<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ZBFW &amp;quot;SIP Protocol Violations&amp;quot; in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252013#M858331</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They have added support for FTP EPRT and EPSV extensions in 15.2, wich were main reason for upgrade, so i don't want to rollback.&lt;/P&gt;&lt;P&gt;And i've tried workaround - doesnt work. Had to simply pass SIP and RTP.&lt;/P&gt;&lt;P&gt;Also, i've got same results on &lt;SPAN style="font-size: 10pt;"&gt;15.3(2)T IOS on 2911 router.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;SIP devices is all Cisco, VCS-Expressway on one side and Cisco E20 on another.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Oct 2013 03:56:32 GMT</pubDate>
    <dc:creator>Utair Corporation</dc:creator>
    <dc:date>2013-10-17T03:56:32Z</dc:date>
    <item>
      <title>ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1251998#M858304</link>
      <description>&lt;P&gt;We have a site that is experiencing SIP Protocol Violation errors from the Zone-Based Firewall Policy configuration. Here is a little bit of info about the site design and some logs desplaying this particular error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-remote site connected to central site via a vpn tunnel&lt;/P&gt;&lt;P&gt;-both routers(1841 &amp;amp; 2801) have a basic ZBFW config that is specifying SIP traffic as being permissible from one site to the other&lt;/P&gt;&lt;P&gt;-phones are Grandstream and SIP server is a Trixbox(we use CME and Cisco IP Phones for all of our builds; these two sites are for a small company that made a purely cost-driven decision about equipment)&lt;/P&gt;&lt;P&gt;-SIP server is 192.168.14.10 at central site&lt;/P&gt;&lt;P&gt;-Grandstream phones are 172.20.14.0/24 at remote site&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following are logged sessions from the router at the remote site(where phones are attempting to establish communication across vpn tunnel with SIP server):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)phone to server SIP traffic&lt;/P&gt;&lt;P&gt;a)Aug  4 11:16:19 207.201.235.14 67: NSA_remote: 000063: Aug  4 15:16:19.055 UTC: %FW-6-SESS_AUDIT_TRAIL_START: (target:class)-(InsideToCentral:outbound_sip_class):Start sip session: initiator (172.20.14.30:5060) -- responder (192.168.14.10:5060)&lt;/P&gt;&lt;P&gt;b)Aug  4 11:16:19 207.201.235.14 68: NSA_remote: 000064: Aug  4 15:16:19.135 UTC: %AIC-4-SIP_PROTOCOL_VIOLATION: SIP protocol violation (Forbidden header field found) -  dropping udp session 192.168.14.10:5060 172.20.14.30:5060 on zone-pair InsideToCentral class outbound_sip_class&lt;/P&gt;&lt;P&gt;c)Aug  4 11:16:19 207.201.235.14 69: NSA_remote: 000065: Aug  4 15:16:19.135 UTC: %FW-6-SESS_AUDIT_TRAIL: (target:class)-(InsideToCentral:outbound_sip_class):Stop sip session: initiator (172.20.14.30:5060) sent 585 bytes -- responder (192.168.14.10:5060) sent 0 bytes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2)server to phone SIP traffic:&lt;/P&gt;&lt;P&gt;a)Aug  4 11:16:19 207.201.235.14 70: NSA_remote: 000066: Aug  4 15:16:19.139 UTC: %FW-6-SESS_AUDIT_TRAIL_START: (target:class)-(CentralToInside:inbound_sip_class):Start sip session: initiator (192.168.14.10:5060) -- responder (172.20.14.30:5060)&lt;/P&gt;&lt;P&gt;b)Aug  4 11:16:19 207.201.235.14 71: NSA_remote: 000067: Aug  4 15:16:19.143 UTC: %AIC-4-SIP_PROTOCOL_VIOLATION: SIP protocol violation (Invalid Dialog) -  dropping udp session 192.168.14.10:5060 172.20.14.30:5060 on zone-pair CentralToInside class inbound_sip_class&lt;/P&gt;&lt;P&gt;c)Aug  4 11:16:20 207.201.235.14 72: NSA_remote: 000068: Aug  4 15:16:19.143 UTC: %FW-6-SESS_AUDIT_TRAIL: (target:class)-(CentralToInside:inbound_sip_class):Stop sip session: initiator (192.168.14.10:5060) sent 0 bytes -- responder (172.20.14.30:5060) sent 0 bytes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For each attempt, outbound sip traffic(from phone to server) flags the "Forbidden header field found" violation. And inbound sip traffic(server to phone) flags the "Invalid Dialog" traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have posted this over in the IP Telephony section of Netpro as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated. Thanks for your time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:02:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1251998#M858304</guid>
