Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    problems unblocking my sip provider

    Scheduled Pinned Locked Moved General pfSense Questions
    76 Posts 6 Posters 11.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NogBadTheBadN
      NogBadTheBad
      last edited by

      Double NAT is the issue then.

      Andy

      1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

      randomaustralianR 1 Reply Last reply Reply Quote 0
      • randomaustralianR
        randomaustralian @NogBadTheBad
        last edited by randomaustralian

        @nogbadthebad said in problems unblocking my sip provider:

        Double NAT is the issue then.

        not at all.

        i'm not connecting anything through the supplied router... its just sitting on my network like any other device. and the WiFi on it does work on my phone so it cant be a double nat issue. at least it wasn't a problem previously

        i'm just using it like a wifi hotspot and a sip device

        2 x UP board, 4GB RAM + 64 GB eMMC w/ vesa case (http://up-shop.org/)
        1x UP^2 Pentium Quad Core, 8GB RAM, 128GB eMMC w/ vesa case (pfSense)
        1x UP Core Plus E3950, 8GB RAM, 64GB EMMC+ Net Plus i210-IT
        1x Dell Power Edge R510
        2x Dell Power Edge R610

        1 Reply Last reply Reply Quote 0
        • NogBadTheBadN
          NogBadTheBad
          last edited by NogBadTheBad

          Have a look at a SIP packet from a packet capture from pfsense.

          Andy

          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

          1 Reply Last reply Reply Quote 0
          • randomaustralianR
            randomaustralian @NogBadTheBad
            last edited by

            @nogbadthebad said in problems unblocking my sip provider:

            Maybe try installing Siproxd

            i don't think this is my solution as this seems to be a server that runs sip on my lan, when i already have a stand alone box that does it.

            2 x UP board, 4GB RAM + 64 GB eMMC w/ vesa case (http://up-shop.org/)
            1x UP^2 Pentium Quad Core, 8GB RAM, 128GB eMMC w/ vesa case (pfSense)
            1x UP Core Plus E3950, 8GB RAM, 64GB EMMC+ Net Plus i210-IT
            1x Dell Power Edge R510
            2x Dell Power Edge R610

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              I agree, capture some SIP packets and see what's happening.

              Sounds like it's registering it's internal IP maybe or something similar. SIProxd might actually help if that is the case.

              Steve

              1 Reply Last reply Reply Quote 0
              • chpalmerC
                chpalmer
                last edited by chpalmer

                Insert the :rolleys: smiley here.. SIP was not originally designed to be behind NAT!

                It was written in later when services such as Vonage and a couple earlier started to look at the residential market. And it does not work all that well.. Double NAT is not in the spec. If you try your on your own.

                In the SIP header you will find (normally) your NATted address. Yes. Building a WAN firewall rule will help in some cases depending on the carrier. Sometimes you need to pay attention to your states when you try to make a call and see what carrier your device is connecting to. SIP from your provider.. RTP from the carrier they use. It is truly a case by case basis.

                Few SIP providers will also need static port enabled. Very few these days.

                I never port forward to any client devices. All of my SIP customers work flawlessly.

                Triggering snowflakes one by one..
                Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                1 Reply Last reply Reply Quote 0
                • randomaustralianR
                  randomaustralian
                  last edited by randomaustralian

                  so for an incoming call
                  if i turn off all the rules i get this:

                  0_1551768763279_75a3adc9-597d-4a5e-b8fa-779062f7d7ee-image.png

                  if i open just all the ports in my rules i get:

                  0_1551768922390_b328c958-e9cf-4cdf-ac4c-1c7b65bc2241-image.png
                  with
                  0_1551769078993_acd14969-7a26-422c-a539-6b4e4855e338-image.png

                  capturing a sip packet i get... a ringing phone? WTF?!?!?!

                  0_1551769317120_8d8d3472-f4c4-4178-9365-3c64d96a3bd5-image.png

                  seems its a 1 off though as it didn't ring the next 3 attempts

                  0_1551769578127_def7901b-ddf0-4557-92e7-f4bbf7d88698-image.png

                  2 x UP board, 4GB RAM + 64 GB eMMC w/ vesa case (http://up-shop.org/)
                  1x UP^2 Pentium Quad Core, 8GB RAM, 128GB eMMC w/ vesa case (pfSense)
                  1x UP Core Plus E3950, 8GB RAM, 64GB EMMC+ Net Plus i210-IT
                  1x Dell Power Edge R510
                  2x Dell Power Edge R610

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by stephenw10

                    What I expect to happen here is the phone connects out to the SIP server at port 5060. If you don't have static outbound NAT set for the phone IP the source port as that leaves the WAN will be randomised. The phone holds that state open with keepalive packets so that when the provider sends traffic to it for an inbound call it still passes through the firewall.

                    Since you are seeing it blocked that state is either not being held open or the provider is replying to the wrong port.

                    Check your state table for the phones IP. See what source port it is using, is it port 5060?
                    Is it holding open a SIP state at all?

                    It could be you need a static outbound NAT rule.

                    Can we see that actual packet capture file? The SIP packets there likely contain useful info.

