Prefix and Source Ip Authentication For Incoming Voip Traffic

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Prefix and Source IP Authentication for Incoming VoIP Traffic - Yasin KAPLAN - (2010)

Prefix and Source IP Authentication for Incoming VoIP Traffic


This document explains how to authenticate incoming VoIP traffic to a Cisco IP-to_IP gateway using RADIUS protocol and TCL scripting. In this example following components are used: IP-to-IP Gateway. This is a Cisco gateway device with IP-to-IP gateway software installed. It can be a Cisco 3660 or Cisco 3845 model (IOS version >= 12.4). TekRADIUS (Version >= 1.9).

You can see network components in the diagram below:

Figure - 1. Sample Topology

You can process VoIP calls (H.323 or SIP) using Cisco TCL scripting. You can authenticate and authorize incoming VoIP calls using RADIUS. TCL script will get IP address of the remote carrier and technical prefix from called number and concatenate them with a user defined character. Resulting string will be put in a RADIUS access-request packet as User-Name attribute and will be sent to TekRADIUS.

TekRADIUS Configuration Youll need to add user profiles for remote carriers. User profiles must have a User-Name in Prefix + Concatenation Character + Carrier IP address format.

2010 Yasin KAPLAN All rights reserved http://www.yasinkaplan.com/

Prefix and Source IP Authentication for Incoming VoIP Traffic - Yasin KAPLAN - (2010)

Figure - 2. Sample User Profile Entry

Do not forget to define you Cisco gateway as a RADIUS client in Clients tab. Re-start TekRADIUS after all settings done and saved. Cisco Gateway Configuration You need to have IP-to-IP Gateway software installed on Cisco Gateway. You need enter following configuration to communicate with RADIUS server:
aaa new-model ! aaa authentication login default local aaa authentication login h323 group radius aaa authorization exec h323 group radius ! Add following line if you like to also get accounting data for VoIP sessions aaa accounting connection h323 start-stop group radius ! radius-server host 192.168.190.1 auth-port 1812 acct-port 1813 key secret

Configure Incoming dial peers for the carriers. SIP version 2 is used as VoIP protocol in our example:
dial-peer voice 50 voip description - Carrier 1 - in service prefix_ip_authentication incoming called-number 9901T session protocol sipv2 codec transparent ! 2010 Yasin KAPLAN All rights reserved http://www.yasinkaplan.com/

Prefix and Source IP Authentication for Incoming VoIP Traffic - Yasin KAPLAN - (2010) dial-peer voice 60 voip description - Carrier 2 - int service prefix_ip_authentication incoming called-number 9902T session protocol sipv2 codec transparent ! dial-peer voice 70 voip description - Carrier 3 - in service prefix_ip_authentication incoming called-number 9903T session protocol sipv2 codec transparent

Following TCL script is used for authorizing incoming VoIP calls (call_route_app.1.0.tcl):
# Script Changed by: Yasin KAPLAN # Script Version: 1.0 # Script Name: prefix_ip_authentication # Script Lock Date: Mon Feb 15 14:06:00 2010 #-----------------------------------------------------------------# February 15th 2010, Yasin KAPLAN # # Copyright (c) 2010 by Yasin KAPLAN # All rights reserved. #-----------------------------------------------------------------# # Description: # # This script allows the call from carrier authenticated by carrier prefix # and IP address of the remote system. # #-----------------------------------------------------------------# proc init_perCallVars { } { global disconnect_cause set disconnect_cause 0 } proc act_Setup { } { global carrierid global carrierip global destination global account init_perCallVars set destination [infotag get leg_dnis] set carrierid [string range $destination 0 3] set carrierip [infotag get leg_remoteipaddress leg_incoming] set carrierid "$carrierid@$carrierip" set account [infotag get leg_username leg_incoming] aaa authenticate $carrierid "" } proc act_Authenticated { } { global account global destination global disconnect_cause set status [infotag get evt_status] puts "\n aaa authenticate Status=$status"

