Connectivity Requirements

9Line for CUCM Overview

The 9Line for CUCM services relies on communication between your Cisco UCM servers, the 9Line Agent, your SBCs, and the 9Line Cloud. The 9Line Agent does not participate in the critical call path for emergency 911 or test 933 calls.

Inspection Considerations

The 9Line Agent authenticates with the 9Line cloud using certificates. Because these certificates identify and authenticate each agent connection, TLS/SSL traffic between the 9Line Agent and the 9Line data centers must not be subject to TLS/SSL inspection unless deploying the agent with a Proxy server configuration. Additional information on configuring the proxy settings is included in the Agent document 9Line for CUCM Agent Download and Installation.

Firewall Rules

The table below lists only the destination ports to the 9Line services. Client-side ephemeral ports are not listed. All services except the Azure Container Registries are routed through Cloudflare for security and DDoS protection purposes.

9Line IP Addresses are not shared in this public-facing document; please log in to the 9Line Support Portal to access the IP Information.

If your firewall can filter based on a URL, we recommend allowing all traffic to our domain. Otherwise, configure your firewall for the Cloudflare IPs available at https://www.cloudflare.com/ips.

For SIP signaling and media traffic behind firewalls, the SIP Application Layer Gateway functionality must be disabled, and traffic should be allowed on the ports and protocols as defined in the configuration section.

Purpose

Source

Destination

Protocol

Ports

Primary SIP signaling (No TLS)

Your SBC external-facing leg

Refer to 9Line Support Portal IP Information

TCP

5060

Secondary SIP signaling
(No TLS)

Your SBC external-facing leg

Refer to 9Line Support Portal IP Information

TCP

5060

Primary SIP signaling
(with TLS)

Your SBC external-facing leg

Refer to 9Line Support Portal *IP Information

TCP

5061

Secondary SIP signaling
(with TLS)

Your SBC external-facing leg

Refer to 9Line Support Portal IP Information

TCP

5061

Primary Audio Media

Your SBC external-facing leg

Refer to 9Line Support Portal IP Information

UDP

40000-60000

Secondary Audio Media

Your SBC external-facing leg

Refer to 9Line Support Portal IP Information

UDP

40000-60000

Agent - 9Line Communication

Your 9Line Agent IP

mgmt.9line911.com
api.9line911.com
9line911agent.azurecr.io
packages.9line911.com

TCP

443

Agent - Telemetry and Metrics: Required for 9Line to provide Application Logging and Troubleshooting

Your 9Line Agent IP

  • .applicationinsights.azure.com
  • .applicationinsights.microsoft.com
  • .services.visualstudio.com
  • .livediagnostics.monitor.azure.com

TCP

443

Agent - Manager Alerts

Your 9Line Agent

api.opsgenie.com

TCP

443

CURRI*

Your CUCM servers

calling.9line911.com

TCP

443

Portal Administration

Internal PCs

portal.9line911.com

TCP

443

DNS

Your 9Line Agent IP

DNS Server*

TCP/UDP

53

DNS**

Your CUCM servers

DNS Server

TCP/UDP

53

NTP

Your 9Line Agent

Internal or Internet

UDP

123

* When configuring "CUCM Clusters" in the 9Line portal, if using the CUCM hostname(s) rather than the IP address, the DNS server specified must be able to resolve the CUCM server hostname(s). This is typically an internal server address. External DNS servers like 8.8.8.8 or 1.1.1.1 will not resolve the internal CUCM hostname.

** Applicable only for CURRI integrations. When using CURRI, your CUCM server(s) must be able to resolve 9Line hostnames.

DMZ Port Usage

If your organization utilizes internal firewalls to segment internal trusted networks, the following ports must be configured for the 9Line Agent to communicate with your telephony infrastructure and network.

