RedMax EXtreme EX-LRT Guia de Resolução de Problemas Página 36

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
Vista de página 35
Oracle SBC Security Guide
Attacks can be prevented through configuration of Access Control Lists, appropriately sized traffic
queues, and trust level settings that will limit or blacklist endpoints that become abusive.
Configuration of these parameters will differ based upon the configuration model used peering, access,
or hybrid. Refer to either Appendix C: DDoS Prevention for Peering Environments or Appendix D:
DDoS Prevention for Access or Hybrid Environments, depending on the architectural model
implemented.
Note that a truly comprehensive and effective DDoS prevention design requires analysis of traffic
patterns, SIP message contents and performance characteristics of all peer devices to provide message
thresholds, CAC, and traffic policing settings. Please contact your Oracle Sales representative for
information on professional services designed to implement customized DDoS settings.
Attack Tool Prevention
Many SIP scanning and attack tools employed by fraudsters can be prevented through employment of
restrictive signaling thresholds and trust levels the same ones used for DDoS protection. However, some
deployments do not allow for this without impacting legitimate traffic. Attackers may also use commonly
available tools that have identifiable signaling patterns. In these cases, additional attack tool identification
and prevention may limit or prevent an attack from being successful.
Oracle recommends that any deployment with internet-connected interfaces comply with the settings
described in Appendix E: Mitigating SIP Attacks.
Lawful Interception
The SBC supports a Lawful Intercept capability as mandated by national laws in various countries.
Multiple interface types are supported. The feature purchasing and documentation are controlled, and the
LI capability has to be enabled with the installation of a license key. It must then be configured to
communicate with a server that provides the authorization ‘tickets’ to enable recording. After installation
of the LI license, a separate administrative user dedicated for LI configuration “li-admin” becomes active.
Vista de página 35
1 2 ... 31 32 33 34 35 36 37 38 39 40 41 ... 141 142

Comentários a estes Manuais

Sem comentários