Sophos XG / Sophos Firewall VoIP Configuration Guide for Cloud PBX

Sophos-XG-Sophos-Firewall-VoIP-Configuration-Guide-for-Cloud-PBX Title Card in Viirtue Branding
If you’re running a Sophos Firewall in front of a hosted VoIP platform and dealing with dropped calls, one-way audio, or choppy conversations, the issue is often firewall behavior, not your provider. This guide walks MSPs and IT admins through a proven Sophos Firewall baseline that stabilizes SIP, RTP, UDP timeouts, DoS protection, and QoS for cloud voice. You’ll learn how to properly handle the Sophos SIP module, adjust UDP timeout stream settings, and prevent security features from disrupting legitimate VoIP traffic. Whether you’re tuning an active deployment or planning a migration from legacy XG hardware, this step-by-step breakdown helps you eliminate mystery VoIP issues and build a repeatable, support-friendly configuration.

If you have a Sophos XG or Sophos Firewall in front of a hosted VoIP platform like Viirtue, the most common “mystery issues” are not actually provider problems. They’re usually one of these:

  • SIP helper behavior (Sophos “SIP module”) interfering with NAT traversal

  • UDP session timeouts that are too short for real-world VoIP

  • DoS/IPS protections dropping high-rate UDP voice streams

  • QoS is not applied correctly, so voice competes with bulk traffic

This post is written for MSPs, IT admins, and VoIP resellers who want a repeatable Sophos baseline that works well with cloud VoIP.

Quick note: All Sophos XG Series hardware appliances reached end-of-life/end-of-support after March 31, 2025. If you’re still deploying XG hardware, you should plan a migration to XGS.

What breaks VoIP behind Sophos firewalls

Baseline call quality targets

Before making any changes, confirm that the network can actually support real-time voice. Standard voice guidance commonly targets:

If your WAN is already exceeding these thresholds during peak usage, firewall tuning will help, but QoS and bandwidth planning become mandatory.

Common symptoms and what they usually mean

Why Sophos is “special” for SIP

Sophos includes a SIP helper called the SIP module. It is on by default, uses UDP 5060, performs NAT translation that updates SIP headers, and dynamically opens voice channels.

That sounds helpful, but it can be counterproductive for many cloud VoIP deployments, especially when:

  • Your provider expects endpoints to handle NAT keepalives

  • You are using SIP over TCP/TLS

  • The helper makes assumptions that don’t match your provider’s SBC behavior

Also important: Sophos notes that the SIP helper doesn’t support SIP/SDP messages spanning more than one packet (which can occur with SIP over TCP). Their stated workaround is to use SIP over UDP for control traffic. (docs.sophos.com)

In practice, that often translates to: if you are using SIP over TCP/TLS, keep the SIP module unloaded.

Step-by-step: Sophos XG / Sophos Firewall configuration for cloud VoIP

Step 0: Gather the info you need first

Before you touch the firewall, collect:

  1. How your endpoints connect

  • Desk phones, softphones, ATAs

  • Voice VLAN subnet(s)

  1. Provider requirements

  • SIP signaling ports (often 5060 UDP or 5061 TCP/TLS, but confirm)

  • RTP media port range (provider-specific)

  • SBC IP ranges or FQDNs (best practice is to restrict destinations if your provider supports it)

  1. Your Sophos context

  • Firmware version (SFOS)

  • Whether IPS, TLS inspection, SD-WAN, or DoS protections are enabled

Step 1: Check and disable the SIP module (SIP helper)

Sophos provides CLI commands to view status and load/unload the SIP module. 

  1. Open the CLI (SSH or from admin > Console in the web admin). 

  2. Choose Option 4: Device Console. (docs.sophos.com)

  3. Run:

system system_modules show
 
  1. If SIP shows as loaded and you want to disable it:

system system_modules sip unload
 

Sophos states the change is persistent across reboots.

When should you NOT disable it?

  • Only if your VoIP provider specifically requires it for their environment.

  • If you disable it and see immediate failures, roll back and test provider-guided settings.

But for most cloud VoIP deployments, disabling SIP helper behavior is a common stability win, and Sophos’ own VoIP troubleshooting flow explicitly references unloading SIP in certain problem states.

Step 2: Increase UDP timeout stream (this fixes a lot)

Sophos documents that the default UDP timeout stream is 60 seconds, and recommends 150 seconds for VoIP reliability (or whatever your provider recommends).

