Solved

IP Routes for Asterisk PBX

Posted on 2007-03-17
14
499 Views
Last Modified: 2013-12-21
Dear all,

the problem that I am experiencing might be a pretty simple for you. I have a local network, which consists of an ADSL modem (Allied Data CopperJet 1612), a DSL/Cable Firewall (Netgear Prosafe/Firewall FR3285) and a Netgear Gigabit switch. Also, I have purchased a range of dedicated IPs (8 IP Addresses).

In a local server, I have installed Asterisk PBX. All internal SIP phones work smoothly and call eachother without any problems. However, it is impossible to receive incoming calls from the service providers, which are declared in the system. I suppose that we have to create a route, which will get over the ADSL modem, the firewall and connect to the server.

How can I create such an route?

Thank you in advance.
0
Comment
Question by:LazaroWolf
  • 5
  • 4
  • 2
  • +1
14 Comments
 
LVL 57

Expert Comment

by:giltjr
Comment Utility
Have you configured your firewall to allow inbound traffic as needed?
0
 

Author Comment

by:LazaroWolf
Comment Utility
Thanks for your reply. Unfortunately, Allied Data Copperjet & Netgear Firewall include two separate firewalls, which have to appropriately be configured. Hence, this issue becomes extremely complicated. From which firewall should I start..? Any particular advice? Thank you.
0
 
LVL 57

Expert Comment

by:giltjr
Comment Utility
You need to do both.  You need to figure out which protocols (TCP vs. UDP) and ports (example H.232 uses 1720 and 1721) you are going to be using.

Then on each firewall you need to allow the protocol and ports to/from your Asterisk server.  The IP addresses you use for the Asterisk server will depend on where you are doing your NAT.
0
 
LVL 39

Expert Comment

by:noci
Comment Utility
besides these ports, the protocols also negitiate other ports to transport the data, which optionaly need natting & opening up ..., you might need a modem/firewall  with sip proxy functionality.
0
 

Author Comment

by:LazaroWolf
Comment Utility
Well, there is no extra financing to additional equipment, so we have to deal with the situation as is. Could you help on which ports should I direct to that particular Asterisk server? Thanks!
0
 
LVL 57

Accepted Solution

by:
giltjr earned 63 total points
Comment Utility
If you are doing SIP over the Intenet you need to verify how Asterisk uses it.

SIP uses TCP and/or UDP port 5060, so you can start by forwarding these to the Asterisk server.
0
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

 
LVL 39

Assisted Solution

by:noci
noci earned 62 total points
Comment Utility
And SIP uses RTP to transmit/receive sound etc.
The RTP ports are negotiated using SIP.
It's the RTP that makes it difficult, not SIP.
So you need something that create dynamic NAT rules for RTP.
0
 
LVL 57

Expert Comment

by:giltjr
Comment Utility
He could setup the one PC to be a "DMZ" PC and all inbound connection requests go to it.
0
 
LVL 39

Expert Comment

by:noci
Comment Utility
isn't RTP allowed to go from one end point to the other directly without passing the chain of SIP handling? So traffic from Phone P dials through asterisk server A to target T, SIP follows that line, but RTP goes from P to T directly?
0
 
LVL 39

Expert Comment

by:noci
Comment Utility
Solution of giltjr is incomplete. RTP doesn't need to go the same path as SIP per se...
0
 
LVL 20

Expert Comment

by:Venabili
Comment Utility
Yeah but it gets the asker started on the solution pretty nicely and without the asker it is as good as it can go - I wondered between delete and accept but still think that is a good enough solution... Although reading this again - it should be a split I suspect.

Can you object so the mods can restart it properly?
0
 
LVL 39

Expert Comment

by:noci
Comment Utility
See above comments.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
Tired of waiting for your show or movie to load?  Are buffering issues a constant problem with your internet connection?  Check this article out to see if these simple adjustments are the solution for you.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now