[
Contents]
[
Prev]
[
Next]
[
Index]
[
Report an Error]
Configuring a Media Gateway in Subscribers' Homes
When a cable service provider offers MGCP services
to residential subscribers, typically they locate the Juniper Networks
device and the call agent on their premises and intstall an Integrated
Access Device (IAD), or set-top box, in each subscriber's home. The
IADs act as a gateways for the residences
After creating zones—external_subscriber
for the customer and internal_ca for the service provider—you
configure addresses, then interfaces, and finally policies to allow
signaling between endpoints. Note that although gateways frequently
reside in different zones, requiring policies for media traffic, in
this example both gateways are in the same subnet. Note also that
because Real-time Transport Protocol (RTP) traffic between the gateways
never passes through the device, no policy is needed for the media.
See Figure 86.
Use either the J-Web or CLI configuration editor.
Figure 86: Media Gateway in Subscribers' Home

This topic covers:
J-Web Configuration
To configure zones:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Zones, click Configure.
- Next to Security zones, click Add new entry.
- In the Name box, type external_subscriber.
- Next to Host inbound traffic, click Configure.
- Next to System services, click Add new entry.
- Next to Service name, select all and click OK.
- Next to Protocols, click Add new entry.
- Next to Protocol name box, select all and click OK.
- Next to Security zones, click Add new entry.
- In the Name box, type internal_ca.
- Next to Host inbound traffic, click Configure.
- Next to System services, click Add new entry.
- Next to Service name, select all and click OK.
- Next to Protocols, click Add new entry.
- Next to Protocol name box, select all and click OK.
- To save and commit the configuration, click Commit.
To configure addresses:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Zones, click Configure or Edit.
- Next to Security zone, click Add new entry.
- In the Name box, type internal_ca.
- Next to Address book, click Configure or Edit.
- Next to Address, click Add new entry.
- In the Address name box, type ca_agent1 10.1.1.101/32 and click OK.
- To configure another security zone external_subscriber,
repeat Step 2 through Step 9 and click OK.
- Next to Address book, click Configure.
- Next to Address, click Add new entry.
- In the Address name box, type SubscriberSubNet
2.2.2.1/24 and click OK.
- To save and commit the configuration, click Commit.
To configure interfaces:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Zones, click Configure.
- Next to Security zone, click Add new entry.
- In the Name box, type internal_ca
- Next to Interfaces, click Add new entry.
- In the Interface unit box, type ge-0/0/01 and click OK.
- Next to Interfaces, click Configure or Edit.
- Next to Interface, click Add new entry.
- In the Interface name box, type ge-0/0/1.
- Next to unit, click Add new entry.
- In the Interface unit number box, type 0.
- Under Family, next to Inet, select the check box, and
click Configure.
- Next to Address, click Add new entry.
- Next to Source, type 2.2.2.1/24 and click OK.
- To configure another security zone, external _subscriber,
and interface, ge-0/0/0, Step 1 through Step 7 and click OK.
- To configure another interface, ge-0/0/0, repeat Step
h to Step l.
- Under Family, next to Inet, select the check box and click OK.
- To save and commit the configuration, click Commit.
To configure internal-to-external zone policies:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure.
- Next to Policy, click Add new entry.
- In the From zone name box, type internal_ca.
- In the To zone name box, type external_subscriber.
- Next to Policy, click Add new entry.
- To specify the Policy name, next to Policy name box, type Pol-CA-To-Subscribers.
- Select the Match check box.
- Select the Then check box.
- Click Configure next to Match check box.
- From the Source address choice list, select Source
address.
- Next to Source address, click Add new entry.
- From the Value keyword list, select Enter Specific
Value.
- In the Address box, type ca-agent1 and click OK.
- From the Destination address choice list, select Destination
address.
- Next to Destination address, click Add new entry.
- Next to Value keyword list, select Enter Specific
Value.
- In the Address box, type SubscriberSubNet and click OK.
- From the Application choice list, select Application.
- Next to Application, click Add new entry.
- Next to Value keyword box, type junos-mgcp and click OK.
- Next to Then, click Configure.
- Next to Action, select permit and click OK.
- To save and commit the configuration, click Commit.
To configure from zone, external_subscriber, and to zone, internal_ca:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure.
- Next to Policy, click Add new entry.
- In the From zone name box, type external_subscriber.
- In the To zone name box, type internal_ca.
- Next to Policy, click Add new entry.
- In the Policy name box, type Pol-Subscribers-To-CA.
- Select the Match check box.
- Select the Then check box.
- Next to Match check box, click Configure.
- From the Source address choice list, select Source
address.
- Next to Source address, click Add new entry.
- From the Value keyword list, select Enter Specific
Value.
- In the Address name box, type SubscriberSubnet and click OK.
- From the Destination address choice list, select Destination
address.
- Next to Destination address, click Add new entry.
- Next to Value keyword list, select Enter Specific
Value.
- In the Address name box, type call_agent1 and click OK.
- From the Application choice list, select Application.
- Next to Application, click Add new entry.
- Next to Value keyword box, type junos-mgcp and click OK.
