Inspection Settings add more than 80 protections and VoIP settings. It protects against malicious attacks by:
As part of Inspection Settings, VoIP protections can be:
With Inspection Settings you can:
For example, if you add an exception that allows non-RFC compliant SIP traffic on a specified VoIP server, security is not compromised for all other VoIP traffic.
Inspection Settings can be configured for each profile and can be:
The Security Gateway has a number of Inspection Settings for MGCP. Inspection Settings protects against attacks by identifying attack signatures and identifying packets with protocol anomalies. Strict compliance is enforced with RFC-2705, RFC-3435 (version 1.0), and ITU TGCP specification J.171. In addition, all Inspection Settings network security capabilities are supported, such as inspection of fragmented packets, anti-spoofing, and protection against Denial of Service attacks.
To configure Inspection Settings:
The Inspection Settings window opens.
In the Settings column, MGCP Inspection Settings shows.
Double-click the service you want to configure. A window opens.
Specified VoIP services can be blocked if the services:
To configure Application Policy:
The Inspection Settings window opens.
A list of Settings options shows.
Notes:
Command Filtering blocks MGCP commands that must not be processed. MGCP command filtering makes it possible to block commands that the MGCP server does not support, or that you do not want the server to handle.
Supported MGCP Commands
There are nine MGCP commands. They are defined in RFC 3435 section 2.3. Commands can be sent by the MGCP server to the endpoint or from the endpoint to the MGCP server.
The Nine supported MGCP commands are:
To view enable supported commands:
The Inspection Settings window opens.
Check the boxes for the commands that you want to support.
It is possible to add new commands.
Important - If an MGCP server is flooded with requests that use commands that the server does not support, the server might experience an overload. An overloaded MGCP server will affect customer service levels.
User Defined MGCP Commands
RFC 3435 section 3.2.1.1 states: New verbs may be defined in further versions of the protocol. It may be necessary, for experimentation purposes, to use new verbs before they are sanctioned in a published version of this protocol. Experimental verbs MUST be identified by a four letter code starting with the letter X, such as for example XPER.
To add new commands:
The Inspection Settings window opens.
You can configure MGCP Command Filtering for these options:
Unknown commands are commands that do not show in the Blocked commands or Supported commands lists. By default, all unknown commands are blocked.
If user-defined commands include an SDP header and the option is selected, the gateway inspects the SDP header attached to the command. If this option is not selected, the SDP header is ignored.
When defining an MGCP command, you can specify if the command contains an SDP header. This VoIP security option parses the header and checks that it has the correct syntax. If the destination address and port in the header are allowed, the media connection is allowed through the gateway.
To block MGCP commands:
The Inspection Settings window opens.
A list of Settings options shows.
To configure Engine Settings:
The Inspection Settings window opens.
The SIP - General Settings window opens.
Fields
Enabling this option configures the gateway to use Hide NAT on the:
With this option disabled, the gateway uses Hide NAT only on the IP address of the MGCP endpoint phones. This option must be enabled in environments where:
A gateway dynamically opens ports for VoIP media channel, according to the information in the MGCP signaling connection. When you select this option, it prevents the opening of MGCP media channels. Do not select this option if an MGCP media channel passes through the gateway.