Description | This article describes how the VoIPD daemon default behavior changes in v7.2.7 can impact an application traffic on port 2000. |
Scope | FortiGate. |
Solution |
In this scenario, the user has upgraded a FortiGate from v7.0.12 to v7.2.7, which impacted the application traffic on port 2000.
In the user configuration in v7.0.12, the default-voip-alg-mode was set to proxy-based.
config system settings set default-voip-alg-mode proxy-based <- It will only show after running 'show full system settings'. end
Consider the following points:
Using the debug flow tool, it is possible to confirm: Technical Tip: Session flags and inspection mode (proxy-based inspection) even without using any type of inspection in the firewall policy.
id=65308 trace_id=238 func=print_pkt_detail line=5862 msg="vd-root:0 received a packet(proto=6, 192.168.1.10:51362->192.168.2.10:2000) tun_id=0.0.0.0 from VLAN1. flag [S], seq 1809234287, ack 0, win 65535"
In v7.2.7, when default-voip-alg-mode is set to proxy-based, FortiGate inspects the traffic, and it is not possible to access the remote server on TCP port 2000. An attempt was made to access a server using https://w.x.y.z:2000 from a local workstation web browser.
The following settings resolved the issue:
config system settings set default-voip-alg-mode kernel-helper-based end
Keep ALG settings in proxy mode:
config system settings set default-voip-alg-mode proxy-based end
In the VoIP profile, disable SCCP inspection. By default, the 'default' VoIP profile is used:
config voip profile edit default config sccp set status disable <<<< end end
config system settings
Related articles: Technical Tip: How to disable ALG for SCCP traffic to allow TCP port 2000 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.