Application Note. Onsight TeamLink And Firewall Detect v6.3



Similar documents
Application Note. Onsight Connect Network Requirements v6.3

Application Note. Onsight Connect Network Requirements V6.1

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Application Note. Onsight Mobile Collaboration Video Endpoint Interoperability v5.0

IP Ports and Protocols used by H.323 Devices

LifeSize Transit Deployment Guide June 2011

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

ReadyNAS Remote White Paper. NETGEAR May 2010

Polycom. RealPresence Ready Firewall Traversal Tips

Internet Privacy Options

ThinkTel ITSP with Registration Setup Quick Start Guide

MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)

Application Note. SIP Domain Management

White Paper. Traversing Firewalls with Video over IP: Issues and Solutions

Setting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer

nexvortex Setup Guide

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

TECHNICAL CHALLENGES OF VoIP BYPASS

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address

Integrating Citrix EasyCall Gateway with SwyxWare

Cisco Expressway Basic Configuration

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

What is the Barracuda SSL VPN Server Agent?

FIREWALLS & CBAC. philip.heimer@hh.se

UIP1868P User Interface Guide

Vega 100G and Vega 200G Gamma Config Guide

Application Note - Using Tenor behind a Firewall/NAT

Crossing firewalls. Liane Tarouco Leandro Bertholdo RNP POP/RS. Firewalls block H.323 ports

Cisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal. Cisco VCS X8.5 December 2014

Network Security Topologies. Chapter 11

StarLeaf Network Guide

Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Unified Communications in RealPresence Access Director System Environments

Hosted Voice. Best Practice Recommendations for VoIP Deployments

nexvortex Setup Template

HOSTED VOICE Bring Your Own Bandwidth & Remote Worker. Install and Best Practices Guide

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking

Video Conferencing and Firewalls

A Scalable Multi-Server Cluster VoIP System

Guideline for setting up a functional VPN

Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway)

COMPUTER NETWORK TECHNOLOGY (300)

What communication protocols are used to discover Tesira servers on a network?

Application Note: Cisco Integration with Onsight Connect

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

OpenScape Business V2

VegaStream Information Note Considerations for a VoIP installation

Using LifeSize systems with Microsoft Office Communications Server Server Setup

UCi2i Video Conference Endpoint Firewall Requirements. UCi2i Video Conference Endpoint Firewall Requirements

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

OpenScape Business V2

Secured Communications using Linphone & Flexisip

Technical Support Information

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Cisco Expressway IP Port Usage for Firewall Traversal. Cisco Expressway X8.1 D December 2013

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

NAT TCP SIP ALG Support

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

LifeSize UVC Multipoint Deployment Guide

NAT and Firewall Traversal with STUN / TURN / ICE

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Controlling Ashly Products From a Remote PC Location

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 TEL: # 255

How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?

THINKTEL COMMUNICATIONS DIGIUM G100/G200 PRI OVER IP SIP TRUNKING

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Firewall. User Manual

White Paper: Librestream Security Overview

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

6.40A AudioCodes Mediant 800 MSBG

Time Warner ITSP Setup Guide

1.1.3 Versions Verified SIP Carrier status as of 18 Sep 2014 : validated on CIC 4.0 SU6.

MiaRec. Cisco Built-in-Bridge Recording Interface Configuration Guide. Revision 1.1 ( )

1 SIP Carriers Warnings Vendor Contact Vendor Web Site : Versions Verified SIP Carrier status as of 9/11/2011

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.

