CHAPTER 21 SIP Message Manipulation
Mediant 4000 SBC | User's Manual
3.
Configure a Message Condition rule according to the parameters described in the table below.
4.
Click
Apply
.
An example of configured Message Condition rules is shown in the figure below:
■
Index 0:
Incoming SIP dialog that is classified as belonging to a User-type IP Group.
■
Index 1:
Incoming SIP dialog that contains a SIP Via header.
■
Index 2:
Incoming SIP dialog with "101" as the user part in the SIP From header.
Table 21-2: Message Conditions Table Parameter Descriptions
Parameter
Description
'Index'
[ConditionTable_
Index]
Defines an index number for the new table row.
Note:
Each row must be configured with a unique index.
'Name'
name
[ConditionTable_
Name]
Defines a descriptive name, which is used when associating the row in
other tables.
The valid value is a string of up to 59 characters.
Note:
The parameter value cannot contain a forward slash (/).
'Condition'
condition
[ConditionTable_
Condition]
Defines the condition of the SIP message.
The valid value is a string. You can use the built-in syntax editor to help
you configure the field. Click the
Editor
button located alongside the field
to open the Editor, and then simply follow the on-screen instructions.
Note:
User and host parts must be enclosed in single quotes.
Configuring SIP Message Policy Rules
The Message Policies table lets you configure up to 20 SIP Message Policy rules. SIP Message
Policy rules are used to block (blacklist) unwanted incoming SIP messages or permit (whitelist)
receipt of desired SIP messages. You can configure legal and illegal characteristics of SIP
messages. This feature is helpful against VoIP fuzzing (also known as robustness testing), which
sends different types of packets to its "victims" for finding bugs and vulnerabilities. For example,
the attacker might try sending a SIP message containing either an oversized parameter or too many
occurrences of a parameter.
You can also enable the Message Policy to protect the device against incoming SIP messages
with malicious signature patterns, which identify specific scanning tools used by attackers to
search for SIP servers in a network. To configure Malicious Signatures, see
Each Message Policy rule can be configured with the following:
■
Maximum message length
- 485 -
Содержание Mediant 4000 SBC
Страница 1: ...User s Manual AudioCodes Series of Session Border Controllers SBC Mediant 4000 SBC Version 7 2...
Страница 40: ...Part I Getting Started with Initial Connectivity...
Страница 48: ...Part II Management Tools...
Страница 113: ...Part III General System Settings...
Страница 118: ...Part IV General VoIP Configuration...
Страница 525: ...Part V Session Border Controller Application...
Страница 654: ...Part VI Cloud Resilience Package...
Страница 663: ...Part VII High Availability System...
Страница 685: ...Part VIII Maintenance...
Страница 759: ...Part IX Status Performance Monitoring and Reporting...
Страница 844: ...Part X Diagnostics...
Страница 888: ...Part XI Appendix...
Страница 1036: ...This page is intentionally left blank CHAPTER 62 Technical Specifications Mediant 4000 SBC User s Manual 1003...