Hi community,
I have the following VoIP setup:
Avaya IP Office v2 --- FG-80F --- ISP1 / ISP2 (SD-WAN)
My goal is to configure a simple failover, where the FortiGate automatically switches to the secondary ISP if the primary link goes down.
However, I’m running into the following issues:
With SIP helper / SIP ALG enabled:
Once the SIP communication is established (INVITE, ACK, etc.), the SIP ALG forces the voice traffic to go out through the failover link (ISP2), even though it should stay on the primary.
This breaks the voice session.
I’ve tried separate rules and SD-WAN policy routes, but the issue persists.
With SIP helper disabled (no ALG):
The SIP/SDP packets are sent out through the correct WAN link.
However, the SDP headers are not NATed and still carry the LAN IP address.
As a result, packets reach the destination but the remote side cannot reply.
Has anyone faced a similar scenario?
I solved this problem configuring the wan ip on the avaya but just can set 1 of them so if my isp go down i have to manually set the other one
Is there a way to get the SDP headers properly NATed without enabling SIP ALG, or a best practice for handling VoIP with SD-WAN failover on FortiGate?
Thanks in advance for any guidance!
Solved! Go to Solution.
Hello again Igneus,
I found this solution. Can you tell me if it helps, please?
To address the issues you're facing with SIP and SD-WAN failover on FortiGate, you can follow these steps:
If these steps do not resolve the issue, you may need to consult with Fortinet support for more specific guidance tailored to your network setup.
Hello Igneus,
Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.
Thanks,
Hello,
We are still looking for an answer to your question.
We will come back to you ASAP.
Thanks,
Hello again Igneus,
I found this solution. Can you tell me if it helps, please?
To address the issues you're facing with SIP and SD-WAN failover on FortiGate, you can follow these steps:
If these steps do not resolve the issue, you may need to consult with Fortinet support for more specific guidance tailored to your network setup.
User | Count |
---|---|
2587 | |
1380 | |
796 | |
658 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.