6 Transport Management
After completing the Setup Wizard, you can manage your PortSIP PBX through the Web Portal.
PortSIP PBX supports multiple SIP signaling transports, including UDP, TCP, and TLS. You must configure which transports and ports the PBX listens on to accept SIP registrations and calls.
❗ Important Only System Administrators are allowed to create or delete SIP transports. When deleting transports, at least one transport must always remain configured.
The Setup Wizard configures a default transport automatically. To modify or add transports, sign in to the PBX Web Portal as a System Administrator and navigate to: Call Manager > Transports
Click Add to create a new transport.
Firewall Considerations
When you add a new SIP transport, you must update firewall rules to allow traffic on the selected port.
IP phones and client applications connect to the PBX using the configured transport protocol and port
If the PBX is deployed on a cloud platform such as Amazon Web Services (AWS), you must:
Open the port on the OS-level firewall
Open the same port in the cloud platform firewall (for example, AWS Security Groups)
Failure to do so will result in registration failures and call setup issues.
Adding UDP, TCP, or TLS Transports
To add a new SIP transport:
Navigate to Call Manager > Transports.
Click Add.
In the Transport protocol field, select UDP, TCP, or TLS.
Specify a listening port:
Default ports:
UDP:
5060TLS:
5061TCP:
5063
You may choose a different port if required, provided it is not already in use.
Click OK to add the transport.
Adding a TLS Transport (Secure SIP)
Before adding a TLS transport, you must prepare TLS certificate files.
Refer to Preparing TLS Certificates to obtain a certificate from a trusted third-party provider for your PBX Web Domain (for example: uc.portsip.cc).
To add the TLS transport:
Navigate to Call Manager > Transports.
Click Add.
Select TLS as the transport protocol.
Specify the listening port (default:
5061).Click OK to save the configuration.
❗ Best Practice TLS is strongly recommended for deployments exposed to the public internet to protect SIP credentials and signaling traffic.
Configuring Firewall Rules (Linux / firewalld)
If you create custom transport ports instead of using the default ones, you must explicitly open those ports on the firewall.
Example Scenario
You created the following transports:
UDP on port
5066TCP on port
5071TLS on port
5072WSS on port
5075
Run the following commands on the PBX server:
❗ Important Opening the OS firewall alone is not sufficient for cloud deployments. You must also open the same ports in the cloud platform firewall, such as AWS Security Groups.
Summary
SIP transports define how and where the PBX listens for signaling traffic
Only System Administrators can manage transports
Always ensure:
At least one transport remains configured
Firewall rules are updated at both the OS and cloud levels
Use TLS wherever possible for secure, internet-facing deployments
Last updated