CHAPTER 14 Security
Mediant 4000 SBC | User's Manual
3.
Click
Apply
.
Configuring IDS Policies
An IDS Policy is configured using two tables with "parent-child" type relationship:
■
IDS Policies table ("parent"):
Defines a name and provides a description for the IDS Policy.
You can configure up to 20 IDS Policies.
■
IDS Rules table ("child"):
Defines the actual rules for the IDS Policy. Each IDS Policy can
be configured with up to 20 rules.
A maximum of 100 IDS rules can be configured (regardless of how many rules are
assigned to each policy).
The device provides the following pre-configured IDS Policies that can be used in your deployment
(if they meet your requirements):
■
"DEFAULT_FEU": IDS Policy for far-end users in the WAN
■
"DEFAULT_PROXY": IDS Policy for proxy server
■
"DEFAULT_GLOBAL": IDS Policy with global thresholds
●
You can edit and delete the default IDS Policies.
●
If the IDS Policies table is empty (i.e., you have deleted all IDS Policies) and you
want to return the default IDS Policies, disable IDS and then enable it again.
The following procedure describes how to configure IDS Policies through the Web interface. You
can also configure it through ini file or CLI:
■
IDS Policy table: IDSPolicy (ini file) or configure voip > ids policy (CLI)
■
IDS Rules table: IDSRule (ini file) or configure voip > ids rule (CLI)
➢
To configure an IDS Policy:
1.
Open the IDS Policies table (
Setup
menu >
Signaling & Media
tab >
Intrusion Detection
folder >
IDS Policies
); the table displays the pre-configured IDS policies:
2.
Click
New
; the following dialog box appears:
3.
Configure an IDS Policy name according to the parameters described in the table below.
- 146 -
Summary of Contents for Mediant 4000 SBC
Page 1: ...User s Manual AudioCodes Series of Session Border Controllers SBC Mediant 4000 SBC Version 7 2...
Page 40: ...Part I Getting Started with Initial Connectivity...
Page 48: ...Part II Management Tools...
Page 113: ...Part III General System Settings...
Page 118: ...Part IV General VoIP Configuration...
Page 525: ...Part V Session Border Controller Application...
Page 654: ...Part VI Cloud Resilience Package...
Page 663: ...Part VII High Availability System...
Page 685: ...Part VIII Maintenance...
Page 759: ...Part IX Status Performance Monitoring and Reporting...
Page 844: ...Part X Diagnostics...
Page 888: ...Part XI Appendix...