Skip to main content


8x8 Support

How to Configure Cisco ASA 5505 Router for 8x8 Service

Important-Icon.png The purpose of this article is to provide a sample configuration. At the time of article creation, this device was in a known working state on the firmware used. 

Keep in mind different firmware versions will interact with hosted VoIP services in different ways. While this device may be fully functional on the tested and/or current firmware version, it is possible newer revisions will cause disruptions in service or make a device fully compliant with the required settings for hosted VoIP services where it was previously not.

Cisco ASA 5505 Router


Administrative Information

  1. Make sure your router is powered on and connected to your network.
  2. In a browser on a computer on the same network as the router, navigate to the following IP address:
  3. Log in (default credentials shown below).
    • Username: <blank>
    • Password: <enable_password>

Tested on firmware version 8.2 (1).

Adding/editing 8x8 subnets is recommended when available. Please click here and review the Traffic Shaping and Specific Subnet/Port Configuration section.

Set up IP Address

  1. Go to Configuration > Device Setup > Interfaces.
  2. Click Add button on the right side of the screen to add an interface. The Edit Interface settings will appear on your screen.
  3. Under Switch Ports select Ethernet 1/0. Click the Add button to add this Ethernet port to the Selected Switch Ports
  4. Set the Interface Name and click the box next Enable Interface.
  5. Select the Use PPoE option in the IP Address section.
  6. Set the following values for the IP Address
    • Group Name
    • PPoE Username
    • PPoE Password
    • Confirm Password
  7. Select PAP for the PPP Authentication field. 
  8. Check the box at the bottom of the IP Address section to Store Username and Password in Local Flash.
  9. Click OK to apply these settings.

Edit Device Interfaces

  1.  Go to the Advanced tab in the Edit Interface settings. 
  2. Set the MTU to 1492.
  3. Click OK.

Configure Access Rules

  1. Go to Configuration > Firewall > Access Rules.
  2. Add the 8x8 subnets by clicking the Add button under the Addresses tab on the right side of the screen.
  3. Set the values below for the Access Rules for all the 8x8 subnets.
  4. Click Apply.

ACL Manager

  1. Go to Configuration > Firewall > ACL Manager
  2. Add the values below by clicking Add. Ensure that you click the Enable checkbox for each line.
  3. Click Apply.

Add Network Objects

Note: 8x8 subnets can be found in the X Series Technical Requirements.

  1. Go to Configuration > Firewall > Objects > Network Objects/Groups.
  2. Add the IP Addresses and 8x8 subnets listed in the link above by clicking the Add button.
  3. Click Apply.

Configure Policy Rules

  1. Go to Configuration > Firewall > Service Policy Rules.
  2. Set the values listed below for the Outside Interface and the Global Policy.
  3. Click Apply.
  4. Select the first service policy rule for COS1_traffic.
  5. Check the box next to Source and Destination IP Address (uses ACL) in the Traffic Criteria section.
  6. Click OK.
  7. Select the row for outside-class.
  8. Check the box next to Any Traffic under the Traffic Match Criteria section in the pop-up settings window.
  9. Click OK.
  10. Click Apply.

Set Rule Actions

  1. Go to the Rule Actions tab in the Edit Service Policy Settings window.
  2. Select the QoS tab.
  3. Check the box to Enable Policing.
  4. Select the checkboxes next to Input Policing and Output Policing.
  5. Set the values below for Input Policing and Output Policing.
  6. Click OK.
  7. Click Apply.


Session Timers, Ports, Subnets, and DSCP Values for Cisco Routers

Configure the UDP and TCP time out values per the X Series documentation

  • UDP session timer: 300 seconds 
  • TCP session timer (TLS connections only, port 5443): 300 - 700 seconds

Information on configuring these settings can be found here

Here are some values users can add to their Cisco configuration file. If subnets are set to high priority or open, specific UDP traffic passing through those subnets does not need to be listed individually.

Under Class Definitions, add:

  • match access-group 2000
  • match access-group 2001
  • match access-group 2003

Under Access List Definitions, add:

  • access-list 2000 permit udp any any dscp ef
  • access-list 2001 permit udp any any dscp af31
  • access-list 2003 permit udp any
  • access-list 2003 permit udp any
  • access-list 2003 permit udp any
  • access-list 2003 permit udp any
  • access-list 2003 permit udp any
  • access-list 2003 permit udp any
  • access-list 2003 permit udp any
  • access-list 2003 permit udp any
  • Was this article helpful?