Knowledgebase Solution

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Using the NetVanta 7100 Series

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

Pre-lab and In-class Laboratory Exercise 10 (L10)

FortiVoice. Version 7.00 VoIP Configuration Guide

Application Note. Onsight Device Certificate Management

LifeSize Transit Server Guide

Using LifeSize Systems with Microsoft Office Communications Server 2007

Telepresence in an IPv6 World. Simplify the Transition

Network Simulation Traffic, Paths and Impairment

Configuration Aid To Ingate Firewall/SIParator - Using Your Own SIP Domain. Lisa Hallingström Paul Donald

Multi-Homing Security Gateway

Unified Communications Mobile and Remote Access via Cisco VCS

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

BorderWare Firewall Server 7.1. Release Notes

Transcription:

Application Note Onsight And Firewall Detect v6.3

1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall Detection Status... 6 2 WEB HTTPS PROXY CONFIGURATION... 8 3 TEAMLINK FIREWALL DETECT LIMITATIONS... 8 4 ONSIGHT CONNECT SERVICE CHECK LIST... 9 Application Note: Onsight and Firewall Detect - 2-2007-2014 Librestream

1 Onsight HTTPS Tunneling Server Onsight is for situations when it is not possible to open SIP and Media ports on the Firewall, in these cases is used to tunnel all SIP and Media traffic encapsulated in HTTPS packets to a Server. The Server proxies all traffic to the SIP and Media Servers on behalf of the Onsight Endpoint behind the Firewall. The advantage of this method is that can use existing open ports on the Firewall, TCP 443 for HTTPS (or TCP 80 for HTTP if preferred). Direct communication with the SIP Server is the preferred method of establishing communication between Onsight endpoints. Whenever possible the firewall should be configured to allow direct communication to the SIP and Media Servers. 1.1 Encapsulation When using the Onsight Endpoint will encapsulate SIP (TCP) and Media (RTP/RTCP/UDP) traffic in HTTPS protocol packets. The Server receives these packets and strips off the HTTPS encapsulation before forwarding them to the SIP (and Media Servers). The SIP Server will send responses to the Server. encapsulates the packets before sending them back to the Onsight Endpoint. When is enabled Onsight Endpoints will first contact a Cluster Manager (TCM) which will assign a Server to the endpoint. The Onsight Endpoint will then register to the Server. 1.2 Firewall Detect Firewall Detect is an Onsight System feature that tests the ports on the local Firewall to determine the best method for SIP Registration or rather when to use versus direct registration to the SIP server. Firewall Detect is only active if is enabled. The test is conducted by sending test traffic to a Test Server, one of either: the Cluster Manager, the server or the Onsight SIP Server. The destination is dependent on configuration of the Onsight endpoint s SIP Detection Method. If the Firewall test detects that the local firewall ports are open to the Test server, then the Onsight Endpoint assumes the ports are also open to the SIP Server. That is, if SIP ports are open to the Test Server the Onsight Endpoint attempts to SIP register directly to the SIP Server; if SIP ports are closed the Onsight Endpoint will use to register to the SIP Server indirectly. Application Note: Onsight and Firewall Detect - 3-2007-2014 Librestream

Firewall Detect determines the best method of SIP Registration based on the results of the port tests to the Test server. If your Enterprise allows direct SIP registration to the SIP server and has endpoints that will migrate from inside the Firewall to outside, Firewall Detect will provide the most accurate results if the Enterprise s Firewall allows traffic to Servers over the following ports: The tested range of SIP, HTTP, HTTPS and UDP ports is configured on the Onsight Endpoint by Librestream. They are based on the required ports for Librestream s Onsight SIP Service. The Firewall Detect Test uses Session Traversal Utilities for NAT (STUN) protocol to determine the mapped Public IP address of the Firewall. STUN traffic is sent to UDP destination port 3478 of the Test Server by the Onsight Endpoint. STUN is also used to test UDP ports 58024 and 58523. Firewall Detect: Protocols, Ports and Transports Protocols Ports Transport SIP 5060 TCP SIP-TLS 5061 TCP RTP* 15000 65000* UDP HTTP 80 TCP HTTPS 443 TCP STUN 3478 UDP SIP.LIBRESTREAM.COM Firewall Detect Matrix: SIP Detection IP Type Protocol / Port # Method/Destination UDP or TCP Port Range under Test UDP 3478 SIP Server (Full or Basic), sip.librestream.com (54.213.166.17) Result Method, Hostname (IP Address) Open Closed, tcmx.librestream.com TCP 5060-5061 SIP Server (Full or Basic), sip.librestream.com (54.213.166.17), tcmx.librestream.com Public IP Address of the Firewall is discovered; the remaining port tests are run Direct SIP Server Registration is attempted Public IP Address of Firewall cannot be determined; the remaining port tests are aborted. tunneling is enabled SIP Registration is proxied through Application Note: Onsight and Firewall Detect - 4-2007-2014 Librestream

