Switchvox Cloud - How to configure a SonicWALL Security Appliance for use with Switchvox Cloud installations?

Switchvox Cloud - How to configure a SonicWALL Security Appliance for use with Switchvox Cloud installations?

Although versions of the SonicWALL Operating System may vary slightly, the following steps give you a general guide to configuring SonicWALL for Switchvox Cloud installations:

NOTE:  If you have any problem with the SonicWALL product itself, refer to SonicWALL Technical Support at www.sonicwall.com/us/en/support/Services.html

Step 1: Login to the SonicWALL web interface

Open a web browser and enter the router's web interface IP address. This is usually 192.168.0.1.

After the SonicWALL login window appears, enter the default username and password (admin and password) and click Login.

 

Step 2: Add Service Objects

Under Firewall, Add Service Object
Name it  Digium SIP and set Port range to 5060 to 5060

Under Firewall, Add Service Object
Name it Digium RTP
Make Port Range 10000 to 20000
Choose Protocol UDP

Step 3: Create Service Group and Add Services

Under Network > Services > Service Groups
Add Group called Digium Voice;
Add the Digium RTP and Digium SIP services to the Digium Voice Group
Click OK when finished.

Step 4: Add IP Address to Host

Under Network, Add Address Object Type Host called DigiumCloudIP and enter the IP Address of your Digium Cloud service.

Click OK when finished.

NOTE: If you do not know the IP address of your Digium Cloud service, you can use the command Line interface (cmd) and ping the hostname/URL, such as yourcompanyname.digiumcloud.net.
 

Step 5: Check VOIP > Settings and Enable Consistency NAT and Disable SIP Transformation

Under VOIP > Settings, the following settings should be selected.

General Settings: Enable consistent NAT
SIP Settings: Disable SIP Transformations

Step 6: Add Access Rules (LAN-WAN and WAN-LAN)

Under Firewall,  Add Access Rule
Enter General Settings as follows:
·         Action: Allow
·         From: LAN
·         To: WAN
·         Service: Digium Voice
·         Source: Any
·         Destination: DigiumCloudIP  
·         Users Included: All
·         Schedule: Always On

Enter Advanced Settings
As shown, making sure UDP timeout is set to 300

Under Firewall,  Add Access Rule
Enter General Settings as follows:
·         Action: Allow
·         From: WAN
·         To: LAN
·         Service: Digium Voice
·         Source: DigiumCloudIP
·         Destination: Any  
·         Users Included: All
·         Schedule: Always On

Enter Advanced Settings
Make sure UDP timeout is set to 300, as shown in LAN-to-WAN example.
 

* Important *

If you are experiencing one way audio issues in some calls, you need to create an outgoing NAT rule and enable "Disable Source port Remap" if your system does not have this feature available, please contact SonicWall Support team and ask them to implement Hotfix HF152075

Under Network > Nat Policies,  Click Add
Enter General Settings as follows:
·         Original Source: <Your LAN> 
·         Translated Source: <Your WAN>
·         Original Destination: Any 
·         Translated Destination: Original 
·         Outgoing Service: Any
·         Translated Service: Original 
·         Inbound Interface: <Your Inbound Interface>
·         Outbound Interface: <Your Outbound Interface>

 

Enable Nat Policy: Checked

 

Enter Advance Settings  as follows:
·         Disable Source Port Remap: Checked
 

This hotfix address a problem in which the SonicWall (randomly) doesn't honor source port of some initial RTP packets, therefore our SIP proxy receives media from two different port causing a confusion on selecting the correct port and then creating the problem on one-way audio issue. In order to address the issue, the SonicWall firewall must keep the same source port on all the RTP packet sent by the device on the internal network.

Looking for labels? They can now be found in the details panel on the floating action bar.

Related content