Once it’s successfully installed, navigate to server –> server settings –> registrations & login and make sure that anonymous login is enabled.
#JITSI FIREWALL PORTS INSTALL#
Ĭlick on Plugins –> available plugins and click on the + button next to Jitsi Video Bridge in order to install the Videobridge plugin. Once that’s configured, you can access the videoconference server’s WebUI by pointing your browser to.
#JITSI FIREWALL PORTS HOW TO#
Here’s how to edit DNS zone files in Windows or with a Godaddy DNS hosted account. Open your DNS Zone and create an A record such as that points to your videoconferencing server’s IP address. Next, let’s create a FQDN to access the videoconferencing server. Note: Make sure that your Windows Server firewall is turned OFF! It’s pretty straight forward and you can find installation instructions here. Install OpenFire on your videoconferencing server.
#JITSI FIREWALL PORTS DOWNLOAD#
It’s stable, secure and free! You can download it here. It is the platform that Jitsi Videobridge will run on. Configure your server’s NIC with the Public IP address that we used for the X2 Interface, as well as a subnet mask, default gateway and DNS server IP address.
You should allow fragmented packets to traverse.įinally, connect an Ethernet cable from the X2 port on the Sonicwall router to the NIC interface on the server that will host the OpenFire XMPP server. You can also assign QOS to the JitsiVideo bridge ports via the QOS tab (optional). Click on the from WAN to DMZ firewall rule.Ĭlick on the add button to create a new rule.Ĭreate a rule for each service port as shown above in order to open those ports on the firewall and allow traffic through. When finished, go to Firewall and select the matrix view. Now, go to network –> services –> add and create the following service ports: This will bridge the video server’s IP address to the DMZ zone where it can be firewalled. Select DMZ zone type, transparent mode and finally, the IP address object we recently created as the transparent range. Select network –> interfaces and click to configure the X2 interface.
Note: It must be in the same subnet as your Primary WAN IP.
Give your object a friendly name, select WAN zone assignment, host as the type and enter the public IP that you will use for your videoconference server. On your Sonicwall router, select network –> address objects –> add. If you are not familiar with this type of setup on Sonicwall routers, here’s some information about extending a WAN subnet to the DMZ using transparent mode.įirst, let’s create a network object on the router with the public IP address that we are going to use. For this reason, we are going to set up a network card with a Public IP on the videoconference server and have it sit behind a firewall so that only the necessary ports are exposed. Since most client endpoints will be behind a NAT, it’s best to avoid NAT at the server. Just like VoIP, Videoconferencing protocols do not play nicely with NAT on both ends of the connections.