The Palo Alto Networks firewall uses the Session
Initiation Protocol (SIP) application-level gateway (ALG) to open
dynamic pinholes in the firewall where NAT is enabled. However,
some applications—such as VoIP—have NAT intelligence embedded in
the client application. In these cases, the SIP ALG on the firewall can
interfere with the signaling sessions and cause the client application
to stop working.
One solution to this problem is to define
an Application Override Policy for SIP, but using this approach disables
the App-ID and threat detection functionality. A better approach
is to disable the SIP ALG, which does not disable App-ID or threat
detection.
You can disable only the following App-IDs: sccp, sip,
teredo, and unistim.
The following procedure describes how to disable
the SIP ALG.