      <dc:creator>snetherland</dc:creator>
      <dc:date>2019-03-11T16:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1251999#M858305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What IOS version are you using?.Can you get the output "debug policy-firewall detailed" and "debug policy-firewall prot sip"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Aug 2009 02:09:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1251999#M858305</guid>
      <dc:creator>sadsiddi</dc:creator>
      <dc:date>2009-08-05T02:09:19Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252000#M858308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Absolutely I can! Thanks so much for responding. Both routers are running advanced IP services 12.4(24)T1. I should be able to provide you with that output in the morning. I also do currently have packet captures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Aug 2009 02:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252000#M858308</guid>
      <dc:creator>snetherland</dc:creator>
      <dc:date>2009-08-05T02:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252001#M858310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls post the debugs and packet capture as well, both taken at the same time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Aug 2009 02:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252001#M858310</guid>
      <dc:creator>sadsiddi</dc:creator>
      <dc:date>2009-08-05T02:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252002#M858312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sadsiddi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so much for your help. I appologize it took me a little time to get back with you. I have the "debug policy-firewall protocol sip" output attached, as well as some brief packet-captures from around the same time. I'm going to set this up in a lab to gain more information shortly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your assistance, and please feel free to make any recommendations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Aug 2009 22:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252002#M858312</guid>
      <dc:creator>snetherland</dc:creator>
      <dc:date>2009-08-10T22:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252003#M858313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the pcap, i see all REGISTER messages. I dont see 100 Trying messages. i believe the pcap was captured when firewall is in place which dropped the non-RFC compliant 100 Trying messages. From the debugs i infer that, the 100 Trying message had "CONTACT" and "REPLY-TO" headers which as per RFC 3261 should not be present. You need to check your SIP gateway why is that sending non-RFC 100 messages. On IOS Firewall, you can skip this strict RFC-3261 check by having the follwoing config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Class-map type inspect sip class-sip&lt;/P&gt;&lt;P&gt;Match protocol-violation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy-map type inspect sip policy-sip&lt;/P&gt;&lt;P&gt;Class type inspect sip class-sip&lt;/P&gt;&lt;P&gt;Allow&lt;/P&gt;&lt;P&gt;Log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any cmap&lt;/P&gt;&lt;P&gt;match protocol sip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect pmap&lt;/P&gt;&lt;P&gt;class type inspect cmap&lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;service-policy sip policy-sip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Aug 2009 16:41:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252003#M858313</guid>
      <dc:creator>sadsiddi</dc:creator>
