[
Contents]
[
Prev]
[
Next]
[
Index]
[
Report an Error]
Configuring a Three-Zone SIP Scenario
In a three-zone SIP configuration, the SIP proxy
server is typically in a different zone than the calling and called
parties. Such a scenario requires additional address and zone configuration,
and policies to ensure that all parties have access to each other
and to the proxy server.
Before You Begin
|
For background information, read
|
In this example, phone1 is on the ge-0/0/0
interface in the private zone, phone2 is on the ge-0/0/0/2 interface
in the public zone, and the proxy server is on the ge-0/0/1.0 interface
in the DMZ. You configure static NAT on the ge-0/0/1 interface to
phone1 in the private zone. You then create policies from the private
zone to the DMZ and from the DMZ ot the private zone, from the public
zone to the DMZ and from the DMZ to the public zone, and from the
pirvate zone to the public zone. The arrows in Figure 81 show the flow of SIP signaling traffic when phone2 in the
public zone places a call to phone1 in the private zone. After the
session is initiated, the media flows directly between phone1 and
phone2.
Figure 81: Three-Zone, Proxy in the DMZ

To configure a three-zone SIP scenario, use either
the J-Web or CLI configuration editor.
This topic covers:
J-Web Configuration
To configure interfaces:
- Select Configuration > View and Edit > Edit Configuration. The
Configuration page appears.
- Next to Interfaces, click Configure or Edit.
- Next to Interface, click Add new entry.
- In the Interface name box, type ge-0/0/0.
- Next to Unit, click Add new entry.
- Next to Interface unit number, type 0.
- Next to Inet, select the check box and click Configure.
- Next to Address, click Add new entry.
- Next to Source, type 10.1.1.1/24 and click OK.
- To configure another interface, ge-0/0/1 and ge-0/0/2,
and addresses, 2.2.2.2/24 and 1.1.1.1/24, repeat Step 2 through Step
9 and click OK.
- To save and commit the configuration, click Commit.
To configure zones:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Zones, click Configure.
- Next to Security zones, click Add new entry.
- In the Name box, type private and click OK.
- Next to Security zone, click Add new entry.
- In the Name box, type public and click OK.
- Next to Security zone, click Add new entry.
- In the Name box, type dmz and
click OK.
- To configure an interface to the private zone, click private.
- Next to Interfaces, click Add new entry.
- Next to Interface unit box, type ge-0/0/0.0 and click OK.
- To configure an interface to the public zone, click public.
- Next to Interfaces, click Add new entry.
- Next to Interface unit box, type ge-0/0/2.0 and click OK.
- To configure an interface to the dmz, click dmz.
- Next to Interfaces, click Add new entry.
- Next to Interface unit box, type ge-0/0/1.0 and click OK.
- To save and commit the configuration, click Commit.
To configure addresses:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Zones, click Configure.
- Next to Security zone, click Add new entry.
- In the Name box, type private.
- Next to Address book, click Configure.
- Next to Address, click Add new entry.
- In the Address name box, type phone1 10.1.1.3/32 and click OK.
- To configure more security zones, public and dmz, and
address books entries such as phone2 1.1.1.4/32 and proxy 2.2.2.4/32,
repeat Step 4 through Step 8, and click OK.
- To save and commit the configuration, click Commit.
To configure static NAT:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Nat, click Configure.
- Next to Interfaces, click Add new entry.
- In the Name box, type ge-0/0/1.0.
- Next to Static nat, click Add new entry.
- In the Address box, type 2.2.2.3/32.
- In the Host box, type 10.1.1.3/32 and click OK.
- To save and commit the configuration, click Commit.
To configure policies:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure.
- Next to Policy, click Add new entry.
- In the From zone name box, type private.
- In the To zone name box, type dmz.
- Next to Policy, click Add new entry.
- In the Policy name box, type private-to-proxy.
- Select the Match check box.
- Select the Then check box.
- Next to Match check box, click Configure.
- From the Source address choice list, select Source
address.
- Next to Source address, click Add new entry.
- From the Value keyword list, select Enter Specific
Value.
- In the Address box, type phone1 and click OK.
- From the Destination address choice list, select Destination
address.
- Next to Destination address, click Add new entry.
- Next to Value keyword list, select proxy and
click OK.
- From the Application choice list, select Application.
- Next to Application, click Add new entry.
- In the Value keyword box, type junos-sip and click OK.
- Next to Then, click Configure.
- Next to Action, select permit.
- Click Configure next to Permit.
- Next to Source nat, select the check box and click Configure.
- From the Source nat choice list, select interface and
click OK.
To configure from zone, public, and to zone, dmz, and the respective
source address, destination address, and application:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure.
- Next to Policy, click Add new entry
- In the From zone name box, type public.
- In the To zone name box, type private.
- Next to Policy, click Add new entry.
- In the Policy name box, type public-to-proxy.
- Select the Match check box.
- Select the Then check box.
- Click Configure next to Match check box.
- Next to Source address choice list select Source address.
- Next to Source address, click Add new entry.
- From the Value keyword list, type phone2 and click OK.
- From the Destination address choice list, select Destination
address.
- Next to Destination address, click Add new entry.
- Next to Value keyword list, select Enter Specific
Value.
- To specify the address, type proxy and click OK.
- From the Application choice list, select Application.
- Next to Application, click Add new entry.
- Next to Value keyword box, type junos-sip and click OK.
- Next to Then, click Configure.
- Next to Action, select permit and click OK.
To configure from zone, private, and to zone, public, and the
respective source address, destination address, and application:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure.
- Next to Policy, click Add new entry.
- In the From zone name box, type private.
- In the To zone name box, type public.
- Next to Policy, click Add new entry.
- In the Policy name box, type private-to-public.
- Select the Match check box.
