Oracle SBC Security Guide
.
in-translationid
out-translationid
in-manipulationid addRouteHeader
Session Agent: A dummy Session Agent needs to be created with the state disabled. This is important so
that the Session Agent will reply with a 503 response to any request. The 503 response will then be
mapped to a new response code that can be easily dropped. A SIP Response Mapping is created to map
any 503 from this Session Agent to a 677 SIP response code. We use an error code that is not valid
according to RFCs so it can easily be distinguished from other traffic. Any 677 responses can then be
dropped at the SIP Interface level without dropping any valid 503 responses from other endpoints. The
SIP Response Mapping must be assigned in the Session Agent as shown below.
session-agent
hostname 10.11.12.13
ip-address
port 5060
state disabled
app-protocol SIP
transport-method UDP
realm-id *
.
.
.
local-response-map 503Rogue
SIP Response Mapping: A SIP Response Mapping must be configured to map 503 responses from this
Session Agent to a dummy response code (677). The response-map ACLI level can be found in
configuration mode under session-router > sip-response-map.
response-map
name 503Rogue
entries 503 -> 677 (Rogue)
SIP Interface: All SIP interfaces that receive messages from SIP scanners require the option
“dropResponse=677” to drop the 677 responses received from the dummy Session Agent.
sip-interface
state enabled
realm-id access
.
.
.
options dropResponse=677
Scanner Mitigation using DDoS Settings
The DDoS settings recommended in the appendices will protect the SBC, but more strict trust levels and
thresholds need to be defined to deny endpoints that are attempting to scan the system. To accomplish
this, the access-control-trust-level on the access realm-config must be configured to low, which will cause
endpoints to be blacklisted when they exceed thresholds. The untrusted-signal-threshold parameter
defines the threshold of SIP messages received within the global tolerance-window (set under media-
manager) before an untrusted user will be demoted to denied. The untrusted-signal-threshold should be
set to a value that is just greater than the number of messages required by an untrusted endpoint to
Komentarze do niniejszej Instrukcji