Skip to content

Instantly share code, notes, and snippets.

@shamun
Created June 28, 2011 10:38
Show Gist options
  • Save shamun/1050885 to your computer and use it in GitHub Desktop.
Save shamun/1050885 to your computer and use it in GitHub Desktop.
alg {
h323 {
media-source-port-any;
application-screen {
unknown-message {
permit-nat-applied;
permit-routed;
}
}
}
}
## WAN - ping++
set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services ping
set security policies default-policy permit-all
## Port forwarding 1720 2253 5060 49152 49500 49501 51234
set security nat destination pool server1 address 192.168.1.125/32
set security nat destination pool server2 address 192.168.1.3/32
set security nat destination pool server3 address 192.168.1.21/32
set security nat destination rule-set ruleset1 from zone untrust
## codec 1
set security nat destination rule-set ruleset1 rule rule1 match destination-address 0.0.0.0/0
set security nat destination rule-set ruleset1 rule rule1 match destination-port 1720
set security nat destination rule-set ruleset1 rule rule1 then destination-nat pool server1
## codec 2
set security nat destination rule-set ruleset1 rule rule2 match destination-address 0.0.0.0/0
set security nat destination rule-set ruleset1 rule rule2 match destination-port 2253
set security nat destination rule-set ruleset1 rule rule2 then destination-nat pool server1
## codec 3
set security nat destination rule-set ruleset1 rule rule3 match destination-address 0.0.0.0/0
set security nat destination rule-set ruleset1 rule rule3 match destination-port 5060
set security nat destination rule-set ruleset1 rule rule3 then destination-nat pool server1
## codec 4
set security nat destination rule-set ruleset1 rule rule4 match destination-address 0.0.0.0/0
set security nat destination rule-set ruleset1 rule rule4 match destination-port 49152
set security nat destination rule-set ruleset1 rule rule4 then destination-nat pool server1
## codec 5
set security nat destination rule-set ruleset1 rule rule5 match destination-address 0.0.0.0/0
set security nat destination rule-set ruleset1 rule rule5 match destination-port 49500
set security nat destination rule-set ruleset1 rule rule5 then destination-nat pool server1
## codec 6
set security nat destination rule-set ruleset1 rule rule6 match destination-address 0.0.0.0/0
set security nat destination rule-set ruleset1 rule rule6 match destination-port 49501
set security nat destination rule-set ruleset1 rule rule6 then destination-nat pool server1
## codec 7
set security nat destination rule-set ruleset1 rule rule7 match destination-address 0.0.0.0/0
set security nat destination rule-set ruleset1 rule rule7 match destination-port 51234
set security nat destination rule-set ruleset1 rule rule7 then destination-nat pool server1
## codec 8
set security nat destination rule-set ruleset1 rule rule8 match destination-address 0.0.0.0/0
set security nat destination rule-set ruleset1 rule rule8 match destination-port 80
set security nat destination rule-set ruleset1 rule rule8 then destination-nat pool server1
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment