![Dinstar SBC300 Скачать руководство пользователя страница 59](http://html1.mh-extra.com/html/dinstar/sbc300/sbc300_user-manual_2505877059.webp)
3 Configurations on Web Interface
SBC300 Session Border Controller
Copyright©2011-2018 Dinstar
53
Action
Log Record: when the security strategy is triggered and takes effect, the attack event is recorded
in a log
Flow Limited: when the security strategy is triggered and takes effect, the traffic of peer IP
address or the set local port is limited, and those packets whose traffics exceed are dropped
during the limitation time.
Packet Rate Limited: when the security strategy is triggered and takes effect, the packet rate of
peer IP address or the set local port is limited, and those packets whose traffics exceed are
dropped during the limitation time.
Drop: when the security strategy is triggered and takes effect, all the packets from peer IP
address and those received by the set local port are dropped during the limitation time.
2. SIP Security
Figure 3-33 SIP Security Strategy
Click
to add a strategy to prevent attacks from SIP-based devices. Click
to delete a strategy, while
click
to modify the strategy.