Description | This article describes why a SYN-ACK is seen from FortiGate when nmap is initiated toward a non-existing IP address. |
Scope | FortiGate. |
Solution |
When nmap is initiated towards a non existing IP address on both ports 5060 and port 2000, a SYN-ACK is observed on FortiGate. This an expected behavior when the ALG configuration is set to a proxy-based mode.
By default, the FortiGate considers traffic using TCP port 2000 as SCCP and traffic using TCP port 5060 as SIP. Both SCCP and SIP are inspected by ALG by default.
If the VoIP algorithm is changed to kernel-helper-based, SYNC-ACK will not be observed on FortiGate.
config system settings set default-voip-alg-mode proxy-based * | kernel-helper-based end
Note: if SIP and/or SCCP traffic is passing through the FortiGate and relies on SIP ALG to open pinhole and/or perform NAT, disabling this feature will most likely break VoIP traffic.
Keep ALG settings in proxy mode:
config system settings set default-voip-alg-mode proxy-based end
config voip profile edit default config sccp end end
Similarly, if VoIP inspection is necessary for SCCP traffic but not for SIP, disable SIP inspection in voip profile:
config voip profile edit default config sip end end
Related articles: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.