TECHNICAL NOTE. FortiGate Support for SIP FortiOS v3.0 MR5. www.fortinet.com



Similar documents
TECHNICAL NOTE. FortiGate Traffic Shaping Version

HA OVERVIEW. FortiGate FortiOS v3.0 MR5.

FortiGate High Availability Overview Technical Note

USER GUIDE. FortiGate IPSec VPN Version 3.0 MR5.

USER GUIDE. FortiGate VLANs and VDOMs Version

FortiGate Troubleshooting Guide

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

Configuration Example

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

INSTALL GUIDE. FortiGate-60 series and FortiGate-100A FortiOS 3.0 MR4.

How To Configure Fortigate For Free Software (For A Free Download) For A Password Protected Network (For Free) For An Ipad Or Ipad (For An Ipa) For Free (For Ipad) For Your Computer Or Ip

Creating Cacti FortiGate SNMP Graphs

USER GUIDE. FortiGate SSL VPN User Guide Version 3.0 MR4.

USER GUIDE. FortiGate SSL VPN User Guide Version 3.0 MR5.

Please report errors or omissions in this or any Fortinet technical document to

Feature Brief. FortiGate TM Multi-Threat Security System v3.00 MR5 Rev. 1.1 July 20, 2007

Fortigate Features & Demo

USER GUIDE. FortiOS v3.0 MR7 SSL VPN User Guide.

Install Guide. FortiMail Version 3.0 MR4.

Using IPsec VPN to provide communication between offices

How To Configure The Fortigate Cluster Protocol In A Cluster Of Three (Fcfc) On A Microsoft Ipo (For A Powerpoint) On An Ipo 2.5 (For An Ipos 2.2.5)

FortiOS Handbook - Getting Started VERSION 5.2.2

Version 0.1 June Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

High Availability. FortiOS Handbook v3 for FortiOS 4.0 MR3

Configuring IPsec VPN between a FortiGate and Microsoft Azure

FortiManager Centralized Device Management

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Using VDOMs to host two FortiOS instances on a single FortiGate unit

FortiGuard Web Content Filtering versus Websense March 2005

Managing a FortiSwitch unit with a FortiGate Administration Guide

VoIP Network Configuration Guide

FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

(91) FortiOS 5.2

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

USER GUIDE. FortiGate IPS User Guide Version 3.0 MR5.

Application Description

Configuring IPsec VPN with a FortiGate and a Cisco ASA

FortiGate 200A. Administration Guide. FortiGate-200A Administration Guide Version 2.80 MR8 4 February

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Use FortiWeb to Publish Applications

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date:

Install Guide. FortiMail Version 3.0 MR2.

AVer Video Conferencing Network Setup Guide

LifeSize UVC Multipoint Deployment Guide

Unified Communications in RealPresence Access Director System Environments

LifeSize Transit Deployment Guide June 2011

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

SIP Security Controllers. Product Overview

Setting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer

How To Program A Talkswitch Phone On A Cell Phone On An Ip Phone On Your Ip Phone (For A Sim Sim) On A Pc Or Ip Phone For A Sim Phone On Iphone Or Ipro (For An Ipro) On

Configuring FortiVoice for Skype VoIP service

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Setup Reference guide for PBX to SBC interconnection

Mobile Configuration Profiles for ios Devices Technical Note

Government of Canada Managed Security Service (GCMSS) Annex A-1: Statement of Work - Firewall

How to configure DNAT in order to publish internal services via Internet

Configuring PPP And SIP

StarLeaf Network Guide

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Fortinet FortiGate App for Splunk

QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)

FortiOS Handbook - FortiView VERSION 5.2.3

Lab Configuring Access Policies and DMZ Settings

FortiGate IPS Guide. Intrusion Prevention System Guide. Version November

Recommended QoS Configuration Settings for. Fortinet FortiGate 30D Router

IP Office Avaya Radvision Interoperation Notes

How-To Feature Guide. SIP Peering

Load Balancing. FortiOS Handbook v3 for FortiOS 4.0 MR3

Copyright ZYCOO All Rights Reserved 1 / 8

VPN Configuration Guide LANCOM

User Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3

FortiGate Multi-Threat Security Systems I

nexvortex Setup Template

FortiOS Handbook - WAN Optimization, Web Cache, Explicit Proxy, and WCCP VERSION 5.2.4

Fireware Essentials Exam Study Guide

Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2

Getting Started KX-TDA5480

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide

Knowledgebase Solution

The SIP School- 'Mitel Style'

nexvortex Setup Guide

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Configuring FortiVoice for Bandwidth.com VoIP service

IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online

Peer-to-Peer SIP Mode with FXS and FXO Gateways

Deploying Wireless Networks. FortiOS Handbook v2 for FortiOS 4.0 MR2

Sophos Endpoint Security and Control standalone startup guide

Technical Support Information

LAN TCP/IP and DHCP Setup

Secure VoIP for optimal business communication

FortiOS Handbook - Load Balancing VERSION 5.2.2

Acano solution. Third Party Call Control Guide. March E

How To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network

SIP Server Installation (Mayah example)

SIP Trunking using Optimum Business SIP Trunk Adaptor and the Panasonic KX-NCP500 IP PBX V2.0502

Transcription:

TECHNICAL NOTE FortiGate Support for SIP FortiOS v3.0 MR5 www.fortinet.com

FortiGate Support for SIP Technical Note FortiOS v3.0 MR5 22 August 2007 01-30005-0232-20070822 Copyright 2007 Fortinet, Inc. All rights reserved. No part of this publication including text, examples, diagrams or illustrations may be reproduced, transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or otherwise, for any purpose, without prior written permission of Fortinet, Inc. Trademarks Dynamic Threat Prevention System (DTPS), APSecure, FortiASIC, FortiBIOS, FortiBridge, FortiClient, FortiGate, FortiGate Unified Threat Management System, FortiGuard, FortiGuard-Antispam, FortiGuard- Antivirus, FortiGuard-Intrusion, FortiGuard-Web, FortiLog, FortiAnalyzer, FortiManager, Fortinet, FortiOS, FortiPartner, FortiProtect, FortiReporter, FortiResponse, FortiShield, FortiVoIP, and FortiWiFi are trademarks of Fortinet, Inc. in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

FortiGate Support for Session Initiation Protocol Configuring SIP settings in a firewall protection profile FortiGate Support for Session Initiation Protocol The Session Initiation Protocol (SIP) is used for establishing and conducting multiuser calls over TCP/IP networks using any media. Due to the complexity of the call setup, not every firewall can handle SIP calls correctly, even if the firewall is stateful. The FortiGate Antivirus Firewall includes special module that tracks SIP calls. The FortiGate unit can make all necessary adjustments, to both the firewall state and call data, to ensure a seamless call is established through the FortiGate unit regardless of its operation mode, NAT, route, or transparent. Note: One call cannot traverse the firewall more than 3 times (inclusive). The FortiGate unit allows you to control the SIP protocol through protection profiles. A statistical summary of the SIP protocol is also available and makes managing SIP use easy. This technical note describes SIP firewall protection profiles and SIP scenarios supported by FortiGate units. The scenarios are broken down into two groups: direct calls and proxy-routed calls. Configuring SIP settings in a firewall protection profile In the Firewall Protection Profiles, you are able to control two functions within the SIP protocol: logging and rate limiting. Logging allows you to enable tracking of information available in the Statistics section. Rate limiting for the SIP protocol allows you to control how much bandwidth is being used. SIP logging You can log SIP events. To enable VoIP logs 1 Go to Firewall > Protection Profile. 2 Select create New to create a new protection profile called SIP_protection. 3 Select the blue arrow to expand the Logging options. 4 Select Log VoIP Activity. 5 Select OK. 01-30005-0232-20070822 3

SIP Statistics FortiGate Support for Session Initiation Protocol SIP rate limiting You can configure VoIP rate limiting for Session Initiated Protocol (SIP) and Skinny Client Control Protocol (SCCP). SIP and SCCP are two types of VoIP protocols. Rate limiting is generally different between SCCP and SIP. For SIP, rate limiting is for that SIP traffic flowing through the FortiGate unit. For SCCP, the call setup rate is between the FortiGate unit and the clients because the call manager normally resides on the opposite side of the FortiGate unit from the clients. To configure SIP rate limiting 1 Go to Firewall > Protection Profile. 2 Select create New to create a new protection profile called SIP_protection. 3 Select the blue arrow to expand the VoIP options. 4 Select the SIP checkbox. 5 Enter a number for requests per second in the Limit REGISTER request (requests/sec) field. 6 Enter a number for requests per second in the Limit INVITE request (requests/sec) field 7 Select OK. SIP Statistics Viewing overview statistics You can view the SIP statistics to gain insight into how the protocol is being used within the network. Overview statistics are provided for all supported VoIP protocols. Note: If virtual domains are enabled on the FortiGate Support for SIP unit, IM, P2P and VoIP features are configured globally. To access these features, select Global Configuration on the main menu. The IM, P2P&VoIP > Statistics > Summary page provides a summary of statistics for all VoIP protocols. Figure 1: SIP statistics summary VoIP Usage Active Sessions (phones connected) Total calls (since last reset) For SIP and SCCP protocol. Number of sessions that are currently active. Total VoIP calls since the last FortiGate unit reset. 4 01-30005-0232-20070822

