RedMax EXtreme EX-LRT Instrukcja Naprawy Strona 5

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 4
Oracle SBC Security Guide
Realm Configuration ........................................................................................................................... 41
SIP Interface ........................................................................................................................................ 41
Session Agent and Access-Control ..................................................................................................... 42
Observations/Limitations .................................................................................................................... 49
Appendix D: DDoS Prevention for Access or Hybrid Environments .................................................... 51
Configuration Models: ........................................................................................................................ 51
Configuration Parameters ................................................................................................................... 51
Realm Configuration ........................................................................................................................... 52
SIP Interface ........................................................................................................................................ 52
Observations/Limitations .................................................................................................................... 59
Appendix E: Mitigating SIP Attacks ...................................................................................................... 61
Goals ................................................................................................................................................... 61
Overview ............................................................................................................................................. 61
Deployment Archetypes ...................................................................................................................... 61
Strategies for Mitigating Against SIP Scanners .................................................................................. 62
Threat Identification Alternative 1: sipShield SPL plug-in ................................................................ 63
Threat Identification Alternative 2: Header Manipulation Rules for Scanner Mitigation .................. 63
Enforcement: Implement DoS Prevention .......................................................................................... 63
Header Manipulation Rules for Scanner Mitigation ........................................................................... 64
Configuration for C-series (Net-Net 3000, 4000, and 6000 series) .................................................... 65
Identifying fraudulent User-Agent values ........................................................................................... 65
Whitelisting known User-Agents ........................................................................................................ 66
Scanner Mitigation using DDoS Settings ........................................................................................... 67
Peering Environments ......................................................................................................................... 68
Appendix F: Intrusion Detection System ............................................................................................... 70
IDS License Details ............................................................................................................................ 70
Dependencies ...................................................................................................................................... 70
Endpoint Promotions and Demotions ................................................................................................. 70
Statistics .............................................................................................................................................. 71
SNMP MIB OIDS ............................................................................................................................... 71
SNMP Traps ........................................................................................................................................ 72
HDR .................................................................................................................................................... 72
Syslog .................................................................................................................................................. 72
Authentication Failures used for Endpoint Demotion ........................................................................ 73
Per-endpoint Call Admission Control ................................................................................................. 74
CAC failures used for Endpoint Demotion ......................................................................................... 74
Przeglądanie stron 4
1 2 3 4 5 6 7 8 9 10 ... 141 142

Komentarze do niniejszej Instrukcji

Brak uwag