DE Toolkit Network Requirements
Knowledge Base

Network Requirements

Network Requirements Reference

Every UCaaS deployment depends on the customer’s network. This document gives you the numbers, formulas, and configuration requirements to assess any customer network and flag any problems before they become go-live failures.


Bandwidth requirements

Formula

Required bandwidth = (peak concurrent calls) × (codec bandwidth) × 1.25 (overhead factor)

Peak concurrent calls: Typically 15–25% of total seat count for a standard business. Contact centers may be 50–80%.

Codec bandwidth:

CodecBandwidth per call (each direction)Quality
G.711~87 kbpsGood (default)
G.729~27 kbpsAcceptable
G.722~87 kbpsHD voice

Quick reference by seat count

Seat countEst. peak concurrentBandwidth needed (G.711)Minimum connection
102217 kbps5 Mbps up/down
255544 kbps10 Mbps up/down
50101.1 Mbps25 Mbps up/down
100202.2 Mbps50 Mbps up/down
200404.3 Mbps100 Mbps up/down
50010010.9 Mbps250 Mbps up/down

Note: These minimums are for voice only — the customer’s internet also carries email, file downloads, video streaming, and cloud backups. Always ask what the peak business internet usage looks like and whether a dedicated voice circuit or VLAN is in place.


Quality targets

MetricTargetAcceptableProblem
MOS≥4.03.5–3.9<3.5
Jitter<20ms20–40ms>40ms
Latency (one-way)<100ms100–150ms>150ms
Packet loss<1%1–3%>3%

QoS configuration

Why QoS matters

Without QoS, a file upload or video stream can saturate the connection and cause voice packet drops. With QoS, the router/switch prioritizes voice packets even under load.

DSCP markings

VoIP audio should be marked DSCP EF (Expedited Forwarding) = decimal 46 = binary 101110. SIP signaling should be marked DSCP CS3 = decimal 24.

All major UCaaS platforms expect incoming audio marked DSCP EF and will mark their own outgoing audio accordingly.

Configuration by router type

Cisco IOS (enterprise routers):

! Mark outbound voice traffic
class-map match-any VOICE-RTP
 match ip dscp ef
policy-map VOICE-PRIORITY
 class VOICE-RTP
  priority percent 30
interface GigabitEthernet0/1
 service-policy output VOICE-PRIORITY

Ubiquiti UniFi (common SMB): Settings → QoS → Enable Smart Queue → set Upload and Download bandwidth → Enable VoIP prioritization

Fortinet FortiGate: Policy & Objects → Traffic Shaping → Create shaper for VoIP → Apply to firewall policy for UCaaS IP ranges

Meraki: Network-wide → QoS → Voice and Video → Enable → Priority: High for the UCaaS IP ranges

Consumer-grade routers (Netgear, TP-Link, Asus): Most support basic QoS in their admin UI. Set to “prioritize voice” or enable WMM (Wi-Fi Multimedia). This is significantly less reliable than enterprise QoS. Flag as a risk for customers on consumer hardware.


Firewall port requirements

Universal requirements (all platforms)

PortProtocolDirectionPurpose
5060UDPOutboundSIP signaling (unencrypted)
5061TCP/UDPOutboundSIP-TLS (encrypted signaling)
10000–20000UDPBidirectionalRTP media (voice audio)
443TCPOutboundAdmin portals, softphone provisioning
80TCPOutboundProvisioning (some devices)

Platform-specific additions

RingCentral:

  • UDP 19302–19309: STUN
  • UDP 5080: additional SIP
  • IPs: 66.81.240.0/20, 216.82.240.0/20, 213.19.0.0/21 (partial — full list at rc.com/support)

8x8:

  • UDP 5060–5090: SIP range
  • IPs: 216.115.192.0/20 (partial — verify at 8x8.com/support)

Webex Calling:

  • TCP/UDP 8934: Webex-specific
  • Full IP and port list: help.webex.com/firewall-setup

Best practice: Download the current port and IP list from each platform’s support documentation before configuring the firewall. These ranges change and published lists may be outdated in training materials.


SIP ALG

SIP ALG (Application Layer Gateway) is a firewall feature that attempts to modify SIP packets passing through NAT. It is designed to help but almost always causes problems:

  • Modifies SIP headers in ways that break the signaling
  • Causes one-way audio (breaks NAT traversal)
  • Causes calls to drop at fixed intervals (session table issues)
  • Breaks DTMF transmission

SIP ALG must be disabled on every UCaaS deployment. No exceptions.

How to disable SIP ALG by firewall

FirewallHow to disable
Cisco ASAno inspect sip in the service-policy
Fortinet FortiGateNetwork → SIP → SIP ALG → Disabled
Ubiquiti EdgeRouterset service nat rule X exclude-destination address or via CLI: delete system conntrack modules sip
MerakiFirewall → L7 Firewall → Block SIP ALG → DO NOT check this box — instead disable under SD-WAN
SonicWallFirewall → VoIP → Disable SIP Transformations
NetgearNot all models support this — consider replacing if SIP ALG cannot be disabled

Voice VLAN

A voice VLAN is a separate logical network segment for VoIP traffic. Benefits:

  • Isolates voice traffic from general internet traffic for better QoS
  • Allows PoE control per-VLAN
  • Simplifies firewall rules (allow entire VLAN outbound on voice ports)
  • Security: voice traffic separated from corporate data

When to recommend a voice VLAN

  • Customer has >25 seats
  • Customer has managed switches (Cisco Catalyst, HP ProCurve, Ubiquiti, Meraki)
  • Customer has reported call quality issues in the past

When not to require it

  • Very small deployments (<10 seats)
  • Unmanaged switches (can’t be configured)
  • Single softphone deployment with no desk phones

NAT traversal

All UCaaS platforms handle NAT via STUN/TURN built into the platform. You generally don’t need to configure anything on the customer side for NAT traversal to work, as long as:

  1. SIP ALG is disabled
  2. The firewall allows outbound UDP on the RTP port range
  3. The firewall session timeout for UDP is ≥120 seconds

Symptoms of NAT traversal failure:

  • One-way audio on external calls (works internally)
  • Calls connect but no audio
  • Calls work on LTE but not on office Wi-Fi

Diagnostic: Place a call from inside the office network. Then place the same call from a phone on LTE hotspot. If LTE works and office Wi-Fi doesn’t: NAT/firewall issue. If both fail: platform configuration issue.


Internet connection types — what to expect

Connection typeTypical throughputReliabilityNotes
Business fiber (symmetric)50–1000 MbpsExcellentPreferred for UCaaS
Business cable (DOCSIS)25–500 Mbps down / 5–50 Mbps upGoodAsymmetric — check upload
T1/DS11.5 Mbps symmetricExcellentStill common in small markets; very limited bandwidth for UCaaS
Bonded T13–12 Mbps symmetricExcellentBetter, still limited
DSL5–50 Mbps down / 1–10 Mbps upFairAvoid for UCaaS if possible
Fixed wireless25–100 MbpsVariableWeather-dependent; check jitter
Satellite (Starlink)50–200 MbpsGoodLatency ~20–40ms — acceptable for UCaaS. Legacy GEO satellite (HughesNet, Viasat) has 600ms+ latency — NOT suitable

T1 red flag: A 50-seat customer on T1 (1.5 Mbps) has approximately 14 kbps of voice capacity per user at peak — not enough for G.711. Document as a hard blocker and require ISP upgrade before migration. This comes up more often than you’d expect in smaller markets.