Ingate Siparator Getting Starting Guide PDF
Ingate Siparator Getting Starting Guide PDF
Lisa Hallingstrm
Paul Donald
Bogdan Musat
Adnan Khalid
Per Johnsson
Rickard Nilsson
The contents of this documentation may not be duplicated, in whole or in part, without the express written permission
of Ingate Systems AB, according to copyright law. This includes all forms of duplications, including but not limited
to printing, photocopying, dittoing, recording on tape, etc.
Copyright 2016 Ingate Systems AB
Table of Contents
Part I. Installation of the Ingate SIParator ........................................................................i
1. Introduction................................................................................................................ 1
2. The exterior of Ingate SIParator 21/26/31/36 rev A .................................................. 5
3. The exterior of Ingate SIParator 21 rev B.................................................................. 7
4. The exterior of Ingate SIParator 51/56/66 ................................................................. 9
5. The exterior of Ingate SIParator 52/57/67 ............................................................... 11
6. The exterior of Ingate SIParator 9x-series, e.g. 95/96/97/98 ................................... 13
7. Overview of the Installation and Configuration....................................................... 15
8. Installing Ingate SIParator ....................................................................................... 19
Part II. Configuring Ingate SIParator ............................................................................. 29
9. Network Configuration ............................................................................................ 31
10. SIP Configuration .................................................................................................. 53
11. Administration of the SIParator ............................................................................. 63
12. Firewall and Client Configuration.......................................................................... 73
Index ............................................................................................................................ 79
ii
Chapter 1. Introduction
What is a SIParator?
A SIParator is a device which processes traffic under the SIP protocol (see RFC 3261). The
SIParator receives SIP requests, processes them according to the rules you have set up, and
forwards them to the receiver.
The SIParator connects to an existing enterprise firewall through a DMZ port, enabling the
transmission of SIP-based communications without affecting firewall security. SIP
messages are then routed through the firewall to the private IP addresses of authorized users
on the internal network.
The SIParator can also be used as an extra gateway to the internal network without
connecting to the firewall, transmitting only SIP-based communications.
Configuration alternatives
The Ingate SIParator can be connected to your network in four different ways, depending
on your needs.
Note that if the Standalone type is used, the interface which should receive traffic from the
outside must have a public IP address (no NAT).
For a DMZ or DMZ/LAN type which uses a private IP address on the interface connected
to the DMZ of the firewall, its corresponding public IP address must be entered on the
Interoperability page.
DMZ Configuration
Using this configuration, the SIParator is located on the DMZ of your firewall, and
connected to it with only one interface. The SIP traffic finds its way to the SIParator using
DNS or by setting the SIParator as an outbound proxy on the clients.
This is the most secure configuration, since all traffic goes through both your firewall and
your SIParator. It is also the most flexible, since all networks connected to any of your
firewalls interfaces can be SIP-enabled.
The drawback is that the SIP traffic will pass the firewall twice, which can decrease
performance.
Chapter 1. Introduction
DMZ/LAN Configuration
Using this configuration, the SIParator is located on the DMZ of your firewall, and
connected to it with one of the interfaces. The other interfaces are connected to your
internal networks. The SIParator can handle several networks on the internal interface even
if they are hidden behind routers.
This configuration is used to enhance the data throughput, since the traffic only needs to
pass your firewall once.
Internet
Firewall
SIParator
Standalone Configuration
Using this configuration, the SIParator is connected to the outside on one interface and your
internal networks on the others.
Use this configuration only if your firewall lacks a DMZ interface, or for some other reason
cannot be configured for the DMZ or DMZ/LAN alternatives.
Chapter 1. Introduction
SIParator
WAN Configuration
Using this configuration, the SIParator is connected to the outside on one interface and your
firewall on another interface. Between these two interfaces (marked as a Data Interfaces on
the Topology page), only data will be sent. Other interfaces can be connected directly to
your LAN, DMZ or other networks, and here SIP traffic will be sent.
Internet
data/VoIP
SIParator
data
Firewall
VoIP
Chapter 1. Introduction
E2
E1
E0
PWR
ALERT
ACTIVE
SIParator Firewall
LINK
1. Active / Link leds. These leds show link and active status. The active led is green
when there is link on the port and it flashes when there is network activity. The link led
indicate the speed of the network, amber led indicate 1000Mbit network, green led
indicate 100Mbit and when the led is off there is a 10 Mbit network.
2. Power LED. This LED is lit when the SIParator is connected to a power outlet and
switched on.
3. ALERT. The ALERT LED indicates that something prevents the SIParator from
working correctly. SIParator states are indicated thus:
The SIParator warns about a minor error which affects the network traffic.
2 3 4
Reset
DC7in
Console
USB
E3
E2
E1
E0
Config
SIParator7Firewall
E2
E1
E0
PWR
ALERT
ACTIVE
SIParator Firewall
LINK
1. Active / Link leds. These leds show link and active status. The active led is green
when there is link on the port and it flashes when there is network activity. The link led
indicate the speed of the network, amber led indicate 1000Mbit network, green led
indicate 100Mbit and when the led is off there is a 10 Mbit network.
2. Power LED. This LED is lit when the SIParator is connected to a power outlet and
switched on.
3. ALERT. The ALERT LED indicates that something prevents the SIParator from
working correctly. SIParator states are indicated thus:
The SIParator warns about a minor error which affects the network traffic.
1 2 3
DC in
Console
USB
E3
E2
E1
E0
Config
SIParator Firewall
1. Power button. Press this button once to turn off or on the SIParator. On power off it
will take about 10 seconds until the SIParator is off. When the SIParator is powered on
the Power button is red and when off its blue.
2. Power connection. Connection for the power cord.
3. Serial port. Serial port for connecting the SIParator to a workstation. This is needed
when installing the SIParator (see also chapter 7, Installing Ingate SIParator).
4. Usb ports. USB 2.0 Ports. These ports are currently unutilized.
5. Ethernet ports. Ethernet ports with 10/100/1000 Mbit led on the right side of the
ethernet ports and link led on the left side of the ethernet ports. The link led is green
when there is link and it flashes when there is network activity on the port. The Mbit
led indicate the speed of the network, a unlit led indicate 10 Mbit network, a green led
indicate 100 Mbit network and amber led indicate 1000 Mbit network.
