Created on 10-13-2008 01:25 AM
The following ports need to be open: 5060 TCP & UDP 10000 – 20000 UDPHowever in the 3CX system you can restrict the number of ports being used, for testing I set this to 9000 to 9001 UDP. The firewall test fails with : 1 9000 Error (4) The STUN server returned an ip which is not accessible from outside. addrFromSTUN = 84.45.179.66:55492 2 9000 Error (6) An incompatible NAT configuration has been detected. Please check FAQ for further information. addrFromAgent = 84.45.179.66:55494addrFromSTUN = 84.45.179.66:55492 3 9000 Warning (8) Local port is not blocked from outside. STUN server has returned global port different from the local one, but the local port is also accessible from outside. 4 9000 Error (10) Port is open, but port number has been changed during NAT translation. THIS ERROR means you have Symmetric NAT and you do not have STATIC PORT MAPPINGS in place. 3CX Phone System will not communicated correctly with your VOIP provider or external extensions. See this FAQ: http://www.3cx.com/support/firewal-checker.html externalAddress = 84.45.179.66:55492 The solution from 3CX was to upgrade to a better firewall such as a Draytek(!) The solution appears to be to use " Full Cone NAT" or basically a Virtual IP to forward all the ports from a given external IP address to the LAN address 172.16.1.21. The problem I have is the external address 84.45.179.66 is being used for a SMTP VIP as well. Is there anyway to make traffic from a given internal IP (172.16.1.21) to go out via a different external IP address ? All my interfaces are currently in use and the WAN1 is the only interface on the 84.45.179.X network. Or do I have to move my DNS entries for e-mail ? Hope this makes some sense.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Is there anyway to make traffic from a given internal IP (172.16.1.21) to go out via a different external IP address ? All my interfaces are currently in use and the WAN1 is the only interface on the 84.45.179.X network. Or do I have to move my DNS entries for e-mail ?If you have multiple adresses in the 84.45.179.X network, add them as secondary ip adresses to your wan interface. Then you could create an ip pool with a single secondary adress, and assign it to an outgoing rule of your voip server. By this way every traffic that comes out of your voip server will have this secondary address as source address. Then create a vip with tjis secondary adress and point it to your voip machine. If you have only one external address, you should be able to create to vips as portforwarding ... Crate a vip for tcp/25 and point it to your smtp server and create a vip eg. 26-65535 and point it to your voip server.
Created on 10-13-2008 04:56 AM
If you have multiple adresses in the 84.45.179.X network, add them as secondary ip adresses to your wan interface. Then you could create an ip pool with a single secondary adress, and assign it to an outgoing rule of your voip server. By this way every traffic that comes out of your voip server will have this secondary address as source address. Then create a vip with tjis secondary adress and point it to your voip machine.Yeah I tried this. My WAN1 IP is 84.45.179.66/255.255.255.248. I tried to add a secondary IP of 84.45.179.67/255.255.255.248 but get the following error : IP address is in same subnet as the others.
Created on 10-13-2008 05:45 AM
220-ESMTP Exim 4.69 #1 Wed, 15 Oct 2008 11:31:48 +0100 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. ehlo 250- Hello smtp.nevis.co.uk [84.45.179.66]
Created on 10-15-2008 03:58 AM
Created on 10-15-2008 04:47 AM
Created on 10-15-2008 05:01 AM
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.