Created on 11-27-2024 02:38 AM
| Description | This article describes how to resolve a situation to prevent malicious actors from trying to register into an internal PBX by scanning the FortiGate WAN IP. |
| Scope | FortiGate, FortiOS. |
| Solution |
Scenario:
This behavior is observed even when using VoIP security profile on the Firewall Policy related to the SIP trunk connection. This occurs because the Policy needs to be changed to Proxy Mode, and not be left at default Flow Mode.
Solution:
These undesired responses refer to the highlighted SIP messages which originated from FortiGate public IP 80.X.Y.Z, as a reply to IP 192.168.1.103 used to trigger responses from FortiGate by simulating SIP connections. After changing the firewall policy to proxy mode, these unwanted responses from FortiGate are no longer observed.
Related documents: Technical Tip: VoIP and SIP configuration and troubleshooting resource lists FortiOS 5.6: Handbook - VoIP Solutions: SIP |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.