Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Access1denied
New Contributor

PROBLEM SOLVED: SIP connection

I have a Grandstream UCM PBX that is behind my fortigate 100D.  my local network is 10.15.20.x and my PBX wan port is 10.15.20.249.  My gateway is configured with 69.231.225.154/29  with 69.231.225.154 my default IP.

 

I have a VIP labeled as [style="background-color: #00ccff;"]OffsitePhone[/style]: 69.231.225.157 -->10.15.20.249 port 5060 

My policy ID 60 is configure to accept incoming traffic from specific IP Address from the WAN1 port TO internal [style="background-color: #00ccff;"]OffsitePhone[style="background-color: #ffffff;"] I also set the service type to SIP.  I know this doesn't matter because of the VIP map with port... but I still set it.[/style][/style]

 

[style="background-color: #00ccff;"][style="background-color: #ffffff;"]I am running into a few problems.[/style][/style]

[style="background-color: #00ccff;"][style="background-color: #ffffff;"]1.  The policy doesn't seem to prevent others from accessing the UCM on port 5060.  As a result of this, I had to turn on the UCM firewall.[/style][/style]

[style="background-color: #00ccff;"][style="background-color: #ffffff;"]2. The connection works for some users and not for others. [/style][/style]

    after reviewing the logs.  I can see the packets coming through to the [style="background-color: #00ccff;"]OffsitePhone[/style] policy to the 10.15.20.249.  However, the packets from the 10.15.20.249 IP is going to the private ip address of the user's network.  It is suppose to go to the user's gateway public ip.  I don't understand why it works for some users and not for others...

6 REPLIES 6
Access1denied
New Contributor

update, I am using Fortigate 60 and I am having the same problem.  The firewall policy doesn't appear to block UDP traffic. This is scary... Am i the only person having this problem.... I have also tried to set the source IP in the VIP policy... but it appears no effect. I am still finding IP address not assigned being able to access my end point.

TheJaeene

Hi!

 

Please take a look at :

https://kb.fortinet.com/kb/documentLink.do?externalID=FD36750

 

and

 

https://kb.fortinet.com/kb/documentLink.do?externalID=FD36405

 

After disabling the SIP ALG you need to create a separate VIP for RTP Traffic with their respective UDP Port Range.

 

 

Please also note that you need to create a outgoing rule from PBX to WAN with SNAT. (IP-Pool) 69.231.225.157 as the SNAT (not the interface IP as NAT) and place this policy above the general outbound NAT.

 

Since you are using a VIP with Portforwarding, which is no 1:1 NAT, you need to do that (established traffic will flow correct though)

 

Greetings,

 

The Jane

 

Access1denied

Thank for the reply..

Is there any way to undo this kb? in the event it doesn't work?  I wasn't sure if the changes is specific to the policy or global?

https://kb.fortinet.com/kb/documentLink.do?externalID=FD36405

poundy

@Access1denied, to remove those settings you can either put them back to the original ones, or otherwise restore your configuration (if you take the backup before starting).

 

For example, in point 1 they help you identify a particular session-helper. Take a copy of that part of the config before you delete it, and replace it if you want to back-out.  Do this by going to the appropriate section (config system session-helper, for example) and typing SHOW, which then allows you to copy the current settings out into a text file to simply replace them. You can use UNSET new settings that you add to remove them.

 

Access1denied

Okay thanks Poundy

Access1denied

Thank you jkassner and poundy...

 

problem solved.  

 

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors