We currently are using a Switchvox 65 SMB connecting to an AT&T IP Flex SIP 
connection through pfsense 1.2.3 at two locations.  Not sure how much has 
changed in 2.0.2, but it does work for us.  We have two separate subnets 
internally, one for LAN and one for VoIP.  Each has it's own physical port on 
the pfsense box (yes we could do it with one port and VLANS).

Port forwarding looks ok to me from what you describe.  One thing that may be 
different is we also have two rules in "Outbound
NAT".  We choose "Manual Outbound NAT rule generation".

1) WAN | {LAN IP/24} | * | * | * | * | * | NO
2) WAN } {VoIP IP/24 | * | * | * | * | * | YES

Having Static port set to "Yes" for the VoIP subnet helped us initially get two 
way voice working.

Do you have any firewall rules for this specifically?  Allowing traffic in/out 
from the SIP provider?

We did not need to use sipproxy for our setup to allow this to work.

If you want to go through the Switchvox settings too let me know.  I am not 
familiar with Cbeyond, but I have worked with a few different providers and 
even spent some time on the phone with AT&T Labs (Bell labs???) at one point 
when we were trying to get SipXecs working before switching to Switchvox.  That 
is another story.....

We were using Automatic Outbound NAT. I changed to Manual Outbound NAT and 
there was a rule related to the LAN subnet for port 500 only. I changed that to 
include all ports. Will test after the office has closed for the evening.

Yes, there are firewall rules for the relevant ports as follows (snipped for 
brevity):

nat on xl0 inet from 192.168.1.0/24 to any -> <WAN Address> static-port
nat on xl0 inet from 192.168.1.0/24 to any -> <WAN Address> port 1024:65535
nat on xl0 inet from 127.0.0.0/8 to any -> <WAN Address> port 1024:65535
nat on xl0 inet from 192.168.2.0/24 to any port = isakmp -> <WAN Address> 
static-port
nat on xl0 inet from 192.168.2.0/24 to any -> <WAN Address> port 1024:65535
nat on xl0 inet from 127.0.0.0/8 to any -> <WAN Address> port 1024:65535

rdr on xl0 inet proto tcp from any to <WAN Address> port = http -> <h_PBX> 
round-robin
rdr on xl0 inet proto tcp from any to <WAN Address> port = https -> <h_PBX> 
round-robin
rdr on xl0 inet proto udp from <g_Cbeyond_SIP_Connections> to <WAN Address> 
port = 5060 -> <h_PBX> round-robin
rdr on xl0 inet proto udp from <g_Cbeyond_SIP_Connections> to <WAN Address> 
port = 5062 -> <h_PBX> round-robin
rdr on xl0 inet proto udp from <g_Cbeyond_SIP_Connections> to <WAN Address> 
port 10000:20000 -> <h_PBX> round-robin
rdr on xl0 inet proto udp from <g_Cbeyond_SIP_Connections> to <WAN Address> 
port 4000:4999 -> <h_PBX> round-robin
rdr on xl0 inet proto udp from <g_Cbeyond_SIP_Connections> to <WAN Address> 
port = 4569 -> <h_PBX> round-robin
rdr on xl0 inet proto tcp from <g_Cbeyond_SIP_Connections> to <WAN Address> 
port = jabber-client -> <h_PBX> round-robin
rdr on xl0 inet proto tcp from <g_Cbeyond_SIP_Connections> to <WAN Address> 
port = 843 -> <h_PBX> round-robin
rdr on xl0 inet proto tcp from <g_Cbeyond_SIP_Connections> to <WAN Address> 
port = jabber-server -> <h_PBX> round-robin

pass in quick on xl0 reply-to (xl0 <WAN Gateway Address>) inet proto tcp from 
any to <h_PBX> port = http flags S/SA keep state label "USER_RULE: NAT forward 
incoming http packets to PBX"
pass in quick on xl0 reply-to (xl0 <WAN Gateway Address>) inet proto tcp from 
any to <h_PBX> port = https flags S/SA keep state label "USER_RULE: NAT forward 
https packets to PBX"
pass in quick on xl0 reply-to (xl0 <WAN Gateway Address>) inet proto udp from 
any to <h_PBX> port = 5060 keep state label "USER_RULE: allow SIP packets from 
Internet to PBX"
pass in quick on xl0 reply-to (xl0 <WAN Gateway Address>) inet proto udp from 
<g_Cbeyond_SIP_Connections> to <h_PBX> port = 5060 keep state label "USER_RULE: 
NAT "
pass in quick on xl0 reply-to (xl0 <WAN Gateway Address>) inet proto udp from 
<g_Cbeyond_SIP_Connections> to <h_PBX> port = 5062 keep state label "USER_RULE: 
NAT "
pass in quick on xl0 reply-to (xl0 <WAN Gateway Address>) inet proto udp from 
<g_Cbeyond_SIP_Connections> to <h_PBX> port 9999 >< 20001 keep state label 
"USER_RULE: NAT "
pass in quick on xl0 reply-to (xl0 <WAN Gateway Address>) inet proto udp from 
<g_Cbeyond_SIP_Connections> to <h_PBX> port 3999 >< 5000 keep state label 
"USER_RULE: NAT "
pass in quick on xl0 reply-to (xl0 <WAN Gateway Address>) inet proto udp from 
<g_Cbeyond_SIP_Connections> to <h_PBX> port = 4569 keep state label "USER_RULE: 
NAT "
pass in quick on xl0 reply-to (xl0 <WAN Gateway Address>) inet proto tcp from 
<g_Cbeyond_SIP_Connections> to <h_PBX> port = jabber-client flags S/SA keep 
state label "USER_RULE: NAT "
pass in quick on xl0 reply-to (xl0 <WAN Gateway Address>) inet proto tcp from 
<g_Cbeyond_SIP_Connections> to <h_PBX> port = 843 flags S/SA keep state label 
"USER_RULE: NAT "
pass in quick on xl0 reply-to (xl0 <WAN Gateway Address>) inet proto tcp from 
<g_Cbeyond_SIP_Connections> to <h_PBX> port = jabber-server flags S/SA keep 
state label "USER_RULE: NAT "


Our phones are in the 192.168.101.0/24 subnet. 192.168.102.0/24 points to our 
DMZ zone.

I noticed in the pass rules the reply-to variables. I had never seen these 
before. Apparently the WAN gateway address was used here and not the WAN 
address. Is this correct?

Is the setup as described above correct?

I would like to go over the SIP settings for the Switchvox. As it is now it is 
functional. Let me test with the changes you suggested tonight and I will 
report back. Thanks for the time, Andrew.

~Doug


_______________________________________________
List mailing list
[email protected]
http://lists.pfsense.org/mailman/listinfo/list

Reply via email to