There are many Inspection Settings profiles in SmartConsole that add means of protection to your gateway and protect against malicious attacks. You can configure the Inspection Settings to:
SmartConsole allows you to configure rule exceptions. For example,if you add an exception that allows non-RFC compliant SIP traffic on a specified VoIP server, security is not compromised for all other VoIP traffic.
Inspection Settings can be configured for each profile and can prevent, detect, or be inactive.
To configure Inspection Settings for VoIP:
The Inspection Settings window opens.
Note for MGCP:
The Security Gateway has a number of Inspection Settings for MGCP. The inspection settings identify attack signatures and packets with protocol anomalies . Strict compliance is enforced with RFC-2705, RFC-3435 (version 1.0), and ITU TGCP specification J.171. Additionally, all inspection settings network security capabilities are supported, such as inspection of fragmented packets, anti-spoofing, and protection against Denial of Service (DoS) attacks.
Note for H.323:
Use SmartConsole to configure VoIP phone and proxy ports. The gateway enforces security on that port. Each protocol uses port 5060 as a default port, but you can also configure new ports for your gateway.
To configure VoIP on a port:
The New <protocol> Service window shows.