6. Config Button. Press this button (a pencil or other thin device is needed) during boot
to make the SIParator erase the current password and enter wait mode. In this mode, it
waits for a reconfiguration made by a magic ping or the installation program (see
chapter 7, Installing Ingate SIParator). Before one of these is performed, no traffic will
be let through the SIParator.
The SIParator logs when the button is pressed according to the Logclass for
administration and configuration set on the Logging Configuration page under
Logging and Tools.
ESC
13
12
CONSOLE
ENTER
USB
ETH0
ETH1
ETH2
10
ETH3
PWR
RESET
HDD
8
HDD
1. Serial port. Serial port for connecting the SIParator to a workstation. This is needed
when installing the SIParator (see also chapter 7, Installing Ingate SIParator).
2. Ethernet ports. Ethernet ports for connecting the SIParator to the network. Use
Ethernet cables only, with RJ-45 connectors.
3. Power LED. This LED is lit when the SIParator is connected to a power outlet and
switched on.
4. ESC button. When the SIParator is restarted, the display will show when to press the
ESC button to make the SIParator erase the current password and enter wait mode. In
this mode, it waits for a reconfiguration made by a magic ping or the installation
program (see chapter 7, Installing Ingate SIParator). Before one of these is performed,
no traffic will be let through the SIParator.
5. Up button. The Up button is used for going up in the menu on the display.
6. Down button. The Down button is used for going down in the menu on the display.
7. Enter button. The Enter button is used to select a setting in the menu shown on the
LCD display.
8. HDD LED. This LED indicates that the hard drive is written to or read from.
9. Activity LEDs. A blinking yellow LED indicates activity on the port.
10. 10/100/1000 MBit LEDs. The LEDs indicate what kind of network the port is
connected to. The LEDs light green for 10/100/1000 MBit.
11. Display. The display shows status for the SIParator and also indicates when to press
the ESC button during boot to enter wait mode. In wait mode, the SIParator waits for a
new password and can also receive a new IP address.
Via the LCD display and the buttons, simple configuration is also possible, when the
SIParator is in unconfigured mode. The settings available is to assign an IP address and
to make the SIParator the standby unit in a failover team, or to break it out from a
failover team.
10
10
12
CONSOLE
ETH0
ETH1
ETH2
ETH3
ETH4
ETH5
ESC
USB
PWR
HDD
ENTER
RESET
11
13
1. Ethernet ports. Ethernet ports for connecting the SIParator to the network. Use
Ethernet cables only, with RJ-45 connectors.
2. LINK/ACT LED. The LED shows link and active status of the port. The LED is green
when the port is connected to a network and it flashes when there is network activity.
3. 10/100/1000 MBit LED. The LED indicates what kind of network the port is
connected to. An unlit LED indicate 10 Mbit network, a green LED indicate 100 Mbit
network and amber LED indicate 1000 Mbit network.
4. Usb ports. USB 2.0 Ports. These ports are currently unutilized.
5. Serial port. Serial port for connecting the SIParator to a workstation. This is needed
when installing the SIParator (see also chapter 7, Installing Ingate SIParator).
6. Power LED. This LED is lit when the SIParator is connected to a power outlet and
switched on.
7. HDD LED. This LED indicates that the hard drive is written to or read from.
8. RESET button. Press this button (a bent steel paper clip or other thin device is
needed) to restart the SIParator.
9. Display. The display shows status for the SIParator and also indicates when to press
the Enter and ESC buttons during boot to enter wait mode. In wait mode, the SIParator
waits for a new password and can also receive a new IP address.
Via the LCD display and the buttons, simple configuration is also possible, when the
SIParator is in unconfigured mode. The settings available is to assign an IP address and
to make the SIParator the standby unit in a failover team, or to break it out from a
failover team.
10. Up button. The Up button is used for going up in the menu on the display.
11. Down button. The Down button is used for going down in the menu on the display.
11
15
14
10
12
CONSOLE
ETH6
10 GBPS
ETH0
ETH7
ETH1
ETH2
ETH3
ETH4
ETH5
ESC
USB
LINK/ACT
PWR
1G/10G
HDD
16
ENTER
RESET
11
13
14. 10 Gbps Ethernet ports. 10 Gbps Ethernet ports for connecting the SIParator to the
network. Connect an SFP+ transceiver to adapt to your cables.
15. LINK/ACT LED. The LED shows link and active status of the port. The LED is green
when the port is connected to a network and it flashes when there is network activity.
16. 1/10 GBit LED. The LED indicates what kind of network the port is connected to. An
amber LED indicate 1 Gbit network and a blue LED indicates 10 GBit network.
12
1. Power. depress to start the unit. Hold to power off the unit.
2. System identification button. Press to illuminate the system ID light. The
identification buttons on the front and back panels can be used to locate a particular
system within a rack.
3. Hardware Status LCD. reports hardware specific system health and status messages.
Not used by the Ingate SIParator firmware.
4. Usb ports. USB 2.0 Ports. These ports are currently unutilized.
5. Video connector. Port for connection of a VGA display to the system. Currently not
used.
6. DVD drive. Only used to boot the factory-reset CD. Simply (re)boot the Ingate
SIParator with the factory-reset CD in the drive during boot sequence. The admin
password is erased and the unit is placed into an UNCONFIGURED state. Note: eject
the CD before next reboot.
7. RAID bay.
13
10
11
or
eth0 eth1 eth2 eth3
iDRAC
eth4 eth5
10
11
14
Select an IP address for the SIParator on your network or use the default IP address set at
factory.
Activate purchased licenses. License codes are typically delivered by e-mail from Ingate
and come with instructions how to register and install.
Make extra configuration according to your requirements via the Web interface by
directing your web browser to the IP address of the SIParator. See next chapter for the
Configuration overview.
Configuration Overview
This is an overview of the configuration needed to make your SIParator work.
Note that several of the steps below will be configured by StartUp Tool TG.
