STM- SIP Security Policy Configuration
15
User Manual v1.0
www.shield.com
The table given below lists the SIP Deep packet Inspection rules categories supported in
STM and configuration parameters in each category.
Category
Possible Actions
User Configurable options
SIP Reconnaissance Attacks
Log the alert/Block the
attack/Blacklist attacker ip
-
SIP Devices Scanning
Log the alert/Block the
attack/Blacklist attacker ip
SIP Dos Attacks
Log the alert/Block the
attack/Blacklist attacker ip
Threshold/Intervel
SIP DDos Attacks
Log the alert/Block the
attack/Blacklist attacker ip
Threshold/Intervel
SIP Anomaly attacks
Log the alert/Block the
attack/Blacklist attacker ip
-
SIP Buffer overflow attacks
Log the alert/Block the
attack/Blacklist attacker ip
-
SIP Cross site scripting
Log the alert/Block the
attack/Blacklist attacker ip
3
rd
Party vendor
vulnerabilities
Log the alert/Block the
attack/Blacklist attacker ip
Summary of Contents for Shield STM
Page 1: ......
Page 2: ...User Manual Shield STM Appliance 1 0 Version 1 0 ...