From Option 4: Device Console:

  1. Check current settings:

show advanced-firewall
 
  1. Set UDP timeout stream to 150 seconds:

set advanced-firewall udp-timeout-stream 150
 

Sophos explicitly recommends 150 seconds as a baseline.

Operational guidance:

  • Start at 150 seconds.

  • If your provider recommends a higher number, follow their recommendation.

  • Avoid “maxing it out” without reason. Longer timeouts can increase state table usage.

Step 3: Review DoS settings (UDP flood can break VoIP)

Sophos documents that an unstable VoIP connection can occur when DoS settings for UDP rate are applied, and specifically points to UDP flood settings causing VoIP traffic to drop. 

In the Sophos web admin:

  • Go to Intrusion prevention > DoS & spoof protection

  • Under DoS settings, clear Apply flag for UDP flood (or tune the thresholds carefully)

Sophos community guidance also explains that when “Apply Flag” is on, SFOS enforces per-host limits and may drop legitimate high-rate UDP traffic. VoIP is explicitly called out as a common UDP-heavy protocol that can trigger these limits. 

Step 4: If IPS/VPN is involved, disable SIP preprocessor patterns

Sophos documents that VoIP call issues over site-to-site VPN or with IPS can be improved by disabling the preloaded SIP IPS patterns: 

set ips sip_preproc disable
 

If you use IPsec tunnels, Sophos also notes a related setting to prevent connection flushing when tunnels come up: 

set vpn conn-remove-tunnel-up disable
 

This matters in real deployments where:

  • Phones are behind a site-to-site VPN

  • Or you backhaul voice over VPN instead of local breakout

Step 5: Create a clean firewall rule for VoIP (and keep NAT simple)

At a minimum, you need a rule that allows SIP signaling and RTP media from your voice subnet to your provider.

Sophos troubleshooting guidance emphasizes verifying that you have a firewall rule for SIP and that destination networks are correctly set.

Recommended approach (cloud VoIP)

  • Outbound rule from Voice VLAN/LAN zone to WAN

  • NAT: Masquerade (SNAT) outbound

  • Do NOT create inbound port forwards unless your provider explicitly requires it (most hosted endpoint registration does not)

Rule design tips

  • Source: Voice VLAN subnet(s) or phone IP host group

  • Destination: Provider SBC IPs/FQDNs where possible (avoid “Any” if you can)

  • Services: SIP + RTP (provider ranges)

  • Log: Enabled initially (turn down once stable)

  • Security scanning: Keep minimal on this rule if it causes false positives (especially IPS rules that touch SIP/RTP)

Step 6: QoS, DSCP, and traffic shaping on Sophos

There are two different goals people mix up:

  1. Marking packets (DSCP) so upstream gear prioritizes voice

  2. Shaping traffic (QoS/traffic shaping) so voice gets bandwidth under congestion

DSCP marking on Sophos Firewall

Sophos states that the firewall only marks outgoing traffic with the DSCP value configured in the firewall rule so upstream routers can prioritize it. It also notes that when incoming traffic already has a DSCP value, Sophos overwrites it with what you configured in the rule.

Common DSCP choices:

  • RTP media: EF (46)

  • SIP signaling: often AF31 (26)

Sophos lists EF (46) and AF31 (26) as standard DSCP values.

Practical recommendation:

  • Prefer having phones/switches mark DSCP correctly.

  • Use Sophos DSCP marking only if you need to enforce consistent tags leaving the firewall.

Traffic shaping policy (QoS) on Sophos

Sophos documents how to create traffic shaping policies under System services > Traffic shaping.

Create a policy:

  1. Go to System services > Traffic shaping and click Add 

  2. Policy association: choose Rules (so you can apply it to your VoIP firewall rule)

  3. Rule type:

  • Guarantee if you want voice to always get a minimum share (recommended)

  • Limit is usually not what you want for voice 

  1. Priority: allocate to real-time traffic (Sophos notes this is the default priority behavior) 

  2. Bandwidth units: Sophos shows values in KBps, and notes speed tests are in kbps, so you must convert (1 KB = 8 kb). Apply it:

  • Edit your VoIP firewall rule and under Shape traffic, select the traffic shaping policy.

Key note:

  • Sophos notes global traffic shaping settings apply to outgoing traffic forwarded to the WAN zone, and default settings apply when no policy matches.