FortiGate Support for Session Initiation Protocol Direct SIP calls Calls failed/dropped Calls Succeeded Number of VoIP sessions that failed during the reporting period. Number of VoIP sessions that were successfully completed during the reporting session. Direct SIP calls Direct SIP traffic passes from terminal to terminal through a FortiGate unit. Policies are created on the FortiGate unit to allow SIP traffic to pass through in either direction. NAT may or may not be applied. A single firewall policy is required for a terminal on the internal network to initiate connections with terminals on the external network. When a terminal initiates a call, two-way communication is allowed because rules are automatically created based on data found in the call setup messages. Scenario 1: FortiGate unit in Transparent mode Figure 2: FortiGate unit in Transparent mode The FortiGate unit is operating in Transparent mode. NAT is not available or required in Transparent mode because all FortiGate interfaces are on the same network. The following firewall policies are required: internal -> external to allow Terminal A to initiate connections with Terminal B. Set service to SIP. external -> internal to allow Terminal B to initiate connections with Terminal A. Set service to SIP. Scenario 2: FortiGate unit in NAT/Route mode, NAT not enabled Figure 3: FortiGate unit in NAT/Route mode The FortiGate unit is operating in NAT/Route mode without NAT being enabled. The following policies are required: internal -> external to allow Terminal A to initiate connections with Terminal B. Set service to SIP. 01-30005-0232-20070822 5

Proxy server calls FortiGate Support for Session Initiation Protocol external -> internal to allow Terminal B to initiate connections with Terminal A. Set service to SIP. Scenario 3: FortiGate unit in NAT/Route mode, NAT enabled and virtual IP required Figure 4: FortiGate unit in NAT/Route mode The FortiGate unit is operating in NAT/route mode with NAT enabled. For Terminal A to be able to call Terminal B, you require the following: an internal -> external policy to allow Terminal A to initiate connections with Terminal B. Enable NAT. Set service to SIP. For Terminal B to be able to call Terminal A, you require the following: a virtual IP on the internal interface an external -> internal policy to allow Terminal B to initiate connections with Terminal A. Set the destination address to the virtual IP address. Set service to SIP. Proxy server calls The proxy server provides the following services: name translation user location authorization and authentication call setup call routing call management The proxy server may be located on the terminal network or outside of the terminal network. It may include a multipoint control unit (MCU) to provide conferencing between three or more terminals. With proxy server-routed calls, a terminal registers with the proxy server when it is powered up. When the terminal places a call, the proxy server contacts the destination terminal, relays data between the terminals, and completes the call setup. Call setup must be set to routed. A single firewall policy is required for a terminal on the internal network to initiate connections with the proxy server on the external network. When a terminal, initiates a call, two-way communication is allowed because rules are automatically created based on data found in the call setup messages. 6 01-30005-0232-20070822

FortiGate Support for Session Initiation Protocol Proxy server calls Proxy server scenario 1: FortiGate unit in Transparent mode Figure 5: FortiGate unit in Transparent mode The FortiGate unit is operating in Transparent mode. NAT is not available or required in Transparent mode because all FortiGate interfaces are on the same network. The following firewall policy is required: internal -> external to allow Terminals A and C to connect to the proxy server. Set service to SIP. Proxy server scenario 2: FortiGate unit in NAT/Route mode, NAT not enabled Figure 6: FortiGate unit in NAT/route mode The FortiGate unit is operating in NAT/Route mode with NAT not enabled The following policy is required: 01-30005-0232-20070822 7

Proxy server calls FortiGate Support for Session Initiation Protocol internal -> external to allow Terminals A and C to connect to the proxy server. Set service to SIP. Proxy server scenario 3: FortiGate unit in NAT/Route mode, NAT enabled Figure 7: Proxy server on the public network The FortiGate unit is operating in NAT/Route mode with NAT enabled. The following policy is required: internal -> external to allow Terminals A nd C to connect to the proxy server. Set service to SIP. Proxy server scenario 4: FortiGate unit in NAT/Route mode, NAT enabled and virtual IP required Figure 8: Proxy server on the private network The FortiGate unit is operating in NAT/Route mode with NAT enabled. 8 01-30005-0232-20070822

FortiGate Support for Session Initiation Protocol Proxy server calls The following policy is required: Terminal A to proxy server. Set service to SIP. For Terminal B to be able to register with the proxy server, you require the following: a virtual IP for the proxy server on the external interface an external -> internal policy to allow Terminal B to initiate connections with the proxy server. Set the destination address to the virtual IP address. Set service to SIP. Proxy server scenario 5: FortiGate unit in NAT/Route mode, NAT enabled Figure 9: Proxy server on a different network The FortiGate unit is operating in NAT/Route mode with NAT enabled. The following policies are required: internal -> DMZ to allow Terminals A and C to connect to the proxy server. Set service to SIP. external -> DMZ to allow Terminal B to connect to the proxy server. 01-30005-0232-20070822 9

