Documentation Index
Fetch the complete documentation index at: https://docs.getsmartalex.com/llms.txt
Use this file to discover all available pages before exploring further.
Audience: network engineer or firewall admin at the customer site. Purpose: complete network requirements in one page so you can fill in a change request without searching for missing details.
Outbound connections required
Your PBX (and any SIP endpoint that reaches SmartAlex) needs outbound access to:| Destination | Port | Protocol | Purpose |
|---|---|---|---|
sip.voice.getsmartalex.com | 5060 | UDP | SIP signalling, default |
sip.voice.getsmartalex.com | 5060 | TCP | SIP signalling, reliable transport option |
sip.voice.getsmartalex.com | 5061 | TCP/TLS | SIP signalling over TLS |
| SmartAlex media range | 10000–60000 | UDP | RTP audio, symmetric |
IP allowlisting
SmartAlex’s SIP infrastructure does not have a static IP range. Cloud-native infrastructure means source IPs can change. Options if your firewall requires IP-based rules:- Use the hostname
sip.voice.getsmartalex.comin the firewall rule. Most modern firewalls support FQDN-based rules that resolve and refresh periodically. - Allow 0.0.0.0/0 for UDP 5060 outbound from the PBX specifically. Combined with digest authentication on the trunk, this is secure: only authenticated INVITEs succeed.
- Put the PBX in a DMZ with broad outbound rules and restrictive inbound rules.
DNS
DNS lookup forsip.voice.getsmartalex.com must resolve correctly from your PBX:
NAT and SIP ALG
SIP ALG (Application Layer Gateway) is a feature in many business-grade firewalls that attempts to rewrite SIP headers for NAT traversal. It invariably breaks something: session timers, REFER targets, SDP bodies. Modern SIP handles NAT correctly without ALG. Turn it off. Common firewalls that have SIP ALG enabled by default:- Cisco ASA (disable with
no sip inspecton the global service policy) - Fortinet FortiGate (disable
sip-disable-session-helpers) - Sonicwall (disable SIP Transformations under VoIP settings)
- Mikrotik (remove the
sipservice port) - pfSense (disable under Firewall → NAT)
- SophosXG (disable SIP Helper)
MTU and fragmentation
SIP INVITEs can exceed the default Ethernet MTU of 1500 bytes when carrying many codecs or headers. If you see failed registrations or missing calls during high-load windows:- Verify MTU end-to-end between PBX and internet edge
- Test with a smaller packet:
ping -c 4 -s 1450 -M do sip.voice.getsmartalex.com - If fragmentation is an issue, either enable TCP transport (5060 TCP) which segments properly, or reduce MTU on the relevant interface
RTP port range
SmartAlex sends and expects RTP on the range 10000–60000 UDP. Your firewall must allow outbound to this range, and must allow the return path (stateful firewalls do this automatically when UDP session state is tracked). RTP session timeout on the firewall should be at least 1800 seconds (30 minutes). If session timeouts are shorter, long calls will drop mid-conversation.TLS and SRTP
For customers requiring encrypted signalling and media:- TLS on port 5061 for SIP signalling
- SRTP for RTP media
*.sip.livekit.cloud (our SIP ingress infrastructure). If a customer PBX strictly validates the hostname in the certificate against the hostname it dialled (sip.voice.getsmartalex.com), the check will fail.
Two options:
- Use UDP or TCP 5060 (unencrypted signalling). Most customers are comfortable with this when combined with VPN or a private peering arrangement.
- For TLS, configure the PBX to dial the raw ingress hostname directly instead of the branded CNAME. Contact support for the current ingress hostname.
Bandwidth
Each concurrent call uses approximately:| Codec | Sustained bandwidth |
|---|---|
| G.711 u-law or A-law | 90 kbps both directions |
| G.722 (HD) | 90 kbps both directions |
| G.729 (if enabled) | 30 kbps both directions |
Quality of Service (QoS)
Not strictly required, but recommended for production:- DSCP mark RTP packets as EF (46) and SIP as AF41 (34) outbound from the PBX
- If your ISP honours DSCP, this prioritises voice over best-effort traffic on congested links
- On internal links between PBX and firewall, map DSCP into your QoS policy
Test commands
From your PBX or a machine in the same network segment:Firewall change request template
Copy this into your change ticket:Next steps
Security & Compliance
Encryption at rest, retention, compliance posture.
3CX
3CX-specific setup.
Troubleshooting
When things don’t work.

