them... newspaper clipping with man yelling "Hello? Hello? Hello!" down a phone.

NAT (Network Address Translation) is what most home and office routers use to let multiple devices share one public IPv4 address. It’s great for security and address conservation, but it changes packet headers in ways that can confuse SIP — the protocol VoIP uses to set up calls.

When SIP gets confused, call signalling packets can vanish, incoming calls fail to arrive, and audio streams may get lost.

That’s where the rport parameter comes in. Defined in RFC 3581, it’s a small change in SIP behaviour that can make the difference between unreliable and rock-solid VoIP.

At Plexatalk, most customers never need to think about rport. We preconfigure the phones and VoIP adapters we supply so they’re ready for NAT handling from the moment you plug them in. But if you’re bringing your own device, using a third-party softphone, or troubleshooting another provider’s service, understanding rport can save you hours of frustration.

Quick Answer — What is rport in VoIP?

In plain English:

rport tells a SIP server to send responses back to the IP address and port that your request actually came from — not the ones written in your SIP headers.

This matters because behind NAT, your device’s internal IP and port (e.g., 192.168.1.50:5060) are not reachable from the internet. Your provider needs to send packets to your router’s public IP and the actual source port NAT assigned (e.g., 81.2.3.4:32415).

Without rport, the server may try to send packets to your private address — and those packets never make it back.

RFC 3581 definition (simplified):

The rport parameter requests that the server send the response back to the source IP address and port from which the request originated.

Example of rport in a SIP Via header:

Without rport:

Via: SIP/2.0/UDP 192.168.1.50:5060;branch=z9hG4bK-123456

With rport:

Via: SIP/2.0/UDP 192.168.1.50:5060;branch=z9hG4bK-123456;rport

SIP, NAT, and the Problem rport Solves

SIP without NAT

When you’re on a public IP:

  1. Your phone sends a SIP request (REGISTER, INVITE, etc.).
  2. It includes its own IP and port in the Via: header.
  3. The SIP server sends its reply to that IP and port.

Everything works fine because the address in the header is valid.

What NAT changes

Behind NAT:

  • Your phone thinks it’s sending from 192.168.1.50:5060.
  • Your router rewrites this to your public IP (e.g., 81.2.3.4:32415).
  • The SIP server sees the request coming from 81.2.3.4:32415 but still reads 192.168.1.50:5060 in the Via: header.

If the server replies to 192.168.1.50:5060, the packet never arrives — NAT doesn’t know where to send it.

How rport fixes it

With rport:

  1. Your device adds ;rport (empty) to its Via: header.
  2. The SIP server fills it with the actual source port it sees (e.g., 32415).
  3. The server replies to your public IP and the correct mapped port.

That means the NAT device can forward the packet back to your phone.

RFC 3581 Mechanics — In Plain Language

RFC 3581 introduced Symmetric Response Routing for SIP over UDP.

Basic flow

  1. Client sends SIP request with rport present but empty.
  2. Receiving proxy takes the source IP and source port from the UDP header.
  3. Proxy fills in the rport parameter with the observed port.
  4. All replies are sent to that observed IP/port instead of the ones in the SIP header body.

Multi-proxy environments

In a chain of SIP proxies:

  • Each proxy appends its own received= parameter (observed IP) to the Via: header.
  • If rport is present, it also appends the observed port.
  • This ensures signalling can route back correctly even through multiple NAT layers and firewalls.

Example: Via header before and after

Before processing:

Via: SIP/2.0/UDP 192.168.1.50:5060;branch=z9hG4bK-111111;rport

After proxy sees packet from 81.2.3.4:32415:

Via: SIP/2.0/UDP 192.168.1.50:5060;branch=z9hG4bK-111111;received=81.2.3.4;rport=32415

What rport Does Not Do

rport is not a cure-all. It:

Does not replace the need for an outbound proxy in some complex topologies.

Does not solve RTP (media) traversal — you still need STUN, TURN, ICE, or symmetric RTP.

Does not keep NAT bindings open — use SIP keep-alives or periodic REGISTERs for that.

When your VoIP provider Might Ask You to Enable rport

If you’re using Plexatalk-supplied hardware (ATAs, IP phones), rport is already set.
If you bring your own device or app, your VoIP provider or even us depending on config – might recommend enabling rport if you:

  • Use Starlink, 4G/5G, or satellite broadband
  • Have double NAT (ISP router + your router)
  • Use Zoiper or another softphone that moves between networks
  • Experience incoming call failures or dropped registrations

How to Enable rport — Device Walkthroughs

Zoiper (Mobile/Desktop)

  1. Go to Settings → Accounts.
  2. Select your SIP account.
  3. Tap Network Settings.
  4. Enable “Use rport” (or similar).
  5. Save and re-register.