Example configuration 1: Peer to peer FortiGate Support for Session Initiation Protocol Example configuration 1: Peer to peer This example shows how to configure a policy for peer to peer SIP connections. The FortiGate unit is in NAT/Route mode. This configuration has two basic steps: configure addresses for the internal terminal (terminal_a) and external terminal (terminal_b) configure a firewall policy for SIP traffic between the terminals (internal -> external) To add terminal addresses 1 Go to Firewall > Address and select Create New. 2 Configure the address as follows: Address Name terminal_a Subnet/IP Range 255.255.255.0/192.168.33.1 4 Repeat steps 2 and 3 for terminal_b: Address Name terminal_b Subnet/IP Range 255.255.255.0/172.20.33.1 To add a firewall policy 1 Go to Firewall > Policy and select Create New. 2 Configure the policy as follows:. Source Interface/Zone Source Address Destination Interface/Zone Destination Address Schedule Service Action NAT Protection Profile internal terminal_a external terminal_b always SIP ACCEPT enable SIP_protection 10 01-30005-0232-20070822

FortiGate Support for Session Initiation Protocol Example Configuration 2: Peer to Peer with a Virtual IP Address Example Configuration 2: Peer to Peer with a Virtual IP Address This example shows how to configure a policy for peer to peer SIP connections. To add terminal addresses 1 Go to Firewall > Address and select Create New. 2 Configure the address as follows: Address Name terminal_a Subnet/IP Range 255.255.255.0/192.168.33.1 4 Repeat steps 2 and 3 for terminal_b: Address Name terminal_b Subnet/IP Range 255.255.255.0/172.20.33.1 To add a firewall policy 1 Go to Firewall > Policy and select Create New. 2 Configure the policy as follows:. Source Interface/Zone Source Address Destination Interface/Zone Destination Address Schedule Service Action NAT Protection Profile internal terminal_a external terminal_b always SIP ACCEPT enable SIP_protection 01-30005-0232-20070822 11

Example Configuration 2: Peer to Peer with a Virtual IP Address FortiGate Support for Session Initiation Protocol To configure a virtual IP address 1 Go to Firewall > Virtual IP and select Create New. 2 Configure the virtual IP address as follows: Name terminal_a_vip External Interface external Type Static NAT External IP Address/Range 172.20.32.25 Mapped IP Address/Range 192.168.33.1/255.255.255.0 To add an external to internal firewall policy 1 Go to Firewall > Policy and select Create New. 2 Configure the policy as follows:. Source Interface/Zone Source Address Destination Interface/Zone Destination Address Schedule Service Action NAT Protection Profile external terminal_b internal terminal_a_vip always SIP ACCEPT enable SIP_protection 12 01-30005-0232-20070822

FortiGate Support for Session Initiation Protocol Example configuration 3: Proxy server Example configuration 3: Proxy server This example show how to configure a policy for SIP connections using a proxy server. The FortiGate unit is in NAT/Route mode. This configuration has three basic steps: configure addresses for the internal terminals (terminal_a and terminal_c) and external terminal (terminal_b) create groups for the terminals (internal_terminals) configure a firewall policy for SIP traffic between the terminals and the proxy server (internal -> external) To add terminal addresses 1 Go to Firewall > Address and select Create New. 2 Configure the address as follows: Address Name terminal_a Subnet/IP Range 255.255.255.0/192.168.33.1 01-30005-0232-20070822 13

Example configuration 3: Proxy server FortiGate Support for Session Initiation Protocol 4 Repeat steps 2 and 3 for terminal_c and the proxy server: Address Name terminal_c Type Subnet/IP Range Subnet/IP Range 255.255.255.0/192.168.33.2 Address Name sip_proxy_server Type Subnet/IP Range Subnet/IP Range 255.255.255.0/172.50.23.10 To add address groups 1 Go to Firewall > Address > Group and select Create New. 2 Enter the Group Name: internal_terminals. 3 Using the right arrow, move terminal_a and terminal_c from the Available Addresses list to the Members list. 4 Select OK. To add a firewall policy 1 Go to Firewall > Policy and select Create New. 2 Configure the policy as follows: Source Interface/Zone Source Address Destination Interface/Zone Destination Address Schedule Service Action NAT Protection Profile internal internal_terminals external sip_proxy_server always SIP ACCEPT enable SIP_protection 14 01-30005-0232-20070822