| Description | This article describes the issue where the Zultys IP PBX system is not accessible from remote branches. |
| Scope | FortiGate. |
| Solution |
The Zultys PBX IP system is a VoIP-based private branch exchange used for business communications. It operates over IP networks using SIP and related VoIP protocols.
Topology:
Follow the steps mentioned below to resolve the issue:
Step 1: Verify firewall configuration: The following firewall configuration elements should be reviewed on both the spoke and hub firewalls:
Step 2: Verify IPsec tunnel configuration: IPsec configuration should be reviewed on all relevant firewalls:
Step 3: Validate NPU offloading settings:
Step 4: Analyze TCP session behavior:
Step 5: Evaluate the impact of deep packet inspection:
Step 6: Bypass security profiles for isolation:
Step 7: Adjust SSL inspection for PBX traffic: The SSL/SSH inspection configuration applied to the firewall policy should be reviewed when PBX application traffic is involved. If deep inspection is not strictly required by security or compliance requirements, certificate inspection may be considered as a preferred alternative, as it allows encrypted traffic to pass with reduced processing overhead. This approach can help minimize latency and avoid potential disruptions to PBX application sessions while still maintaining basic certificate validation.
Step 8: Validate application connectivity:
PBX applications may terminate sessions due to latency introduced by deep packet inspection. Deep SSL inspection can delay encrypted traffic processing, leading to timeout or protocol handling issues on latency-sensitive applications such as PBX systems. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.