Created on
11-19-2025
01:26 PM
Edited on
11-19-2025
01:27 PM
By
Jean-Philippe_P
| Description | This article describes an issue where SIP UDP INVITE packets are dropped when SIP ALG (proxy-based) and Hyperscale full-offload are enabled on NP7. The behavior is caused by IPv6 fragmentation and NP7 Maximum Transmission Unit-handling logic, leading to packet drops before reaching the kernel. |
| Scope | FortiGate. |
| Solution |
SIP UDP traffic is dropped only when SIP ALG (proxy-based) and Hyperscale are both enabled. The issue applies to all NP7 platforms.
Fails with SIP UDP, Works with SIP TCP, Works with SIP UDP with ALG disabled. The drop occurs at the NP level, before the packet reaches the kernel.
config system settings
SIP ALG is enabled by default. SIP signaling uses IPv6, media line uses IPv4, ICE/crypto/rtcp-mux present.
Scenario 1: UDP + SIP ALG + Hyperscale -> Non-Working. INVITE packets in MCC capture (GI_UDP_run4) do not appear in NP7 capture (Inside_3_SIP_IPv6_UDP_fail). Kernel capture also contains no INVITE packets and confirms a drop in NP7. All dropped packets correspond to fragmented INVITEs.
Scenario 2: TCP + SIP ALG + Hyperscale -> Working. Debug shows all SIP TCP segments arriving. No reassembly anomalies. It matches end-to-end signaling. Debug proves no packets were dropped in transit.
Scenario 3: UDP + SIP ALG disabled + session-helper -> Working. The same can be observed when we turn off the ALG completely and use the Session helper. SIP via UDP is functioning correctly.
The observed fragmentation behavior is:
Root Cause:
In all cases, INVITE fragments are dropped before reaching kernel-level SIP ALG logic.
Workarounds:
config system settings
config firewall service custom
Long-term Solution: Update the FortiOS to v7.6.5:
In FortiOS v7.6.5, INVITE fragments are properly reassembled and delivered to the SIP ALG kernel logic. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.