                    Steve

                    randomaustralianR 1 Reply Last reply Reply Quote 0
                    • T
                      tim.mcmanus
                      last edited by

                      You have ovcercomplicated this and now your troubnleshooting is going to be far more complicated.

                      I am running a Cisco SIP phone behind pfSense and have been doing it for years with no issues. I also run a SIP client (Bria) on my iOS phone as well as my Mac. All three of them have no issues running behind pfSense.

                      Your SIP phone will initiate a connection from itself to the SIP provider. Since that connection is initiated on pfSense’s LAN, it also manages the incoming connection back to the phone with no additional configurations required. If you installed a default pfSense box as your router with no additional configurations (other than the ones you need to get your LAN to communicate with the Internet), your phone will work with no issues. The problem is the complexity of your configuration and trying to acutely manage this traffic. Let pfSense do it’s job and when the outgoing connection starts, pfSense will manage the inflow too.

                      I was on hours of conference calls yesterday with no issues whatsoever. I have a minimal pfSense installation with very few rules in order to reduce the complexity of the installation to ensure that stuff works without me having to go in and continually tweak stuff.

                      So try ratcheting back all of the features and config you have first. Reduce the complexity and then build up rules from there. When you enable the rule or config that’s killing your SIP connection, you’ll find it this way.

                      IMHO, YMMV...

                      1 Reply Last reply Reply Quote 0
                      • randomaustralianR
                        randomaustralian @randomaustralian
                        last edited by

                        @randomaustralian said in problems unblocking my sip provider:

                        @stephenw10

                        I got it to work easily enough last time. i have used a 3rd party router since i got FTTP NBN cause its all PPOE. They don't at all support what i'm doing. I'm putting my ISP supplied router behind my 3rd party router so i can still use all the ISP features that require my ISP supplied router to be used.

                        But it think pfSense is more secure then IPFire. even when i try to allow the ports and IP addresses in my firewall rules i still can't get incoming calls to work.

                        I just realized i didn't answer your question properly.
                        telstra don't expect this to work. the sip host is on their provided edge router and they do not support what i am trying to do...
                        the thing is I got it to work easily on ipfire. I'm having troubles with pfsense because it seems pfsense is more secure/intelligent with what is allows through.

                        2 x UP board, 4GB RAM + 64 GB eMMC w/ vesa case (http://up-shop.org/)
                        1x UP^2 Pentium Quad Core, 8GB RAM, 128GB eMMC w/ vesa case (pfSense)
                        1x UP Core Plus E3950, 8GB RAM, 64GB EMMC+ Net Plus i210-IT
                        1x Dell Power Edge R510
                        2x Dell Power Edge R610

                        1 Reply Last reply Reply Quote 0
                        • randomaustralianR
                          randomaustralian @stephenw10
                          last edited by randomaustralian

                          0_1551907391062_packetcapture.7z @stephenw10 said in problems unblocking my sip provider:

                          What I expect to happen here is the phone connects out to the SIP server at port 5060. If you don't have static outbound NAT set for the phone IP the source port as that leaves the WAN will be randomised. The phone holds that state open with keepalive packets so that when the provider sends traffic to it for an inbound call it still passes through the firewall.

                          Since you are seeing it blocked that state is either not being held open or the provider is replying to the wrong port.

                          Check your state table for the phones IP. See what source port it is using, is it port 5060?
                          Is it holding open a SIP state at all?

                          It could be you need a static outbound NAT rule.

                          Can we see that actual packet capture file? The SIP packets there likely contain useful info.

                          Steve

                          i have tried a LAN rule that allows all outbound from the static address i have assigned to the sip controller device to any wan address. makes no difference.

                          I'm still pretty sure that pfsense is killing off connections after 15 minutes cause my call cuts out to the second.

                          0_1551907406899_packetcapture.7z

                          2 x UP board, 4GB RAM + 64 GB eMMC w/ vesa case (http://up-shop.org/)
                          1x UP^2 Pentium Quad Core, 8GB RAM, 128GB eMMC w/ vesa case (pfSense)
                          1x UP Core Plus E3950, 8GB RAM, 64GB EMMC+ Net Plus i210-IT
                          1x Dell Power Edge R510
                          2x Dell Power Edge R610

                          1 Reply Last reply Reply Quote 0
                          • randomaustralianR
                            randomaustralian
                            last edited by randomaustralian

                            I am also no longer confident that outbound just "works" cause i've realized i have to call the one number multiple times and the call only goes through after 2 or 3 attempts some times. i didn't realize it before because i got the engaged noise and just thought they were already on the phone. i only noticed now because i have been calling my own mobile/cell so much for generating logs to see whats going on.

                            2 x UP board, 4GB RAM + 64 GB eMMC w/ vesa case (http://up-shop.org/)
                            1x UP^2 Pentium Quad Core, 8GB RAM, 128GB eMMC w/ vesa case (pfSense)
                            1x UP Core Plus E3950, 8GB RAM, 64GB EMMC+ Net Plus i210-IT
                            1x Dell Power Edge R510
                            2x Dell Power Edge R610

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              So you tried an outbound NAT rule with static ports? Not a static IP?