      <dc:date>2009-08-11T16:41:10Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252004#M858315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sadsiddi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so much for your response. We are investigating the strange non-RFC headers you mentioned in your post. We did make adjustments to our current firewall config and are now able to make calls from the phones. Thank you very much for your assistance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I actually ran a few more debugs and tried to get concurrent packet captures. I am posting some output from our most recent testing after making the modifications to our ZBFW config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am still seeing quite a few dropped packets, but again I want to stress that right now we are very happy that we're just able to make calls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We appreciate all of your help, and please feel free to make any recommendations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Aug 2009 23:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252004#M858315</guid>
      <dc:creator>snetherland</dc:creator>
      <dc:date>2009-08-12T23:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252005#M858318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've the same problem but how I can configure to skip the SIP check on the "&lt;/P&gt;&lt;P&gt;policy-map type inspect policy-trust-untrust" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I try to attach the child policy the IOS tell me the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CISCO2811-VR-IT(config)#policy-map type inspect policy-trust-untrust&lt;/P&gt;&lt;P&gt;CISCO2811-VR-IT(config-pmap)#class type inspect class-trust-untrust&lt;/P&gt;&lt;P&gt;CISCO2811-VR-IT(config-pmap-c)#service-policy sip policy-sip &lt;/P&gt;&lt;P&gt; Deep packet inspection action of the configured type not applicable to protocol "ftp" in class "class-trust-untrust". Please remove the protocol and try.&lt;/P&gt;&lt;P&gt; Unable to attach child policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please can you help me in a configuration like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect sip match-any class-sip&lt;/P&gt;&lt;P&gt; description ** SIP PROTOCOL&lt;/P&gt;&lt;P&gt; match  protocol-violation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any class-untrust-trust&lt;/P&gt;&lt;P&gt; description ** INTERNET TO INSIDE&lt;/P&gt;&lt;P&gt; match protocol telnet&lt;/P&gt;&lt;P&gt; match protocol ssh&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any class-trust-untrust&lt;/P&gt;&lt;P&gt; description ** INSIDE TO INTERNET&lt;/P&gt;&lt;P&gt; match protocol sip&lt;/P&gt;&lt;P&gt; match protocol ftp&lt;/P&gt;&lt;P&gt; match protocol ftps&lt;/P&gt;&lt;P&gt; match protocol sip-tls&lt;/P&gt;&lt;P&gt; match protocol pptp&lt;/P&gt;&lt;P&gt; match protocol tftp&lt;/P&gt;&lt;P&gt; match protocol stun&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt;!         &lt;/P&gt;&lt;P&gt;!         &lt;/P&gt;&lt;P&gt;policy-map type inspect policy-untrust-trust&lt;/P&gt;&lt;P&gt; class type inspect class-untrust-trust&lt;/P&gt;&lt;P&gt;  inspect &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;  drop log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect policy-trust-untrust&lt;/P&gt;&lt;P&gt; class type inspect class-trust-untrust&lt;/P&gt;&lt;P&gt;  inspect &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;  drop log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect sip policy-sip&lt;/P&gt;&lt;P&gt; class type inspect sip class-sip&lt;/P&gt;&lt;P&gt;  allow   &lt;/P&gt;&lt;P&gt;  log     &lt;/P&gt;&lt;P&gt;!         &lt;/P&gt;&lt;P&gt;zone security trust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone security untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security trust-untrust source trust destination untrust&lt;/P&gt;&lt;P&gt; service-policy type inspect policy-trust-untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security untrust-trust source untrust destination trust&lt;/P&gt;&lt;P&gt; service-policy type inspect policy-untrust-trust&lt;/P&gt;&lt;P&gt;!         &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Sep 2009 11:58:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252005#M858318</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2009-09-11T11:58:01Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252006#M858320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please can you check the following configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've try to configure to skip the SIP protocol violation but the IOS drop:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect sip match-any class-sip&lt;/P&gt;&lt;P&gt; description ** SIP PROTOCOL&lt;/P&gt;&lt;P&gt; match  protocol-violation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any class-sip-trust-untrust&lt;/P&gt;&lt;P&gt; match protocol sip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any class-untrust-trust&lt;/P&gt;&lt;P&gt; description ** INTERNET TO INSIDE&lt;/P&gt;&lt;P&gt; match protocol telnet&lt;/P&gt;&lt;P&gt; match protocol ssh&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any class-trust-untrust&lt;/P&gt;&lt;P&gt; description ** INSIDE TO INTERNET&lt;/P&gt;&lt;P&gt; match protocol sip&lt;/P&gt;&lt;P&gt; match protocol ftp&lt;/P&gt;&lt;P&gt; match protocol ftps&lt;/P&gt;&lt;P&gt; match protocol sip-tls&lt;/P&gt;&lt;P&gt; match protocol pptp&lt;/P&gt;&lt;P&gt; match protocol tftp&lt;/P&gt;&lt;P&gt; match protocol stun&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect policy-untrust-trust&lt;/P&gt;&lt;P&gt; class type inspect class-untrust-trust&lt;/P&gt;&lt;P&gt;  inspect &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;  drop log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect sip policy-sip&lt;/P&gt;&lt;P&gt; class type inspect sip class-sip&lt;/P&gt;&lt;P&gt;  allow&lt;/P&gt;&lt;P&gt;  log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect policy-trust-untrust&lt;/P&gt;&lt;P&gt; class type inspect class-sip-trust-untrust&lt;/P&gt;&lt;P&gt;  inspect &lt;/P&gt;&lt;P&gt;  service-policy sip policy-sip&lt;/P&gt;&lt;P&gt; class type inspect class-trust-untrust&lt;/P&gt;&lt;P&gt;  inspect &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;  drop log&lt;/P&gt;&lt;P&gt;!         &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone security trust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone security untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security trust-untrust source trust destination untrust&lt;/P&gt;&lt;P&gt; service-policy type inspect policy-trust-untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security untrust-trust source untrust destination trust&lt;/P&gt;&lt;P&gt; service-policy type inspect policy-untrust-trust&lt;/P&gt;&lt;P&gt;!         &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CISCO2811-VR-IT#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;015590: Sep 11 15:32:22.932 CET: CCE: CBAC SIP: Multiple VIA Headers found&lt;/P&gt;&lt;P&gt;015591: Sep 11 15:32:22.932 CET: CCE: sip_fetch_record_route_addr&lt;/P&gt;&lt;P&gt;015592: Sep 11 15:32:22.932 CET: CCE: sip_fetch_sip_URI&lt;/P&gt;&lt;P&gt;015593: Sep 11 15:32:22.932 CET: CCE: sip_fetch_sip_URI&lt;/P&gt;&lt;P&gt;015594: Sep 11 15:32:22.932 CET: CCE: sip_fetch_to_addr&lt;/P&gt;&lt;P&gt;015595: Sep 11 15:32:22.932 CET: CCE: sip_fetch_sip_URI&lt;/P&gt;&lt;P&gt;015596: Sep 11 15:32:22.932 CET: CCE: sip_fetch_from_addr&lt;/P&gt;&lt;P&gt;015597: Sep 11 15:32:22.932 CET: CCE: sip_fetch_sip_URI&lt;/P&gt;&lt;P&gt;015598: Sep 11 15:32:22.932 CET: CCE: sip_fetch_cseq&lt;/P&gt;&lt;P&gt;015599: Sep 11 15:32:22.932 CET: CCE: sip_fetch_seq_no&lt;/P&gt;&lt;P&gt;015600: Sep 11 15:32:22.932 CET: CCE: SIP: Err: protocol-voilation checking: Message 180 is not permitted in state Transaction Init&lt;/P&gt;&lt;P&gt;015601: Sep 11 15:32:22.932 CET: FIREWALL sis 4A6100C0: *** protocol error found ***&lt;/P&gt;&lt;P&gt;015602: Sep 11 15:32:22.932 CET: %AIC-4-SIP_PROTOCOL_VIOLATION: SIP protocol violation (Invalid Transaction) -  dropping udp session 192.168.1.55:58140 83.211.227.21:5060 on zone-pair trust-untrust class class-sip-trust-untrust&lt;/P&gt;&lt;P&gt;015603: Sep 11 15:32:22.932 CET: FIREWALL: Pregen without any dialog&lt;/P&gt;&lt;P&gt;015604: Sep 11 15:32:22.936 CET: FIREWALL: Pregen without any dialog&lt;/P&gt;&lt;P&gt;015605: Sep 11 15:32:22.936 CET: FIREWALL sis 4A6100C0: Sis extension deleted&lt;/P&gt;&lt;P&gt;015606: Sep 11 15:32:22.936 CET: CCE: I2R = 1, source = 192.168.1.55:58140, dest = 83.211.227.21:5060, state_object = 0x0, data_len = 4&lt;/P&gt;&lt;P&gt;015607: Sep 11 15:32:22.936 CET: CCE: SIP: Err: Response Invalid&lt;/P&gt;&lt;P&gt;015608: Sep 11 15:32:22.936 CET: FIREWALL sis 4A6100C0: *** protocol error found ***&lt;/P&gt;&lt;P&gt;015609: Sep 11 15:32:22.936 CET: FIREWALL