Description |
This article describes how to apply VoIP profile where SIP inspection is not required for specific traffic crossing IPv4 policy.
The latest FortiGate versions have by default VoIP SIP ALG enabled globally and sometimes the FortiGate needs to handle more than one VoIP solutions where one solution will need SIP ALG active and other VoIP solutions will not be required.
Default FortiGate configuration:
config system settings
Note: If ALG mode is set in Kernel mode, Firewall policy is still required in Proxy mode to use a different VOIP profile.
If a specific traffic flow requires to pass without SIP ALG inspection active, this can also be accomplished by adding the following VoIP profile to the IPv4 policy which allows this traffic. Note that the VoIP profile that is applied has the SIP inspection disabled. If such a profile is not used, FortiGate will detect the SIP traffic and apply the 'default' VoIP profile even if not applied in the policy:
config voip profile
By CLI:
config firewall policy
Note: Enable VoIP feature from System -> Feature Visibility -> VoIP.
|
Scope | FortiGate. |
Solution |
Having VoIP profiles where one has SIP ALG disabled, allows one to decide which traffic needs SIP inspection and which does not at the policy level.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.