CHAPTER 27 Configuring Malicious Signatures
Mediant 4000 SBC | User's Manual
27
Configuring Malicious Signatures
The Malicious Signature table lets you configure up to 30 Malicious Signature patterns. Malicious
Signatures are signature patterns that identify SIP user agents (UA) who perform malicious attacks
on SIP servers by SIP scanning. Malicious Signatures allow you to protect SBC calls handled by
the device from such malicious activities, thereby increasing your SIP security. The Malicious
Signature patterns identify specific scanning tools used by attackers to search for SIP servers in
the network. The feature identifies and protects against SIP (Layer 5) threats by examining new
inbound SIP dialog messages. Once the device identifies an attack based on the configured
malicious signature pattern, it marks the SIP message as invalid and discards it or alternatively,
rejects it with a SIP response (by default, 400), configured in the Message Policies table.
Protection applies only to new dialogs (e.g., INVITE and REGISTER messages) and
unauthenticated dialogs.
Malicious signatures can also be used with the Intrusion Detection System (IDS) feature (see
). You can configure an IDS Policy that is activated if the device detects a
malicious signature (when the 'Reason' parameter is configured to
Dialog establishment failure
).
Malicious signature patterns are typically based on the value of SIP User-Agent headers, which
attackers use as their identification string (e.g., "User-Agent: VaxSIPUserAgent"). However, you
can configure signature patterns based on any SIP header. To configure signature patterns, use the
same syntax as that used for configuring Conditions in the Message Manipulations table (see
Configuring SIP Message Manipulation
). Below are configured signature patterns based on the
User-Agent header:
■
Malicious signature for the VaxSIPUserAgent malicious UA:
header.user-agent prefix 'VaxSIPUserAgent'
■
Malicious signature for the scanning tool "sip-scan":
header.user-agent prefix 'sip-scan'
By default, the table provides preconfigured malicious signatures of known, common attackers.
●
Malicious Signatures do not apply to the following:
✔
Calls from IP Groups where Classification is by Proxy Set.
✔
In-dialog SIP sessions (e.g., refresh REGISTER requests and re-INVITEs).
✔
Calls from users that are registered with the device.
●
If you delete all the entries in the table, when you next reset the device, the table is
populated again with all the default signatures.
You can export / import Malicious Signatures in CSV file format to / from a remote server through
HTTP, HTTPS, or TFTP. To do this, use the following CLI commands:
(config-voip)# sbc malicious-signature-database <export-csv-to | import-csv-from> <URL>
To apply malicious signatures to calls, you need to enable the use of malicious signatures for a
Message Policy and then assign the Message Policy to the SIP Interface associated with the calls
(i.e., IP Group). To configure Message Policies, see
Configuring SIP Message Policy Rules
The following procedure describes how to configure Malicious Signatures through the Web
interface. You can also configure it through ini file [MaliciousSignatureDB] or CLI (
configure
voip > sbc malicious-signature-database
).
- 591 -
Summary of Contents for Mediant 4000 SBC
Page 1: ...User s Manual AudioCodes Series of Session Border Controllers SBC Mediant 4000 SBC Version 7 2...
Page 40: ...Part I Getting Started with Initial Connectivity...
Page 48: ...Part II Management Tools...
Page 113: ...Part III General System Settings...
Page 118: ...Part IV General VoIP Configuration...
Page 525: ...Part V Session Border Controller Application...
Page 654: ...Part VI Cloud Resilience Package...
Page 663: ...Part VII High Availability System...
Page 685: ...Part VIII Maintenance...
Page 759: ...Part IX Status Performance Monitoring and Reporting...
Page 844: ...Part X Diagnostics...
Page 888: ...Part XI Appendix...