sis 4A6100C0: Sis extension deleted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;015653: Sep 11 15:43:22.948 CET: %AIC-4-SIP_PROTOCOL_VIOLATION: SIP protocol violation (Invalid Transaction) -  dropping udp session 192.168.1.55:58140 83.211.227.21:5060 on zone-pair trust-untrust class class-sip-trust-untrust&lt;/P&gt;&lt;P&gt;015654: Sep 11 15:44:22.952 CET: %AIC-4-SIP_PROTOCOL_VIOLATION: SIP protocol violation (Invalid Transaction) -  dropping udp session 192.168.1.55:58140 83.211.227.21:5060 on zone-pair trust-untrust class class-sip-trust-untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Sep 2009 12:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252006#M858320</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2009-09-11T12:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252007#M858321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you still face the issue?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Sep 2009 08:04:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252007#M858321</guid>
      <dc:creator>sadsiddi</dc:creator>
      <dc:date>2009-09-18T08:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252008#M858323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the problems with SIP phones persist !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)- How can I disable the SIP protocol inspection (but leave SIP ALG active) ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2)- FYI: WITH A cisco PIX/ASA version 7.x the IP SIP phone works perfectly/correctly !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) how I can configure the IOS to log (by syslog) every sessions created/dopped/... by the IOS zone firewall ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've configured the following but the firewall ONLY log the dropped packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;ip inspect audit-trail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) "Please can you confirm me that the IOS ZONE based firewall is configured correctly: the inside lan need to connect to an external SIP gateway.&lt;/P&gt;&lt;P&gt;I've tried to configure the firewall to "bypass" the SIP check (but still use the SIP ALG) but still not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;ip inspect audit-trail&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect sip match-any class-sip&lt;/P&gt;&lt;P&gt;  description ** SIP PROTOCOL&lt;/P&gt;&lt;P&gt;  match  protocol-violation&lt;/P&gt;&lt;P&gt;class-map type inspect match-any class-sip-trust-untrust&lt;/P&gt;&lt;P&gt;  match protocol sip&lt;/P&gt;&lt;P&gt;class-map type inspect match-any class-untrust-trust&lt;/P&gt;&lt;P&gt;  description ** INTERNET TO INSIDE&lt;/P&gt;&lt;P&gt;  match protocol telnet&lt;/P&gt;&lt;P&gt;  match protocol ssh&lt;/P&gt;&lt;P&gt;  match protocol icmp&lt;/P&gt;&lt;P&gt;class-map type inspect match-any class-trust-untrust&lt;/P&gt;&lt;P&gt;  description ** INSIDE TO INTERNET&lt;/P&gt;&lt;P&gt;  match protocol sip&lt;/P&gt;&lt;P&gt;  match protocol ftp&lt;/P&gt;&lt;P&gt;  match protocol ftps&lt;/P&gt;&lt;P&gt;  match protocol sip-tls&lt;/P&gt;&lt;P&gt;  match protocol pptp&lt;/P&gt;&lt;P&gt;  match protocol tftp&lt;/P&gt;&lt;P&gt;  match protocol stun&lt;/P&gt;&lt;P&gt;  match protocol tcp&lt;/P&gt;&lt;P&gt;  match protocol udp&lt;/P&gt;&lt;P&gt;  match protocol icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect policy-untrust-trust&lt;/P&gt;&lt;P&gt; class type inspect class-untrust-trust&lt;/P&gt;&lt;P&gt;  inspect &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;  drop log&lt;/P&gt;&lt;P&gt;policy-map type inspect sip policy-sip&lt;/P&gt;&lt;P&gt; class type inspect sip class-sip&lt;/P&gt;&lt;P&gt;  allow&lt;/P&gt;&lt;P&gt;  log&lt;/P&gt;&lt;P&gt;policy-map type inspect policy-trust-untrust&lt;/P&gt;&lt;P&gt; class type inspect class-sip-trust-untrust&lt;/P&gt;&lt;P&gt;  inspect &lt;/P&gt;&lt;P&gt;  service-policy sip policy-sip&lt;/P&gt;&lt;P&gt; class type inspect class-trust-untrust&lt;/P&gt;&lt;P&gt;  inspect &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;  drop log&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security trust&lt;/P&gt;&lt;P&gt;zone security untrust&lt;/P&gt;&lt;P&gt;zone-pair security trust-untrust source