STM- SIP Security Policy Configuration
14
User Manual v1.0
www.shield.com
4. Configuring the SIP Security Policies
4.1. SIP Security Settings
The SIP Deep packet inspection engine running the STM appliance has been made to
inspect the SIP traffic with the SIP Security Compliance rules in built into the SIP DPI
engine.
The SIP Security Compliance parameters are configurable from the SIP Security settings
page. The page also allows configuring the SIP ports on which the SIP DPI happens & RTP
ports in use in the target deployment
.
4.2. DPI Signatures
The SIP DPI Configuration page allows toe configure the SIP Deep packet Inspection rules
categories. The administrator can enable/disable the inspection against particular category
of rules, action to be taken on detecting attacks matching the rules in the categories.
The possible actions that the STM can execute are log the alert, block the packets
containing the attack vector and blacklist the ip for the given duration. The blocking duration
of how long the attacker up needs to be blocked is also configure per category level.
Summary of Contents for Shield STM
Page 1: ......
Page 2: ...User Manual Shield STM Appliance 1 0 Version 1 0 ...