SonicWALL 5.8.1 Microscope & Magnifier User Manual


  Open as PDF
of 1490
 
VoIP Settings
825
SonicOS 5.8.1 Administrator Guide
Server Address Objects - The wizard creates the address object for the new server.
Because the IP address of the server added in the example is in the IP address range
assigned to the LAN zone, the wizard binds the address object to the LAN zone.
Server Service Group Object - The wizard creates a service group object for the services
used by the new server.
Server NAT Policies - The wizard creates a NAT policy to translate the destination
addresses of all incoming packets with one of the services in the new service group and
addressed to the WAN address to the address of the new server. The wizard also creates
a Loopback NAT policy
Server Access Rules - The wizard creates an access policy allowing all traffic to the WAN
Primary IP for the new service.
Step 11 Click Accept in the Public Server Configuration Summary page to complete the wizard and
apply the configuration to your SonicWALL.
Tip The new IP address used to access the new server, both internally and externally, is
displayed in the URL field of the Congratulations window.
Step 12 Click Close to close the wizard.
Configuring VoIP Logging
You can enable the logging of VoIP events in the SonicWALL security appliance log in the Log
> Categories page. Log entries are displayed on the Log > View page. To enable logging:
Step 1 Select Log > Categories.
Step 2 Select Expanded Categories from the View Style menu in the Log Categories section.
Step 3 Locate the VoIP (VOIP H.323/RAS, H.323/H.225, H.323/H.245 activity) entry in the table.
Step 4 Select Log to enable the display of VoIP log events in on the Log > View page.
Step 5 Select Alerts to enable the sending of alerts for the category.
Step 6 Select Syslog to enable the capture of the log events into the SonicWALL security appliance
Syslog.
Step 7 Click Accept.
VoIP Deployment Scenarios
SonicWALL security appliances can be deployed VoIP devices can be deployed in a variety of
network configurations. This section describes the following deployment scenarios:
“Generic Deployment Scenario” on page 826
“Deployment Scenario 1: Point-to-Point VoIP Service” on page 826
“Deployment Scenario 2: Public VoIP Service” on page 827
“Deployment Scenario 3: Trusted VoIP Service” on page 828