What is double NAT in my VoIP network?

Double NAT is a silent VoIP killer. Calls “mostly work” until they do not. Then you get one-way audio, random drops, and hard-to-read logs.

Double NAT means two routers or firewalls are doing NAT back-to-back, creating two private networks. This breaks SIP and RTP reachability because inbound packets and port mappings become unpredictable.

DJSlink SP intercom behind double NAT
Diagram showing ISP Router NAT #1 and Customer Router NAT #2 inside a cloud, with paths to internet services and a customer router with Wi-Fi connecting a DJSlink SP intercom handset

Most VoIP problems blamed on “the provider” are local network problems. Double NAT is one of the most common. Once Network Address Translation (NAT) 1{#ref-1} is understood, fixing it is usually straightforward and repeatable.


How does double NAT affect SIP registration and RTP?

Double NAT often looks harmless because the phone still shows “Registered.” Then calls fail in weird ways and only some networks are affected.

Double NAT can keep SIP registration barely alive with outbound traffic, but it often breaks inbound SIP (INVITE/NOTIFY) and RTP media paths because ports and IPs change twice and time out faster.

SIP registration across local network
SIP cloud labeled Local Area Network LAN where a desk phone and an intercom/base unit register using contact and Via header changes

What SIP expects, and what NAT changes

SIP signaling was designed to carry endpoint addressing inside messages. NAT rewrites the packet headers, not the SIP body. If two NAT devices rewrite and track state independently, the SIP server may see one IP/port, while the phone believes it is reachable at another.

This mismatch is small during registration (outbound, stateful). It becomes painful during inbound calls, BLF/NOTIFY updates, transfers, and re-INVITEs, because those rely on NAT pinholes staying open and consistent.

RTP is even more sensitive than SIP

RTP is usually UDP and uses dynamic ports. During a call, each side tells the other where to send media (IP + port) inside Session Description Protocol (SDP) 2{#ref-3}. With double NAT, the “outside view” may not match what the endpoint advertises. Even when signaling succeeds, RTP may be sent to an unroutable private address, or to a port that is no longer mapped.

That is where you get silent audio, one-way audio, or audio that starts then dies after 20–60 seconds. If you want the canonical behavior, it’s defined in the Real-time Transport Protocol (RTP) 3{#ref-4} spec.

Why “it works for a few minutes” is a NAT timer problem

Many consumer gateways use short UDP timeouts. Double NAT means two separate timeout clocks. Your phone can be fine on the inner NAT, but the outer NAT drops the mapping first. Keepalives and shorter registration intervals can mask this, but they do not remove the root cause.

VoIP function What it needs What double NAT breaks Typical symptom
SIP REGISTER Outbound reach + stable mapping Outer NAT expires early Random deregistration
Inbound INVITE PBX/ITSP must reach phone Inbound blocked or misrouted Missed calls, failed ring
SIP NOTIFY (BLF/MWI) Unsolicited inbound updates NAT/firewall blocks NOTIFY Stuck BLF lights, no voicemail lamp
RTP media Correct IP/port mapping Wrong SDP, port mapping drift One-way or no audio
Re-INVITE/transfer Mid-call signaling reliability Timer/NAT mapping resets Drops during transfer/hold

Why do I get one-way audio or failed calls with double NAT?

One-way audio is the classic sign. It is also the most confusing for non-VoIP teams because “the call connected,” so people assume audio should be automatic.

One-way audio happens when SIP signaling succeeds but RTP can only travel in one direction due to NAT mappings, wrong SDP addresses, blocked UDP ports, or SIP ALG rewriting headers incorrectly in a double NAT path.

One-way audio / media path troubleshooting
Illustration of an operator with headset and PC, a wireless media device, and a remote video caller; SDP and CNT paths are highlighted with the caption ‘I hear them’ to show signaling vs media flow

The most common failure patterns

Inbound audio missing, outbound audio OK. Your endpoint can send RTP out, but the return RTP cannot find a valid mapping back through both NAT layers.

