Created on 08-03-2023 12:55 AM Edited on 08-03-2023 12:57 AM By Jean-Philippe_P
This article describes the configuration to be done on FortiGate when using 3CX devices.
v7.0, v7.2.
In this case, let's assume the 3CX server is behind the FortiGate.
Create inbound policy.
Firstly, it is needed to create the VIP.
The RTP port can change from SIP provider to provider. It is necessary to check with the SIP provider to get the ranges of RTP ports configured on the 3CX server and allow those required ports in VIP.
After creating the VIP, it is required to place the VIP in the incoming policy.
DNS.
Make sure the DNS server is able to resolve all the required FQDN of 3CX.
Disable SIP ALG.
FortiGate should not be using SIP ALG and even session helper should be disabled.
To disable SIP ALG:
config system settings
set sip-expectation disable
set sip-nat-trace disable
set default-voip-alg-mode kernel-helper-based
end
To disable session helper
config system session-helper
edit 13
set name sip
set protocol 17
set port 5060
next
delete 13
end
After that clear the session for port 5060.
Check the setup from 3CX.
Log into the 3CX Management Console → Dashboard → Firewall and run the 3CX Firewall Checker. This will validate if the firewall is correctly configured for use with 3CX.
Related article:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.