![]() |
||||||||||||||||
Cisco IOS Firewall Support for TRP
![]() |
||||||||||||||||
Contents
Cisco IOS Firewall Support for TRPLast Updated: March 22, 2012
To guarantee service and security, the deployment of voice services over IP networks requires special handling of secondary channels within the network. When Trust Relay Points (TRPs) are implemented in voice networks, the networks must account for the following caveats when handling the opening of secondary channels.
Consequently, transparent entities, such as the Cisco IOS Firewall, that are operating on the networks, must process media channels differently. This feature enables Cisco IOS Firewall to process Session Traversal Utilities for NAT (STUN). STUN messages open connections between ports for secondary channels, known as pinholes, which are necessary for implementation of TRPs in voice networks.
Finding Feature InformationYour software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Firewall Support for TRPBefore configuring STUN to open pinholes for data, ensure that the voice protocol control packets in your network are not blocked by the Cisco IOS Firewall. Restrictions for Firewall Support for TRP
parameter-map type protocol-info stun-ice cfd1 authorization agent-id 20 shared-secret 12345flower12345 cat-window 15 authorization agent-id 22 shared-secret 12345cisco54321 cat-window 15 parameter-map type protocol-info stun-ice cfd2 authorization agent-id 21 shared-secret 12345flower54321 cat-window 15 ! class-map type inspect match-all stun-ice match protocol stun-ice cfd1 class-map type inspect match-any stun-ice1 match protocol stun-ice cfd2 ! policy-map type inspect policy_test class type inspect class_1 pass class type inspect sip_ctrl_channel inspect class type inspect stun-ice inspect class type inspect stun-ice1 inspect class class-default drop Information About Firewall Support for TRP
Cisco IOS FirewallThe Cisco IOS Firewall extends the concept of static access control lists (ACLs) by introducing dynamic ACL entries that open on the basis of the necessary application ports on a specific application and close these ports at the end of the application session. The Cisco IOS Firewall achieves this functionality by inspecting the application data, checking for conformance of the application protocol, extracting the relevant port information to create the dynamic ACL entries, and closing these ports at the end of the session. The Cisco IOS Firewall is designed to easily allow a new application inspection whenever support is needed. How Cisco IOS Firewall Supports TRP in a Voice NetworkThe following information describes the deployment scenarios supported by the Cisco IOS Firewall with TRP present in a voice network:
How Cisco IOS Firewall Supports Partial SIP InspectionCisco IOS Firewall TRP support enables Cisco IOS Firewall to process UDP STUN messages that open pinholes for secondary channels, which are necessary for implementation of TRPs in voice networks. Previous implementations of Cisco IOS Firewall, SIP clients could negotiate with the server to dynamically open control channels on a port, which could not be supported using the access-group class map. In addition, SIP traffic was sent through the firewall without any protocol conformance checks. To overcome these issues, Cisco IOS Firewall supports partial SIP inspection. This allows the SIP Application-level Gateway (ALG) to parse the entire SIP message, including the Session Description Protocol (SDP) part to check for protocol conformance, but does not allows SIP ALG to open pinholes for media information found in the SDP message. The STUN ALG is allowed to open the pinholes in the firewall. Because partial SIP inspection decouples the media channel from the SIP control channel, SIP ALG can no longer depend on media channel inactivity to timeout the control sessions. Therefore, the SIP ALG implementation in this environment depends on the UDP timeout configured on the router. Because the default setting is low (30 seconds), you must set the UDP timeout value to a value slightly longer than the SIP call duration, when configuring the system. TRP MessagesTRP uses the following message types to control how the Cisco IOS Firewall manages sessions:
To keep the Cisco IOS Firewall media sessions active the TRP generates authenticated keep-alive messages which must be validated to keep the session open. The keep-alive messages are valid only for a configured length of time, which is configured on the call-control entity (CCE). The Cisco IOS Firewall must receive a new message within the configured time, otherwise it closes the pinhole. The keep-alive message has the Cryptographic Authentication Token (CAT) obtained from the CCE which must be validated by the Cisco IOS Firewall before the keep-alive message is accepted.
The CAT (obtained from the CCE) is valid only for the CAT-life seconds setting configured on the CCE. After that time TRP gets a new CAT and sends a new message with the new CAT. This periodic open message specifies the keys that the Cisco IOS Firewall uses to authenticate the keep-alive messages until the next new CAT is obtained. Therefore, if the Cisco IOS Firewall does not receive a new CAT with the time specified by the CAT-life seconds, the media session closes as it cannot authenticate any keep-alive messages.
If the Cisco IOS Firewall receives a STUN message from TRP that indicates that a session should be active for 0 seconds (Seconds-Active = 0), it first validates the packet, then generates a syslog message and then allows the message to pass through the Cisco IOS Firewall so that other firewalls on the path can also see the message and close their session, finally it closes the session.
When TRP is configured on both the caller and the called side, the Cisco IOS Firewall receives 2 STUN messages for the same session. The Cisco IOS Firewall does not validate STUN messages from the remote party, instead it drops the packets and generates a syslog message. How to Configure a Firewall to Support TRP in Voice Networks
Configuring a Policy to Allow STUN MessagesBefore You Begin
SUMMARY STEPS
If the firewall is configured on the same device as the TRP, the STUN policy needs to be applied on the zone-pair between self and out zones. DETAILED STEPS Configuring Maps to Allow Partial SIP InspectionPerform this task to define a parameter map that does not create or open a media channel when the parameter map is attached to the SIP class map. Before You Begin
SUMMARY STEPS
Because partial SIP inspection decouples the media channel from the SIP control channel, SIP ALG can no longer depend on media channel inactivity to timeout the control sessions. Therefore, the SIP ALG implementation in this environment depends on the UDP timeout configured on the router. Because the default setting is low (30 seconds), you must set the UDP timeout value to a value slightly longer than the SIP call duration, when configuring the system. DETAILED STEPS Configuring a Parameter Map for TRP SupportSUMMARY STEPS
DETAILED STEPS Configuration Examples for Firewall and TRP in a Voice NetworkExample Cisco IOS Firewall Support of STUN Messages in Voice Network ConfigurationThe following example shows how to configure a Cisco IOS Firewall policy to support STUN messages: parameter-map type protocol-info stun-ice abc1 authorization agent-id 10 password letmein CAT-window 3 class-map type inspect stun-traffic match protocol stun-ice abc1 class-map type inspect voice-control-traffic match access-group 101 match protocol udp policy-map type inspect voice-traffic class type inspect voice-control-traffic inspect class type inspect stun-traffic inspect access-list 101 permit ip 10.0.0.0 255.255.255.255 2.2.2.2 255.255.255.255 ! Allow SIP control packets to ensure the Cisco IOS firewall does not open secondary ! channels for media. ! access-list 101 permit tcp any any eq 5060 access-list 101 permit udp any any eq 5060 ! class-map type inspect voice-control-traffic match access-group 101 ! policy-map type inspect policy_test class type inspect voice-control-traffic inspect Additional ReferencesThe following sections provide references related to the Cisco IOS Firewall Support for TRP feature. Related DocumentsMIBsTechnical Assistance
Feature Information for Firewall Support for TRPThe following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. © 2012 Cisco Systems, Inc. All rights reserved.
|
||||||||||||||||
|
|