Created on
09-03-2024
09:50 AM
Edited on
01-28-2025
07:19 AM
By
Jean-Philippe_P
Description | This article describes how the VoIPD daemon default behavior changes in v7.2.7 can impact SCCP (TCP 2000) traffic. |
Scope | FortiGate. |
Solution |
In this scenario, the user has upgraded a FortiGate from v7.0.12 to v7.2.7, which has impacted SCCP (TCP 2000) traffic.
As per the user configuration in v7.0.12, default-voip-alg-mode was set to proxy-based.
config system settings set default-voip-alg-mode proxy-based <- It will only show after running 'show full system settings'. end
Consider the following points:
Using the debug flow tool, it is possible to confirm that traffic is being sent to the application layer (proxy-based inspection) even without using any type of inspection in the firewall policy.
id=65308 trace_id=238 func=print_pkt_detail line=5862 msg="vd-root:0 received a packet(proto=6, 192.168.1.10:51362->192.168.2.10:2000) tun_id=0.0.0.0 from VLAN1. flag [S], seq 1809234287, ack 0, win 65535"
Considering the above three points, it appears that FortiGates with default-voip-alg-mode set to proxy-based on FortiOS v7.2.7 were using the VoIPD daemon to inspect TCP port 2000 traffic, causing the VoIPD daemon to drop the traffic. This could be due to either the traffic failing inspection or a bug in VoIPD.
A lab test was able to replicate the issue even without any of the customer config files.
The following settings resolved the issue:
config system settings set default-voip-alg-mode kernel-helper-based end
Alternatively, if VoIP inspection is necessary for SIP traffic, the following can be applied:
Keep ALG settings in proxy mode:
config system settings set default-voip-alg-mode proxy-based end
In the VoIP profile, disable SCCP inspection. By default, the 'default' VoIP profile is used:
config voip profile edit default config sccp set status disable end end |