Description
This article describes the most common scenarios of VOIP implementation in FortiGate when SIP is used.
There are three general scenarios in which the FortiOS session initiation protocol (SIP) solution is usually deployed, and a common practice for ISP/multi-vdom scenarios, where NAT is needed.
Solution
For the ease of understanding, the green highlight covers the network part that is managed.
Firewall Policy Configuration for SIP traffic:
Note: This will be the sample for SIP configuration. Check the SIP provider documentation for requirements
Topology:
Internal phone network (Test-Phone VLAN) --- Internal Phone Server (Test-Server VLAN) --- FGT (WAN) --- Internet --- SIP provider
(If the phone server is in the same VLAN as the phone system, you can skip the first step of the policy configuration below)
config firewall policy
edit 1
set name "Phone-to-Server"
set srcintf "Test-Phone"
set dstintf "Test-Server"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
next
edit 2
set name "Server-to-Phone"
set uuid c25ad7ee-d4b2-51ed-cc97-a28410b79310
set srcintf "Test-Server"
set dstintf "Test-Phone"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
next
end
config firewall vip
edit "SIP-to-Server-VIP"
set uuid deafae72-d4b4-51ed-665a-f03753be03dd
set src-filter "<SIP-provider-public-IP>"
set extip "<WAN-IP-address>"
set mappedip "<Test-Server-VLAN-address>"
set extintf "any"
next
end
It is optionally possible to enable services to further restrict the traffic through port(s) to be able to reach the internal address and enable port forwarding to map the external port(s) to internal port(s).
config firewall policy
edit 4
set name "SIP-to-Server"
set srcintf "WAN"
set dstintf "Test-Server"
set action accept
set srcaddr "all"
set dstaddr "SIP-to-Server-VIP"
set schedule "always"
set service "ALL"
next
edit 3
set name "Server-to-SIP"
set srcintf "Test-Server"
set dstintf "WAN"
set action accept
set srcaddr "Test-Server address"
set dstaddr "SIP Provider"
set schedule "always"
set service "ALL"
set nat enable
next
end
Related Articles
Technical Tip: VOIP calls (using SIP)
Technical Tip: Disabling VoIP Inspection
Techincal Tip: SIP useful Commands
Technical Tip: Enabling the SIP Application Layer Gateway (ALG)
Technical Tip: How to confirm if FortiGate is using SIP Session Helper or SIP ALG
Technical Tip: How to use the SIP ALG to prevent unwanted calls
Technical Tip: FortiGate Hosted NAT Traversal for SIP
SIP and SCCP Traffic is Handled by the VoIP ALG/Proxy by default in FortiOS 5.2
This is a really important article for more sophisticated sip implementations. Great work!
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.