Page 1
STM User Manual www.allo.com Version 1.0...
Page 2
Proprietary Rights The information in this document is Confidential to Allo.com and is legally privileged. The information and this document are intended solely for the addressee. Use of this document by anyone else for any other purpose is unauthorized.
STM User Manual About this manual This manual describes the Allo product application and explains how to work and use it major features. It serves as a means to describe the user interface and how to use it to accomplish common tasks.
1. Introduction 1.1 . Overview This User manual describes the steps involved in setting up the allo STM Appliance. Allo STM is an appliance based VoIP threat prevention solution dedicated to protect the SIP based PBX/Telecom Gateway/IP Phones/Mobile device deployments. The appliance runs the Real time Deep Packet Inspection on the SIP traffic to identify the VOIP attack vectors and prevents the threats impacting the SIP based devices.
Page 8
STM User Manual Attack response includes the option for quietly dropping malicious SIP packets to help prevent continued attacks Dynamic Blacklist Update service for VOIP, SIP PBX/Gateway Threats Configurability of Blacklist/White list/Firewall rules. Support for Geo Location based blocking.
Primary Storage 16 MB Flash 64MB Secondary Storage USB Storage devices support for logging ( Optional) Interfaces Two Fast Ethernet Interfaces. 1.1.1. Notification LEDs (On the Front Panel of the STM) Figure 1: Front Panel LED Notifications www.allo.com Version 1.0...
Figure 2: STM Rear View 1.1.3. STM Deployment Considerations The STM has been made to protect the SIP based PBX/Gateway Servers against SIP based network threats and anomalies. Thus it is recommended to deploy the STM along with the PBX/Gateway deployment as given in the following scenarios based on what is applicable in the user’s setup.
Page 11
Some of the PBX/Gateway devices may have an exclusive LAN/Mgmt Interface for device management purpose other than the Data Interface (also referred as WAN/Public Interface). In such cases LAN Port of the STM should be connected to the Data Interface (WAN/Public Interface). Deployment Scenario 2...
Page 12
STM User Manual Figure 5: Scenario3 www.allo.com Version 1.0...
Some of the PBX/Gateway devices may have an exclusive LAN/Mgmt Interface for device management purpose other than the Data Interface (also referred as WAN/ public Interface). In such cases LAN port of the STM should be connected to the Data Interface (WAN/ Public Interface).
Configure the STM Device IP Address from the “Device Settings” Page as per your local network range. Verify the IP address set to STM from the dashboard page. Once the user assigns the STM Device IP Address successfully, he can access the device using that IP address further.
Page 15
Alternatively the user can access the device via the static IP 10.0.0.1 and configure the network settings during first time installation. Connect a PC to the LAN port of the STM and assign the IP address 10.0.0.100/255.255.255.0 to the PC. Now you can access the device from the browser using the URL https://<10.0.0.1>...
STM User Manual Figure 7: Timeout Message If somebody is already logged in to STM WebUI session, the subsequent attempts to login will notify the details previous login session as illustrated below and will prompt the user to override the previous session and continue OR to discard the attempt the login.
On logging into the STM WebUI, the dashboard will be shown. The user can visit the dashboard page from the any configuration page in the STM WebUI, by clicking the STM Product Icon that appears in the left corner of the Top panel.
Page 18
System Status Panel shows Device up time, Memory Usage, Flash Usage & CPU Usage. Sig Update Version Panel shows the STM Signature version and Release State. Network Status Panel shows IP, LAN MAC, WAN MAC and Gateway of the device.
Device Settings 3. Device Configuration Configuration pages of the STM WebUI have been made as self- intuitive and easy to configure. All the configuration pages have been made to work with the two-phase commit model. The two-phase commit model is not applicable to time settings and signature update settings.
The page also allows to enable/disable the SSH Access to the device. The ‘Allow ICMP’ option will configure the device to respond to the ICMP ping messages sent to STM appliances or not. By the SSH Access and ICMP Ping messages are allowed to the STM appliance.
Page 21
It allows user to specify the Host name for general settings. IP Configuration User can configure IP to be static or DHCP. IP Addr/Mask It specifies the IP address and Netmask of STM General Settings. Gateway It specifies the Gateway IP of the STM device. E.g. 10.0.0.254 or 10.0.0.1...
3.3. Management Access Navigate through Device> Management Access The access the STM Device management (SSH CLI / WebUI Access) can be restricted with the management access filters. By default, the access has been allowed to any global address and www.allo.com...
Page 23
STM User Manual management Vlan network configurations on the device. The administrator can override these settings. Figure 14: Create Management Access Rule Name Enter the name of the Management access for user reference. IP Type User can select the appropriate IP type from the drop down list.
STM User Manual Figure 15: Management Access Results 3.4. Signature Update Navigate through Device> Signature Update To enable the automatic signature update, select the checkbox ‘enable update’ on the device and configure the signature update schedule. The valid subscription key and correct signature update URL should be configured for the signature update to happen.
