The Pfsense opensource firewall is frequently used in network deployments for small and medium enterprises. This document uses the attached network topology to configure Sipxcom with Pfsense to provideconnectivity provide connectivity with an Internet Telephony Service Provider (ITSP) for public voice network access. The following assumptions are used in this setup:
- Pfsense is installed and provides working Internet connectivity to the 19.168.55.x subnet via a LAN interface.
- Sipxcom is installed with an IP address on the 192.168.55.xx subnet - all services required for SIP trunk and phone connectivity are enabled.
- The internal SBC application within Sipxcom called Sipxbridge is used for SIP trunk connectivity with the ITSP.
Step 1 - Set Up Sipxcom SIP Trunk To the ITSP
The following steps are used to create a SIP trunk (each number in the above diagram corresponds to a step number):
- Go to Devices->Gateways and select SIP trunk from the pull-down menu
- The SIP Trunk configuration menu will be displayed - assign a name to the trunk, provision the public IP address or FQDN for the ITSP, port number, and transport protocol. Hit the Apply button.
- Assign a default caller-id to the trunk.
- Go to ITSP Account menu - if the ITSP is providing a registered SIP trunk, then provision the SIP trunk account name / password information and enable the Register on Initialization option. Hit OK to complete the SIP trunk initialization. After 30 seconds or so, Sipxbridge will register the SIP trunk with the ITSP - go to Diagnostics->SIP Trunk Statistics and ascertain that the trunk is registered and authenticated. If the ITSP SIP trunk is static (no registration is required), then leave the ITSP account information blank for the Sipxcom SIP trunk gateway. Static SIP trunks do not appear when the Diagnostics->SIP Trunk Statistics menu is displayed.
- Go to System-NAT Traversal->Server Config , specify the Address type as static, and provision the public IP Address with the IP address assigned to the WAN interface in Pfsense. Hit Apply. Although calls will work properly when STUN is enabled, specifying a static public IP address in the NAT traversal field allows calls to work properly in the event that DNS is not available.
- Go to System-NAT Traversal->Settings and ascertain that the Enable NAT Traversal and Server behind NAT options are enabled.
Step 2 - Provision Pfsense Firewall
When setting up Pfsense, the following Firewall->NAT->Outbound manual outbound NAT rule should of been already defined (assumption 1 in the Introduction). This rule translates private addresses in the 192.168.55.xx subnet to the public IP address assigned to the Pfsense WAN interface (and vice-versa).