Enter the IP address of the SIParator in your web browser. If you have set the IP address
with magic ping you will be prompted to set a password for the SIParator admin user.
15
Now you can see the main page of Ingate SIParator. Click on the SIParator Type link
and select the configuration for your SIParator. The types are described on the
corresponding help page.
Go to the Basic Configuration page and enter a DNS server. See also the Basic
Configuration section.
Go to the Access Control page and make settings for the configuration of the SIParator.
See also the Access Control section.
Go to the Eth0 page under Network and enter the necessary configuration. See also the
Interface section. Note that the SIParator must have at least one IP address which can be
reached from the Internet.
If one of the SIParator Types DMZ/LAN or Standalone was chosen, move on to the Eth1
page and give the SIParator at least one IP address on this interface and state the
networks connected to the interface. See also the Interface section.
Go to the Default Gateways page and enter a Default gateway. See also the Default
Gateways section.
Go to the Networks and Computers page. Define the networks that will send and
receive SIP traffic using the SIParator. Usually, you need at least one network per
interface of the firewall connected to the SIParator (or, for the Standalone type, per
interface of the SIParator). Some computers should be handled separately, and they
therefore need their own networks. See also the Networks and Computers section.
Go to the Topology page (for the DMZ SIParator Type) and state the networks connected
to the firewall. See also the Topology section in chapter , Network Configuration.
Press the SIP Services button and turn the SIP module on. Enter the port range to be
used by the SIParator for the media streams. See also the Basic section.
Go to the Filtering page under SIP Traffic to create Proxy rules for the SIP traffic from
different networks and allow the content types which should be allowed in the SIP media
streams. See also the Filtering section.
If the SIParator should work as a SIP registrar, go to the Local Registrar page and enter
the domains handled by the SIParator, and the users allowed to register. See also the
Local Registrar section.
If the SIParator should request that users authenticate themselves for various SIP
activities, go to the Authentication and Accounting page and make the authentication
active and enter a SIP realm. See also the Authentication and Accounting section.
When the configuration has been applied, you should save a backup to file. Press Save to
local file to save the configuration.
When the SIParator is configured, the firewall connected to it must also be reconfigured (for
the DMZ and DMZ/LAN SIParator Types).
16
Allow UDP and TCP traffic in the port interval used for media streams by the SIParator,
and port 5060. This traffic must be allowed to all networks which should be reached by
SIP traffic.
See also chapter , Firewall and Client Configuration, for information on configuring the
firewall and the SIP clients, and chapter of the How To Guide for SIParator configuration
examples.
License Conditions
To fulfill the license conditions, we must either attach the source code with the software, or
send a written offer, valid at least three years, to give a copy of the source code to anyone
who wants it. According to 3b) of the license, we are entitled to charge for the distribution
of the source code.
To make the distribution easier and cheaper, both for Ingate Systems AB and you, we have
an FTP server where you can download the GPL:ed source code. You find the FTP server at
ftp://ftp.ingate.com/pub/fuego/firewall/src/.
We also have this offer:
Ingate Systems AB offer the source code for all third party software included in Ingate
SIParator and licensed under GPL. This offer is valid for this version of Ingate SIParator
and is valid for three years after deliverance of your Ingate SIParator unit. Deliverance in
17
18
You need a serial cable (one was included with the product), a serial adapter cable, and a
terminal program on your workstation.
Connect the serial port at the SIParator to your workstation with the serial cable, using a
serial adapter suiting your workstation.
When communicating via serial links with Ingate products, use 19200bps, 8N1 (i.e. 8
data, No parity, 1 stop bit), VT100.
If you use a Windows workstation, connect like this: Start PUTTY (of course other
terminal programs can be used, however only PUTTY is described here).
19
If you use a MAC workstation, connect like this: Start Screen (of course other
terminal programs can be used, however only Screen is described here).
1. Plug in your USB-serial adapter.
2. Find the right TTY device.
ls /dev/tty*
You should get something like this:
20
Log on from your workstation as the user admin. The first time you log on, no password is
required. You set the password when you run the 1. Basic configuration from the menu,
that is presented when you have logged on.
Each network interface is marked with a name (Eth0, Eth1, ...), which corresponds to a tab
under Network. All eth interfaces belong to ethernet cards and should only be connected
using ethernet cables.
Decide which computer(s) are allowed to configure Ingate SIParator and enter the name of
the network interface to which they are connected, for example, eth0. You must use the
physical device name (eth0, eth1, ...).
Enter the IP address of the SIParator on this interface and the network mask for the
network.
A network mask can be written in two ways in Ingate SIParator:
The first looks just like an IP address, for example 255.255.192.0 or 255.255.254.0.
The other way is as a number between 0 and 32. An IP address has 32 bits, where
network mask number indicates how many bits are used in the networks addresses. The
rest of the bits identifies the computer on the network.
Now, you can select to deactivate any network interfaces. Select y to deactivate all
interfaces but the one you just configured. The remaining network interfaces can be
activated later when you complete the configuration via the web interface from your work
21
22
23
24
Find out the MAC address of the SIParator (printed on the SIParator label). This is the
MAC address of Eth0.
Add a static entry in your local ARP table consisting of the SIParators MAC address and
the IP address it should have on eth0.
This is how to add a static ARP entry if you use a Windows 8 or Windows 7 computer:
25
This is how to add a static ARP entry if you use an older Windows version:
Ping this IP address to give the SIParator its new IP address. You should receive one
ping reply if the address distribution was successful.
The magic ping will not set any password. Set a password immediately via the web user
interface. Before any configuration has been made, only the computer which performed the
magic ping will be able to configure the Ingate SIParator.
changing the administrator password using a reboot and the SIParator buttons.
26
For more information about the necessary configuration, see chapter 3 of the Reference
Guide.
27
28
SIParator Type
The SIParator can be connected to your network in different ways, depending on your
needs. On this page, you state what configuration you have.
DMZ Configuration
Using this configuration, the SIParator is located on the DMZ of your firewall, and
connected to it with only one interface. The SIP traffic finds its way to the SIParator using
DNS or by setting the SIParator as an outbound proxy on the clients.
