FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
mbanica
Staff
Staff
Article Id 192693
Description
In some network environments implementing policy routes for SIP traffic is needed.

A regular PBR would be configured as shown below:
config router policy
    edit 0
        set input-device "lan"
        set src "10.139.109.0/255.255.255.0"
        set dst "0.0.0.0/0.0.0.0"
        set gateway 10.253.10.110
        set output-device "wan1"

In FortiOS 5.2, all SIP and SCCP (Skinny) traffic is now processed by the SIP ALG by default.

SIP ALG replaces IP in SIP headers and SDP info.

Setting gateway in PBR for SIP traffic can trigger the SIP ALG to replace the destination with the gateway set in PBR and in such case the following output will be seen in the debug flow:

2016-04-01 15:32:29 id=20085 trace_id=2 func=print_pkt_detail line=4420 msg="vd-root received a packet(proto=17, 10.139.109.199 :3004->10.253.10.110:5060) from local. "   

Scope
All FortiGates.

Solution
Not to use gateway in PBR for SIP traffic (when asymroute is disabled).
show router policy
    edit 1
        set input-device "port1"
        set src "10.139.109.0/255.255.255.0"
        set dst "0.0.0.0/0.0.0.0"
        set output-device "port2"

Debug output will now show the real destination:

2016-04-01 15:48:39 id=20085 trace_id=303 func=print_pkt_detail line=4420 msg="vd-root received a packet(proto=17, 10.139.109.199:3007->10.137.90.211:5060) from local. "

Related Articles

SIP and SCCP Traffic is Handled by the VoIP ALG/Proxy by default in FortiOS 5.2

Contributors