                              IPFire includes a SIP ALG, do you recall if it needed to be enabled?
                              If so SIProxd might work for you here.

                              Steve

                              randomaustralianR 1 Reply Last reply Reply Quote 0
                              • randomaustralianR
                                randomaustralian @stephenw10
                                last edited by

                                @stephenw10 said in problems unblocking my sip provider:

                                So you tried an outbound NAT rule with static ports? Not a static IP?

                                IPFire includes a SIP ALG, do you recall if it needed to be enabled?
                                If so SIProxd might work for you here.

                                Steve

                                Someone mentioned SIProxy before. i had a quick look at it and i've never seen anything like it before. and as i keep saying....

                                i never had to use more then the settings i'm using now on my previous configuration and never had issues.

                                2 x UP board, 4GB RAM + 64 GB eMMC w/ vesa case (http://up-shop.org/)
                                1x UP^2 Pentium Quad Core, 8GB RAM, 128GB eMMC w/ vesa case (pfSense)
                                1x UP Core Plus E3950, 8GB RAM, 64GB EMMC+ Net Plus i210-IT
                                1x Dell Power Edge R510
                                2x Dell Power Edge R610

                                1 Reply Last reply Reply Quote 0
                                • randomaustralianR
                                  randomaustralian
                                  last edited by

                                  is there a way to can make pfSense stop blocking anything incoming on that port. i know its a security risk i want to try it temporarily and see if it solves my problem

                                  2 x UP board, 4GB RAM + 64 GB eMMC w/ vesa case (http://up-shop.org/)
                                  1x UP^2 Pentium Quad Core, 8GB RAM, 128GB eMMC w/ vesa case (pfSense)
                                  1x UP Core Plus E3950, 8GB RAM, 64GB EMMC+ Net Plus i210-IT
                                  1x Dell Power Edge R510
                                  2x Dell Power Edge R610

                                  1 Reply Last reply Reply Quote 0
                                  • randomaustralianR
                                    randomaustralian
                                    last edited by

                                    So i have added so many firewall rules now that nothing shows up in my logs to do with any incoming or outgoing call attempts. I have also tried disabling snort cause i read a post from 3 years ago that "pfSense works perfectly with snort disabled"

                                    but i am still having the same problems.

                                    2 x UP board, 4GB RAM + 64 GB eMMC w/ vesa case (http://up-shop.org/)
                                    1x UP^2 Pentium Quad Core, 8GB RAM, 128GB eMMC w/ vesa case (pfSense)
                                    1x UP Core Plus E3950, 8GB RAM, 64GB EMMC+ Net Plus i210-IT
                                    1x Dell Power Edge R510
                                    2x Dell Power Edge R610

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Try adding a 1:1 NAT rule to the SIP device. Then add a firewall rule on WAN allowing all traffic to that internal IP.

                                      Yes, that's a big risk it exposes the SIP device completely. But that will add static outbound NAT and will pass everything.

                                      If it still doesn't work there's some NAT issue like it's sending it's internal IP. That can only be solved by configuring the SIP device not to do that or using a SIP ALG that translates that.

                                      Steve

                                      1 Reply Last reply Reply Quote 0
                                      • randomaustralianR
                                        randomaustralian
                                        last edited by

                                        are you sure its a 1:1 nat rule? i cant specify ports

                                        isnt this what i want?
                                        0_1552360387150_5de0f7f6-aec6-4eb6-8770-a0f438db2e54-image.png

                                        its doesn't work though

                                        2 x UP board, 4GB RAM + 64 GB eMMC w/ vesa case (http://up-shop.org/)
                                        1x UP^2 Pentium Quad Core, 8GB RAM, 128GB eMMC w/ vesa case (pfSense)
                                        1x UP Core Plus E3950, 8GB RAM, 64GB EMMC+ Net Plus i210-IT
                                        1x Dell Power Edge R510
                                        2x Dell Power Edge R610

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          With a 1:1 rule all ports are forwarded. All incoming traffic will be sent to the SIP device. All outgoing traffic will leave using the same source ports the SIP device sets. That eliminates a number of possible problems.

                                          1:1 NAT rules do not automatically open firewall rules though so you need to add a rule to pass what you need. As a test I suggest just passing everything.

                                          However that will not help if, for example,m the SIP device is using it's private IP is SIP packets as the response address. Only looking at those packets will tell you that. If it is SIProxd could help.

                                          Steve

                                          1 Reply Last reply Reply Quote 0
                                          • randomaustralianR
                                            randomaustralian
                                            last edited by

                                            Is there a nice guide for setting up siproxy?
                                            as this is my second dabble with connecting sip devices i really have no idea what i am doing

                                            2 x UP board, 4GB RAM + 64 GB eMMC w/ vesa case (http://up-shop.org/)
                                            1x UP^2 Pentium Quad Core, 8GB RAM, 128GB eMMC w/ vesa case (pfSense)
                                            1x UP Core Plus E3950, 8GB RAM, 64GB EMMC+ Net Plus i210-IT
                                            1x Dell Power Edge R510
                                            2x Dell Power Edge R610

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.