This is the most secure configuration, since all traffic goes through both your firewall and
your SIParator. It is also the most flexible, since all networks connected to any of your
firewalls interfaces can be SIP-enabled.
The drawback is that the SIP traffic will pass the firewall twice, which can decrease
performance.
On your firewall, you need to open the SIP port (normally UDP port 5060) and a range of
UDP ports for RTP traffic between the SIParator and the Internet as well as between the
SIParator and your internal networks. The SIP traffic finds its way to the SIParator using
DNS or by setting the SIParator as an outbound proxy on the clients.
The firewall mustnt use NAT for the traffic between the SIParator and your internal
networks or for the traffic between the SIParator and the Internet. However, the SIParator
can itself use NAT for traffic to the Internet.
You need to declare your internal network topology on the Topology page.
31
DMZ/LAN Configuration
Using this configuration, the SIParator is located on the DMZ of your firewall, and
connected to it with one of the interfaces. The other interfaces are connected to your
internal networks. The SIParator can handle several networks on the internal interface even
if they are hidden behind routers.
This configuration is used to enhance the data throughput, since the traffic only needs to
pass your firewall once.
Internet
Firewall
SIParator
On your firewall, you need to open the SIP port (normally UDP port 5060) and a range of
UDP ports for RTP traffic between the SIParator and the Internet. The other interface is
connected to your internal network. The SIParator can handle several networks on the
internal interface even if they are hidden behind routers. No networks on other interfaces on
the firewall can be handled.
Internal users have to configure the SIParator as outbound proxy, or an internal proxy has to
use the SIParator as outbound proxy.
The SIParator derives information about your network topology from the interface
configuration.
Standalone Configuration
Using this configuration, the SIParator is connected to the outside on one interface and your
internal networks on the others.
Use this configuration only if your firewall lacks a DMZ interface, or for some other reason
cannot be configured for the DMZ or DMZ/LAN alternatives.
SIParator
32
WAN Configuration
Using this configuration, the SIParator is connected to the outside on one interface and your
firewall on another interface. Between these two interfaces (marked as a Data Interfaces on
the Topology page), only data will be sent. Other interfaces can be connected directly to
your LAN, DMZ or other networks, and here SIP traffic will be sent.
Internet
data/VoIP
SIParator
data
Firewall
VoIP
Internal users have to configure the SIParator as outbound proxy, or an internal proxy has to
use the SIParator as outbound proxy. No change in the firewall configuration is needed.
The SIParator derives information about your network topology from the interface
configuration.
33
Change type
Press the Change type button to set the new SIParator Type. This setting, like others, must
be applied on the Save/Load Configuration page before it affects the SIParator
functionality.
34
General
Physical device
Physical device tells the physical device name of the network interface.
This interface is
Specify if this network interface is On or Off. If the interface is off, all configuration on
this page is ignored, and the SIParator will behave as if this interface wasnt present (except
when used for failover).
If the interface should be used for failover, you should select Off. In this case, it wont be
available for other traffic than the synchronizing within the failover team. Read more about
failover in chapter 11 of the Reference Guide.
Interface name
The network Interface name is only used internally in the SIParator, e. g. when
configuring Networks and Computers.
35
Name
A name for this IP address. You can use this name when configuring VPN. This name is
only used internally in the SIParator.
IP Address
Shows the IP address of the DNS Name or IP Address you entered in the previous field.
Netmask/Bits
Enter the mask of the network where the DNS Name or IP Address applies.
Network Address
The IP address of the network where the DNS Name or IP Address applies.
Broadcast Address
Shows the broadcast address of the network in the Network address field.
36
VLAN Id
VLANs are used for clustering IP ranges into logical networks. A VLAN id is simply a
number, which identifies the VLAN uniquely within your network.
Enter a VLAN id for this network. You dont need to use a named VLAN (defined on the
VLAN page).
VLAN Name
If you entered the VLAN id of a named VLAN, the name will show here.
Delete
If you select this box, the row is deleted when you click on Add new rows, Save, or Look
up all IP addresses again.
Alias
Ingate SIParator can use extra IP addresses, aliases, on its interfaces. All alias IP addresses
must belong to one of the Directly Connected Networks you have specified.
37
Name
Enter the name of your alias. This name is only used internally in the SIParator.
IP Address
Shows the IP address of the DNS Name or IP Address you entered in the previous field.
Delete
If you select this box, the row is deleted when you click on Add new rows, Save, or Look
up all IP addresses again.
38
Proxy ARP
Delete
If you select this box, the row is deleted when you click on Add new rows, Save, or Look
up all IP addresses again.
Static Routing
If there is a router between the SIParator and a computer network which the SIParator is
serving, you must name the router and the network here. The table is sorted by network
number and network mask.
The Default gateway, configured on the Default Gateways page, will automatically be
entered in this table on the corresponding interface page, when added to the Main Default
Gateways table.
If the interface obtains its IP address dynamically, no other static routes can be defined.
Routed network
Enter the DNS name or IP address of the routed network under DNS Name or Network
Address.
39
Router
The name or IP address of the router that will be used for routing to the network. If there
are several routers between the SIParator and the network, fill in the router closest to the
SIParator.
If an interface will receive its IP address from a DHCP server, the SIParator will get its
default gateway from the server. In this case, select the corresponding IP address under
Dynamic.
Delete
If you select this box, the row is deleted when you click on Add new rows, Save, or Look
up all IP addresses again.
Save
Saves all Interface configuration to the preliminary configuration.
Undo
Clears and resets all fields in new rows and resets changes in old rows.
Default Gateways
Main Default Gateways
The Default gateway is the IP address of the router that is used to contact the outside
world. This IP address is usually the firewall. Default gateway must be an IP address from
one of the Directly Connected Networks of the SIParators interfaces. See appendix J of the
Reference Guide, for further description of routers/gateways.
The SIParator must have at least one default gateway to work.
You can enter more than one default gateway. The SIParator will use one of them until it
stops responding, and then switch to the next one.
40
Priority
If you entered more than one default gateway, you can assign a priority to each of them.
