Good morning,
The case concerns the FG100F.
After upgrading from 6.2 to 7.2.5 there were problems with SIP traffic.
The policy that allows SIP traffic only from Poland (geolocation) and from a few selected ip addresses from abroad also allows SIP traffic from other countries that are not on the list.
When I check through the policy lookup, I have information that the traffic should go to the implicit deny, but the logs show that the traffic goes to this policy and is allowed. At first I thought geolocation was the problem, but I tested it and it seems to be working fine. The problem is only with SIP. What could be the reason? The policy is in proxy mode and does not have a VOIP profile so it uses default.
config firewall policy
edit 87
set uuid 1c0ffe44-254f-51ee-4c1c-b82b6b9b89ca
set srcintf "OUTSIDE"
set dstintf "SIP_PUB"
set action accept
set srcaddr {Poland + ip list)
set dstaddr "SIP_GRP"
set schedule "always"
set service "serwis_10000-65535_RTPproxy" "serwis_5060_5061_siptcp" "serwis_5060-5062_sip"
set inspection-mode proxy
set logtraffic all
next
config voip profile
edit "default"
set comment "Default VoIP profile."
config sip
set status disable
end
next
SIP helper has been removed and SIP disabled in VOIP profile as customers have reported problems with SIP traffic. Currently, this setup works fine except for one client. The problem is that the policy allows SIP traffic from addresses that are not on the allowed list.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Not sure what I'm doing wrong here, but SIP traffic won't match my LAN->WAN policy, or my traffic shaping policy. RTP traffic matches just fine but I get no hits on SIP.
I've done a packet capture just to verify my IP PBX is actually using port 5060 for SIP and that the destination matches what I have in the policy, and it all looks fine to me.
I do have a VIP policy that forwards SIP traffic to my PBX, but I'm not sure if/why this would prevent outbound SIP traffic from matching my policy.
Hi @charley672 , your post looks like unrelated to OPs problem. If indeed hijacking this thread, please open a new one on your own. If only to increase the chances that someone sees your posts and offers a solution. Thx.
Hello MateuszP,
Thank you for reaching out on Fortinet forums.
Can you please confirm whether are you using any VIP for the destination address "SIP_GRP" on the 87 ID firewall policy if yes please create a test firewall from any source to that VIP destination and enable
set match-vip enable from CLI.
Make sure you place that block policy below Poland allow policy
reference article you can use below :
The article which can explain why default deny is not blocking if you are using VIP:
Regards,
Manasa
Thank you for your answer.
No, I don't use VIP, there are several regular IPs in the SIP_PUB group.
I don't have an explicit deny policy, traffic should go implicit deny.
I know about "set match-vip enable" in VIP policies.
Hi Mateusz,
Thank you for the update.
I noticed there is also ip-list that you allowed i am assuming none of the above ip from the screenshot are not part of them I guess.
Do you still see the entries ? Just for testing Did you try creating a policy above ID 87 to block traffic for the same services?
-Have you configured any local-in-policy on the firewall to allow access?
Thanks,
Manasa
Created on 08-20-2023 11:22 PM Edited on 08-20-2023 11:40 PM
Yes, those IPs are not on the allowed list.
The problem still occurs.
There are several VDOMs on this FG and the problem also occurs on the others VDOMs. On one of them I added a deny policy above allow and block addresses correctly.
This does not change the fact that addresses that are not on the allow list should not match into allow.
There is no local-in-policy.
The problem is only with SIP traffic so I'm pretty sure the cause is somewhere on the side of SIP helper / ALG / voip profile.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1731 | |
1105 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.