Call automation for data driven teams | FreJun

Firewall Traversal

« Back to Glossary Index

Firewall Traversal refers to the techniques and protocols that allow VoIP traffic to pass through firewalls and NAT (Network Address Translation) devices without compromising network security. It ensures seamless VoIP communication, especially in remote or enterprise environments.

Here’s a more detailed explanation:

What it is:
Firewalls are designed to block unauthorized or unknown internet traffic — which can include VoIP packets. Firewall traversal enables VoIP systems to work smoothly by navigating or bypassing these barriers securely, allowing audio and video calls to connect without interruption.

How it works:
When a VoIP call is initiated, the devices must exchange data over specific ports. Firewalls or NAT routers can block this traffic unless traversal methods are in place. Protocols like STUN (Session Traversal Utilities for NAT), TURN (Traversal Using Relays around NAT), and ICE (Interactive Connectivity Establishment) help establish and maintain the VoIP connection.

Benefits:

  • Seamless connectivity: Enables VoIP calls across various networks, including behind corporate firewalls.
  • Improved remote access: Supports remote workers and mobile users with consistent call quality.
  • Enhanced security: Ensures only safe, authorized VoIP traffic is allowed through the firewall.
  • Reduced call failures: Fixes one-way audio, dropped calls, or failed connections due to firewall blocks.
  • Supports global teams: Crucial for distributed teams accessing VoIP systems from multiple networks.

Key components:

  • STUN servers: Help clients discover their public IP and port info.
  • TURN servers: Relay media when direct peer-to-peer connection fails.
  • ICE protocol: Combines STUN and TURN to select the best connection path.
  • SIP ALG configuration: SIP Application Layer Gateway (often disabled) affects call routing through firewalls.

Why it’s beneficial:
Without firewall traversal, VoIP systems can become unreliable or completely unusable in secure networks. These protocols make it possible to maintain high-quality, secure voice communication —  even in environments with complex network configurations.