2010 Yasin KAPLAN All rights reserved http://www.yasinkaplan.com/

Prefix and Source IP Authentication for Incoming VoIP Traffic - Yasin KAPLAN - (2010)
if { $status == "au_000" } { set callInfo(accountNum) $account leg setup $destination callInfo leg_incoming } else { set disconnect_cause di_021 act_SendCauseCode fsm setstate CALLDISCONNECT } } proc act_CallSetupDone { } { global creditTime global disconnect_cause set status [infotag get evt_status] puts "\t\t******* act_CallSetupDone: $status" if {$status == "ls_000"} { return } # leg setupFail set disconnect_cause [infotag get evt_last_disconnect_cause] act_SendCauseCode fsm setstate CALLDISCONNECT } proc act_SendCauseCode { } { global disconnect_cause puts "\t\t***** DISCONNECT CAUSE CODE: $disconnect_cause" set cause [split $disconnect_cause "_"] leg disconnect leg_incoming [lindex $cause 1] } proc act_ConnectionDestroy { } { global disconnect_cause set disconnect_cause [infotag get evt_last_disconnect_cause] connection destroy con_all } proc act_Cleanup { } { call close } requiredversion 2.0 #---------------------------------# State Machine #---------------------------------set fsm(any_state,ev_disconnected) set fsm(any_state,ev_disconnect_done) set fsm(CALL_INIT,ev_setup_indication) set fsm(AUTHENTICATE,ev_authenticate_done) set fsm(PLACECALL,ev_setup_done) set fsm(CALLACTIVE,ev_disconnected) set fsm(CALLACTIVE,ev_disconnected)

"act_Cleanup "act_Cleanup "act_Setup "act_Authenticated "act_CallSetupDone "act_SendCauseCode

same_state" same_state" AUTHENTICATE" PLACECALL" CALLACTIVE" CALLDISCONNECT"

"act_ConnectionDestroy CONNDESTROY"

2010 Yasin KAPLAN All rights reserved http://www.yasinkaplan.com/

Prefix and Source IP Authentication for Incoming VoIP Traffic - Yasin KAPLAN - (2010)
set fsm(CONNDESTROY,ev_destroy_done) set fsm(CALLDISCONNECT,ev_disconnected) set fsm(CALLDISCONNECT,ev_destroy_done) set fsm(CALLDISCONNECT,ev_disconnect_done) fsm define fsm CALL_INIT "act_SendCauseCode "act_Cleanup "act_Cleanup "act_Cleanup CALLDISCONNECT" same_state" same_state" same_state"

Enter following configuration to define this script as an application:


application service carrier_routing flash:call_route_app.1.0.tcl

References 1. Cisco IP-to-IP Gateway Configuration http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vvfax_c/callc_c/ h323_c/ipipgw/ipgw.htm 2. Cisco TCL Scripting http://www.cisco.com/en/US/products/sw/iosswrel/ps5207/products_feature_guide09186a0 0801a75a7.html 3. TekRADIUS http://www.tekradius.com/ 4. Microsoft SQL Server http://www.microsoft.com/sql/default.mspx

THIS INFORMATION PROVIDED IN THIS DOCUMENT AS IS WITHOUT WARRANTY OF ANY KIND AND PROVIDED TO YOU AT NO CHARGE. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, YASIN KAPLAN FURTHER DISCLAIMS ALL WARRANTIES; INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT. THE ENTIRE RISK ARISING OUT OF THE USE OR PERFORMANCE OF THE SYSTEMS BASED ON THIS DOCUMENTATION REMAINS WITH RECIPIENT. YASIN KAPLAN DOES NOT WARRANT THAT DOCUMENTED FEAUTURES OPERATE CORRECTLY ON YOUR SYSTEM. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL YASIN KAPLAN BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL, DIRECT, INDIRECT, SPECIAL, PUNITIVE, OR OTHER DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR OTHER PECUNIARY LOSS) ARISING OUT OF THE USE OF OR INABILITY TO USE INFORMATION IN THIS DOCUMENT, EVEN IF YASIN KAPLAN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Microsoft, Microsoft SQL Server, Win32, Windows 2000, Windows, and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Cisco, IOS are Registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.

2010 Yasin KAPLAN All rights reserved http://www.yasinkaplan.com/

You might also like