- Select the Then check box.
- Next to Match check box, click Configure.
- From the Source address choice list, select Source
address.
- Next to Source address, click Add new entry.
- From the Value keyword list, select Enter Specific
Value.
- In the Address box, type phone1 and click OK.
- From the Destination address choice list, select Destination
address.
- Next to Destination address, click Add new entry.
- Next to Value keyword list, type phone2 and click OK.
- From the Application choice list, select Application.
- Next to Application, click Add new entry.
- In the Value keyword box, type junos-sip and click OK.
- Next to Then, click Configure.
- Next to Action, select permit.
- Click Configure next to Permit.
- Next to Source nat, select the check box and click Configure.
- From the Source nat choice list, select interface and click OK.
To configure from zone, dmz, and to zone, private, and the respective
source address, destination address, and application:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure.
- Next to Policy, click Add new entry
- In the From zone name box, type dmz.
- In the To zone name box, type private.
- Next to Policy, click Add new entry.
- In the Policy name box, type proxy-to-private.
- Select the Match check box.
- Select the Then check box.
- Click Configure next to Match check box.
- Next to Source address choice list select Source address.
- Next to Source address, click Add new entry.
- From the Value keyword list, type proxy and click OK.
- From the Destination address choice list, select Destination
address.
- Next to Destination address, click Add new entry.
- Next to Value keyword list, select Enter Specific
Value.
- To specify the address, type static_nat_2.2.2.3_32 and click OK.
- From the Application choice list, select Application.
- Next to Application, click Add new entry.
- Next to Value keyword box, type junos-sip and click OK.
- Next to Then, click Configure.
- Next to Action, select permit and click OK.
To configure from zone, dmz, and to zone, public, and the respective
source address, destination address, and application:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure.
- Next to Policy, click Add new entry
- In the From zone name box, type dmz.
- In the To zone name box, type public.
- Next to Policy, click Add new entry.
- In the Policy name box, type proxy-to-public.
- Select the Match check box.
- Select the Then check box.
- Click Configure next to Match check box.
- Next to Source address choice list select Source address.
- Next to Source address, click Add new entry.
- From the Value keyword list, type proxy and click OK.
- From the Destination address choice list, select Destination
address.
- Next to Destination address, click Add new entry.
- Next to Value keyword list, select Enter Specific
Value.
- To specify the address, type phone2 and click OK.
- From the Application choice list, select Application.
- Next to Application, click Add new entry.
- Next to Value keyword box, type junos-sip and click OK.
- Next to Then, click Configure.
- Next to Action, select permit and click OK.
- To save and commit the configuration, click Commit.
- To check the configuration, see “Verifying the SIP
Configuration” on page 522.
CLI Configuration
- Configure interfaces.
- user@host# set interfaces ge-0/0/0 unit 0 family inet
address 10.1.1.1/24
- user@host# set interfaces ge-0/0/1 unit 0 family inet
address 2.2.2.2/24
- user@host# set interfaces ge-0/0/2 unit 0 family inet
address 1.1.1.1/24
- Configure zones.
- user@host# set security zones security-zone private
interfaces ge-0/0/0.0
- user@host# set security zones security-zone public
interfaces ge-0/0/2.0
- user@host# set security zones security-zone dmz interfaces
ge-0/0/1.0
- Configure addresses.
- user@host# set security zones security-zone private
address-book address phone1 10.1.1.3/32
- user@host# set security zones security-zone public
address-book address phone2 1.1.1.4/32
- user@host# set security zones security-zone dmz address-book
address proxy 2.2.2.4/32
- Configure static-NAT.
- user@host# set security nat interface ge-0/0/1.0 static-nat
2.2.2.3/32 host 10.1.1.3/32
- Configure policies.
- user@host# set security policies from-zone private
to-zone dmz policy private-to-proxy match source-address phone1
- user@host# set security policies from-zone private
to-zone dmz policy private-to-proxy match destination-address proxy
- user@host# set security policies from-zone private
to-zone dmz policy private-to-proxy match application junos-sip
- user@host# set security policies from-zone private
to-zone dmz policy private-to-proxy then permit source-nat interface
- user@host# set security policies from-zone public to-zone
dmz policy public-to-proxy match source-address phone2
- user@host# set security policies from-zone public to-zone
dmz policy public-to-proxy match destination-address proxy
- user@host# set security policies from-zone public to-zone
dmz policy public-to-proxy match application junos-sip
- user@host# set security policies from-zone public to-zone
dmz policy public-to-proxy then permit
- user@host# set security policies from-zone private
to-zone public policy private-to-public match source-address phone1
- user@host# set security policies from-zone private
to-zone public policy private-to-public match destination-address
phone2
- user@host# set security policies from-zone private
to-zone public policy private-to-public match application junos-sip
- user@host# set security policies from-zone private
to-zone public policy private-to-public then permit source-nat interface
- user@host# set security policies from-zone dmz to-zone
private policy proxy-to-private match source-address proxy
- user@host# set security policies from-zone dmz to-zone
private policy proxy-to-private match destination-address static_nat_2.2.2.3_32
- user@host# set security policies from-zone dmz to-zone
private policy proxy-to-private match application junos-sip
- user@host# set security policies from-zone dmz to-zone
private policy proxy-to-private then permit
- user@host# set security policies from-zone dmz to-zone
public policy proxy-to-public match source-address proxy
- user@host# set security policies from-zone dmz to-zone
public policy proxy-to-public match destination-address phone2
- user@host# set security policies from-zone dmz to-zone
public policy proxy-to-public match application junos-sip
- user@host# set security policies from-zone dmz to-zone
public policy proxy-to-public then permit
Related Topics
[
Contents]
[
Prev]
[
Next]
[
Index]
[
Report an Error]