[
Contents]
[
Prev]
[
Next]
[
Index]
[
Report an Error]
Configuring Static NAT for Incoming SIP Calls
When you locate the SIP proxy server in an external,
or public, zone, static NAT configured on the interface to the public
will enable callers in the internal, or private, zone to register
with the proxy.
|
For background information, read
|
In this example, phone1 is on the ge-0/0/0
interface in the private zone, and phone2 and the proxy server are
on the ge-0/0/2 interface in the public zone. You configure static
NAT on the ge-0/0/2.0 interface to phone1, then create policies that
allow SIP traffic from the public zone to the private zone, and reference
the static NAT in the policy. This example is similar to the (Configuring Interface Source NAT for Incoming SIP Calls and Configuring a Source NAT Pool for Incoming SIP Calls, except
that with static NAT you need one public address for each private
address in the private zone, while with a DIP pool a single interface
address can serve multiple private addresses. See Figure 78.
Figure 78: Static NAT for Incoming Calls

To configure static NAT for incoming calls, use
either the J-Web or CLI configuration editor.
This topic covers:
J-Web Configuration
To configure interfaces:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Interfaces, click Configure or Edit.
- Next to Interfaces, click Add new entry.
- In the Interface name box, type ge-0/0/0.
- Next to Unit, click Add new entry.
- In the Interface unit number box, type 0.
- Under Family, select inet and click Configure.
- Next to Address, click Add new entry.
- In the Source box, type 10.1.1.1/24 and click OK.
- To configure other interface, ge-0/0/2, and to add address,
repeat Step 2 through Step 9, and click OK.
- To save and commit the configuration, click Commit.
To configure a zone and assign an interface:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Zones, click Configure.
- Next to Security zones, click Add new entry.
- In the Name box, type private.
- Next to Interfaces, click Add new entry.
- In the Interface unit box, type ge-0/0/0.0 and click OK.
- To save and commit the configuration, click Commit.
To configure addresses:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Zones, click Configure.
- Next to Security zones, click Add new entry.
- In the Name box, type private.
- Next to Address book, click Configure.
- Next to Address, click Add new entry.
- In the Address name box, type phone1 10.1.1.3/32.
- To configure more security zones, public, and address
books entries such as proxy 10.1.1.3/32 and phone2 1.1.1.4/32, repeat
Step 3 through Step 8 and click OK.
- To save and commit the configuration, click Commit.
To configure zones:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Zones, click Configure.
- Next to Security zones, click Add new entry.
- In the Name box, type private and click OK.
- To specify the name of the another security zone, next
to Security zone, click Add new entry.
- In the Name box, type public and click OK.
- To configure an interface to the private zone, click private.
- Next to Interfaces, click Add new entry.
- In the Interface unit box, type ge-0/0/0.0 and click OK.
- To configure an interface to the public zone, click public.
- Next to Interfaces, click Add new entry.
- In the Interface unit box, type ge-0/0/0.0 and click OK.
- To configure an interface to the private zone, click private.
- Next to Interfaces, click Add new entry.
- In the Interface unit box, type ge-0/0/2.0 and click OK.
- To save and commit the configuration, click Commit.
To configure static NAT:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Nat, click Configure or Edit.
- Next to Interfaces, click Add new entry.
- In the Name box, type ge-0/0/2.0 and click OK.
- Under the Name column, click ge-0/0/2.0.
- Next to Static nat, click Add new entry.
- In the Address box, type 1.1.1.3/32.
- In the Host box, type 10.1.1.3/32 and click OK.
- To save and commit the configuration, click Commit.
To configure policies:
- Select Configuration > View and Edit > Edit Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure.
- Next to Policy, click Add new entry.
- In the From zone name box, type public.
- In the To zone name box, type private and click OK.
- Under the From zone name column, click public.
- Next to Policy, click Add new entry.
- In the Policy name box, type incoming.
- Select the Match check box.
- Select the Then check box.
- Next to Match, click Configure.
- Next to Source address, select Source address.
- Next to Source address, click Add new entry.
- From the Value keyword list, select any and click OK.
- From the Destination address choice list, select Destination
address.
- Next to Destination address, click Add new entry.
- From the Value keyword list, select Enter Specific
Value.
- In the Address box, type static_nat_1.1.1.3-32 and click OK.
- From the Application choice list, select Application.
- Next to Application, click Add new entry.
- In the Value keyword box, type junos-jsrp and click OK.
- Next to Then, click Configure.
- Next to Action, select permit and click OK.
- To save and commit the configuration, click Commit.
CLI Configuration
- Configure interfaces.
- user@host# set interfaces ge-0/0/0 unit 0 family inet
address 10.1.1.1/24
- user@host# set interfaces ge-0/0/2 unit 0 family inet
address 1.1.1.1/24
- user@host# set security zones security-zone private
interface ge-0/0/0.0
- Configure addresses.
- user@host# set security zones security-zone private
address-book address phone1 10.1.1.3/32
- user@host# set security zones security-zone public
address-book address proxy 10.1.1.3/32
- user@host# set security zones security-zone public
address-book address phone2 1.1.1.4/32
- Configure zones.
- user@host# set security zones security-zone private
- user@host# set security zones security-zone public
- user@host# set security zones security-zone private
interfaces ge-0/0/0.0
- user@host# set security zones security-zone public
interfaces ge-0/0/2.0
- Configure static NAT.
- user@host# set security nat interface ge-0/0/2.0 static-nat
1.1.1.3/32 host 10.1.1.3/32
- Configure Policies.
- user@host# set security policies from-zone public to-zone
private policy incoming match source-address any destination-address
static_nat_1.1.1.3-32 application junos-jsrp
- user@host# set security policies from-zone public to-zone
private policy incoming then permit
Related Topics
[
Contents]
[
Prev]
[
Next]
[
Index]
[
Report an Error]