cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
736
Views
0
Helpful
2
Replies

Strange intermittent video conferencing after implementing Palo Alto firewall

AHotovy
Level 1
Level 1

Hoping someone has some ideas for me as I've run out of my own.

We implemented our Palo Alto firewall at our HQ in May of this year. Ever since implementation we have been having very strange issues with our video conferences where connecting to a video conference can take multiple tries and will exhibit some of the following:

* Call connects, but there is no video and no audio

* Call connects and there is audio but no video
* Call rings multiple times and eventually disconnects

* Call rings once and immediately disconnects

* Call connects, audio and video work

It never works on the first try when connecting to outside endpoints, and sometimes it will take 4 or 5 tries to get a complete connection to an endpoint.

 

This seems to work perfectly fine with completely internal video conferencing that does not traverse the PA, so I'm sure I've configured something incorrectly but am at a loss as to what to do now.

 

Here's our devices:

Room1 (10.0.1.10) (Tandberg C40)

VCS-C (10.0.1.200) (X8.2)

VCS-E (10.0.1.20 and NAT Outside IP) (X7.2.2)

 

On the Palo I have the following policies:

NameSource ZoneSource AddressSource UserSource HIP ProfileDestination ZoneDestination AddressApplicationServiceAction
VCSExpresswayuntrustanyanyanyuntrustVCSExpressway-NATanyanyAllow
VCSExpressway-2trustanyanyanyDMZ;untrustVCSExpressway;VCSExpressway-NATanyanyAllow
VCSExpressway-1DMZVCSExpresswayanyanytrustanyanyanyAllow

 

As you can see based on the policies our entire setup is basically wide open at the moment with everything allowed both ways. I'd obviously like to not leave it this way, but we are still trying to figure out whats going on.

 

We never see any denies or dropped traffic for any leg of the conference, and for traffic there's no difference in logs I've been able to see.

 

Completely at a loss as to what could be going on. If any more information is needed let me know. Have yet to open either a TAC case or a case with PA.

1 Accepted Solution

Accepted Solutions

PJMack
Level 7
Level 7

My guess is your firewall has H.323 and/or SIP awareness turned on (aka H.323 or SIP inspection) These features can cause Expressway to fail, they need to be turned off. 

 

Here's one article I found on how to turn it off on a PA firewall - don't know if this will work for you, but it's likely this is your problem, so if this doesn't work I'd work with your PA guys to figure this out. 

 

https://knowledgebase-iframe.polycom.com/kb/viewContent.do;jsessionid=FE5FBDC44290BC2E6334856A122D4C73?externalId=29437

 

You can open a ticket with TAC, but based on your description this worked fine until you installed this firewall, it's likely not a Cisco problem, so TAC may or may not be able to help you. 

View solution in original post

2 Replies 2

PJMack
Level 7
Level 7

My guess is your firewall has H.323 and/or SIP awareness turned on (aka H.323 or SIP inspection) These features can cause Expressway to fail, they need to be turned off. 

 

Here's one article I found on how to turn it off on a PA firewall - don't know if this will work for you, but it's likely this is your problem, so if this doesn't work I'd work with your PA guys to figure this out. 

 

https://knowledgebase-iframe.polycom.com/kb/viewContent.do;jsessionid=FE5FBDC44290BC2E6334856A122D4C73?externalId=29437

 

You can open a ticket with TAC, but based on your description this worked fine until you installed this firewall, it's likely not a Cisco problem, so TAC may or may not be able to help you. 

This was actually the issue! I had already disabled ALG on SIP, but hadn't even considered inspection on the traffic maybe causing problems. Created an application override and like magic it's working perfectly again, no more weirdness!

 

Thanks for your help!