Step 7: TLS inspection and “security profiles” caution

If your VoIP signaling is encrypted (SIP TLS) and/or media is SRTP, avoid applying SSL/TLS inspection or aggressive application inspection policies to that traffic unless you have a specific validated design. Encrypted VoIP should generally be treated like a real-time business application, not like web browsing.

(Keep this simple: build a dedicated VoIP rule and apply only what you need.)

Validation and troubleshooting checklist

A. Validate after every change (in this order)

  1. Phones stay registered for 30 to 60 minutes (no flapping)

  2. Place outbound calls (local and long distance)

  3. Inbound calls ring consistently

  4. No one-way audio (both directions)

  5. Leave an active call up for 10+ minutes (watch for mid-call drops)

B. Look at Sophos logs the right way

  • Filter firewall logs by the phone subnet

  • Confirm VoIP traffic hits the intended rule (not a generic “LAN to WAN” rule)

  • If you changed the SIP module or UDP timeouts, retest after the endpoints re-register

Sophos’ troubleshooting guidance also calls out that misbehavior can relate to conntrack state and that verifying the correct firewall rule match is part of the resolution steps.

C. Troubleshooting matrix (fast diagnosis)

 
 

Symptom

Likely cause

What to check/fix

Calls drop, poor quality, intermittent audio

UDP timeout stream too low

Set udp-timeout-stream to 150+ per Sophos guidance 

VoIP unstable when security features enabled

DoS UDP flood thresholds dropping packets

Disable Apply flag for UDP flood or tune thresholds 

VoIP issues over VPN or with IPS enabled

SIP IPS preprocessor interference

set ips sip_preproc disable 

SIP weirdness, header/NAT problems

SIP module interfering

system system_modules sip unload

Voice quality tanks during downloads

No traffic shaping policy

Create “Guarantee” shaping policy and apply to VoIP rule 

DSCP not behaving as expected

Marking behavior misunderstandings

Sophos marks outgoing only; can overwrite inbound DSCP 

D. What to send your VoIP provider (or Viirtue support) to resolve fast

  • Sophos model + SFOS version

  • Whether SIP module is loaded or unloaded

  • Current show advanced-firewall output (sanitized)
  • DoS settings state (especially UDP flood Apply flags)

  • Provider destination IP/FQDN restrictions you are using

  • A packet capture from WAN during a failed call (SIP + RTP)

 

Final Thoughts: Make Your Sophos Firewall VoIP-Ready

When VoIP issues show up behind a Sophos Firewall, the root cause is usually configuration, not the cloud provider. The good news is that once you address the SIP module behavior, increase UDP timeout stream values, tune DoS protections, and apply proper traffic shaping, most instability disappears.

A clean, dedicated VoIP rule with minimal interference and validated QoS gives you predictable, repeatable performance across deployments. If you are still running legacy XG hardware, now is the time to modernize and standardize your firewall baseline. Build it right once, document it, and your future self and your support team will thank you.

If you are interested in how Viirtue can support you through our various partner programs, find more information or schedule an introductory call today

FAQ: Sophos Firewall Configuration Guide

Do I need to port forward SIP ports on Sophos for a cloud VoIP platform?

Usually no for hosted endpoints, because phones register outbound and RTP is negotiated outbound. Only port-forward if your provider explicitly requires inbound delivery to a PBX you host on-prem.

In many cloud VoIP deployments, yes. Sophos provides commands to unload it, and their troubleshooting guidance references disabling it in certain scenarios. (docs.sophos.com)


If your provider requires it, follow provider guidance and validate with test calls.

Sophos documents a default of 60 seconds and recommends 150 seconds as a baseline (or your provider’s recommendation). (docs.sophos.com)

Yes. Sophos specifically documents VoIP instability when UDP flood settings are applied, and community guidance explains how per-host DoS enforcement can drop legitimate high-rate UDP traffic like VoIP. (docs.sophos.com)

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Sophos documents that DSCP marking is applied to outgoing traffic based on firewall rule configuration, and it does not mark reply traffic. (docs.sophos.com)

Yes from a lifecycle/support standpoint. Sophos states XG Series hardware reached end-of-life/end-support after March 31, 2025 and recommends migrating to XGS. (community.sophos.com)

Deploy a Fully-Featured Class 5 Softswitch under your own branding

Start Selling VoIP Today

AI Solutions

VoIP & Fax

Viirtue’s free, full-service tool for MSPs.
Free for all Viirtue partners, ViiBE makes quoting and billing seamless, so you can grow your business efficiently while serving your clients better.