Configure a Juniper Firewall¶
Note
Step 1: Add the Reemo servers¶
In Security > Policy Elements > Zone Address Book, add the following addresses in the Internet zone:
- Reemo_TURN1 :
Type :
FQDN
Domain Name :
turn1.reemo.io

Add TURN1 address in the Zone Address Book.¶
- Reemo_TURN2 :
Type :
FQDN
Domain Name :
turn2.reemo.io

Add TURN2 address in the Zone Address Book.¶
- Reemo_Signal :
Type :
FQDN
Domain Name :
signal.reemo.io

Add Signal address in the Zone Address Book.¶
Overview of addresses

Summary of configured addresses.¶
Step 2: Create Reemo applications (services)¶
In Security > Policy Elements > Applications, create the following custom applications:
- Reemo_TURN_UDP443 :
Protocol :
udp
Destination Port :
443

Custom application: TURN over UDP/443.¶
- Reemo_Protocol_out :
Protocol :
udp
Source Port :
58200-58400

Custom application: outgoing flows from the Reemo Agent.¶
- Reemo_Protocol_in :
Protocol :
udp
Destination Port :
58200-58400

Custom application: incoming flows for the browser.¶
Overview of applications

Summary of configured applications.¶
Step 3: Create security rules¶
In Security > Security Policy, create the following rules:
Global rules¶
- Reemo_TURN :
From Zone :
internal
To Zone :
Internet
Destination Address :
Reemo_TURN1
,Reemo_TURN2
Applications :
Reemo_TURN_UDP443
,junos-https
Action :
permit

Allow TURN (UDP/443) and HTTPS to the TURN servers.¶
- Reemo_Signal :
From Zone :
internal
To Zone :
Internet
Destination Address :
Reemo_Signal
Applications :
junos-https
Action :
permit

Allow HTTPS to the signaling server.¶
Rules for the remote computer (“Reemo Side”)¶
These rules concern the outgoing traffic generated by the remote computer running the Reemo Agent. They allow the machine to correctly communicate with the client browser via the UDP 58200–58400 range.
- ReemoAgent_out :
From Zone :
internal
To Zone :
Internet
Source Address :
LAN
(remote computer)Destination Address :
any
Applications :
Reemo_Protocol_out
Action :
permit

Allow outgoing flows from the Reemo Agent.¶
Rules for the browser (“Browser Side”)¶
These rules concern the incoming traffic on the browser side (the user’s workstation). They ensure that UDP 58200–58400 flows sent by the Reemo Agent properly reach the browser.
- ReemoAgent_in :
From Zone :
internal
To Zone :
Internet
Applications :
Reemo_Protocol_in
Action :
permit

Allow incoming UDP flows on the browser side.¶
Overview of policies

Summary of configured policies.¶
Step 4: NAT configuration (recommended)¶
- To preserve performance in direct/udp, it is recommended to:
Disable source port overloading,
Enable persistent NAT behavior.
Open NAT > Source, then Global Settings.
Disable the Interface Port-Overloading option.
Add specific rules in the main Source Rule Set.

Example of NAT configuration.¶
NAT rule examples¶
- Reemo_NAT_TestPage_rule (Test to UDP/443) :
Source :
your internal subnet
Protocol :
udp
Port :
443
Action :
Do Source NAT With Egress Interface Address
+ Persistent
- ReemoAgent_out (Agent outgoing flows) :
Source :
your internal subnet
Protocol :
udp
Ports :
58200-58400
Action :
Do Source NAT With Egress Interface Address
+ Persistent
- ReemoAgent_in (browser-side incoming flows) :
Source :
your internal subnet
Protocol :
udp
Ports :
58200-58400
Action :
Do Source NAT With Egress Interface Address
+ Persistent
Summary: Ports and addresses to open¶
Usage |
Protocol |
Ports |
Destination |
---|---|---|---|
Signal server |
TCP/UDP |
443 |
|
TURN servers |
UDP |
443 |
|
Reemo Protocol In |
UDP |
58200–58400 |
Browser (client workstation) |
Reemo Protocol Out |
UDP |
58200–58400 (src → dynamic dst) |
Remote computer (Reemo Agent) |