[
Contents]
[
Prev]
[
Next]
[
Index]
[
Report an Error]
Passing H.323 ALG Traffic to a Gatekeeper in the External Zone
Because route mode does not require address mapping
of any kind, a J-series device configuration for a gatekeeper in the
external, or public, zone is usually identical to the configuration
for a gatekeeper in an internal, or private, zone.
In the following example, you set up two policies
to allow H.323 traffic to pass between IP phone hosts in the internal
zone, and the IP phone at IP address 2.2.2.5 (and the gatekeeper)
in the external zone. The J-series device can be in transparent or
route mode. See Figure 68.
Figure 68: H.323 Gatekeeper in Zone2

To configure a gatekeeper in the external zone,
use either J-Web or the CLI Configuration editor.
This topic covers:
J-Web Configuration
To configure addresses, to configure a policy from
the internal zone to the external zone, and to configure a policy
to allow traffic between the internal zone and the gatekeeper in the
external zone using the J-Web configuration editor, follow the sequence
of steps listed below:
To configure addresses:
- Select Configuration > View and Edit > Edit Configuration.
The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Zones, click Configure or Edit.
- Next to Security zone, click Add new entry.
- In the Name box, type external.
- Next to Address book, click Configure or Edit.
- Next to Address, click Add new entry.
- In the Address name box, type ip_phone 2.2.2.5/32 and click OK.
- To configure another security zone internal,
repeat Step 2 through Step 4 and click OK.
- Next to Address book, click Configure.
- Next to Address, click Add new entry.
- In the Address name box, type gatekeeper 2.2.2.10/32 and click OK.
To configure a policy from the internal zone to
the external zone:
- Select Configuration > View and Edit > Edit Configuration.
The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure or Edit.
- Next to Policy, click Add new entry.
- In the From zone name box, type internal.
- In the To zone name box, type external and click OK.
- Under the From zone name column, click internal.
- Next to Policy, click Add new entry.
- In the Name box, type p_1.
- Select the Match check box.
- Select the Then check box.
- Next to Match, click Configure or Edit.
- Next to Source address, select Enter Source address and click Add new entry.
- From the Value keyword list, select any and click OK.
- Next to Destination address, click Add new entry.
- From the Value keyword list, select Enter Specific
Value.
- In the Address box, type ip_phone and click OK.
- Next to Application, click Add new entry.
- In the Value keyword box, type junos-h323 and click OK.
- Next to Then, click Configure.
- Next to Action, enter permit and click OK.
To configure a policy to allow traffic between
the internal zone and the gatekeeper in the external zone:
- Select Configuration > View and Edit > Edit Configuration.
The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure or Edit.
- Next to Policy, click Add new entry.
- In the From zone name box, type internal.
- In the To zone name box, type external and click OK.
- Next to Policy, click Add new entry.
- In the Policy name box, type p_2.
- Select the Match check box.
- Select the Then check box.
- Next to Match, click Configure.
- Next to Source address, select Enter Source address and click Add new entry.
- From the Value keyword list, select any and click OK.
- Next to Destination address, click Add new entry.
- From the Value keyword list, select Enter Specific
Value.
- Next to Address box, type gatekeeper and click OK.
- Next to Application, click Add new entry.
- In the Value keyword box, type junos-h323 and
click OK
- Next to Then, click Configure.
- Next to Action, enter permit and click OK.
To configure a policy to allow traffic between
phones in the internal zone and the external zone:
- Select Configuration > View and Edit > Edit Configuration.
The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Policies, select the check box and click Configure or Edit.
- Next to Policy, Add new entry.
- In the From zone name box, type external.
- In the To zone name box, type internal and click OK.
- Under the From zone name column, click external.
- Next to Policy, click Add new entry.
- In the Policy name box, type p_3.
- Select the Match check box.
- Select the Then check box.
- Next to Match, click Configure.
- Next to Source address, select Enter Source address and click Add new entry.
- From the Value keyword list, select ip_phone and click OK.
- Next to Destination address, click Add new entry.
- From the Value keyword list, select Enter Specific
Value.
- In the Address box, type any and click OK.
- Next to Application, click Add new entry.
- In the Value keyword box, type junos-h323 and
click OK
- Next to Then, click Configure.
- Next to Action, enter permit and click OK.
To configure a policy to allow traffic between
phones in the internal zone and the gatekeeper in the external zone:
- Select Configuration > View and Edit > Edit Configuration.
The Configuration page appears.
- Next to Security, click Configure or Edit.
- Select the Policies check box, and click Configure or Edit.
- Next to Policy, Add new entry.
- In the From zone name box, type external.
- In the To zone name box, type internal and click OK.
- Next to Policy, click Add new entry.
- Under the From zone name column, click external.
- In the Policy name box, type p_4.
- Select the Match check box.
- Select the Then check box.
- Next to Match, click Configure.
- Next to Source address, select Enter Source address and click Add new entry.
- From the Value keyword list, select gatekeeper and click OK.
- Next to Destination address, click Add new entry.
- From the Value keyword list, select Enter Specific
Value.
- In the Address box, type any and click OK.
- Next to Application, click Add new entry.
- In the Value keyword box, type junos-h323 and click OK
- Next to Then, click Configure.
- Next to Action, enter permit and click OK.
- If you are finished configuring the J-series device, commit
the configuration.
CLI Configuration
- Configure addresses.
- user@host# set security zones security-zone external
address-book address IP_Phone 2.2.2.5/32
- user@host# set security zones security-zone internal
address-book address gatekeeper 2.2.2.10/32
- Configure a policy from the internal zone to the external
zone.
- user@host# set security policies from-zone internal
to-zone external policy p_1 match source-address any
- user@host# set security policies from-zone internal
to-zone external policy p_1 match destination-address IP_Phone
- user@host# set security policies from-zone internal
to-zone external policy p_1 match application junos-h323
- user@host# set security policies from-zone internal
to-zone external policy p_1 then permit
- Configure a policy to allow traffic between the internal
zone and the gatekeeper in the external zone.
- user@host# set security policies from-zone internal
to-zone external p_2 match source-address any
- user@host# set security policies from-zone internal
to-zone external policy p_2 match destination-address gatekeeper
- user@host# set security policies from-zone internal
to-zone external policy p_2 match application junos-h323
- user@host# set security policies from-zone internal
to-zone external policy p_2 then permit
- Configure a policy to allow traffic between phones in
the internal zone and the external zone.
- user@host# set security policies from-zone external
to-zone internal policy p_3 match source-address IP_Phone
- user@host# set security policies from-zone external
to-zone internal policy p_3 match destination-address any
- user@host# set security policies from-zone external
to-zone internal policy p_3 match application junos-h323
- user@host# set security policies from-zone external
to-zone internal policy p_3 then permit
- Configure a policy to allow traffic between phones in
the internal zone and the gatekeeper in the external zone.
- user@host# set security policies from-zone external
to-zone internal policy id_4 match source-address gatekeeper
- user@host# set security policies from-zone external
to-zone internal policy p_4 match destination-address any
- user@host# set security policies from-zone external
to-zone internal policy p_4 match application junos-h323
- user@host# set security policies from-zone external
to-zone internal policy p_4 then permit
- If you are finished configuring the J-series device, commit
the configuration.
Related Topics
[
Contents]
[
Prev]
[
Next]
[
Index]
[
Report an Error]