AudioCodes Mediant 3000 User Manual page 342

Media gateway & enterprise session border controller (e-sbc)
Hide thumbs Also See for Mediant 3000:
Table of Contents

Advertisement

Parameter
Enable TCP Keepalive
[SIPInterface_TCPKeepa
liveEnable]
Classification Failure
Response Type
[SIPInterface_Classificati
onFailureResponseType]
Pre Classification
Manipulation Set ID
[SIPInterface_PreClassifi
cationManipulationSet]
User's Manual
Notes:
Regardless of the parameter, the device always accepts registration
refreshes from users that are already registered in its database.
If configured to Disable or Enable, the parameter overrides the 'Enable
Un-Authenticated Registrations' parameter settings of the SRD (in the
SRD table) that is associated with the SIP Interface.
Enables the TCP Keep-Alive mechanism with the IP entity on this SIP
Interface. TCP keep-alive can be used, for example, to keep a NAT entry
open for clients located behind a NAT server, or simply to check that the
connection to the IP entity is available.
[0] Disable (default)
[1] Enable
Note: For configuring TCP keepalive, use the following ini file parameters:
TCPKeepAliveTime, TCPKeepAliveInterval, and TCPKeepAliveRetry.
Defines the SIP response code that the device sends if a received SIP
request (OPTIONS, REGISTER, or INVITE) fails the SBC Classification
process.
The valid value can be a SIP response code from 400 through 699, or it
can be set to 0 to not send any response at all. The default response
code is 500 (Server Internal Error).
This feature is important for preventing Denial of Service (DoS) attacks,
typically initiated from the WAN. Malicious attackers can use SIP
scanners to detect ports used by SIP devices. These scanners scan
devices by sending UDP packets containing a SIP request to a range of
specified IP addresses, listing those that return a valid SIP response.
Once the scanner finds a device that supports SIP, it extracts information
from the response and identifies the type of device (IP address and
name) and can execute DoS attacks. A way to defend the device against
such attacks is to not send a SIP reject response to these unclassified
"calls" so that the attacker assumes that no device exists at such an IP
address and port.
Note: The parameter is applicable only if the device is set to reject
unclassified calls. This is configured using the 'Unclassified Calls'
parameter on the General Settings page (Configuration tab > VoIP menu
> SBC > General Settings).
Assigns a Message Manipulation Set ID to the SIP Interface. This lets you
apply SIP message manipulation rules on incoming SIP initiating-dialog
request messages (not in-dialog), received on this SIP Interface, prior to
the Classification process.
By default, no Message Manipulation Set ID is defined.
For configuring Message Manipulation rules, see Configuring SIP
Message Manipulation on page 371.
Notes:
The Message Manipulation Set assigned to a SIP Interface that is
associated with an outgoing call, is ignored. Only the Message
Manipulation Set assigned to the associated IP Group is applied to the
outgoing call.
If both the SIP Interface and IP Group associated with the incoming
call are assigned a Message Manipulation Set, the one assigned to the
SIP Interface is applied first.
The parameter is applicable only to SBC calls.
342
Description
Document #: LTRT-89730
Mediant 3000

Advertisement

Table of Contents
loading

Table of Contents