Description | This article describes the steps needed to confirm whether or not SIP traffic is being inspected by FortiGate. |
Scope | VoIP traffic over FortiGate. |
Solution |
it is possible to check if the SIP traffic is inspected by the FortiGate by running the following commands:
For SIP-ALG (proxy):
diag sys sip-proxy stat FortiGate # diag sys sip-proxy stat sip stats
For session-helper (kernel-helper-based):
diag sys sip status FortiGate # diag sys sip status
More details are visible here: Technical Tip: How to confirm if FortiGate is using SIP Session Helper or SIP ALG
Alternatively, this can be checked at the session level. In a FortiGate CLI window, run the following commands to get a list of all existing SIP sessions running on port 5060:
diagnose sys session filter clear diagnose sys session filter dport 5060 diagnose sys session list
In the output for each session, examine the line starting with 'class_id=':
class_id=0 ha_id=0 policy_dir=0 tunnel=/ helper=sip vlan_cos=0/255
class_id=0 ha_id=0 policy_dir=0 tunnel=/ helper=20 vlan_cos=0/255
class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/255
If it is inspected by the session helper, it can be checked using the command below: diagnose sys session list expectation |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.