ALG Disable
Table of Contents
Expand all | Collapse all
-
-
- Add a Branch
- Add a Data Center
- Add a Branch Gateway
- Configure Circuits
- Configure Internet Circuit Underlay Link Aggregation
- Configure Private WAN Underlay Link Quality Aggregation
- Configure Circuit Categories
- Configure Device Initiated Connections for Circuits
- Add Public IP LAN Address to Enterprise Prefixes
- Manage Data Center Clusters
- Configure a Site Prefix
- Configure a DHCP Server
- Configure NTP for Prisma SD-WAN
- Configure the ION Device at a Branch Site
- Configure the ION Device at a Data Center
- Switch a Site to Control Mode
- Allow IP Addresses in Firewall Configuration
-
- Configure a Controller Port
- Configure Internet Ports
- Configure WAN/LAN Ports
- Configure a Loopback Interface
- Configure a PoE Port
- Configure and Monitor LLDP Activity and Status
- Configure a PPPoE Interface
- Configure a Layer 3 LAN Interface
- Configure Application Reachability Probes
- Configure a Secondary IP Address
- Configure a Static ARP
- Configure a DHCP Relay
- Configure IP Directed Broadcast
- VPN Keep-Alives
-
- Configure Prisma SD-WAN IPFIX
- Configure IPFIX Profiles and Templates
- Configure and Attach a Collector Context to a Device Interface in IPFIX
- Configure and Attach a Filter Context to a Device Interface in IPFIX
- Configure Global and Local IPFIX Prefixes
- Flow Information Elements
- Options Information Elements
- Configure the DNS Service on the Prisma SD-WAN Interface
- Configure SNMP
-
-
- Prisma SD-WAN Branch Routing
- Prisma SD-WAN Data Center Routing
-
- Configure Multicast
- Create a WAN Multicast Configuration Profile
- Assign WAN Multicast Configuration Profiles to Branch Sites
- Configure a Multicast Source at a Branch Site
- Configure Global Multicast Parameters
- Configure a Multicast Static Rendezvous Point (RP)
- Learn Rendezvous Points (RPs) Dynamically
- View LAN Statistics for Multicast
- View WAN Statistics for Multicast
- View IGMP Membership
- View the Multicast Route Table
- View Multicast Flow Statistics
- View Routing Statistics
- Prisma SD-WAN Incident Policies
-
- Prisma SD-WAN Branch HA Key Concepts
- Configure Branch HA
- Configure HA Groups
- Add ION Devices to HA Groups
- View Device Configuration of HA Groups
- Edit HA Groups and Group Membership
-
- Configure Branch HA with Gen-1 Platforms (2000, 3000, 7000, and 9000)
- Configure Branch HA with Gen-2 Platforms (3200, 5200, and 9200)
- Configure Branch HA with Gen-2 Embedded Switch Platforms (1200-S or 3200-L2)
- Configure Branch HA for Devices with Software Cellular Bypass (1200-S-C-5G)
- Configure Branch HA for Platforms without Bypass Pairs
- Configure Branch HA in a Hybrid Topology with Gen-1 (3000) and Gen-2 (3200) Platforms
- Prisma SD-WAN Incidents and Alerts
ALG Disable
Learn more about the Prisma SD-WAN alg disbale NAT use
case.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Prisma SD-WAN application fabric is a
critical enabler of this transition by emphasizing Voice & Video
quality reporting and SLA assurance. As the consumption of these
services has changed, it has driven new demands of the network.
Specifically, many UCaaS systems require that network solution providers
disable the SIP ALG (Application Layer Gateway) for any traffic
that crosses a NAT boundary destined for a SIP provider.
In this example, a phone is configured at the
branch to communicate with a UCaaS system on the internet via SIP
(Session Initiation Protocol), a standard protocol used by collaboration
endpoints to register with the intended control system. The SIP
traffic (via Path Policy) configures to be placed directly onto
any available internet link. As such, it uses the default NAT policy.
The UCaaS provider has also specified that any SIP ALG must be disabled.
Disabling the SIP ALG prevents issues from occurring that may affect
phone registration and 1-way audio.
Fields | Description |
---|---|
1 | A new SIP registration source from Phone
1 with a source address of 10.10.20.20 and a destination address
of 80.80.80.80. |
2 | A packet arrives at the ION device's LAN
interface. Perform a policy lookup and the traffic on the internet
segment. |
3 | Place the packet onto the internet segment;
the Default-NATPolicySet it matches against the Default-InternetRule. This
rule contains the following configuration:
In this rule, the NAT
Pool is blank by default, and the system uses the IP Address bound
to the internet interface. Apply the packet's policy;
the source address of 10.10.10.10 overwrites by the address bound
to the Internet Interface (50.50.50.1), and it might change the
source port to a random port during this operation. In
this example the original packet: (s) 10.10.20.20:12345: (d) 80.80.80.80:5060.
Is rewritten to: (s) 50.50.50.1:54321: (d) 80.80.80.80:5060. |
4 | In addition to the default NAT policy, the
traffic also matches the recently created rule to disable the SIP
ALG.
|
5 | Traffic arrives at the SIP server directly
on the internet. |
6 | Send the return traffic to the destination
of 50.50.50.1:54321. A translation table check is performed on the
flow to ensure that there is an active connection. |
7 | Establish the traffic onto the LAN segment;
the destination IP address is rewritten from 50.50.50.1:54321 to
10.10.20.20:12345. To clone the Default-NATPolicySet,
add the appropriate policy settings and apply this newly created
set to the intended target site(s).When required to change ALG behavior,
it is best practice to create a new Policy Set Stack. Once created,
add the Default-NATPolicySet to the stack, then create a new NAT
Set with a rule that disables ALG. Bind the new NAT Set to the new
NAT Stack. |