Time Schedule It schedule signature update at Configured time in UI. When the user buys the STM appliance, the device will be shipped with the SIP signatures that will help in protecting against the SIP based attacks known as of date.
Page 26
STM User Manual Remote Logging It allows user to configure Remote Log Server settings. Syslog Server User can configure the remote Syslog server where it gets log from the STM device. www.allo.com Version 1.0...
The possible actions that the STM can execute are logging the alert, block the packets containing the attack vector and blacklist the attacker IP for the given duration. The blocking duration of how long the attacker up needs to be blocked is also configured per category level.
Page 28
STM User Manual User Configurable Category Description options This can be considered as the first step of attacking any system or a network. In this hacker tries to learn information about our network typically conducts a ping sweep of the target network to determine which IP addresses are alive.
Page 29
Maximum Dialog within a session, SIP Ports and its Protocol. The SIP Deep packet inspection engine running the STM appliance has been made to inspect the SIP traffic with the SIP Security Compliance rules in built into the SIP DPI engine.
Page 30
STM User Manual protocol anomaly conditions and take the action configured by the administrator. Configuring inappropriate values these parameters can result to the disruptive impact in the VOIP deployment. Administrators with more in-depth understanding with the SIP Protocol can choose to tune these parameters for their specific deployment needs.
Page 31
STM User Manual data. This refers to illegally trying to access the resources of the SIP device like its memory Buffer overflow address for which it does not have the Attacks authenticate permissions leading data corruption of this address along with its adjacent address.
Page 32
STM User Manual This refers to flooding the device with general UDP No of UDP Packet within packet on any port where legitimate users are UDP Flood specified duration barred from availing the Device resources after some interval of time.
STM User Manual 4.2. SIP Servers Navigate through Security Settings > SIP Servers User can configure all these parameters to avoid IP spoofing attack. In IP spoofing attacker will sniff your IP address and make your system Vulnerable. Figure 19: SIP Servers...
It allows user to configure SIP compliance settings and SIP media Port Configuration. The SIP Deep packet inspection engine running the STM appliance has been made to inspect the SIP traffic with the SIP Security Compliance rules in built into the SIP DPI engine.
Page 35
STM User Manual Figure 21: SIP Protocol Compliance SIP Protocol Compliance Settings Max_sessions A SIP session is the application level connection setup created between the SIP server and SIP client for exchanging the audio/video messages with each other. The max_sessions parameter defines the maximum number session that SIP deep packet inspection engine can keep track of.
Page 36
STM User Manual specifies the maximum Request URI field size. The Default is set to 256. The allowed range for this option is 1 - 65535. Max_call_id_len The Call-ID header field in SIP message acts as a unique identifier that relates to sequence of messages exchanged between SIP client and server.
Page 37
It is used to store and deliver information or data over communication medium. Media may be TCP based or UDP based communications. STM media settings allows user to choose the communication medium of the SIP traffic. It supports TCP, UDP or Both as communication media for SIP Communications. Media ports allow user to configure media ports like 1024-65535.
Navigate through Security Settings > Call Blocker Rules A user can block the calls statically by making use of "Call Blocker Rules" feature in STM. This feature will block the calls by various viable options such as Phone number, Phone number prefix, Phone Extension, Phone Extension Prefix, IP address and User Agent.
Page 39
STM User Manual Block Anonymous Calls – User cannot able to make call for unknown numbers. Figure 23: Call Blocker Rules Click Add New button, to create Call Blocker Rule. Figure 24: Create Call Blocker Rule Name Specify the name for the Call Blocker Rule for user’s reference.
Page 40
User can select the appropriate Call Blocker type from the drop down list. It allows user to block the calls that reaching to PBX system i.e. protected by the STM. E.g. 1. Phone number: User can block the SIP communication which is originated from any phone number.
STM User Manual (optional) 4.6. Firewall Rules Navigate through Security Settings > Firewall Rules The firewall rules configuration will allow the administrator in configuring what traffic should be allowed to protect SIP PBX/Gateway network from an untrusted wan zone, besides DPI enabled SIP traffic and RTP traffic.
STM User Manual Dst Address User can configure and apply the Firewall rule to particular destination Address (Dst Address). E.g.:192.168.0.8 Protocol Protocols specify interactions between communicating entities. User can select the type of protocol whether it is TCP or UDP from the drop down list.
This page allows to configure the white listed IP addresses in the untrusted wan zone from which the access to communicate with the protected SIP network will be allowed by the STM. This page will also allow configuring whether the white rules take precedence over the blacklist rules (both static and dynamic) configured on the device at any instant.
Page 44
STM User Manual Figure 28: Create White list Rule Name Specify the name for the White list Rules for user’s reference. The user can choose any name to recognize the White list Rules. IP Type User can select the appropriate IP type from the drop down list.
