Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Mike Lewis on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Remote SIP Worker on Avaya J179 4

Status
Not open for further replies.

effectivecommunicat

IS-IT--Management
Jan 19, 2009
148
US
Hi All,

Looking for assistance on making a secure remote worker (without SBCE and using NAT)on a J179. We have the 3rd party certificates installed and have port forwarded just the TLS 5061 and RTP/NAT ports. Equinox/IX Workplace works on a PC and iphone, but unable to get a J179 phone to connect and it sits on Acquiring Service. We have bumped up the security settings but verified the phone will connect using the FQDN that local DNS routes to the LAN IP inside the office (outside the office routes to the public IP and the same one IX Workplace is using). Anything else we may be missing or an idea of what to check?

effectivecommunicat
ACIS, ACSS Certified
 
Thanks derfloh! Is there a way to verify/test the certificates were correctly configured? Again, thank you!

effectivecommunicat
ACIS, ACSS Certified
 
WHO issued the certificate? Most public trusted CAs have a root CA and an intermediate CA. The phone has to load both certificates. Usually the phones load an autogenerated WebRootCA.pem from IPO. This one only holds one of the needed certificates.

You have to merge both CA certificates into a single file and upload it as WebrootCA.pem

In Wireshark you can see the certificates exchange.

You also have to make sure that the certificate of the IPO has the needed subject alternative names (SANs).

IP Office remote service
Fixed price SIP trunk configuration
CLI based call blocking
SCN fallback over PSTN
 
Thanks! Used the site to verify the certificate was good and the 411 forwarding allowed the phone to connect.

I also opened port 443 in order to verify the certificate and Im wondering if I need to leave it open or if i should remove the port forwarding..?

Looking through the R11 Security Guidelines and wondering if anyone has any other suggestions besides changing all default passwords and enforcing strong/complex passwords for accounts and extensions. I noticed you can now restrict SIP extensions to a SIP UA Whitelist and considering that but not sure if that would be overkill.

Thanks again.

effectivecommunicat
ACIS, ACSS Certified
 
Sorry, maybe i should have been more clear. After port forwarding 411 everything is working correctly and the phone was able to connect. Thanks for all the assistance.

My follow up question was more on any specific suggestions on hardening the security.

effectivecommunicat
ACIS, ACSS Certified
 
You have to merge both CA certificates into a single file and upload it as WebrootCA.pem

We have found that the simplest solution when using a 3rd party cert is to load the certs (intermediate/crt and then pfx) to the system, then go to the webpage and open the cert, select copy to file and save it as WebRootCA.cer

Then use an openssl session to change it to WebRootCA.pem and then just upload that to the primary folder.

Command would be

openssl x509 -inform der -in WebRootCA.cer -out WebRootCA.pem

The above command is assuming the file is in the default folder location.

Edit - above command thanks to Smash :)



| ACSS SME |
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top