Switchvox Cloud - How to configure a SonicWALL Security Appliance for use with Switchvox Cloud installations?
Although versions of the SonicWALL Operating System may vary slightly, the following steps give you a general guide to configuring SonicWALL for Switchvox Cloud installations:
NOTE: If you have any problem with the SonicWALL product itself, refer to SonicWALL Technical Support at www.sonicwall.com/us/en/support/Services.html.
Step 1: Login to the SonicWALL web interface
Open a web browser and enter the router's web interface IP address. This is usually 192.168.0.1.
After the SonicWALL login window appears, enter the default username and password (admin and password) and click Login.
Step 2: Add Service Objects
Under Firewall, Add Service Object
Name it Digium SIP and set Port range to 5060 to 5060
Under Firewall, Add Service Object
Name it Digium RTP
Make Port Range 10000 to 20000
Choose Protocol UDP
Step 3: Create Service Group and Add Services
Under Network > Services > Service Groups
Add Group called Digium Voice;
Add the Digium RTP and Digium SIP services to the Digium Voice Group
Click OK when finished.
Step 4: Add IP Address to Host
Under Network, Add Address Object Type Host called DigiumCloudIP and enter the IP Address of your Digium Cloud service.
Click OK when finished.
NOTE: If you do not know the IP address of your Digium Cloud service, you can use the command Line interface (cmd) and ping the hostname/URL, such as yourcompanyname.digiumcloud.net.
Step 5: Check VOIP > Settings and Enable Consistency NAT and Disable SIP Transformation
Under VOIP > Settings, the following settings should be selected.
General Settings: Enable consistent NAT
SIP Settings: Disable SIP Transformations
Step 6: Add Access Rules (LAN-WAN and WAN-LAN)
Under Firewall, Add Access Rule
Enter General Settings as follows:
· Action: Allow
· From: LAN
· To: WAN
· Service: Digium Voice
· Source: Any
· Destination: DigiumCloudIP
· Users Included: All
· Schedule: Always On
Enter Advanced Settings
As shown, making sure UDP timeout is set to 300
Under Firewall, Add Access Rule
Enter General Settings as follows:
· Action: Allow
· From: WAN
· To: LAN
· Service: Digium Voice
· Source: DigiumCloudIP
· Destination: Any
· Users Included: All
· Schedule: Always On
Enter Advanced Settings
Make sure UDP timeout is set to 300, as shown in LAN-to-WAN example.
* Important *
If you are experiencing one way audio issues in some calls, you need to create an outgoing NAT rule and enable "Disable Source port Remap" if your system does not have this feature available, please contact SonicWall Support team and ask them to implement Hotfix HF152075
Under Network > Nat Policies, Click Add
Enter General Settings as follows:
· Original Source: <Your LAN>
· Translated Source: <Your WAN>
· Original Destination: Any
· Translated Destination: Original
· Outgoing Service: Any
· Translated Service: Original
· Inbound Interface: <Your Inbound Interface>
· Outbound Interface: <Your Outbound Interface>
Enable Nat Policy: Checked
Enter Advance Settings as follows:
· Disable Source Port Remap: Checked
This hotfix address a problem in which the SonicWall (randomly) doesn't honor source port of some initial RTP packets, therefore our SIP proxy receives media from two different port causing a confusion on selecting the correct port and then creating the problem on one-way audio issue. In order to address the issue, the SonicWall firewall must keep the same source port on all the RTP packet sent by the device on the internal network.