Inspection Settings add more than 80 protections and VoIP settings. It protects against malicious attacks by:
As part of Inspection Settings, VoIP protections can be:
With Inspection Settings you can:
For example, if you add an exception that allows non-RFC compliant SIP traffic on a specified VoIP server, security is not compromised for all other VoIP traffic.
Inspection Settings can be configured for each profile and can be:
To configure Inspection Settings:
The Inspection Settings window opens.
The SIP Protections service shows. Double-click the service. A window opens.
Note - We strongly recommended that you enable Strict SIP Protocol Flow Enforcement.
To enable Strict SIP Protocol Flow Enforcement:
The Inspection Settings window opens.
Specified VoIP services can be blocked if the services:
To configure Application Policy:
The Inspection Settings window opens.
A list of Settings options shows.
Notes:
A protocol anomaly is a field name or value in the protocol header that is RFC compliant, but deviates from usual use.
For example, the presentation of a field value which contains hundreds of characters, where normally, fewer than ten characters is usual. This is an anomaly.
If a protocol anomaly is found in the VoIP packet, this is a good indication that the VoIP network is being attacked.
RFC 3261 section 6, has rules for the structure of SIP headers:
Protocol anomalies can result in buffer overflow conditions, parser errors, and malformed packets. Protocol anomalies in SIP messages make SIP applications vulnerable to attacks that send repeated, huge quantities of fraudulent data. The data that eventually overwhelms the server.
For example, many buffer-overflow attacks send repeated, large headers to the VoIP phone. Buffer overflow conditions can also result in arbitrary code execution.
Stateful and Stateless protocol validation is done on SIP headers. SIP messages with header values that do not match correct usage are blocked.
To configure Protocol Anomaly Protection:
The Inspection Settings window opens.
There are two header security protections found in the main Protocol Anomaly protection.
In the general SIP header and not in specified header fields
In specific SIP header fields
To configure Engine Settings:
The Inspection Settings window opens.
The SIP - General Settings window opens.
Fields
This determines how long endpoint registration information is kept in the database if a timeout is not specified in a registration message.
If the endpoint does not send a user registration message in this period, registration information is deleted from the database.
SIP signaling idle timeout when RTP/RTCP traffic does not pass via the gateway
If you check this option when you use Hide NAT, the gateway is configured to translate the IP address and source port of SIP endpoints.
If this option in not checked, the gateway uses Hide NAT only on the IP address of the SIP endpoint phones. You must enable this option in environments where:
Note - To register all internal phones successfully on the server, the source port of the REGISTER message sent by the phone must be the same as the port in the Contact header of the REGISTER message. In Cisco IP Phones, for example, this is done by selecting the NAT Enabled option.
For more information, see SIP service on a non-default port.
The gateway can be configured to:
Endpoints register with the SIP server using their full name (usually a number). Calls to and from endpoints are made using a short extension name, such as a suffix of the full name.
The length of the extension name is configurable.
For example, If the full name of an endpoint registered with the SIP server is 987654321@example.com,
the configured extension length is 4. The gateway can associate calls to or from 4321@example.com
instead of the longer extension number.
This prevents SIP media channels from opening. A Security Gateway dynamically opens ports for the VoIP media channel based on the data in the signaling connection. Do not select this option if the SIP media channel passes through the gateway.