Grandstream IP Phones

  1. Log into the web UI.
  2. Navigate to Accounts → SIP Settings → SIP Advanced Settings.
  3. Enable “Use rport”.
  4. Save and apply.

Yealink IP Phones

  1. Log into the web UI.
  2. Go to Account → Advanced.
  3. Set “Enable Rport” to Enabled.
  4. Save and re-register.

Cisco/Linksys ATAs (e.g., SPA112)

  1. Access the ATA’s web UI.
  2. Navigate to Line → SIP Settings.
  3. Set “SIP RPort” to Yes.
  4. Save and reboot.

Plexatalk tip: If we’ve supplied your device, these settings are already correct. If you’ve brought your own, we can confirm the right configuration for your SIP account.

rport vs Other NAT Traversal Tools

  • rport – Fixes where SIP signalling replies are sent. It tells the server to use your actual public IP and the port NAT assigned, not the private address in your SIP header.
  • STUN – Lets your VoIP device discover its public IP and port mapping, which can then be used in SIP and SDP. Often used alongside rport.
  • Keep-alives – Sends small packets periodically to keep NAT bindings open. Useful so that incoming calls still work after periods of inactivity.
  • TURN – Relays SIP and/or RTP traffic through a third-party server, bypassing NAT issues entirely. More bandwidth-intensive.
  • Outbound Proxy – All signalling and media are sent to one central proxy, which handles NAT traversal for you.

Pitfalls & Misunderstandings

  • Disabling rport “just to test” often creates more problems.
  • SIP ALG in many routers can override or strip rport info — best to disable SIP ALG.
  • rport only affects SIP signalling — your RTP/media path still needs to be correct.

Example Call Flows

Without rport:

  1. Phone sends REGISTER with Via: 192.168.1.50:5060.
  2. NAT changes source to 81.2.3.4:32415.
  3. Server replies to 192.168.1.50:5060 — lost.

With rport:

  1. Phone sends REGISTER with Via: 192.168.1.50:5060;rport.
  2. NAT changes to 81.2.3.4:32415.
  3. Server fills rport=32415, replies to 81.2.3.4:32415 — delivered.

Why Preconfigured Hardware Saves Time

Plexatalk ships VoIP devices pre-tuned for UK ISPs and NAT environments. That includes:

  • rport enabled where needed
  • Correct SIP timers
  • Keep-alives configured
  • SIP ALG workarounds in place

You plug in, it works.
If you bring your own hardware, we’ll guide you — but preconfigured gear removes guesswork.

References & Further Reading

Frequently Asked Questions – rport in VoIP

What is rport in VoIP?

rport is a SIP parameter defined in RFC 3581 that tells a VoIP server to send responses to the IP address and port where your request actually came from, instead of relying on the internal IP and port in your SIP headers. It helps SIP signalling work correctly when your device is behind NAT.

Why is rport important for VoIP?

Without rport, SIP servers may send call signalling to your device’s private IP address, which can’t be reached from the internet. This can cause missed calls, one-way audio, or dropped registrations. rport ensures replies go to your real public IP and NAT-mapped port.

Does rport fix audio problems?

Not directly. rport only affects SIP signalling (call setup messages), not the RTP media stream that carries voice. For audio issues, you may also need to configure STUN, TURN, ICE, or symmetric RTP.

Do I need to enable rport?

In most cases, yes — it’s safe and can improve reliability. If you’re a Plexatalk customer using our supplied phones or VoIP adapters, rport is already enabled. If you’re using your own device or softphone, you may need to turn it on in the SIP settings.

Will enabling rport cause any problems?

No. rport is a low-risk setting that usually improves NAT compatibility. Disabling it is more likely to cause issues than enabling it.

Does rport replace STUN or keep-alives?

No. rport is complementary to other NAT traversal tools. STUN helps discover your public IP/port mapping, while keep-alives maintain NAT bindings. For best reliability, use them together.

Why might my VoIP provider ask me to enable rport?

Your provider may ask for rport if you’re experiencing inbound call issues, using mobile broadband, behind double NAT, or moving between Wi-Fi and mobile networks.

If I switch to Plexatalk, will I need to set rport?

Not if you use our preconfigured hardware — it’s already set. If you bring your own device, we’ll guide you through enabling rport along with other recommended NAT-friendly settings.