RedMax EXtreme EX-LRT Anleitung zur Fehlerbehebung Seite 4

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 142
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 3
Oracle SBC Security Guide
Part 3: Security Features ............................................................................................................................. 22
The Security Model ................................................................................................................................ 22
Net-SAFE Architecture: SBC & Core Infrastructure Protection ............................................................ 22
Net-SAFE Architecture: Topology Hiding & SIP Manipulation ........................................................... 24
Security Specific Licenses ...................................................................................................................... 24
IDS Reporting ..................................................................................................................................... 24
Administrative Security Features (Optional) ...................................................................................... 25
FIPS License ....................................................................................................................................... 26
Configuring Monitoring and Performance Management Features ......................................................... 26
SNMP .................................................................................................................................................. 26
RADIUS Accounting .......................................................................................................................... 26
HDR over SFTP .................................................................................................................................. 27
Syslog .................................................................................................................................................. 27
Configuring AAA Integration ................................................................................................................ 27
SSH RADIUS Authentication ............................................................................................................. 27
TACACS+........................................................................................................................................... 27
Configuring Signaling & Media Interface Security ................................................................................ 28
Signaling/Media Management Functions ........................................................................................... 28
SIP Interface Security ......................................................................................................................... 28
Services ACLs .................................................................................................................................... 29
TLS for SIP ......................................................................................................................................... 31
OCSP................................................................................................................................................... 32
SRTP ................................................................................................................................................... 33
IPsec for SIP ....................................................................................................................................... 33
Call Admission Control (CAC)........................................................................................................... 34
Media Policing .................................................................................................................................... 35
DoS/DDoS Prevention ........................................................................................................................ 35
Attack Tool Prevention ....................................................................................................................... 36
Lawful Interception ............................................................................................................................. 36
Part 4: Appendices ...................................................................................................................................... 37
Appendix A: Secure Deployment Checklist ........................................................................................... 37
Appendix B: Port Matrix ........................................................................................................................ 38
Appendix C: DDoS Prevention for Peering Environments .................................................................... 40
Configuration Models: ........................................................................................................................ 40
Supported platforms: ........................................................................................................................... 40
Configuration Parameters ................................................................................................................... 40
Seitenansicht 3
1 2 3 4 5 6 7 8 9 ... 141 142

Kommentare zu diesen Handbüchern

Keine Kommentare