Created on
01-21-2026
12:46 AM
Edited on
01-21-2026
12:48 AM
By
Jean-Philippe_P
| Description | This article describes how to troubleshoot one way SIP Audio issue on the agent over an SSL VPN Tunnel. |
| Scope | FortiGate. |
| Solution |
Scenario :
config system settings set default-voip-alg-mode proxy-based end
By default, SSL VPN will use the destination address on the SSL VPN firewall policy to determine the split tunnel address range.
Topology: External SIP Server (11.11.11.11) -- (22.22.22.22) FortiGate -- Internal PBX Server (192.168.0.241).
Remote Agent: 10.212.134.52 (over SSL VPN tunnel).
The SIP/RTP packet capture flow when the Remote Agent calls out.
From PBX to FortiGate:
Internet Protocol Version 4, Src: 192.168.0.241, Dst: 11.11.11.11
This SIP Invite is coming from the internal PBX Server (192.168.0.241) and instructing the external SIP Server to initiate audio connection directly with the remote agent (10.212.134.52). And the remote agent will listen to the RTP audio stream on port 32514.
From FortiGate to external SIP Server:
Internet Protocol Version 4, Src: 22.22.22.22, Dst: 11.11.11.11
As SIP-ALG is enabled, FortiGate will translate the SDP (Session Description Protocol) content. Instead of source 192.168.0.241, it's translated towards FortiGate public IP 22.22.22.22. The audio connection IP and port is also translated, 22.22.22.22 on port 47278.
From External SIP Server to FortiGate:
Internet Protocol Version 4, Src: 11.11.11.11, Dst: 22.22.22.22
The external SIP Server will acknowledge and listen to the RTP traffic on port 18070.
From FortiGate to PBX:
Internet Protocol Version 4, Src: 11.11.11.11, Dst: 192.168.0.241
FortiGate will then forward the acknowledgement as is towards the internal PBX Server.
The RTP Flow from external SIP Server :
Internet Protocol Version 4, Src: 11.11.11.11, Dst: 22.22.22.22
Internet Protocol Version 4, Src: 11.11.11.11, Dst: 10.212.134.52
As negotiated, the external SIP Server will send RTP traffic with source port 18070 and destination port 47278. FortiGate will then translate the destination IP towards the remote agent 10.212.134.52 with port 32514.
In this scenario, FortiGate was not receiving any RTP traffic from the remote agent. Remote Agent is expected to send RTP with source port 32514 and destination port 18080 towards external SIP Server 11.11.11.11.
This is because with split tunnel enabled, the remote agent will route traffic of 11.11.11.11 towards its local connection, not through the SSL VPN tunnel.
The solution is to add a firewall policy to allow traffic from the SSL VPN IP pool range towards 11.11.11.11. By adding this policy, the destination IP Address 11.11.11.11 will be installed on the remote agent machine, so the RTP traffic will be correctly routed. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.