It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

How to Configure the SIP Proxy

  • Last updated on

To allow SIP-based VoIP communication to pass the firewall, you can configure the built-in SIP proxy for the Barracuda CloudGen Firewall. The SIP proxy dynamically opens all necessary RTP ports for successful SIP communication through a Barracuda CloudGen Firewall. You must also create a forwarding firewall rule that redirects traffic to the SIP proxy.

sip_proxy.png

Step 1. Create an App Redirect Firewall Rule

Create an App Redirect rule to forward all SIP traffic to the SIP proxy service. For example, to create this rule for the example setup that is displayed in the illustration above, use the following settings. Note that the network ranges the SIP phones reside in must be 10.0.0.0/8, 172.16.0.0/12 or 192.168.0.0/16.

  • Action – App Redirect

  • Source – 192.168.2.0/24 (The subnet that the SIP phones reside in)

  • Service – SIPcf

  • Destination – 192.168.1.100 (The IP address of the PBX host)

  • Redirection Local Address – 192.168.2.1:5060 (The listening IP address for the firewall of the subnet that the SIP phones reside in)

For more information on creating an App Redirect firewall rule, see How to Create an App Redirect Access Rule.

Step 2. Configure the SIP Proxy

In the forwarding firewall settings, configure the SIP proxy.

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > Firewall > Forwarding Settings.

  2. In the left menu, select VoIP/SIP.

  3. Click Lock.

  4. In the SIP Proxy Settings section, select the Enable the SIP Proxy check box.

  5. Configure the remaining SIP Proxy Settings. For more information on these settings, see the following SIP Proxy Settings section.

  6. Click  Send Changes and Activate

Step 3. SIP Proxy Settings

Advanced Configuration Mode

Some of the settings are only available in advanced configuration mode. To access this mode, expand the Configuration Mode menu in the left navigation pane and then click Switch to Advanced.

Setting

Description

Enable the SIP Proxy

The SIP proxy is disabled by default if the appliance is newly installed or updated from a firmware version that did not offer the feature.

Allowed Destinations

The IP addresses, IP ranges, and domain names that the user agents are allowed to contact. Alternatively, you can leave this field empty and restrict the destinations through forwarding rules.

For domain names, you can use wildcard characters such as asterisks (*), question marks (?), and square brackets ([ ]).

Entering 0.0.0.0/0 allows any IP address but no domain name. If you want to allow any domain name, add an entry with just an asterisk ( * ). If the list is empty, no restrictions are applied (this does not override the forwarding rules). If you want to forbid all destinations, block the SIP port (UDP+TCP 5060) in the forwarding rules instead.

Default Destination

SIP requests addressed to the SIP proxy will be redirected to the specified IP. If this field remains empty (which is the default), related requests will be discarded.

Trust Connection IP

Specifies whether the SIP proxy trusts the IP address in the connection IP field contained within the SDP header of SIP packets. This header field usually contains the source IP address for the packet. However, this IP address can be invalid in NAT'd networks, which would effectively block the SIP traffic. You can select one of the following modes:

  • Yes – The IP address in the SDP header is always be trusted. Works only if the clients are not NAT'd.

  • No – The IP address in the SDP header is not trusted. This can fix problems with NAT'd phone devices but might break traffic for devices with a public IP address residing behind another intermediate SIP proxy.

  • Automatic – The mode is detected automatically for each client. However, the Automatic mode cannot always detect the correct setting. If you encounter connection problems with traffic through the SIP proxy, try the other Trust Connection IP modes. The following table lists the modes that you can use for some specific scenarios that do not work with Automatic mode:

    ScenarioTrust Connection IP Setting
    Phone ↔ Firewall + SIP Proxy #1 ↔ Firewall + SIP Proxy #2 ↔ Phone or Phone SystemYes in SIP Proxy #1
    Phone ↔ Router with Symmetric NAT but no SIP Proxy ↔ Barracuda SIP Proxy ↔ Phone or Phone SystemNo
    Phone ↔ External Vendor's SIP Proxy or Phone System without RTP Forwarding ↔ Barracuda SIP Proxy ↔ Phone or Phone SystemYes
    Phone ↔ Barracuda SIP Proxy ↔ Phone System ↔ PhoneYes

Allow Registrations From WAN Addresses
(Advanced View)

Specifies if user agent clients (UACs) from WAN IP addresses are allowed to register on the SIP proxy.

For security reasons, Barracuda Networks recommends that you disable this feature.

Private Networks
(Advanced View)

Add all networks that should be handled by the SIP proxy to this list. By default, all SIP connections from 10.0.0.0/8, 192.168.0.0/16 and 172.16.0.0/16 are accepted by the SIP proxy.

No. of Child Processes
(Advanced View)

The number of SIP processes to be created for each available network port and interface.

For example, the Barracuda CloudGen Firewall F400 has seven network ports and the number of child processes is set to 4, so the SIP proxy starts four processes for each port. Because SIP requires TCP and UDP sessions for communication, there will be a total of 56 active SIP proxy processes (7 x 4 x 2 = 56).

Server Signature
(Advanced View)

The custom signature to be encapsulated into SIP packets.

Debug Log Level
(Advanced View)

race the SIP proxy's operations in one of three available granularity levels. If you encounter SIP proxy issues with VoIP communications, Barracuda Networks recommends that you increase the log level for further troubleshooting.

  • 0: Notice – Basic log information.

  • 1: Info – Medium log information.

  • 2: Debug – Extensive log information.

The log output is written to LOGS > your firewall service > sipproxy.