Common SIP VoIP configurations This section describes some common SIP VoIP configurations and simplified SIP dialogs for these configurations. This section also shows some examples of how adding a FortiGate affects SIP processing. Peer to peer configuration In the peer to peer configuration shown below, two SIP phones (in the example, FortiFones) communicate directly with […]
Inside FortiOS: Voice over IP (VoIP) protection The FortiOS SIP Application Layer Gateway (ALG) allows SIP calls to pass through a FortiGate by opening SIP and RTP pinholes and performing source and destination IP address and port translation for SIP and RTP packets. There are a large number of SIP-related Internet Engineering Task Force (IETF) […]
Introduction This FortiOS Handbook chapter contains detailed information about how FortiGates processes SIP VoIP calls and how to configure the FortiGate to apply security features to SIP calls. This document describes all FortiGate SIP configuration options and contains detailed configuration examples. Before you begin Before you begin to configure VoIP security profiles, including SIP, from […]
Troubleshooting and logging This section explains how to troubleshoot logging configuration issues, as well as connection issues, that you may have with your FortiGate unit and a log device. This section also contains information about how to use log messages when troubleshooting issues that are about other FortiGate features, such as VPN tunnel errors. Using […]
Advanced logging This section explains how to configure other log features within your existing log configuration. You may want to include other log features after initially configuring the log topology because the network has either outgrown the initial configuration, or you want to add additional features that will help your network’s logging requirements. The following […]
Latest status update discussing some video quality upgrades we will be getting soon etc.
A lot of people that have fairly strict policy sets end up having matchmaking issues with their gaming consoles when behind a FortiGate. I discuss two methods to resolving this issue. Videos are going to start discussing a lot more architecture driven topics to help ensure everyone is building the best network possible!
Logging and reporting for large networks This section explains how to configure the FortiGate unit for logging and reporting in a larger network, such as an enterprise network. To set up this type of network, you are modifying the default log settings, and you are also modifying the default report. The following procedures are examples […]