This page allows to configure the blacklisted IP addresses in the untrusted wan zone from which the access to communicate with the protected SIP network will be blocked by the STM. This page will also allow configuring whether the white rules take precedence over the blacklist rules (both static and dynamic) configured on the device at any instant.
4.10. Dynamic Blacklist IP Addresses Navigate through Security Settings > Dynamic Blacklist IP Addresses The dynamic blacklist IP Addresses are the blocking rules added by the STM deep packet inspection engine to block the traffic from attacker IP addresses for the blocking duration configured in the rules category, on detecting the attack.
Page 47
STM User Manual Figure 33: Geo IP Filters www.allo.com Version 1.0...
5.1. Security Alerts Navigate through Logs> Security Alerts The status alerts page shows the list of alerts pertaining to the SIP attacks detected the STM Deep packet inspection engine at any instant. The administrator can choose to set log viewer page refresh interval in this page. It also chooses to configure the device to send email notifications summary about the security alerts generated by the device.
Page 49
STM User Manual This feature allows user to send the generated alerts in STM to the specified user. Figure 35: Edit Email Server Settings Enable E-mail User can either enable or disable this email notification. Notification Server IP/Port User can specify the Email server IP address and Server port.
STM User Manual 5.2. Call Blocker Logs Navigate through Logs> Call Blocker Logs You can see the logs for the call blocker rule which you have configured at call blocker module. It shows the, source timestamp IP address, source port which tries to make that call attempt.
STM User Manual Update Refresh Interval- Users can Update & Refresh the page interval. Refresh- click refresh button, to update the displayed messages and to reflect the most recent changes to a SIP monitoring logs being viewed. Download Logs- User can have the option to download the security alerts shown in this page in CSV format is available on the page.
Page 52
STM User Manual Search- You can check the Log messages that you have created and also search by mentioning the system log names in the search tab. Particular log can search by making use of Search field. Figure 38: System Logs www.allo.com...
The STM appliances support taking the configuration backup and restore the configuration later. Figure 39: Administration The configuration backup will contain the lastly persisted configuration, if there are any transient changes that are yet to be applied while taking the backup;...
The diagnostics page will allow the administrator to gather the troubleshooting logs which will help allo Support team in debugging any issues faced with STM deployment setup. To run the utility on the device, the administrator needs to click the ‘Run diagnostics’ button.
The administrator can troubleshoot the network connectivity issues with running ping from the STM device. The administrator needs to enter the IP address that needs to be pinged from the STM appliance/ping count and click the ‘Ping’ button to run the task. The ping results will be displayed in the text area once the ping task is complete.
STM User Manual Figure 43: Trace route 6.5. Troubleshooting Navigate through Tools> Troubleshooting This page will allow disable/enable the DPI on the STM appliance for troubleshooting purposes. Figure 44: Troubleshooting www.allo.com Version 1.0...
Download the STM firmware update package from allo website and keep it your local system. From the browser on your local system, login to STM WebUI and launch the STM firmware upgrade page. Click the ‘Browse’ in the firmware page and select the STM firmware update package file that you saved on your local system.
Navigate through Tools> Logs Archive If the USB storage device attached to STM, the device will attempt to archive older logs in the USB storage device. The summary information on the logs stored on the archive will be shown on the Logs Archive Page.
7. Frequently Asked Questions (FAQs) What are SIP Threat Management (STM) devices? SIP threat management (STM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console. SIP Threat Management (STM) devices combine an Intrusion Prevention System (IPS), Firewall into a single hardware platform.
STM User Manual Glossary 8. Glossary Term Definition (Denial DoS are an attempt to make a machine or network resource unavailable to Service) its intended users. DDos (Distributed DDOS is a type of DOS attack where multiple compromised systems which...
Page 61
STM User Manual Term Definition structured text that uses logical links (hyperlinks) between nodes containing text. HTTPS -Hyper Text It makes more difficult for hackers, the NSA, and others to track users. The Transport protocol makes sure the data isn't being transmitted in plain-text format, Protocol over Secure which is much easier to eaves drop on.
Page 62
STM User Manual Term Definition Secure This is the standard security technology for establishing an encrypted link Socket Layer between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.
Page 63
STM User Manual Term Definition Protocol (TCP) and, together with IP, is sometimes referred to as UDP/IP. TCP/IP- This is the suite of communications protocols used to connect hosts on the Transmission Internet. TCP/IP uses several protocols, the two main ones being TCP and IP.
STM User Manual Appendix 9. Appendix A – Using Console Access 1. Connect the serial console the serial port of STM device. 2. Use the following serial console settings to access the 'allo' CLI i. Speed : 38400 ii. Parity : None iii.
STM User Manual 10. Appendix B – Configuring STM IP Address via Console The user can choose to view/set the IP address of the STM device allo>show IP Now you can access the device from the browser using the URL https://<device-ip>...
Page 66
STM User Manual www.allo.com Version 1.0...
Need help?
Do you have a question about the STM and is the answer not in the manual?
Questions and answers