- Next to Then, click Configure.
- Next to Action, select permit and click OK.
- To save and commit the configuration, click Commit.
To configure from zone and to zone as internal_ca:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure.
- Next to Policy, click Add new entry.
- In the From zone name box, type internal_ca.
- In the To zone name box, type internal_ca.
- Next to Policy, click Add new entry.
- In the Policy name box, type Pol-Intra-CA.
- Select the Match check box.
- Select the Then check box.
- Next to Match check box, click Configure.
- From the Source address choice list, select Source
address.
- Next to Source address, click Add new entry.
- From the Value keyword list, select any and click OK.
- From the Destination address choice list, select Destination
address.
- Next to Destination address, click Add new entry.
- Next to Value keyword list, select any and click OK.
- From the Application choice list, select Application.
- Next to Application, click Add new entry.
- Next to Value keyword box, select any and click OK.
- Next to Then, click Configure.
- Next to Action, select permit.
- To save and commit the configuration, click Commit.
To configure from zone and to zone as external_subscriber:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure.
- Next to Policy, click Add new entry.
- In the From zone name box, type external_subscriber.
- In the To zone name box, type external_subscriber.
- Next to Policy, click Add new entry.
- In the Policy name box, type Pol-Intra-subscriber.
- Select the Match check box.
- Select the Then check box.
- Next to Match check box, click Configure.
- From the Source address choice list, select Source
address.
- Next to Source address, click Add new entry.
- From the Value keyword list, select any and click OK.
- From the Destination address choice list, select Destination
address.
- Next to Destination address, click Add new entry.
- Next to Value keyword list, select any and click OK.
- From the Application choice list, select Application.
- Next to Application, click Add new entry.
- Next to Value keyword box, select any and click OK.
- Next to Then, click Configure.
- Next to Action, select permit.
- To save and commit the configuration, click Commit.
CLI Configuration
- Configure zones.
- user@host# set security zones security-zone external_subscriber
- user@host# set security zones security-zone external_subscriber
host-inbound-traffic system-services all
- user@host# set security zones security-zone external_subscriber
host-inbound-traffic protocols all
- user@host# set security zones security-zone internal_ca
- user@host# set security zones security-zone internal_ca
host-inbound-traffic system-services all
- user@host# set security zones security-zone internal_ca
host-inbound-traffic protocols all
- Configure addresses.
- user@host# set security zones security-zone internal_ca
address-book address ca_agent1 10.1.1.101/32
- user@host# set security zones security-zone external_subscriber
address-book address SubscriberSubNet 2.2.2.1/24
- Configure interfaces.
- user@host# set security zones security-zone internal_ca
interfaces ge-0/0/1
- user@host# set interfaces ge-0/0/1 unit 0 family inet
address 2.2.2.1/24
- user@host# set security zones security-zone external_subscriber
interfaces ge-0/0/0
- user@host# set interfaces ge-0/0/0 unit 0 family inet
- Configure internal-to-external zone policies.
- user@host# set security policies from-zone internal_ca
to-zone external_subscriber policy Pol-CA-To-Subscribers match source-address
ca_agent1
- user@host# set security policies from-zone internal_ca
to-zone external_subscriber policy Pol-CA-To-Subscribers match destination-address
SubscriberSubNet
- user@host# set security policies from-zone internal_ca
to-zone external_subscriber policy Pol-CA-To-Subscribers match application
junos-mgcp
- user@host# set security policies from-zone internal_ca
to-zone external_subscriber policy Pol-CA-To-Subscribers then permit
- user@host# set security policies from-zone external_subscriber
to-zone internal_ca policy Pol-Subscribers-To-CA match source-address
SubscriberSubNet
- user@host# set security policies from-zone external_subscriber
to-zone internal_ca policy Pol-Subscribers-To-CA match destination-address
call_agent1
- user@host# set security policies from-zone external_subscriber
to-zone internal_ca policy Pol-Subscribers-To-CA match application
junos-mgcp
- user@host# set security policies from-zone external_subscriber
to-zone internal_ca policy Pol-Subscribers-To-CA then permit
- user@host# set security policies from-zone internal_ca
to-zone internal_ca policy Pol-Intra-CA match source-address any
- user@host# set security policies from-zone internal_ca
to-zone internal_ca policy Pol-Intra-CA match destination-address
any
- user@host# set security policies from-zone internal_ca
to-zone internal_ca policy Pol-Intra-CA match application any
- user@host# set security policies from-zone internal_ca
to-zone internal_ca policy Pol-Intra-CA then permit
- user@host# set security policies from-zone external_subscriber
to-zone external_subscriber policy Pol-Intra-subscriber match source-address
any
- user@host# set security policies from-zone external_subscriber
to-zone external_subscriber policy Pol-Intra-subscriber match destination-address
any
- user@host# set security policies from-zone external_subscriber
to-zone external_subscriber policy Pol-Intra-subscriber match application
any
- user@host# set security policies from-zone external_subscriber
to-zone external_subscriber policy Pol-Intra-subscriber then permit
Related Topics
[
Contents]
[
Prev]
[
Next]
[
Index]
[
Report an Error]