Print Download PDF Send Feedback

Previous

Next

Enabling Inspection Settings on SIP

Inspection Settings add more than 80 protections and VoIP settings. It protects against malicious attacks by:

As part of Inspection Settings, VoIP protections can be:

With Inspection Settings you can:

Inspection Settings can be configured for each profile and can be:

Configuring SIP Protections

To configure Inspection Settings:

  1. In the Manage & Settings tab, go to Blades > General, select Inspection Settings.

    The Inspection Settings window opens.

  2. From the General tab, in the search window, enter SIP protections.

    The SIP Protections service shows. Double-click the service. A window opens.

  3. Double-click on the Inspection Profile of your choice. Select Advanced.
  4. Check the boxes to enable the protections that you want.
  5. Click OK.

Note - We strongly recommended that you enable Strict SIP Protocol Flow Enforcement.

To enable Strict SIP Protocol Flow Enforcement:

  1. In the Manage & Settings tab, go to Blades > General, select Inspection Settings.

    The Inspection Settings window opens.

  2. From the General tab, in the search window, enter Strict SIP Protocol Flow Enforcement.
  3. Double-click on the Inspection Profile of your choice.
  4. Select Override with Action > Accept.
  5. Click OK.

Configuring SIP Application Policy

Specified VoIP services can be blocked if the services:

To configure Application Policy:

  1. In the Manage & Settings tab, go to Blades > General, select Inspection Settings.

    The Inspection Settings window opens.

  2. From the General tab, in the search window, enter SIP.

    A list of Settings options shows.

  3. Double-click the settings you want to configure.
  4. Click OK.

Notes:

Configuring SIP Protocol Anomaly Protection

A protocol anomaly is a field name or value in the protocol header that is RFC compliant, but deviates from usual use.

For example, the presentation of a field value which contains hundreds of characters, where normally, fewer than ten characters is usual. This is an anomaly.

If a protocol anomaly is found in the VoIP packet, this is a good indication that the VoIP network is being attacked.

RFC 3261 section 6, has rules for the structure of SIP headers:

Protocol anomalies can result in buffer overflow conditions, parser errors, and malformed packets. Protocol anomalies in SIP messages make SIP applications vulnerable to attacks that send repeated, huge quantities of fraudulent data. The data that eventually overwhelms the server.

For example, many buffer-overflow attacks send repeated, large headers to the VoIP phone. Buffer overflow conditions can also result in arbitrary code execution.

Stateful and Stateless protocol validation is done on SIP headers. SIP messages with header values that do not match correct usage are blocked.

To configure Protocol Anomaly Protection:

  1. In the Manage & Settings tab, go to Blades > General, select Inspection Settings.

    The Inspection Settings window opens.

  2. From the General tab, in the search window, enter SIP.
  3. A list of Settings options shows.
  4. Double-click the settings you want to configure.
  5. Click OK.

There are two header security protections found in the main Protocol Anomaly protection.

Configuring SIP Engine Settings

To configure Engine Settings:

  1. In the Manage & Settings tab, go to Blades > General, select Inspection Settings.

    The Inspection Settings window opens.

  2. From the General tab, in the search window, enter SIP - General Settings.

    The SIP - General Settings window opens.

  3. Select Advanced and configure the fields.
  4. Click OK.

Fields

For more information, see SIP service on a non-default port.