How to Port Forward 3CX
PUREVPNPort ForwardingHow to Port Forward 3CX

If you wish to use a VoIP provider remotely, all you have to do is make changes to your internet firewall. This guide explains how you can open ports on your routers at home and set up your firewall for 3CX.

Requirements to Port Forward 3CX

Just before you begin with the process of port forwarding, make sure you have the following things:

  • The IP address of your router.
  • IP address of your gaming device.
  • TCP and UDP ports of 3CX for your gaming device as mentioned in the section below.

How to Port Forward 3CX

Step-by-step guide on how to port forward 3CX

Now that you have the above details noted down, you can move to the next stage of 3CX port forwarding:

  1. On your web browser address bar, type your router’s IP Address/Default Gateway.
  2. Log in with your router’s credentials (username and password) to view your router’s firmware settings.
  3. Navigate to the port forwarding section of your router.
  4. Click on Port Forwarding.
  5. Enter the IP address of your gaming device in your router in the correct box.
  6. Put the TCP and UDP ports of the 3CX server in the boxes in your router. The default 3CX port number is 5060. And then click the apply button.
  7. And you’re done. Restart your router to let the changes take effect.
  8. Once your changes take effect, now you can connect to 3CX.

3CX Default ports

To play 3CX online and create a server without any interruptions, you’ll have to allow access to certain ports on your firewall. The default 3CX ports are:

Network Port Requirements for 3CX Services

Service  Ports  Description 
Remote 3CX Apps & SBC TCP: 5090, 5091 




TCP: 443 (WebMeeting) 

TCP: 5000-5100 (Media)    
Communication between 3CX clients and Session Border Controller (SBC) WebMeeting feature for remote collaboration Media transmission for voice and video calls
3CX Video ConferenceTCP: 5090, 5091

TCP: 443 (WebMeeting) 

TCP: 5000-5100 (Media)  
Communication for video conferencing sessions WebMeeting feature for video conferencing Media transmission for video conference streams 
Other Services (SMTP & Activation)TCP: 25, 587 (SMTP)


TCP: 9000 (Activation)    
Simple Mail Transfer Protocol (SMTP) for email servicesActivation service for licensing and registration 
SIP Trunk / VoIP Provider  Varies (Check with provider)Ports specified by the SIP Trunk or VoIP provider for communication 

Steps to Configure Split DNS/ Hairpin NAT

Efficient 3CX phone system operation demands the integration of Split DNS and Hairpin NAT, which is crucial for maintaining a smooth and secure experience across internal and external networks. 

Split DNS customizes domain name resolution based on network origin, while Hairpin NAT enables internal clients to access the 3CX system using its external IP without disruptions.

Steps to Configure Split DNS:

Identify Domain Names:

  • Internal: “3cx.internal”
  • External: “yourcompany.com”

Internal DNS:

  • Resolve 3CX FQDN internally.
  • Create A record for “pbx.yourcompany.com” pointing to the internal IP.

External DNS:

  • Resolve 3CX FQDN externally.
  • Create A record for “pbx.yourcompany.com” pointing to the public IP.

3CX Management Console:

  • Set FQDN to an external domain (“pbx.yourcompany.com”).

Steps to Configure Hairpin NAT:

Router:

  • Access router interface.
  • Create a NAT rule to forward external IP traffic to the internal 3CX server.
  • Apply the rule to both TCP and UDP on essential ports (e.g., SIP, RTP).

Firewall:

  • Adjust settings to allow traffic on configured ports.
  • Create rules for the internal network to access external IP.

3CX Management Console:

  • Navigate to “Settings” > “Network” > “Firewall Checker.”
  • Run firewall checker for port validation.

Verification:

Internal Access:

  • Test internal access using external FQDN; should resolve to internal IP.

External Access:

  • Test external access using external FQDN; should resolve to external IP.

Firewall Checker:

  • Rerun checker to confirm no reported issues.

Tips For Some Famous 3CX Firewalls

Device Configuration TasksAdditional Notes   
Sonicwall FirewallPort forwarding for 3CX ports 
Enable SIP transformations  
Ensure Sonicwall security policies allow SIP and RTP traffic. Review Sonicwall documentation for specific firmware versions and recommendations.
Draytek 2820 Router     Port forwarding for 3CX ports 
Enable SIP ALG 
Implement Quality of Service (QoS) for prioritizing VoIP traffic.Draytek routers may have different models with variations in firmware; refer to specific model docs.
AVM FritzBox  Port forwarding for 3CX ports Enable or configure QoS for VoIP trafficDisable SIP ALG if present.FritzBox configurations can vary. Check the FritzBox admin interface for relevant settings.
CISCO Router Access Control Lists (ACLs) for 3CX ports
Enable QoS for VoIP   
Adjust settings for NAT and inspect SIP traffic. Cisco router configurations depend on the specific model and IOS version; refer to Cisco docs.
FortiGate 80C   Virtual IP and Firewall Policies for 3CX ports

Implement VoIP security policies 
Set up security profiles and ensure SIP and RTP traffic is allowed.  FortiGate settings may vary; consult FortiGate documentation for accurate configurations.
WatchGuard XTM Firewall Configure Packet Filter and NAT for 3CX ports
Enable SIP and H.323 ALG if available 
Adjust security settings and exceptions for VoIP traffic.Refer to WatchGuard documentation for model-specific details.  
pfSense Firewall NAT Port Forward for 3CX ports  Implement Traffic Shaping or QoS for VoIP traffic Adjust firewall rules and disable SIP ALG. Consult pfSense documentation for version-specific instructions.   
MikroTik Firewall Create NAT rules for 3CX ports 

Configure Firewall Filter Rules     
Implement Simple Queues or Queue Tree for VoIP traffic prioritization. MikroTik RouterOS versions may have differences; check documentation accordingly.  

Quickly and safely open ports using PureVPN

Opening a port shouldn’t be complicated. With the Port Forwarding add-on, it’s as simple as 1, 2, and 3!

Ports to forward on devices

Ports to run on Windows

TCP Port:5060-5061
UDP Port5060

How to open ports behind CGNAT

What if your ISP performs CGNAT? Most ISPs perform CGNAT (Carrier-grade Network Address Translation) to conserve bandwidth and assign a single IP address to multiple users connected to the same internet network. However, CGNAT makes it difficult for you to open ports on the router. 

To get around the CGNAT issue, you can use the Port Forwarding add-on to bypass this problem and port forward routers without hassle. 
Here’s more information on how to use PureVPN’s Port Forwarding add-on and bypass CGNAT in a few clicks.

PureVPN’s Port Forwarding Add-on

A secure way to open all ports

To most people, port forwarding is quite a demanding task. For starters, every router has a different console, which often makes it difficult to navigate to specific settings.

Secondly, you won’t always be able to open 3CX ports on your router if your ISP restricts the ports. Yes, you heard that right! ISPs are notorious for blocking ports due to security reasons. If ISP isn’t the reason behind a blocked port, then perhaps it could be your operating system’s firewall.

Well, you can make all these problems go away and enjoy smooth online gaming on all your desired systems with PureVPN’s Port Forwarding add-on. Through the Port Forwarding add-on, you can allow all ports, disallow all ports, and allow specific ports.

author

Sameed Ajax

date

December 6, 2023

time

5 months ago

6-Feet Tall Tech writer.

Have Your Say!!

Join 3 million+ users to embrace internet freedom

Signup for PureVPN to get complete online security and privacy with a hidden IP address and encrypted internet traffic.