6 Transport Management

After completing the Setup Wizard, you can manage your PortSIP PBX through the Web Portal.

PortSIP PBX supports multiple SIP signaling transports, including UDP, TCP, and TLS. You must configure which transports and ports the PBX listens on to accept SIP registrations and calls.

Important Only System Administrators are allowed to create or delete SIP transports. When deleting transports, at least one transport must always remain configured.

The Setup Wizard configures a default transport automatically. To modify or add transports, sign in to the PBX Web Portal as a System Administrator and navigate to: Call Manager > Transports

Click Add to create a new transport.


Firewall Considerations

When you add a new SIP transport, you must update firewall rules to allow traffic on the selected port.

  • IP phones and client applications connect to the PBX using the configured transport protocol and port

  • If the PBX is deployed on a cloud platform such as Amazon Web Services (AWS), you must:

    • Open the port on the OS-level firewall

    • Open the same port in the cloud platform firewall (for example, AWS Security Groups)

Failure to do so will result in registration failures and call setup issues.


Adding UDP, TCP, or TLS Transports

To add a new SIP transport:

  1. Navigate to Call Manager > Transports.

  2. Click Add.

  3. In the Transport protocol field, select UDP, TCP, or TLS.

  4. Specify a listening port:

    • Default ports:

      • UDP: 5060

      • TLS: 5061

      • TCP: 5063

    • You may choose a different port if required, provided it is not already in use.

  5. Click OK to add the transport.


Adding a TLS Transport (Secure SIP)

Before adding a TLS transport, you must prepare TLS certificate files.

Refer to Preparing TLS Certificates to obtain a certificate from a trusted third-party provider for your PBX Web Domain (for example: uc.portsip.cc).

To add the TLS transport:

  1. Navigate to Call Manager > Transports.

  2. Click Add.

  3. Select TLS as the transport protocol.

  4. Specify the listening port (default: 5061).

  5. Click OK to save the configuration.

Best Practice TLS is strongly recommended for deployments exposed to the public internet to protect SIP credentials and signaling traffic.


Configuring Firewall Rules (Linux / firewalld)

If you create custom transport ports instead of using the default ones, you must explicitly open those ports on the firewall.

Example Scenario

You created the following transports:

  • UDP on port 5066

  • TCP on port 5071

  • TLS on port 5072

  • WSS on port 5075

Run the following commands on the PBX server:

Important Opening the OS firewall alone is not sufficient for cloud deployments. You must also open the same ports in the cloud platform firewall, such as AWS Security Groups.


Summary

  • SIP transports define how and where the PBX listens for signaling traffic

  • Only System Administrators can manage transports

  • Always ensure:

    • At least one transport remains configured

    • Firewall rules are updated at both the OS and cloud levels

  • Use TLS wherever possible for secure, internet-facing deployments

Last updated