trust destination untrust&lt;/P&gt;&lt;P&gt; service-policy type inspect policy-trust-untrust&lt;/P&gt;&lt;P&gt;zone-pair security untrust-trust source untrust destination trust&lt;/P&gt;&lt;P&gt; service-policy type inspect policy-untrust-trust&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; description ** INSIDE LAN&lt;/P&gt;&lt;P&gt; ip address 192.168.1.199 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; zone-member security trust&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1452&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface ATM0/0/0&lt;/P&gt;&lt;P&gt; description *** connected to INTERNET&lt;/P&gt;&lt;P&gt; bandwidth 24000&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip nbar protocol-discovery&lt;/P&gt;&lt;P&gt; ip flow ingress&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; load-interval 30&lt;/P&gt;&lt;P&gt; no atm ilmi-keepalive&lt;/P&gt;&lt;P&gt; pvc tiscali 8/35 &lt;/P&gt;&lt;P&gt;  encapsulation aal5mux ppp dialer&lt;/P&gt;&lt;P&gt;  dialer pool-member 1&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dialer0&lt;/P&gt;&lt;P&gt; description *** connected to INTERNET&lt;/P&gt;&lt;P&gt; ip address negotiated&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip flow ingress&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; zone-member security untrust&lt;/P&gt;&lt;P&gt; encapsulation ppp&lt;/P&gt;&lt;P&gt; load-interval 30&lt;/P&gt;&lt;P&gt; dialer pool 1&lt;/P&gt;&lt;P&gt; dialer-group 1&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt; ppp authentication chap callin&lt;/P&gt;&lt;P&gt; ppp chap hostname xxxxxxxxxxxxxxxxx@xxxxxxxxxx&lt;/P&gt;&lt;P&gt; ppp chap password xxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt; ppp ipcp dns request&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CISCO2811-VR-IT#sh ver&lt;/P&gt;&lt;P&gt;Cisco IOS Software, 2800 Software (C2800NM-ADVENTERPRISEK9-M), Version 12.4(24)T, RELEASE SOFTWARE (fc1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you need anything else (the debug packets) ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THANKS for your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Sep 2009 08:12:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252008#M858323</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2009-09-18T08:12:35Z</dc:date>
    </item>
    <item>
      <title>ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252009#M858325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this problem solved?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm running 891 with adv. ip services and have same problem. IOS from c890-universalk9-mz.152-2.T&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, sip are broken on some sip-gateways, programmers of remote gateways know about it and not going to do anything with it, thats not a question, and we have to live with it. Question is how to turn off "%AIC-4-SIP_PROTOCOL_VIOLATION: SIP protocol violation (Invalid Transaction) -&amp;nbsp; dropping udp session". Looks like allowing protocol-violation not working or i'm doing something wrong. Here is config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect sip match-any class-sip&lt;/P&gt;&lt;P&gt; match&amp;nbsp; protocol-violation&lt;/P&gt;&lt;P&gt;policy-map type inspect sip policy-sip&lt;/P&gt;&lt;P&gt; class type inspect sip class-sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; allow&lt;/P&gt;&lt;P&gt;&amp;nbsp; log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any sip&lt;/P&gt;&lt;P&gt;match protocol sip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect voice-internet&lt;/P&gt;&lt;P&gt; class type inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; service-policy sip policy-sip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Log:&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;CCE: SIP: Err: protocol-voilation checking: Message 200 is not permitted in state Transaction Init&lt;/P&gt;&lt;P&gt;FIREWALL sis 89443BA0: *** protocol error found ***&lt;/P&gt;&lt;P&gt; %AIC-4-SIP_PROTOCOL_VIOLATION: SIP protocol violation (Invalid Transaction) -&amp;nbsp; dropping udp session x.x.x.x:5060 y.y.y.y:5060 on zone-pair data-internet class sip&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It migth be message 180, or whatever message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"policy-map type inspect sip policy-sip" just not allowing, but it logging (3rd line in log).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2012 13:07:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252009#M858325</guid>
