Had a customer with DECTR4 at a few different sites using a H323 trunk to CM. Don't know why, but it uses port 5120. The Checkpoint firewall downloads its automagic hotfixes from the internet last night and today decided that plain unencrypted h323 trunk traffic on port 5120 was actually old SSLv3 that must be blocked and stopped.
I'm more curious than anything... Has anyone ever seen a firewall update itself and get new definitions/signatures of naughty stuff for deep packet inspection and just had it arbitrarily knock out VOIP?
I'm more curious than anything... Has anyone ever seen a firewall update itself and get new definitions/signatures of naughty stuff for deep packet inspection and just had it arbitrarily knock out VOIP?