<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SIP Traffic in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160920#M28404</link>
    <description>&lt;P&gt;The way I would approach this in the past was always run zdebug if issue was there. So say, just making this up, you have problem with ip 1.2.3.4 and port 5060, you can do something like this from expert mode -&amp;gt; fw ctl zdebug + drop | grep 1.2.3.4 | grep ":5060"&lt;/P&gt;
&lt;P&gt;That will most likely tell you where issue might be coming from. By the way, you do NOT need to config anything in IPS to bypass this, UNLESS there is clear proof that IPS is dropping it.&lt;/P&gt;
&lt;P&gt;Makes sense?&lt;/P&gt;</description>
    <pubDate>Tue, 01 Nov 2022 14:01:32 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2022-11-01T14:01:32Z</dc:date>
    <item>
      <title>SIP Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160900#M28400</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;&lt;P&gt;I'm fairly new to checkpoint and have got a request to allow the SIP traffic UDP/5060, TCP/5060 and TCP/5061. Firewalls running R81.10 and Take78.&lt;/P&gt;&lt;P&gt;Have gone through this article and it suggests opening the data port manually along with&amp;nbsp;sip_tls_not_inspected (if&amp;nbsp; sip_tls_authentication can't be used)&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_VoIP_AdminGuide/Topics-VOIPG/207831.htm?tocpath=Session%20Initiation%20Protocol%20(SIP)%7C_____2" target="_blank"&gt;SIP-Specific services (checkpoint.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I'd like to seek your help in understanding how checkpoint processes the SIP traffic as couple of posts suggest using without the protocol handler and exempt from the IPS inspection to avoid one-way call issue.&lt;/P&gt;&lt;P&gt;Is it mandatory to bypass the SIP traffic from both IPS and Inspection settings?&lt;BR /&gt;Will the checkpoint not automatically allow the dynamic connections?&lt;BR /&gt;If the protocol handler isn’t set, obviously the inspection will not do. If that’s the case, why do we need to config the IPS and inspection settings bypass the SIP traffic?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 10:36:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160900#M28400</guid>
      <dc:creator>SriNarasimha005</dc:creator>
      <dc:date>2022-11-01T10:36:27Z</dc:date>
    </item>
    <item>
      <title>Re: SIP Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160902#M28401</link>
      <description>&lt;P&gt;Whenever possible, use the pre-defined Services including protocol handler to be safe and sure by includong SIP in IPS and TP inspection. See also&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk95369&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;sk95369: ATRG: &lt;STRONG&gt;VoIP&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 10:43:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160902#M28401</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-11-01T10:43:24Z</dc:date>
    </item>
    <item>
      <title>Re: SIP Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160909#M28402</link>
      <description>&lt;P&gt;Those are indeed all very good questions! I recall even in old days of CP, it was tricky to make this work properly, you always had to make either IPS exceptions or change service protocol "mode". I would definitely follow link&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;provided and if you get stuck, open TAC case and get it fixed.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 12:00:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160909#M28402</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-01T12:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: SIP Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160917#M28403</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply. Can you please help me on this as I'm unable to figure this out based on the resources available.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If the protocol handler isn’t set, obviously the inspection will not do. If that’s the case, why do we need to config the IPS and inspection settings bypass the SIP traffic?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 13:57:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160917#M28403</guid>
      <dc:creator>SriNarasimha005</dc:creator>
      <dc:date>2022-11-01T13:57:26Z</dc:date>
    </item>
    <item>
      <title>Re: SIP Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160920#M28404</link>
      <description>&lt;P&gt;The way I would approach this in the past was always run zdebug if issue was there. So say, just making this up, you have problem with ip 1.2.3.4 and port 5060, you can do something like this from expert mode -&amp;gt; fw ctl zdebug + drop | grep 1.2.3.4 | grep ":5060"&lt;/P&gt;
&lt;P&gt;That will most likely tell you where issue might be coming from. By the way, you do NOT need to config anything in IPS to bypass this, UNLESS there is clear proof that IPS is dropping it.&lt;/P&gt;
&lt;P&gt;Makes sense?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 14:01:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160920#M28404</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-01T14:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: SIP Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160921#M28405</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks mate.&lt;/P&gt;&lt;P&gt;Final one, when you refer to "&lt;SPAN&gt;do NOT need to config anything in IPS to bypass this, UNLESS there is clear proof that IPS is dropping it"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Shall I assume that you're suggesting using&amp;nbsp;the pre-defined services (with protocol handler)?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 14:16:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160921#M28405</guid>
      <dc:creator>SriNarasimha005</dc:creator>
      <dc:date>2022-11-01T14:16:10Z</dc:date>
    </item>
    <item>
      <title>Re: SIP Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160923#M28407</link>
      <description>&lt;P&gt;Yes sir, good guess ; - ). technically, if you did below, it would bypass IPS.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18291i4F30C50A60C5ECFB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 14:22:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160923#M28407</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-01T14:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: SIP Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160996#M28426</link>
      <description>&lt;P&gt;The best and most secure is &lt;SPAN&gt;using&amp;nbsp;the pre-defined services (with protocol handler) - any bypass shall only be made if suggested by TAC!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 08:49:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/160996#M28426</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-11-02T08:49:11Z</dc:date>
    </item>
    <item>
      <title>Re: SIP Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/161023#M28457</link>
      <description>&lt;P&gt;Yes sir Gunther, very good point indeed!!&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 11:20:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SIP-Traffic/m-p/161023#M28457</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-02T11:20:56Z</dc:date>
    </item>
  </channel>
</rss>