      <dc:creator>RosInterBank</dc:creator>
      <dc:date>2012-07-24T13:07:23Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252010#M858328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to keep this thread going...the problem still exists with 15.2(4)M3. I had to downgrade to 15.1(4)M6 to fix the problem on a 7206VXR router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jun 2013 09:00:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252010#M858328</guid>
      <dc:creator>Richard H. Shores</dc:creator>
      <dc:date>2013-06-27T09:00:29Z</dc:date>
    </item>
    <item>
      <title>ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252011#M858329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just stumbled upon &lt;SPAN style="font-size: 10pt;"&gt;AIC-4-SIP_PROTOCOL_VIOLATION in 15.2(4)M5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Any way for workaround? L7 inspection is needed for dynamic RTP pass.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 10:20:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252011#M858329</guid>
      <dc:creator>Utair Corporation</dc:creator>
      <dc:date>2013-10-16T10:20:40Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252012#M858330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To Utair Corporation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like the bug is in all 15.2M releases per&lt;/P&gt;&lt;P&gt;Bug &lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCui66278" rel="nofollow" target="_blank"&gt;CSCui66278&lt;/A&gt; ZBF: SIP inspection drops legitimate packets as protocol violation&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/bugsearch/bug/" rel="nofollow"&gt;https://tools.cisco.com/bugsearch/bug/&lt;/A&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCui66278" rel="nofollow" target="_blank"&gt;CSCui66278&lt;/A&gt;/?referring_site=ss&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is fixed in 15.3 and 15.4 IOS releases, which is only available for the latest Cisco router products. Check the bug info, as it has a workaround, but it may affect your L7 inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I posted above back in June 2013, the problem went away for me with 15.1(4)M6. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 11:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252012#M858330</guid>
      <dc:creator>Richard H. Shores</dc:creator>
      <dc:date>2013-10-16T11:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252013#M858331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They have added support for FTP EPRT and EPSV extensions in 15.2, wich were main reason for upgrade, so i don't want to rollback.&lt;/P&gt;&lt;P&gt;And i've tried workaround - doesnt work. Had to simply pass SIP and RTP.&lt;/P&gt;&lt;P&gt;Also, i've got same results on &lt;SPAN style="font-size: 10pt;"&gt;15.3(2)T IOS on 2911 router.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;SIP devices is all Cisco, VCS-Expressway on one side and Cisco E20 on another.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Oct 2013 03:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252013#M858331</guid>
      <dc:creator>Utair Corporation</dc:creator>
      <dc:date>2013-10-17T03:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: ZBFW "SIP Protocol Violations"</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252014#M858332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would call TAC and get them involved. It sucks when there are new features introduced in IOS and there are bugs from the start.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck to you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2013 00:18:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-quot-sip-protocol-violations-quot/m-p/1252014#M858332</guid>
      <dc:creator>Richard H. Shores</dc:creator>
      <dc:date>2013-10-18T00:18:19Z</dc:date>
    </item>
  </channel>
</rss>