UDP 15000-65000 SIP Server (Full or Basic), sip.librestream.com (54.213.166.17), tcmx.librestream.com TCP 80, 443 SIP Server (Full or Basic), sip.librestream.com (54.213.166.17), tcmx.librestream.com Media streams are sent directly to the SIP Server registration and HTTP/S tunneling are enabled Media streams are tunneled through is blocked, can t register to For v6.3 the SIP Detection Method: should be used when using either sip.librestream.com or your company s own SIP Server. Only use SIP Detection: SIP Server Full or Basic when using sip.librestream.com as the SIP domain. If Firewall Detect determines that all ports are blocked to the Test Server, including HTTPS and HTTP, Onsight Connect will attempt to register directly to the SIP Server as a last attempt at SIP Registration. 1.2.1 Firewall Detect Test Server Options: There are some important differences between v6.3 and v6.2 Onsight Connect architectures with regards to the Firewall Detect test. Previously, with v6.2 and earlier, firewall detection to determine SIP connectivity was done against a single server which was configured on the client. With v6.3, Firewall detection occurs through different paths depending on the configuration of the Onsight Client. The configuration is controlled by the OAM Client Policy under Firewall Detect-SIP Detection Method. Firewall Detect Tests are only run when is enabled. v6.3 is under Cluster management control (tcm.librestream.com). This means each endpoint is configured to contact a Cluster Manager (TCM). The Cluster Manager assigns the Onsight Client a server dynamically. At that point the Onsight Client connects to the server directly. If an Onsight client is enabled for with TCM: A. HTTP/HTTPS tests are done directly to the configured Cluster Manager server. If the cluster is load balanced, the load balancer decides with cluster manager this request goes to. B. SIP tests are done according to the following: 1. If a private SIP server is configured, a simple OPTIONS ping test will be done to the configured private SIP server. 2. If SIP Detection Method is configured to be SIP Server Full. Then the Onsight client will interrogate the configured public SIP server with a full SIP/STUN test. 3. If SIP Detection Method is configured to be SIP Server Basic. Then the Onsight client will interrogate the configured public SIP server with a simple OPTIONS ping test. Application Note: Onsight and Firewall Detect - 5-2007-2014 Librestream

4. If SIP Detection Method is configured to be. Then the Onsight client will interrogate the configured Cluster Manager server with a full SIP/STUN test. If the cluster is load balanced, then the TCM that is interrogated is the same as the one that received the request in A. Onsight Endpoints using v6.3 can still be configured to register directly to servers without first contacting a Cluster Manager. If an Onsight client is enabled for without TCM: A. HTTP/HTTPS tests are done directly to the configured server B. SIP tests are done according to the following: 1. If a private SIP server is configured, a simple OPTIONS ping test will be done to the configured private SIP server. 2. If SIP Detection Method is configured to be SIP Server Full. Then the Onsight client will interrogate the configured public SIP server with a full SIP/STUN test. 3. If SIP Detection Method is configured to be SIP Server Basic. Then the Onsight client will interrogate the configured public SIP server with a simple OPTIONS ping test. 4. If SIP Detection Method is configured to be. Then the Onsight client will interrogate the configured server with a full SIP/STUN test. 1.2.2 Firewall Detection Status For a summary of all the Firewall Detect settings and status, select Details and the following screen will appear. Application Note: Onsight and Firewall Detect - 6-2007-2014 Librestream