PurposeSourceDestinationProtocolPorts
SNMPYour 9Line Agent VM IPYour Network Switches and CUCM cluster(s)UDP161
AXLYour 9Line Agent VM IPYour CUCM cluster(s)TCP8443
SSHYour management network(s)Your 9Line Agent VM IPTCP22
NTPYour 9Line Agent VM IPInternal or InternetUDP123

Optional Rules for 9Line Monitoring

If you wish to enable the optional 9Line monitoring through Azure Arc, the following additional rules must be enabled. All traffic occurs over encrypted TCP/443 (TLS). Note: Rules labeled “Always” only apply if you wish to use the Azure Arc Monitoring feature.

Destination

Description

When Required

aka.ms

Used to resolve the download script during installation

At installation time, only.

packages.microsoft.com

Used to download the Linux installation package

At installation time, only.

login.windows.net

Authentication / Azure Active Directory

Always

login.microsoftonline.com

Authentication / Azure Active Directory

Always

pas.windows.net

Authentication / Azure Active Directory

Always

management.azure.com

Azure Resource Manager - to create or delete the Arc server resource

Always

*.his.arc.azure.com

Metadata and hybrid identity services

Always

*.guestconfiguration.azure.com

Extension management and guest configuration services

Always

guestnotificationservice.azure.com
*.guestnotificationservice.azure.com

Notification service for extension and connectivity scenarios

Always

azgn*.servicebus.windows.net

Notification service for extension and connectivity scenarios

Always

*.servicebus.windows.net

For Remote Support SSH scenarios

If the customer wishes to enable customer-driven remote support via SSH.


RTP Port Ranges - Customer SBC’s

Your SBC platform determines your RTP port range. Any firewall rules you create regarding RTP will need to take this into account. The following documentation discusses changing the range for Cisco SBC Platforms RTP - Negotiated UDP port range with Cisco CUBE.

SIP TLS and SRTP Requirements

  • Signed Certificate Exchange using PKI; no registration required.
  • Encryption (recommended: AEAD_AES_256_GCM). Other options include:
    • AEAD_AES_128_GCM
    • AES_CM_128_HMAC_SHA1_80
    • AES_CM_128_HMAC_SHA1_32
  • TLS 1.2 exclusively for SIP Signaling (port 5061 required).
  • SRTP via DTLS.

Helpful Documentation: Cisco Unified Border Element Configuration Guide - Cisco IOS XE 17.6 Onwards - SRTP-SRTP Interworking


Supporting Emergency Callback

Kari's Law mandates that 911 operators be able to initiate a call to the person who called 911 in the event of an emergency call disconnection. In the context of Kari's Law compliance, 9Line offers a crucial feature in managing the callback telephone number mapping for each call. This telephone number is essential for emergency call tracking and callback functionality.

When an outside party, such as a 911 dispatcher, calls the 9Line managed telephone number, 9Line’s Session Border Controllers (SBCs) will initially receive the call. Subsequently, 9Line relays the call back to the customer’s SBC IP address. The customer’s SBC will route to the Cisco Unified Communications Manager (CUCM) and, ultimately, to the original phone that initiated the 911 call.

To support this feature, create firewall rules that allow for SIP traffic originating from 9Line’s SBCs to your SBCs to pass. The 9Line IP addresses specified above are applicable, as are the TCP port for signaling and the UDP ports for media. The destination IP address and signaling port for an emergency callback from 9Line can be specified as an alternate IP and Port. This is configured by editing the Voice Gateway in the 9Line portal.

Third-Party Cookies

If your organization blocks third-party cookies, please note the required domains for cookies below. These apply to administrators when performing configuration tasks at https://portal.9line911.com and Jabber users when accessing the 9Line gadget in the Jabber client. Ideally, all domains specified below would be accessible. However, if security policy dictates, please ensure the required domains are allowed. If your security policy prevents this, please raise a ticket via the support portal for further discussion with 9Line.

DomainRequiredPurpose
*.cloudflare.comYesUsed by Cloudflare Web App Firewall, caching, and portal performance acceleration.
*.9line911.comYesUsed to control access and operational state in the 9Line portal.
*.azure.comYesUsed by Azure load balancers and application gateways to route traffic to 9Line systems.
*.userpilot.ioNoInteractive user guides and portal surveys.