[
Contents]
[
Prev]
[
Next]
[
Index]
[
Report an Error]
Configuring a Source NAT Pool for Incoming SIP Calls
In a two-zone scenario with the SIP proxy server
in an external, or public zone, you can use NAT for incoming calls
by configuring a NAT pool on the interface to the public zone.
Before You Begin
|
For background information, read
|
In this example, phone1 is in the private
zone, and phone2 and the proxy server are in the public zone. You
configure a source NAT pool on the ge-0/0/2.0 interface to do NAT
on incoming calls, then set a policy permitting SIP traffic from the
public zone to the private zone and reference the NAT pool in the
policy. You also create a policy that permits SIP traffic from the
private to the public zone.. This enables phone1 in the private zone
to register with the proxy in the public zone. See Figure 77.
Figure 77: Source NAT Pool for Incoming
Calls

To configure a source NAT pool for incoming calls,
use either the J-Web or CLI configuration editor.
This topic covers:
J-Web Configuration
To configure interfaces:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Interfaces, click Configure or Edit.
- Next to Interface, click Add new entry.
- In the Interface name box, type ge-0/0/0.
- Next to Unit, click Add new entry.
- In the Interface unit number box, type 0.
- Under Family, select inet and click Configure.
- Next to Address, click Add new entry.
- To specify the source address, next to Source box, type 10.1.1.1/24 and click OK.
- To configure other interface, ge-0/0/2, and to add address,
repeat Step 2 through Step 9 and click OK.
- To save and commit the configuration, click Commit.
To configure a private zone and assign an interface to it:
- Select Configuration > View and
Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Zones, click Configure.
- Next to Security zones, click Add new entry.
- In the Name box, type private.
- Next to Interfaces, click Add new entry.
- In the Interface unit box, type ge-0/0/0.0 and click OK.
- To save and commit the configuration, click Commit.
To configure addresses:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit
- Next to Zones, click Configure.
- Next to Security zones, click Add new entry.
- In the Name box, type private.
- Next to Address book click Configure.
- Next to Address, click Add new entry.
- In the Address name box, type phone1 10.1.1.3/32 and click OK.
- To configure more security zones, public, and address
books entries such as proxy 10.1.1.3/32 and phone2 1.1.1.4/32, repeat
Step 3 through Step 7and click OK.
- To save and commit the configuration, click Commit.
To configure zones:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Zones, click Configure.
- Next to Security zones, click Add new entry.
- In the Name box, type private and click OK.
- To specify the name of the another security zone, click Add new entry next to Security zone.
- Next to the Name box, type public and click OK.
- To configure an interface to the private zone, click private.
- Next to Interfaces, click Add new entry.
- In the Interface unit box, type ge-0/0/0.0 and click OK.
- To configure an interface to the public zone, click public.
- Next to Interfaces, click Add new entry.
- In the Interface unit box, type ge-0/0/2.0 and click OK.
- To save and commit the configuration, click Commit.
To configure source NAT pool:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Source Nat, click Configure.
- Next to Address persistent, select the check box and click OK.
- Next to Interface, click Add new entry.
- In the Name box, type ge-0/0/2.0.
- Next to Source nat, click Configure.
- Next to Pool, click Add new entry.
- In the Name box, type sip-pool.
- Next to Address range, click Add new entry.
- Next to High box, type 1.1.1.60 and next to Low box, type 1.1.1.20 and
click OK.
- Next to Allow incoming, select the check box and click OK.
- To save and commit the configuration, click Commit.
To configure policies:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure.
- Next to Policy, click Add new entry.
- In the From zone name box, type private.
- In the To zone name box, type public.
- Next to Policy, click Add new entry.
- In the Policy name box, type outgoing.
- Select the Match check box.
- Select the Then check box.
- Next to Match check box, click Configure.
- From the Source address choice list, select Source
address.
- Next to Source address, click Add new entry.
- From the Value keyword list, select Enter Specific
Value.
- In the Address box, type phone1 and click OK.
- From the Destination address choice list, select Destination
address.
- Next to Destination address, click Add new entry.
- Next to Value keyword list, select any and click OK.
- From the Application choice list, select Application.
- Next to Application, click Add new entry.
- In the Value keyword box, type junos-sip and click OK.
- Next to Then, click Configure.
- Next to Action, select permit.
- Click Configure next to Permit.
- Next to Source nat, select the check box and click Configure.
- From the Source nat choice list, select interface and
click OK.
- In the From zone name box, type private.
- In the To zone name box, type public.
- Next to Policy, click Add new entry.
- In the Policy name box, type incoming.
- Select the Match check box.
- Select the Then check box.
- Click Configure next to Match check box.
- Next to Source address choice list select Source address.
- Next to Source address, click Add new entry.
- From the Value keyword list, select any and click OK.
- From the Destination address choice list, select Destination
address.
- Next to Destination address, click Add new entry.
- Next to Value keyword list, select Enter Specific
Value.
- To specify the address, type incoming-nat-fe0/0/2.0 and click OK.
- From the Application choice list, select Application.
- Next to Application, click Add new entry.
- Next to Value keyword box, type junos-sip and click OK.
- Next to Then, click Configure.
- Next to Action, select permit.
- To save and commit the configuration, click Commit.
CLI Configuration
- Configure interfaces.
- user@host# set interfaces ge-0/0/0 unit 0 family inet
address 10.1.1.1/24
- user@host# set interfaces ge-0/0/2 unit 0 family inet
address 1.1.1.1/24
- user@host# set security zones security-zone private
interface ge-0/0/0.0
- Configure addresses.
- user@host# set security zones security-zone private
address-book address phone1 10.1.1.3/32
- user@host# set security zones security-zone public
address-book address proxy 10.1.1.3/32
- user@host# set security zones security-zone public
address-book address phone2 1.1.1.4/32
- Configure zones.
- user@host# set security zones security-zone private
- user@host# set security zones security-zone public
- user@host# set security zones security-zone private
interfaces ge-0/0/0.0
- user@host# set security zones security-zone public
interfaces ge-0/0/2.0
- Configure the source NAT pool.
- user@host# set security nat source-nat address-persistent
- user@host# set security nat interface ge-0/0/2.0 source-nat
pool sip-pool address-range low 1.1.1.20 high 1.1.1.60
- user@host# set security nat interface ge-0/0/2.0 source-nat
pool sip-pool allow incoming
- Configure policies.
- user@host# set security policies from-zone private
to-zone public policy outgoing match source-address phone1 destination-address
any application junos-sip
- user@host# set security policies from-zone private
to-zone public policy outgoing then permit source-nat pool sip-pool
- user@host# set security policies from-zone private
to-zone public policy incoming match source-address any destination-address
incoming-nat-sip-pool application junos-sip
- user@host# set security policies from-zone public to-zone
private policy incoming then permit
Related Topics
[
Contents]
[
Prev]
[
Next]
[
Index]
[
Report an Error]