Inspection Settings add more than 80 protections and VoIP settings. It protects against malicious attacks by:
As part of Inspection Settings, VoIP protections can be:
With Inspection Settings you can:
For example, if you add an exception that allows non-RFC compliant SIP traffic on a specified VoIP server, security is not compromised for all other VoIP traffic.
Inspection Settings can be configured for each profile and can be:
Inspection Settings does these application layer checks:
To configure Inspection Settings:
The Inspection Settings window opens.
In the Settings column, H.323 Inspection Settings show.
Specified VoIP services can be blocked if the services:
Application policy options are not intended to protect against attacks.
To configure Application Policy:
The Inspection Settings window opens.
A list of Settings options shows.
A protocol anomaly is a field name or value in the protocol header that is RFC compliant, but deviates from usual use.
For example, if a protocol header presents a field value which contains hundreds of characters, when normally, fewer than ten characters present. This is an anomaly. If a protocol anomaly is found in the VoIP packet, this is a good indication that the VoIP network is being attacked.
To configure Protocol Anomaly Protection:
The Inspection Settings window opens.
To configure Engine Settings:
The Inspection Settings window opens.
The H.323 - General Settings window opens.
Fields
A timeout for a dynamically opened T.120 connection.
A gateway dynamically opens ports for VoIP media channel, based on the information in the H.323 signaling connection. When you select this option, it prevents the opening of H.323 media channels. Do not select this option if an H.323 media channel passes through the gateway.
Control connections are required by all H.323 connections. If you select this setting, make sure that the H.323 service is marked as allowed in the Rule Base and the control connections are dynamically opened by the firewall from the RAS messages. This option applies only to connections that start with RAS.
The endpoint usually initiates the H.323 (H.225) TCP connection to the Gatekeeper or server. In scenarios where the Gatekeeper initiates the TCP connection to the endpoint, this setting must be selected.
Note - In this scenario, Hide NAT on the internal network is not supported.