[asterisk-users] SIP and NAT best practices since recent changes?
Bryant Zimmerman
BryantZ at zktech.com
Wed Jan 11 12:09:09 CST 2012
----------------------------------------
From: "Steve Davies" <davies147 at gmail.com>
Sent: Wednesday, January 11, 2012 12:51 PM
To: "Asterisk Users Mailing List - Non-Commercial Discussion"
<asterisk-users at lists.digium.com>
Subject: Re: [asterisk-users] SIP and NAT best practices since recent
changes?
On 11 January 2012 15:43, Kevin P. Fleming <kpfleming at digium.com> wrote:
> On 01/11/2012 05:29 AM, Steve Davies wrote:
>>
>> Hi,
>>
>> Since the recent update to the NAT configuration options and defaults
>> in chan_sip.so, I am interested in any SIP/NAT best practices advice.
>>
>> What I've always done in the past is:
>>
>> Global: nat=no
>> SIP handsets that are local: nat=no
>> SIP handsets that are remote: nat=yes
>> ITSP SIP trunks: nat=yes
>>
>> I will then set externip and localnet to reflect the local setup,
>> UNLESS there is a functional SIP ALG doing the work in the gateway
>> device. I make this statement because I've found one or two firewalls
>> where it is best to disable the SIP ALG, and one or two where it is
>> best to leave it enabled.
>>
>> The above always worked very well, but I now find my asterisk logs
>> being spammed with warnings containing lots of "!!" and I'd like to
>> know the best way to operate to achieve what I've always had while
>> following the new rules in order to be as secure as possible with
>> "clean" logs. I should add that we do not accept unsolicited
>> connections, and 99% of attempts to connect will be stopped at the
>> firewall.
>
>
> The simplest answer is to always use 'nat=yes' (or at least
> 'nat=force_rport' in recent versions of Asterisk that support it), until
you
> come across a SIP endpoint that fails to work properly with that setting.
If
> you do come across such an endpoint, try hard to get it to work with
that
> setting; if you can't, then set 'nat=no' for that endpoint, and
understand
> that the endpoint's name could be discoverable using the attack methods
> previously disclosed. If the endpoint's configuration is suitably locked
> down (permit/deny, for example) this may not be a concern for you. If
it's
> not locked down (for example, if it has to register to your Asterisk
server
> from random locations), then the next step would be to seriously
consider
> requesting that the user of that endpoint consider switching to some
other
> SIP endpoint.
>
> To date, the only endpoints that have been identified that do *not* work
> with Asterisk's 'rport' handling forced upon them are Cisco phones.
>
Excellent. Thanks as always Kevin.
(Why am I not surprised about Cisco!)
Regards,
Steve
Steve
I can't get my grandstream phones to work with force_rport behind a pfsense
firewall. but yes and comedia work fine.
Bryant
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.digium.com/pipermail/asterisk-users/attachments/20120111/449bdb75/attachment.htm>
More information about the asterisk-users
mailing list