?
Solved

Juniper 5gt SIP configuration example

Posted on 2013-01-07
9
Medium Priority
?
725 Views
Last Modified: 2013-01-15
My customer bought a 5gt and wants to use it solely for voip.  Does anybody have a configuration example of what this needs to look like?  I don't have web access to the firewall.  It is sitting on a desk with a console cable on it.
0
Comment
Question by:dhuff2012
  • 4
  • 4
9 Comments
 
LVL 7

Expert Comment

by:Phyo HTET AUNG
ID: 38753428
hope this might help.

Solution From Juniper Forum
0
 
LVL 18

Expert Comment

by:Sanga Collins
ID: 38754796
The setup will depend on where the VOIP server sits. Is the server and phones going to be behind the firewall? Or is the server going to be outside the firewall and the phones inside?
0
 

Author Comment

by:dhuff2012
ID: 38756644
I'm not sure yet.  The customer is getting that info for me.  In the meanwhile I have put a config on the firewall to ship it to them.  I can continue configuration once it is in place.  Would you mind looking at the config and let me know if I'm missing anything?  I'm concerned about the default route as I'm used to Cisco cli and this is quite different.
voice-fw-config.docx
0
A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

 
LVL 18

Expert Comment

by:Sanga Collins
ID: 38756801
Since this appears to be at least screenOS 6.x or newer the following statement in your config should be sufficient

set interface ethernet 0/0 gateway 63.x.x.x

But since you said you are sending the device to a client, just to be safe you can (from the webui) add the default route under Network > Routing > Destination, or from the command line using the following command

set route 0.0.0.0/0 interface ethernet0/0 gateway 63.x.x.x
save
0
 

Author Comment

by:dhuff2012
ID: 38756984
Thanks.  The phone server is outside of the customer network at a place called Next Level.  Does this help?
0
 
LVL 18

Expert Comment

by:Sanga Collins
ID: 38757055
Yes that is very important. With the VoIP server residing off site, what you want to do is:

A) disable sip ALG
B) enable 'source based NAT' in the advanced properties of the trust to untrust policy. You can get to properties for a policy by clicking on the edit link for the policy in question.

I will look up the correct CLI commands to enter and post them if you only have console access.
0
 

Author Comment

by:dhuff2012
ID: 38757095
That would be terrific.  Please provide the cli commands.  Thank you.
0
 
LVL 18

Accepted Solution

by:
Sanga Collins earned 2000 total points
ID: 38757539
unset alg sip enable
set policy id 1 from "Trust" to "Untrust"  "Any" "Any" "ANY" nat src permit log
save

The above commands will accomplish the required setting
0
 

Author Closing Comment

by:dhuff2012
ID: 38778961
Thanks.  The FW is going in today and I will try your suggestions.
0

Featured Post

How to change the world, one degree at a time.

By embracing technology, we can solve even the biggest problems—including the gender gap.  By earning a degree from WGU, you have an opportunity to gain the knowledge, credentials, and experience it takes to thrive in today’s high-growth IT industry.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses
Course of the Month13 days, 10 hours left to enroll

750 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question