The SIParator will use the gateway with the highest priority (lowest number) when it
works. If it stops working, the SIParator will switch to the next in priority, while checking
the first for availability. When the first gateway works again, the SIParator will switch back
to using that.
Dynamic
If an interface will receive its IP address from a DHCP server, the SIParator will get its
default gateway from the server. In this case, select the corresponding IP address here.
IP Address
Shows the IP address of the DNS Name or IP Address you entered in the previous field.
Interface
Select the interface connected to the SIParator default gateway.
Delete
If you select this box, the row is deleted when you click on Add new rows, Save, or Look
up all IP addresses again.
41
Dynamic
If an interface will receive its IP address from a DHCP server, the SIParator can also get its
default gateway from the server. In this case, select the corresponding IP address here.
IP Address
Shows the IP address of the DNS Name or IP Address you entered in the previous field.
Interface
Select the interface connected to the SIParator default gateway.
Delete
If you select this box, the row is deleted when you click on Add new rows, Save, or Look
up all IP addresses again.
42
The Discard IP packets selection means that the SIParator ignores the IP packets without
replying that the packet did not arrive.
The Allow IP packets selection makes the SIParator use the rest of the configuration to
decide if the packet should be allowed.
IP Address
Shows the IP address of the DNS Name or IP Address you entered in the previous field.
Delete
If you select this box, the row is deleted when you click on Add new rows, Save, or Look
up all IP addresses again.
Save
Saves the Default Gateways configuration to the preliminary configuration.
43
Undo
Clears and resets all fields in new rows and reset changes in old rows.
Name
Enter a name for the group of computers. You can use this name when you change
configuration on the pages mentioned above. A group can consist of several rows of IP
addresses or series of IP addresses. By clicking on the plus sign beside the name, you add
more rows where you can specify more IP addresses for this group.
44
Subgroup
An already defined group can be used as a subgroup to new groups. Select the old group
here and leave the fields for DNS name empty. Select - as Interface. If you dont want to
use a subgroup, select - here.
Lower Limit
DNS Name or IP Address
Enter the DNS name or IP address of the network or computer. For computers in an IP
range that you want to give a network name, enter the first IP address in the range. DNS
Name or IP Address must not be empty if you are not using a subgroup.
IP Address
The IP address of the object you entered in the DNS Name or IP Address field is
displayed here. This field is not updated until you click on Look up all IP addresses again
or make changes in the DNS Name or IP Address field.
Upper Limit
DNS Name or IP Address
Here, enter the last DNS name/IP address of the network or group. For computers in an IP
range that you want to give a network name, enter the last IP address in the seriesrange.
The IP address in Upper Limit must be at least as high as the one in Lower Limit. If this
field is left empty, only the IP address in Lower Limit is used. If you use a subgroup, leave
this field empty.
IP Address
The IP address of the object you entered in the DNS Name or IP Address field is
displayed here. This field is not updated until you click on Look up all IP addresses again
or make changes in the DNS Name or IP Address field.
Interface/VLAN
Here, you can select an interface or a VLAN to restrict the IP range.
If - is chosen, the group will consist of all IP addresses in the interval between Lower
Limit and Upper Limit, regardless of what interface they are connected to. By selecting an
interface or a VLAN, you constrain the group to consist only of the IP addresses in the
interval that really are connected to the selected interface/VLAN.
For example, if 10.20.0.0 - 10.20.0.255 are IP addresses behind the interface DMZ-1 and
the lower and upper limits are 10.10.10.20 and 255.255.255.255 respectively, choosing
DMZ-1 as Interface will cause the group to consist of the IP addresses 10.20.0.0 10.20.0.255, being the IP addresses in the interval actually connected to the selected
interface.
45
Delete
If you select this box, the row is deleted when you click on Add new rows, Save, or Look
up all IP addresses again.
Save
Saves the Networks and Computers configuration to the preliminary configuration.
Undo
Clears and resets all fields in new rows and reset changes in old rows.
Topology
State the topology around the SIParator on this page. Which type of topology is needed
depends on which SIParator Type was selected.
Surroundings
Settings in the Surroundings table are only required when the SIParator has been made the
DMZ type.
The SIParator must know what the networks around it look like. On this page, you list all
networks which the SIParator should serve and which are not reached through the default
gateway of the firewall.
All computers that can reach each other without having to go through the firewall connected
to the SIParator should be grouped in one network. When you are finished, there should be
one line for each of your firewalls network connections (not counting the default gateway).
One effect of this is that traffic between two users on different networks, or between one of
the listed networks and a network not listed here, is NAT:ed.
Another effect is that for connections between two users on the same network, or on
networks where neither is listed in Topology, no ports for RTP sessions will be opened,
since the SIParator assumes that they are both on the same side of the firewall.
For DMZ and LAN SIParators, at least one network should be listed here. If no networks
are listed, the SIParator will not perform NAT for any traffic.
46
Network
Select a network. The alternatives are the networks you defined on the Networks and
Computers page.
Additional Negotiators
Sometimes you have SIP devices on a different network that needs to negotiate for this
network. This happens when there is a SIP server on one network, and SIP-unaware phones
on another. In this case, select the phone network under Network, and the SIP server as an
Additional Negotiator. Select from the networks defined on the Networks and Computers
page.
Delete
If you select this box, the row is deleted when you click on Add new rows or Save.
Data Interfaces
Settings in the Data Interfaces table are only required when the SIParator has been made
the WAN type.
Between the Data Interfaces listed here, the SIParator will act as a plain router, and only
forward traffic, with the exception that QoS will be performed if configured for the traffic in
question.
The traffic sent between Data Interfaces will not be logged by the SIParator.
The SIParator will only send SIP traffic between the other interfaces.
47
Interface
Select a data interface here.
Delete
If you select this box, the row is deleted when you click on Add new rows or Save.
Save
Saves all Topology configuration to the preliminary configuration.
Undo
Clears and resets all fields in new rows and resets changes in old rows.
Basic Configuration
On the Basic Configuration page, general settings for the SIParator are made. The most
important one for getting started is the DNS server.
