RedMax EXtreme EX-LRT Guide de dépannage Page 4

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 142
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 3
Oracle SBC Security Guide
Part 3: Security Features ............................................................................................................................. 22
The Security Model ................................................................................................................................ 22
Net-SAFE Architecture: SBC & Core Infrastructure Protection ............................................................ 22
Net-SAFE Architecture: Topology Hiding & SIP Manipulation ........................................................... 24
Security Specific Licenses ...................................................................................................................... 24
IDS Reporting ..................................................................................................................................... 24
Administrative Security Features (Optional) ...................................................................................... 25
FIPS License ....................................................................................................................................... 26
Configuring Monitoring and Performance Management Features ......................................................... 26
SNMP .................................................................................................................................................. 26
RADIUS Accounting .......................................................................................................................... 26
HDR over SFTP .................................................................................................................................. 27
Syslog .................................................................................................................................................. 27
Configuring AAA Integration ................................................................................................................ 27
SSH RADIUS Authentication ............................................................................................................. 27
TACACS+........................................................................................................................................... 27
Configuring Signaling & Media Interface Security ................................................................................ 28
Signaling/Media Management Functions ........................................................................................... 28
SIP Interface Security ......................................................................................................................... 28
Services ACLs .................................................................................................................................... 29
TLS for SIP ......................................................................................................................................... 31
OCSP................................................................................................................................................... 32
SRTP ................................................................................................................................................... 33
IPsec for SIP ....................................................................................................................................... 33
Call Admission Control (CAC)........................................................................................................... 34
Media Policing .................................................................................................................................... 35
DoS/DDoS Prevention ........................................................................................................................ 35
Attack Tool Prevention ....................................................................................................................... 36
Lawful Interception ............................................................................................................................. 36
Part 4: Appendices ...................................................................................................................................... 37
Appendix A: Secure Deployment Checklist ........................................................................................... 37
Appendix B: Port Matrix ........................................................................................................................ 38
Appendix C: DDoS Prevention for Peering Environments .................................................................... 40
Configuration Models: ........................................................................................................................ 40
Supported platforms: ........................................................................................................................... 40
Configuration Parameters ................................................................................................................... 40
Vue de la page 3
1 2 3 4 5 6 7 8 9 ... 141 142

Commentaires sur ces manuels

Pas de commentaire