Audio drops after ~30–60 seconds. Often NAT pinholes timing out or SIP session refresh failing (UPDATE/re-INVITE/keepalive behavior differs by platform).

Transfers fail / park-retrieve breaks / hold-resume breaks. Transfers frequently change the RTP endpoints mid-call (new SDP, new ports). Double NAT increases the chance the new mapping does not line up, so the transferred leg has dead audio or fails to connect.

SIP ALG makes double NAT worse

SIP Application Layer Gateway (SIP ALG) 4{#ref-5} tries to “help” by modifying SIP packets. In practice, it often breaks them—especially when two devices are trying to rewrite headers/SDP. Result: calls that work only to some destinations, or only from one side.

How to confirm it is double NAT fast

A quick check is your router’s WAN IP:

  • If WAN IP is public, you likely have single NAT.
  • If WAN IP is private (like 192.168.x.x, 10.x.x.x, 172.16–31.x.x), you are in RFC1918 private address space 5{#ref-2} and there is another NAT upstream.

Then confirm the path:

  • Phone → inner router → ISP gateway → internet
Symptom Likely cause inside double NAT What to check first
One-way audio RTP return path blocked WAN IP is private, UDP timeouts, firewall rules
No inbound calls Inbound INVITE cannot reach endpoint Port forwards, NAT pinholes, PBX reachability
BLF/MWI stuck NOTIFY blocked inbound Firewall “unsolicited” traffic, NAT binding time
Drops on transfer Re-INVITE changes RTP ports ALG, NAT mapping stability
Works on LAN only NAT traversal fails offsite SBC/ICE support, NAT keepalives

How can I fix double NAT—bridge mode, DMZ, static routes, or UPnP off?

Most fixes are about one goal: remove one NAT layer. If that is not possible, then control the damage by making NAT behavior predictable.

The best fix is to eliminate one NAT layer using bridge mode or access-point mode. If you cannot, use a DMZ to your VoIP router, disable SIP ALG and UPnP, and stabilize NAT timers and routing.

Before and after NAT / bridge-mode fix
Side-by-side ‘Before’ and ‘After’ diagram: left shows ISP gateway performing NAT; right shows customer router using bridge-mode pass-through for secure connectivity to user devices

Fix option 1: Put the ISP gateway in bridge mode (best)

Bridge mode turns the ISP device into a modem. Your own router/firewall becomes the only NAT device. This usually fixes inbound SIP/RTP issues immediately and makes troubleshooting simpler.

Watch-outs:

  • Bridge mode may disable ISP Wi-Fi (often fine in business networks).
  • You may need PPPoE credentials or VLAN tagging, depending on the carrier.
  • Your router must handle the public IP and firewall rules.

Fix option 2: Put your second router into AP mode (also best)

If the ISP gateway must stay as the router, convert the downstream router to Access Point mode (no NAT, no DHCP). This removes double NAT without needing bridge mode.

Fix option 3: DMZ to the downstream router (damage control)

If you cannot disable NAT on either device, DMZ can help by forwarding inbound traffic from the ISP gateway to the WAN IP of your VoIP router. It reduces inbound blockage, but it still leaves two NAT layers. Treat it as a workaround.

If you use DMZ:

  • Disable SIP ALG on both devices.
  • Disable UPnP on both devices.
  • Harden the downstream firewall and admin access.
  • Use strong SIP credentials and rate limits.

Fix option 4: Static routes (special cases)

Static routes can solve reachability between the two private subnets, but they do not remove NAT. For SIP trunks over the internet, static routes alone rarely fix one-way audio.

Why UPnP off is usually the right call

UPnP opens ports automatically. In voice networks it’s unpredictable and unsafe, and it can create conflicting mappings across two NAT layers. For VoIP, predictable policies beat automatic holes.