48
General
Default domain
Here, you can enter a default domain for all settings. If a default domain is entered, the
SIParator will automatically assume that an incomplete computer name should be
completed with the default. If, for example, Default domain contains company.com, you
could as the name of the computer axel.company.com use only axel. If no default domain
should be used, the Default domain field should contain a single dot (.).
IP Policy
Here, you specify what will happen to IP packets which are neither SIP packets, SIP
session media streams, or SIParator administration traffic. Discard IP packets means that
the SIParator ignores the IP packets without replying that the packet did not arrive. Reject
IP packets makes the SIParator reply with an ICMP packet telling that the packet did not
arrive.
49
DNS Servers
Here, you configure DNS servers for the SIParator. The servers are used in the order they
appear in this table, which means that the SIParator uses the top server to resolve DNS
records until it doesnt reply. Only then is server number two contacted.
No.
The DNS servers are used in the order they are presented in the table. To move a server to a
certain row, enter the number on the row to which you want to move it. You need only
renumber servers that you want to move; other servers are renumbered automatically. When
you click on Save, the DNS servers are re-sorted.
Dynamic
If an interface will receive its IP address from a DHCP server, the SIParator can also get
information about its DNS server from that server. In this case, select the corresponding IP
address here and leave the other fields empty.
50
IP Address
Shows the IP address of the DNS Name or IP Address you entered in the previous field.
Delete
If you select this box, the row is deleted when you click on Add new rows, Save, or Look
up all IP addresses again.
Save
Saves the Basic Configuration configuration to the preliminary configuration.
Undo
Reverts all the above fields to their previous configuration.
51
52
Basic
Here, you make basic settings for the SIParator SIP management.
SIP Module
Here, select whether the SIP module should be enabled or disabled. If you select to Disable
SIP module, no other SIP settings will have any effect.
If specified, only SIP signaling originating from any of the specified networks/computers
will be accepted by the firewall. Packets that are not accepted will either be "discarded" or
"rejected" depending on the setting "IP Policy" specified under basic configuration. In the
default setting ("-") the firewall will accept SIP signaling from any client.
53
Enter the lower and upper limit of the port range that the SIParator should use for media
streams. The upper limit must be at least as high as the lower limit.
Port
Enter an additional port on which the SIParator should listen for SIP signaling. The
SIParator will then receive SIP signaling on this port for all its IP addresses.
SIP signaling over TLS cannot be received on a SIParator port which is used for something
else, like configuration of the SIParator.
Transport
Select which SIP signaling transports should be allowed on this port.
Comment
Enter a comment to remind yourself why you added the port.
54
Delete
If you select this box, the row is deleted when you click on Add new rows or Save.
SIP Logging
The same settings can also be found on the Logging Configuration page under Logging
and Tools.
55
56
Server
Enter the host name, domain name, or IP address of the server to be monitored.
Port
Enter the port to be monitored on that host. This should be the port to use for SIP signaling.
Transport
Select the transport to be monitored on that host. This should be the transport to use for SIP
signaling.
Delete
If you select this box, the row is deleted when you click on Add new rows or Save.
57
Save
Saves the Basic configuration to the preliminary configuration.
Undo
Clears and resets all fields in new rows and resets changes in old rows.
Local Registrar
The SIP registrar keeps track of where a user is right now. The registrar receives
registrations from the SIP user clients and discards them when they become obsolete. A
user can register from several computers.
Here, you enter the SIP domains the SIParator should manage and set up the SIP user
database. If authentication should be used, you also need to do some settings on the
Authentication and Accounting page, and select which SIP methods should be
authenticated on the SIP Methods page.
If you want to use a RADIUS server for SIP users instead of a local database, you select
that on the Authentication and Accounting page.
Domain
Enter the name of the domain, such as ingate.com. Sometimes you have to use an IP
address (of the SIParator) as the domain as well, when the SIP client substitutes the domain
for the IP address noted in DNS.
Delete
If you select this box, the row is deleted when you click on Add new rows or Save.
58
Filtering
On the Filtering page you select the MIME types you want to let through, if the SIParator
should forward any other SIP traffic than just IP telephony or instant messages.
On that page, you can also select filtering of SIP signaling based on several conditions.
No.
The No. field determines the order of the rules. Rules are used in the order in which they
are displayed in the table; rule number 1 is first. The order is important if you used
networks which partly contain the same IP addresses. To change order for a rule, enter the
new number in the field and press Save.
From Network
The network name that the SIP request originates from. You can select between the
networks defined on the Networks and Computers page under Network.
Action
Under Action, you select what to do with a SIP request from the selected network. The
choices are Process all, which handles all requests regardless of destination, Local only,
which only handles requests to Local SIP Domains (entered on the Local Registrar page),
and Reject all, which doesnt handle any requests at all.
Delete
If you select this box, the row is deleted when you click on Add new rows or Save.
59
Content Types
The SIP packets present information in different ways, using content types (MIME types).
Enter here which types the SIP proxy should accept. The most common MIME types are
predefined and you only have to activate them.
The content types application/sdp (used for SIP requests), application/xpidf+xml (used for
Presence) and text/x-msmsgsinvite (used by Messenger) are always accepted - you dont
have to enter them into the table. You can find a complete list of MIME types at
ftp://ftp.isi.edu/in-notes/iana/assignments/media-types/media-types/.
Content Type
Enter the content type (only one in each row). The format is category/type, e.g.
text/plain. You can also allow all content types by entering */* in a row and allow it.
Allow
Select if the SIParator should allow (On) or reject (Off) this content type in SIP signaling.
Delete
If you select this box, the row is deleted when you click on Add new rows or Save.
60
Routing
DNS Override For SIP Requests
Here, you can register SIP domains to which the SIParator should be able to forward
requests, but which for some reason cannot be resolved in DNS. Enter an IP address and
port to which the requests should be forwarded. You can also select to use a specific
protocol.
The SIParator uses the Request-URI of the incoming SIP packet to match for the domains
in this table. When it matches a domain, the packet will be forwarded to the IP address
entered here. Note that the Request-URI will not be rewritten!
