Print Download PDF Send Feedback

Previous

Next

SIP Advanced Configuration

Gateway Clustering Support for SIP

Synchronizing SIP Connections

SIP calls can be made across a ClusterXL cluster or a third-party cluster.

The Synchronize connections on Cluster option must be selected for:

To confirm that SIP connections through a cluster are synchronized:

  1. Open SmartConsole.
  2. Go to Object Explorer > Services.
  3. Locate your service with the search box and double-click on it.
  4. Select the Advanced tab.
  5. Make sure the Synchronize connections on Cluster box is checked.

    Note - The Synchronize connections on Cluster option is enabled by default.

  6. Click OK.
  7. Install the Access Control policy.

Configuring SIP-T Support

To configure support for RFC 3372 Session Initiation Protocol for Telephones (SIP-T):

  1. In the applicable $FWDIR/lib/user.def file on the Security Management Server (see sk98239), add this line:

    sipt_hosts = { <first_ip, second_ip> , <first_ip, second_ip> , .... ...., <first_ip, second_ip> } ;

    first_ip and second_ip are the IP addresses between which (bidirectional) SIP-T are allowed.

    For example, to allow SIP-T between 192.1.1.1 and 192.1.1.2, and between 192.1.1.1 and 192.1.1.3, add this line:

    sipt_hosts = { <192.1.1.1, 192.1.1.2> , <192.1.1.1, 192.1.1.3> } ;

    If the file does not exist, create it.

  2. Save the file.
  3. Install Policy.

SIP Protocol Anomaly Protection

RFC 3261 section 6, has rules for the structure of SIP headers:

Protocol anomalies can result in buffer overflow conditions, parser errors, and malformed packets. Protocol anomalies in SIP messages make SIP applications vulnerable to attacks that send repeated, huge quantities of fraudulent data. The data that eventually overwhelms the server.

For example, many buffer-overflow attacks send repeated, large headers to the VoIP phone. Buffer overflow conditions can also result in arbitrary code execution.

Stateful and Stateless protocol validation is done on SIP headers. SIP messages with header values that do not match correct usage are blocked.

There are two header security protections found in the main Protocol Anomaly protection.