Fix method Best when VoIP benefit Main downside
ISP bridge mode You control the edge firewall Removes double NAT fully Requires edge-router ownership
Router AP mode ISP gateway must route Removes double NAT fully Less control on ISP gateway features
DMZ to router No other option Improves inbound reach Still double NAT, more risk
Port forwards on both Emergency workaround Can allow some inbound flows Hard to maintain, still fragile
Static routes Controlled internal routing need Helps internal reach Does not solve NAT for internet paths

Should I use STUN, TURN, or an SBC to handle double NAT?

Sometimes you cannot change the ISP equipment (multi-tenant buildings, retail chains, temporary sites). In those cases, NAT traversal tools can keep VoIP stable—but each has limits.

STUN can help endpoints discover their public mapping, TURN can relay media when direct RTP fails, and an SBC is the most reliable business option because it anchors signaling and media and controls NAT behavior.

Where are your users? NAT options decision tree
Flow chart starting with ‘Where are your users?’ branching to Home single NAT, Remote hotel CGNat, and Office, then to ‘ISP gateway + own router’ and down to_)

When STUN helps (and when it doesn’t)

STUN 6{#ref-6} helps the endpoint learn “what the internet sees.” With double NAT it may still work, but reliability drops if the outer NAT is symmetric or changes mappings often. STUN also doesn’t fix strict inbound firewall behavior—it improves discovery, not permission.

TURN is the safety net for media

TURN relays RTP through a reachable server, so both sides send media to TURN instead of directly to each other. This can eliminate one-way audio on hostile networks. Trade-off: added bandwidth cost and added latency (important to test for doors/intercom talk-over).

ICE is the “try best path first” strategy

Many modern softphones and WebRTC clients use ICE (STUN+TURN candidates), which is often the most practical approach for remote users behind unknown networks.

SBC is the business-grade answer

A Session Border Controller (SBC) 7{#ref-7} (your own, or your provider’s) makes NAT traversal boring by:

  • Keeping SIP sessions pinned (often with TCP/TLS)
  • Anchoring media so RTP has a stable, known path
  • Enforcing policy (TLS/SRTP, rate limits, fraud controls)
  • Managing keepalives and timers consistently

For multi-site and mixed endpoints, an SBC is usually the cleanest long-term solution.

Option What it solves well What it does not solve Best fit
STUN Address discovery Strict/symmetric NAT, inbound blocks Small sites, simple NAT
TURN Media reachability Adds relay cost and latency Remote users, unknown networks
ICE (STUN+TURN) Best-path selection Needs client support Softphones and WebRTC users
SBC Signaling + media stability + security Requires design and licensing Business VoIP, multi-site, SIP trunks

Conclusion

Double NAT is two layers of address translation that confuse SIP and RTP. Remove one NAT if possible (bridge mode or AP mode). If not, disable SIP ALG/UPnP, stabilize timers, and consider TURN/ICE or (best for business) an SBC to keep signaling and media predictable.

Footnotes


  1. NAT overview and why address/port rewriting breaks reachability for VoIP without stable mappings.  

  2. Explains SDP fields that advertise media IP/ports—often the source of one-way audio under NAT.  

  3. RTP standard reference for how real-time voice media is transported (and why UDP loss hurts).  

  4. Why SIP ALG rewrites SIP/SDP and commonly causes failures—especially with two NAT devices.  

  5. Defines RFC1918 private IP ranges used to quickly confirm an upstream NAT exists.  

  6. STUN standard describing public mapping discovery for clients behind NATs.  

  7. SBC functions and terminology for anchoring SIP/RTP and enforcing edge policy predictably.  

About The Author
Picture of DJSLink R&D Team
DJSLink R&D Team

DJSLink China's top SIP Audio And Video Communication Solutions manufacturer & factory .
Over the past 15 years, we have not only provided reliable, secure, clear, high-quality audio and video products and services, but we also take care of the delivery of your projects, ensuring your success in the local market and helping you to build a strong reputation.

Request A Quote Today!

Your email address will not be published. Required fields are marked *. We will contact you within 24 hours!
Kindly Send Us Your Project Details

We Will Quote for You Within 24 Hours .

OR
Recent Products
Get a Free Quote

DJSLink experts Will Quote for You Within 24 Hours .

OR