You can also enter subdomains to Local SIP Domains, if you want the subdomain to be
handled by a separate SIP proxy. This table has a higher priority than Local SIP Domains,
which means that if you register a subdomain to a domain registered under Local SIP
Domains, the SIParator will forward SIP requests to the subdomain instead of processing
them itself.
You can enter more than one IP address or host name for a domain, and set weights and
priorities for these.
Domain
Enter the domain name of the SIP domain. This domain is compared to the domain in the
Request-URI of the incoming SIP packet.
You cant enter a domain that was entered in the Local SIP Domains table.
61
Relay To
DNS Name or IP Address
Enter the IP address for the SIP server handling the domain. You can also enter a DNS
name for the SIP server, if it has a DNS-resolvable host name, even if the SIP domain is not
possible to look up in DNS.
IP Address
Shows the IP address of the DNS Name or IP Address you entered in the previous field.
Port
Here, enter the port on which the SIP server listens for SIP traffic. The standard port is
5060 (5061 for TLS).
Transport
You can select which transport protocol to use between the SIParator and the SIP server.
Under Transport, select from UDP, TCP and TLS.
Priority
If you entered more than one IP address/host name for the same domain, you should also
assign them Priority and Weight. A low Priority value means that the unit should have a
high priority.
Weight
If more than one unit has the same Priority, the signaling sent to them is distributed
between them according to their Weight. If two units have the same priority, and Unit 1 has
weight 4, and Unit 2 has weight 9, 4/13 of the signaling will be sent to Unit 1, and 9/13 will
be sent to Unit 2.
Auth
The firewall asks the requestor for authentication.
Delete
If you select this box, the row is deleted when you click on Add new rows, Save, or Look
up all IP addresses again.
62
Access Control
On the Access Control page, settings are made which controls the access to the SIParator
administration interfaces. The SIParator can be configured via the web (http and https) and
via ssh or the serial cable (using the CLI, see chapter 15 of the Reference Guide).
Select one or more configuration IP addresses for the SIParator. The configuration address
is the IP address to which you direct your web browser to access the web interface of the
SIParator, or connect your ssh client to.
For each network interface, you also specify whether or not the SIParator can be configured
via this network interface.
You also select what kind of authentication will be performed for the users trying to access
the administration interfaces.
To further increase security, the SIParator can only be configured from one or a few
computers that are accessed from one of these interfaces. Enter the IP address or addresses
that can configure the SIParator. The IP addresses can belong to one or more computers. For
each IP address or interval of addresses, select which configuration protocols are allowed.
Configuration Transport
Select SIParator IP addresses for the allowed configuration protocols. The SIParator web
server will listen for web traffic on the IP addresses and ports selected under HTTP and
HTTPS.
This is the IP address and port which should be entered in your web browser to connect to
the SIParator.
For configuration via ssh, you need an ssh client to log on to the SIParator.
63
64
This setting specifies whether configuration traffic is allowed via this interface. If you only
allow configuration via eth1, configuration traffic will only be allowed from computers
connected to the eth1 interface, regardless of which IP address the configuration traffic is
directed to or which IP addresses the computers have.
The choices for each interface are On and Off. This configuration is a complement to the
Configuration Computers setting below.
Select the mode of administrator authentication for logins via the web interface: Local
users, via a RADIUS database, or a choice between the two alternatives at login (Local
users or RADIUS database).
65
Configuration Computers
Enter the IP address or addresses that can configure the SIParator. The IP addresses can
belong to one or more computers.
Note that you must also allow configuration via the SIParator interface that the computers
are connected to. See Configuration Allowed Via Interface above.
No.
The No. field determines the order of the lines. The order is important in deciding what is
logged and warned for. The SIParator uses the first line that matches the configuration
traffic.
Perhaps you want to configure the SIParator so that configuration traffic from one specific
computer is simply logged while traffic from the rest of that computers network is both
logged and generates alarms.
The rules are used in the order in which they are listed, so if the network is listed first, all
configuration traffic from that network is both logged and generates alarms, including the
traffic from that individual computer. But if the individual computer is listed on a separate
line before the network, that line will be considered first and all configuration traffic from
that computer is only logged while the traffic from the rest of the computers network is
both logged and generates alarms.
Network Address
Shows the network address of the DNS Name or Network Address you entered in the
previous field.
66
Netmask/Bits
Netmask/Bits is the mask that will be used to specify the configuration computers. See
chapter 3 of the Reference Guide for instructions on writing the netmask. To limit access so
that only one computer can configure, use the netmask 255.255.255.255. You can also
specify the netmask as a number of bits, which in this case would be 32. To allow
configuration from an entire network, you must enter the network address under Network
Address, and a netmask with a lower number here. To allow configuration from several
computers or networks, create several lines for the information.
Range
The Range shows all IP addresses from which the SIParator can be configured. The range
is calculated from the configuration under DNS Name or Network Address and
Netmask/Bits. Check that the correct information was entered in the DNS Name or
Network Address and Netmask/Bits fields.
SSH
Check the check box if this computer/network should be allowed to configure the SIParator
via SSH.
HTTP
Check the check box if this computer/network should be allowed to configure the SIParator
via HTTP.
HTTPS
Check the check box if this computer/network should be allowed to configure the SIParator
via HTTPS.
Log Class
Here, you enter what log class the SIParator should use to log the configuration traffic to
the SIParators web server. Log classes are defined on the Log Classes page under Logging
and Tools. See also chapter 8 of the Reference Guide.
Delete
If you select this box, the row is deleted when you click on Add new rows, Save, or Look
up all IP addresses again.
67
Save
Saves the Access Control configuration to the preliminary configuration.
Undo
Reverts all the above fields to their previous configuration.
Save/Load Configuration
Here, you work with the preliminary and permanent configurations, save them and load
new configurations from previously saved configurations.
68
Apply configuration
Saves the preliminary configuration to the permanent configuration and puts it into use.
You can test your preliminary configuration before finalizing it.
Three buttons are displayed during the test:
Backup
All configurations can be saved to and loaded from file. This does not affect the permanent
configuration.
