Introduction to SIP

Session Initiation Protocol (SIP) is transported over UDP and TCP. It is an Application Layer control protocol that creates, modifies, and terminates sessions with one or more participants. SIP is a peer-to-peer protocol.

SIP uses design elements similar to the HTTP request/response transaction model. SIP clients usually use TCP or UDP on port numbers 5060 or 5061 to connect to SIP servers and other SIP endpoints. Port 5060 is commonly used for non-encrypted signaling traffic, whereas port 5061 is typically used for traffic encrypted with Transport Layer Security (TLS).

To configure your environment with SIP in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on.:

For important information about SIP, refer to the other topics in this chapter and to sk95369.

Basic SIP Configuration

In a basic SIP configuration, a Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. sits between an Internal NetworkClosed Computers and resources protected by the Firewall and accessed by authenticated users. and an External Network, with or without a proxy.