• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Shared Firewall for Voip Service

Scheduled Pinned Locked Moved L2/Switching/VLANs
10 Posts 2 Posters 755 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • H
    halter_joel
    last edited by halter_joel Aug 3, 2023, 3:11 PM Aug 3, 2023, 2:48 PM

    Im trying to figure the best way to Share my Session Border Controller for a sub tenant Phone System. Im trying to come up with a solution that wont require me to Touch there Network. I'll put a Diagram of what i have for a network. The PBX 192.168.0.20 needs to access the Session Border Controller (10.20.200.5) for its Sip Trunk. I have access to the PBX but thats it.

    PfSense.jpg

    M 1 Reply Last reply Aug 3, 2023, 9:05 PM Reply Quote 0
    • M
      michmoor LAYER 8 Rebel Alliance @halter_joel
      last edited by Aug 3, 2023, 9:05 PM

      @halter_joel Im not all together following what the requirement. So the tenant is in the 192.168.0 network. You are in the 10.20.200 network.
      You want the tenant to access 10.20.200.5?
      Am i understanding it correctly?

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      H 1 Reply Last reply Aug 3, 2023, 9:26 PM Reply Quote 0
      • H
        halter_joel @michmoor
        last edited by Aug 3, 2023, 9:26 PM

        @michmoor
        That is correct i only want the PBX 192.168.0.20 to access the SBC 10.20.200.5

        I thought i could create the 192.168.0.254 network on my Pfsense and plug the Ethernet cable into their Switch and allow only the 192.168.0.20 traffic thru. When i did that i can't get any traffic from pbx to hit the SBC.

        M 1 Reply Last reply Aug 3, 2023, 9:32 PM Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @halter_joel
          last edited by Aug 3, 2023, 9:32 PM

          @halter_joel Oh..
          So create a firewall rule permitting the single host 192.168.0.20 to connect to single host 10.20.200.5. The port(s) you'll need can be defined in the rule as well.

          Does SBC know how to access your PBX? Is there routing in place?

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          H 1 Reply Last reply Aug 3, 2023, 11:33 PM Reply Quote 0
          • H
            halter_joel @michmoor
            last edited by Aug 3, 2023, 11:33 PM

            @michmoor

            When i Plug the Pfsense port associated to the new network i created 192.168.0.254, into the Customers Switch and create a rule that allows all traffic to and from i don't get any traffic. I plug my Laptop into the switch and ping 192.168.0.254 i get nothing. I have also tried to take the new network and have it try to dhcp and it wont pull an address from their network.
            I'm assuming because when i plug a laptop into their network i pull a gateway of 192.168.0.1 and it has no idea that 192.168.0.254 exist. I thought that the pfsense would pull an IP from their network though.

            M 1 Reply Last reply Aug 4, 2023, 7:58 PM Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @halter_joel
              last edited by Aug 4, 2023, 7:58 PM

              @halter_joel The link between the Netgate and 192.168.0.1.
              Is that over a WAN or VPN? Is this within a building and directly connected? Whats the expectation of connectivity? How are you guys supposed to talk to each other? If you can explain that then we can move forward. Otherwise how are you expacting your network to talk to the Un Controlled network?

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              H 1 Reply Last reply Aug 4, 2023, 9:56 PM Reply Quote 0
              • H
                halter_joel @michmoor
                last edited by Aug 4, 2023, 9:56 PM

                @michmoor
                The link is a Cat 5e Cable. Both companies are located in the same building.

                The goal here is to create a secure way for the PBX to get to the SBC for SIP and RTP. I feel like there should be an easy way to do this but for some reason its been difficult. I have Netgate 2100 that i could also use to put in place between the two but i feel like this method should work.

                M 1 Reply Last reply Aug 5, 2023, 2:40 AM Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @halter_joel
                  last edited by Aug 5, 2023, 2:40 AM

                  @halter_joel but you never answered how each network knows about each other. Do you have routes in place? If you’re able to ping each other then this is just a simple firewall rule.

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  H 1 Reply Last reply Aug 7, 2023, 3:45 PM Reply Quote 0
                  • H
                    halter_joel @michmoor
                    last edited by Aug 7, 2023, 3:45 PM

                    @michmoor

                    These two networks aren't currently connected so they don't know anything about each other. That is what i am trying to accomplish. Both Networks are in the same building. If i had access to their Router i would put some static routes in and id be good to go. I am trying to come up with a solution without touching their network.

                    M 1 Reply Last reply Aug 7, 2023, 3:56 PM Reply Quote 0
                    • M
                      michmoor LAYER 8 Rebel Alliance @halter_joel
                      last edited by Aug 7, 2023, 3:56 PM

                      @halter_joel
                      Once you are connected physically, assign a /30 network to the link.
                      So for example you will be 10.1.1.1/30 and they will be 10.1.1.2/30

                      Once you got that transit in place, create your static route. They will need one for you as well.
                      After that apply firewall rules on that new interface/transit link and thats it.

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      1 Reply Last reply Reply Quote 0
                      9 out of 10
                      • First post
                        9/10
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                        This community forum collects and processes your personal information.
                        consent.not_received