Hi
My first post, so go easy on me...;)
We have a client with a Fortigate 50E running firmware 5.6.8 build 1672 (GA). On the LAN side of the network they have just installed an LG Ipecs PBX phone system. This has a fixed IP of 6.0.1.150.
The issue is this;
When a LAN side user makes a call to an external destination, the external destination cannot hear the LAN side caller. The LAN side caller can hear the external user. If an external user calls a LAN side user, everything is fine.
The setup:
I have created multiple Virtual IP's that port forward all the relevant UDP/TCP traffic to the PBX and added them to a Virtual IP Group called LG_Phone_System
I have create the following inbound policy;
Incoming Interface: WAN1
Outgoing Interface: LAN
Source: all
Destination: LG_Phone_System (VIP Group)
Schedule: Always
Action: Accept
NAT: Enabled
There are no security profiles applied to this rule.
I have created the following outbound policy;
Incoming Interface: LAN
Outgoing Interface: WAN1
Source: LG_PBX (this is defined as an address object using 6.0.1.150/32 )
Destination: All
Schedule: Always
Action: Accept
NAT: Enabled
There are no security profiles applied to the rule
I have ran the following commands on the CLI to disable the SIP ALG
Config system settings
Set sip-helper disable
Set sip-nat-trace disable
config system session-helper
show
delete 13 (SIP Entry)
config voip profile
edit default
config sip
set rtp disable
config system settings
set default-voip-alg-mode kernel-helper-based
Have rebooted several times but always have the issue outlined at the top. If I replace the Fortigate with a Draytek 2672 everything works fine.
I would welcome any help. I have put in a support ticket with Fortinet but haven't had any response for four days, so hoping for better luck on here.
kind regards
Phil
kind regards Phil
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Got same issue, did You find out solution?
Hey Phil M and Looki,
I don't have experience with this specific VoIP solution but here are some things you can try... These will take a while but they will eventually help solve your issue so get some coffee. :)
[ol]
With the debug logs you've captured, you should be able to learn more about what's happening on the 'Gate itself.
I know troubleshooting VoIP is a PITA and I'm sorry I don't have the immediate answer to fix this out of the box but hopefully this will put you on the right path.
Good luck!
Sean (Gr@ve_Rose)
Site: https://tcpdump101.com
Twitter: https://twitter.com/Grave_Rose
Reddit: https://reddit.com/r/tcpdump101
I would typically disable NAT on the WAN > LAN rule
Also, you may need to disable the VOIP profile whereas you only disabled rtp:
config voip profile edit default config sip
set status disable
Or, it's not always full disabling of SIP ALG that's required. There are occasions where you need to disable most of it, but leave the voip profile and rtp enabled.
I'm confused
Why did you disable the SIP ALG ? And how would expect the fortigate to work ?
Did you read the FTNT KB . https://kb.fortinet.com/kb/documentLink.do?externalID=FD36405
FWIW, I'm on FWE50E ( 6.0 ) and have the same setup ( but in reverse ) and with sip-alg enable
If you look at the SIP invite and media-port the rtp-stream is broken since the firewall has not open the dynamic pinhole that's is required for SIP.
Also double check if you SIP signaling is or not using std 5060 port.
Ken
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.