×

TMCnet
ITEXPO begins in:   New Coverage :  Asterisk  |  Fax Software  |  SIP Phones  |  Small Cells
 

Special Focus
May 2003

Enabling NATs And Firewalls With SIP

BY Karl Erik St�hl

It is expected that real-time person-to-person communication, like IP telephony (VoIP), presence, instant messaging, voice, video, and data collaboration will be the next big step of Internet usage. The Internet standard for such communication is SIP. To be part of this accelerating SIP user community, it is important that your network is prepared for it. To have universal connectivity across the Internet, NATs and Firewalls need to be SIP capable, which is currently uncommon.

Person-To-Person Communication
Internet started as a defense, research, and university network. There are two applications that have spread the Internet usage to almost all companies and persons in the world: e-mail and Web surfing. However, these applications do not direct real-time communication between individuals, a capability that is becoming highly useful as more and more individuals have broadband or a fixed connection to the Internet.

Therefore, the next big step of Internet usage will include person-to-person communication such as:

� Voice (of which IP telephony is but one component);
� Video;
� Presence;
� Instant Messaging;
� Conferencing with voice, video and data collaboration, and more�

Several forms of person-to-person communication over the Internet have already been in use for a few years. However, it is just now, when a general standard has been established, that these types of applications will become more available and more widely used. SIP is the Internet standard for such applications and currently has a strongly accelerating growth.

A powerful driving force for SIP is that Microsoft has announced that all future real time communication (RTC) will be based on the SIP standard. Windows Messenger, which can be downloaded at no charge, already has a SIP mode that provides the user with telephony, voice, video, presence, and instant messaging. And, Microsoft is set to launch Greenwich, the RTC services for the Windows 2003 server. Greenwich includes a SIP server for safe enterprise usage and a programming API, which is expected to result in numerous SIP applications. With the market impact of Microsoft, there could easily be tens of millions of SIP users.


IP TELEPHONY -- JUST ONE PART
SIP is also used for �ordinary telephony,� i.e., voice with 3 kHz bandwidth and common number dialing, over IP networks. For this application, the SIP standard is taking over from the earlier H.323, which is a protocol from the standardisation organisation of the telecom world, the ITU-T. H.323 has been used to build islands of VoIP, but most often without interoperability on the IP level between the different operators. Another protocol is MGCP, or the related H.248/MEGACO, that sometimes is used to control IP phones on a low level in order for operators to connect these to the old telephone network, the PSTN.

It should be noted that IP telephony -- where ordinary telephony is emulated over IP -- is only a small part of person-to-person communication for which SIP was created. Real time person-to-person communication is expected to be the next big step in Internet usage following e-mail and Web surfing.


FIREWALLS, NATs, ROUTERS
When connecting a PC to the Internet, you do not want it to be accessible for everyone or vulnerable to attacks from hackers. That is especially important if you are constantly connected, for example via broadband or a fixed line. A firewall protects the PC by only allowing approved traffic and by rejecting attacks and illegal data packets.

On a local-area network (LAN), where several PCs or other equipment is connected, it is common to have private IP addresses on the LAN and a single common public IP address to the Internet. That is called NAT (Network Address Translation) and is often an integrated part of the firewall.

Firewalls and NAT-routers are designed for data traffic that is initiated from the inside of the private network. If instead the data traffic is initiated from the outside, and even worse, must reach a specific user on the private network, serious problems occur.

This is exactly what is happening with person-to-person communication via SIP. Therefore, it is highly important that all new firewalls and NAT routers now being installed are designed to support SIP properly and securely.

A TICKING TIME BOMB?
Most firewalls installed today do not handle SIP in an adequate way. The problem occurs for all similar protocols (e.g., H.323) where a person on a private LAN is to be contacted. Ordinary firewalls are simply not designed for such data traffic. It is a common misunderstanding that well known firewalls can be configured to handle SIP traffic, but that is not the case. One problem is that the media streams (e.g., voice and video packets) are transferred over dynamically assigned UDP ports that are generally closed. Another problem is that the SIP clients inside the firewall cannot be reached by IP addresses since these most often are private and local to the LAN. It simply does not work, unless there is specific SIP support in the firewall.

The same applies to routers that are switching the address space, NATs. NAT routers are used when several users share a common Internet connection with a single IP address. There are also operators only offering private IP addresses to their customers.


SIP NAT/FIREWALL TRAVERSAL
It is of course a fundamental problem that person-to-person communication does not reach the users on the LANs. Various methods and equipment have been suggested to solve this problem in a number of situations, but the most general one is to eliminate the problem where it occurs -- in the firewall itself. Firewalls including a SIP server (with a SIP proxy and SIP registrar) that dynamically controls the firewall are currently available.

A number of firewall vendors are planning to introduce models including a SIP ALG (Application Layer Gateway). These ALGs usually work at a lower level than a proxy, adjusting the data packets �on-the-fly.� Cisco is planning to introduce such ALGs that also handle incoming calls to multiple users, while other more simple implementations may only support a single SIP user on the LAN. A common limitation of the ALG architecture is that it cannot handle secure SIP signaling via TLS (Transport Layer Security). TLS is strongly recommended by Microsoft to be used with their Greenwich SIP enterprise solution.

SIP capable firewalls are not more expensive than ordinary firewalls and should be considered for all new installations of firewalls and NATs. If not, there is a high risk that even newly installed firewalls and NATs have to be exchanged in the near future.

Other methods are also proposed for SIP firewall and NAT traversal.

STUN is a method for getting SIP through existing NATs. It works through keeping holes open in the NAT by dummy traffic and having the SIP clients emulate their �looks� from the outside of the protected LAN. STUN will not work for all NATs and not for real secure firewalls, and may have some scalability and security issues. The SIP client has to implement STUN and integrate it in the SIP stack to make it work.

There are also various tunneling approaches, creating a tunnel through the firewall and then having an ALG in a central place at the �SIP operator� to cope with the separate address space of the private LANs and their individual users. Special equipment is therefore required at the SIP operator and sometimes, special equipment and software are required on the LAN or in the SIP clients. With this approach, the users get locked into a specific SIP operator. This approach can normally not handle complex configurations, such as inter-working between an operator and the Microsoft Greenwich architecture, where a local SIP server on the LAN is used.

For home users, Microsoft has suggested an extension to UPnP (Universal Plug and Play) to allow Windows to control the NAT or firewall. Several small inexpensive NATs have implemented these UPnP extensions, and thus allow SIP traversal for Windows Messenger (which is SIP based). However, it is not secure to allow every PC on the LAN to open the firewall, so UPnP is not acceptable for a proper firewall that should protect the LAN (In the Greenwich architecture, even Microsoft recommends that UPnP be disabled for high security). Another limitation is of course that UPnP control from Windows clients will not help other SIP products (e.g., SIP phones) to traverse a NAT or firewall.

CONCLUSION
In all new installations of firewalls and NAT routers, proper SIP support should be assured to allow the users on the LANs to utilize real time person to person communication, the next big usage of the Internet. Of the various methods proposed for firewall and NAT traversal, the most general and reliable is to solve the problems where it occurs, in the firewall or NAT itself. By including a SIP proxy and a SIP registrar for controlling the NAT and firewall, it is possible to handle complex SIP scenarios and to use TLS for secure and private signaling.

Karl Erik St�hl is president, Intertex Data AB, Sweden, a Swedish company with 20 years� experience in telecommunications and the development of high-quality communication and security products. Currently, Intertex is developing next generation broadband access products focusing on the SIP standard and person-to-person IP communication. For more information, please visit the company online at www.intertex.se.

[ Return To The May 2003 Table Of Contents ]



Today @ TMC
Upcoming Events
ITEXPO West 2012
October 2- 5, 2012
The Austin Convention Center
Austin, Texas
MSPWorld
The World's Premier Managed Services and Cloud Computing Event
Click for Dates and Locations
Mobility Tech Conference & Expo
October 3- 5, 2012
The Austin Convention Center
Austin, Texas
Cloud Communications Summit
October 3- 5, 2012
The Austin Convention Center
Austin, Texas