The following table describes each of the fields shown above. Client state Indicates whether Firewall Detect is active Connectivity Reports the Status of the SIP Registration methods and Network. Connection Method is Open/Network is connected Connection Method is Disabled Connection Method is Blocked Local Address Mapped Address Path MTU Server SIP Server SIP Detection Method UDP Connectivity SIP Connectivity Reports the Local IP address of the Host PC running Onsight Connect for PC Reports the external IP address of the Firewall the PC sits behind Reports the size of the Maximum Transmission Unit for the Host PC Load Balancer SIP Registration Server SIP test method for Firewall Detect Reports the status of the listed UDP ports on the Firewall Reports the status of the listed TCP ports on the Firewall The UDP test checks the ports used for the media such as audio, video and data. For efficiency, set the boundaries of the port range you would like to test as in the example above by separating them by commas e.g. 58024, 58523. Testing a complete range e.g. 58024 58523 could take an excessive amount of time. Application Note: Onsight and Firewall Detect - 7-2007-2014 Librestream

The SIP test will check for TCP ports 5060 and 5061 and it will test for SIP aware Firewalls. The SIP Aware NAT test is a SIP header test looking for Public IP addresses being inserted in the SIP header in place of private LAN IP addresses. When a SIP Aware NAT is present it can cause confusion for the SIP Server so it is best to use SIP-TLS as the transport. SIP-TLS will encrypt the SIP headers and make these unavailable for inspection by the SIP Aware NAT. 2 Web HTTPS Proxy Configuration Onsight Connect and use HTTPS to communicate with the Onsight Connect service and tunnel SIP traffic. It is possible that it will need to be routed through an internal Web HTTPS Proxy at your location. Onsight Endpoints can be configured to use the Web Proxy at your location. Proxy Settings options include: No Proxy, Use System Settings, or Manual Proxy configuration. Onsight Connect also supports Proxy Authentication. On a PC, the Onsight Connect option, Use System Settings will use the client s Proxy configuration found under Control Panel-Internet Properties-Connections-LAN Settings. Onsight Connect Devices, e.g. 2500/2000/1000, support Manual Proxy configuration and Authentication. Onsight for ios Devices supports Use System Settings and Manual. If Use System Settings is selected the proxy configuration will be used from the currently selected Wireless Network configuration under Settings. Your Enterprise s Web Proxy must allow traffic to the both Onsight.librestream.com and Servers. Direct SIP Traffic is not sent through a Web Proxy, it is only routed through a Web Proxy when is enabled and the connection method is HTTPS or HTTP. Recall that the Firewall Detect test determines the suitable connection method: SIP, HTTPS or HTTP, depending on the results of the Firewall test. 3 Firewall Detect Limitations The firewall detection implementation of and the Onsight Connect endpoints have these known limitations: 1. Onsight Endpoints who use SIP Detection, won't correctly interpret the Firewall Detect test if the Firewall has been configured to block SIP and Media ports to either the TCM or server but allow HTTP/S. This may result in the use of s HTTPS tunneling when it is not required. This is because the SIP ports are tested using either TCM or as the destination. If the Firewall blocks SIP to either this will be reported as SIP blocked even though it allows SIP to an unknown SIP Server. (Note: the term unknown SIP Server is meant only to indicate that is unaware of the SIP Server in terms of Firewall Detect.) Application Note: Onsight and Firewall Detect - 8-2007-2014 Librestream

2. Customers who are using 3 rd party SIP Servers must use the SIP Server Basic method for SIP Detection. The 3 rd Party SIP Server must respond to SIP OPTIONS requests in order for the Firewall Detect Test to function correctly. 4 Onsight Connect Service Check List Firewall ports have been configured to allow Onsight Connect Service, SIP and (if required) Onsight devices are connected to the network (WiFi or Ethernet) Onsight Account Manager has been configured with Users, Client Policies and SIP Account information: o SIP server address o URI o User name and password o Authentication Transport Setting Install Certificates (if necessary, for SIP-TLS) If required, has been enabled For further information regarding Onsight Connect Setup consult the Onsight Connect User Manuals. Application Note: Onsight and Firewall Detect - 9-2007-2014 Librestream