69
Browse
Browse is used to scan your local disk. The web browser opens a new window where you
can search among files and directories. Go to the right directory and select the file you want
to upload.
Browse
Browse is used to scan your local disk. The web browser opens a new window where you
can search among files and directories. Go to the right directory and select the file you want
to upload.
70
71
72
The Firewall
The firewall to which the SIParator is connected should have the following configuration:
SIP over UDP
Let through UDP traffic between the Internet (all high ports) and the SIParator (port
5060). You must allow traffic in both directions.
Let through UDP traffic between the internal networks (all high ports) and the SIParator
(port 5060). You must allow traffic in both directions.
Let through UDP traffic between the Internet (all high ports) and the SIParator (the port
interval for media streams which was set on the Basic page). You must allow traffic in
both directions.
Let through UDP traffic between the internal networks (all high ports) and the SIParator
(the port interval for media streams which was set on the Basic page). You must allow
traffic in both directions.
Let through UDP traffic between the SIParator (all high ports) and the Internet (port 53).
You must allow traffic in both directions. This enables the SIParator to make DNS
queries to DNS servers on the Internet. If the DNS server is located on the same network
as the SIParator, you dont have to do this step.
NAT between the SIParator and the Internet must not be used.
NAT between the SIParator and the internal networks must not be used.
73
Let through TCP traffic between the Internet (all high ports) and the SIParator (ports
1024-32767). You must allow traffic in both directions.
Let through TCP traffic between the internal networks (all high ports) and the SIParator
(ports 1024-32767). You must allow traffic in both directions.
Let through UDP traffic between the Internet (all high ports) and the SIParator (the port
interval for media streams which was set on the Basic page). You must allow traffic in
both directions.
Let through UDP traffic between the internal networks (all high ports) and the SIParator
(the port interval for media streams which was set on the Basic page). You must allow
traffic in both directions.
Let through UDP traffic between the SIParator (all high ports) and the Internet (port 53).
You must allow traffic in both directions. This enables the SIParator to make DNS
queries to DNS servers on the Internet. If the DNS server is located on the same network
as the SIParator, you dont have to do this step.
NAT between the SIParator and the Internet must not be used.
NAT between the SIParator and the internal networks must not be used.
Other
The DNS server used must have a record for the SIP domain, which states that the
SIParator handles the domain, or many SIP clients wont be able to use it (if you dont use
plain IP addresses as domains).
Internet
Firewall
SIParator
The Firewall
The firewall to which the SIParator is connected should have the following configuration:
74
Let through UDP traffic between the Internet (all high ports) and the SIParator (port
5060). You must allow traffic in both directions.
Let through UDP traffic between the Internet (all high ports) and the SIParator (the port
interval for media streams which was set on the Basic page). You must allow traffic in
both directions.
Let through UDP traffic between the SIParator (all high ports) and the Internet (port 53).
You must allow traffic in both directions. This enables the SIParator to make DNS
queries to DNS servers on the Internet. If the DNS server is located on the same network
as the SIParator, you dont have to do this step.
NAT between the SIParator and the Internet must not be used.
Let through TCP traffic between the Internet (all high ports) and the SIParator (ports
1024-32767). You must allow traffic in both directions.
Let through UDP traffic between the Internet (all high ports) and the SIParator (the port
interval for media streams which was set on the Basic page). You must allow traffic in
both directions.
Let through UDP traffic between the SIParator (all high ports) and the Internet (port 53).
You must allow traffic in both directions. This enables the SIParator to make DNS
queries to DNS servers on the Internet. If the DNS server is located on the same network
as the SIParator, you dont have to do this step.
NAT between the SIParator and the Internet must not be used.
SIP clients
The SIP clients on the internal network should have the SIParators IP address on that
network as their outgoing SIP proxy and registrar.
Other
The DNS server used must have a record for the SIP domain, which states that the
SIParator handles the domain, or many SIP clients wont be able to use it (if you dont use
plain IP addresses as domains).
75
SIParator
Other
The DNS server used must have a record for the SIP domain, which states that the
SIParator handles the domain, or many SIP clients wont be able to use it (if you dont use
plain IP addresses as domains).
WAN type
Using the WAN type, the network configuration should be identical to Standalone type. The
SIParator is transparent and all data flows to the existing firewall as normal.
Internet
data/VoIP
SIParator
data
Firewall
VoIP
76
Other
The DNS server used must have a record for the SIP domain, which states that the
SIParator handles the domain, or many SIP clients wont be able to use it (if you dont use
plain IP addresses as domains).
77
78
Index
apply configuration, 68
ARP, 39
authentication
of administrator, 65
back panel
SIP, 53
CLI file
save to, 70
upload, 70
configuration
apply, 68
IP address, 63
permanent, 17
preliminary, 17
use protocol, 63
via HTTPS, 64
configuration computers, 66
configuration interface, 65
Content types, 60
default domain, 49
default gateway, 40
directly connected networks, 36
DMZ type, 31
SIP, 61
factory configuration, 70
front panel
HTTPS
for configuration, 64
installing Ingate SIParator, 19
interface, 34
interface name, 35
IP policy, 49
limited test mode, 68
logging
of configuration, 67
SIP, 55
magic ping, 25
MIME types, 60
monitor SIP servers, 56
network interface, 34
network topology, 46
networks and computers, 44
permanent configuration, 17
physical device name, 35
ping policy, 50
port interval for media streams, 54
preliminary configuration, 17
Proxy, 39
Proxy ARP, 39
router, 39
save configuration, 69
SIP, 53
content types, 60
encryption, 61
signaling ports, 54
SIP basic configuration, 53
SIP domains, 58
static, 61
SIP filtering, 59
SIP license, 58
SIP registration, 58
SIP servers
monitored, 56
SIP users, 58
SIParator name, 49
SIParator Type
configuration, 33
DMZ, 31
DMZ/LAN, 31
standalone, 32
standalone type, 32
79
standardntsluss, 40
Startup Tool, 25
static routing, 39
subgroup
networks, 44
surroundings, 46
test mode, 69
turn off the Ingate SIParator, 26
version control, 49
VPN peer, 67
80