<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NO Inspect SIP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/no-inspect-sip/m-p/3414362#M951139</link>
    <description>&lt;P&gt;when you turn SIP inspection off, you essentially pass on SIP traffic (most likely based on udp/5060 and 61 or tcp).&amp;nbsp; &amp;nbsp;the ASA will then not "intelligently" inspect SIP protocol headers and dynamically open up RTP ports based on the inspection.&amp;nbsp; SIP inspection can be a bit of a double edged sword. sometimes it creates problems, sometimes it fixes them&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Jul 2018 23:33:22 GMT</pubDate>
    <dc:creator>Dennis Mink</dc:creator>
    <dc:date>2018-07-11T23:33:22Z</dc:date>
    <item>
      <title>NO Inspect SIP</title>
      <link>https://community.cisco.com/t5/network-security/no-inspect-sip/m-p/3414116#M951138</link>
      <description>&lt;P&gt;Hi Guys&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ran into an issue today with our VOIP service provider, calls were not coming through, a quick call to the service provider suggested to turn of SIP inspection, and yep it works.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question is if SIP is not being inspected and we have no ACL how does this work?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-inspect-sip/m-p/3414116#M951138</guid>
      <dc:creator>S.mooney12</dc:creator>
      <dc:date>2020-02-21T15:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: NO Inspect SIP</title>
      <link>https://community.cisco.com/t5/network-security/no-inspect-sip/m-p/3414362#M951139</link>
      <description>&lt;P&gt;when you turn SIP inspection off, you essentially pass on SIP traffic (most likely based on udp/5060 and 61 or tcp).&amp;nbsp; &amp;nbsp;the ASA will then not "intelligently" inspect SIP protocol headers and dynamically open up RTP ports based on the inspection.&amp;nbsp; SIP inspection can be a bit of a double edged sword. sometimes it creates problems, sometimes it fixes them&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 23:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-inspect-sip/m-p/3414362#M951139</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-07-11T23:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: NO Inspect SIP</title>
      <link>https://community.cisco.com/t5/network-security/no-inspect-sip/m-p/4478444#M1084157</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/322101"&gt;@Dennis Mink&lt;/a&gt;&amp;nbsp;we recently had a very similar issue. &amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the setup:&lt;/P&gt;&lt;P&gt;We have a global deny policy - no ACL, no pass.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We did not have ACLs allowing traffic to flow through a firewall to our CUBEs.&lt;/P&gt;&lt;P&gt;SIP inspection was ON.&lt;/P&gt;&lt;P&gt;Calls are flowing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Change to inspection policy - do not match (inspect) for &lt;EM&gt;&lt;STRONG&gt;a single IP.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;We apply policy and no new RTP is set up, resulting in calls coming through with no audio.&lt;/P&gt;&lt;P&gt;We quickly put ACLs in place to allow our SIP endpoints (Soft Phones) a path to the CUBEs.&lt;/P&gt;&lt;P&gt;Calls start flowing.&lt;/P&gt;&lt;P&gt;Inspection policy is still in place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We open a TAC case and the agent says it should have never worked without ACLs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm a little confused. &amp;nbsp;Should the inspection policy dynamically create pathways for SIP traffic or is an ACL required? &amp;nbsp;it seems to be as of right now, at least, but the doesn't explain the last few years. &amp;nbsp;Of note - this is the first time we've touched the inspection policy in our tenure here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Oct 2021 19:06:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-inspect-sip/m-p/4478444#M1084157</guid>
      <dc:creator>David_Mason</dc:creator>
      <dc:date>2021-10-01T19:06:13Z</dc:date>
    </item>
  </channel>
</rss>

