Configure Telephony Fraud Protection - ACLI
The telephony fraud protection feature requires configuration, which you can perform from the
Oracle® Enterprise Session Border Controller (E-SBC) ACLI by way of the
fraud-protection configuration element under System.
Before You Begin
- Confirm that you own the Advanced license.
- Add or upload at least one telephony fraud protection file to the E-SBC.
- Note the name of the fraud protection file that you want to use. Confirm that the system displays the ACLI.
Procedure
Use this procedure to enable telephony fraud protection management on the E-SBC. You must also specify the fraud protection file name and activate the configuration. You cannot specify multiple fraud protection files because the system recognizes only one file as the active source file.
Note:
The first time you configure the E-SBC to manage fraud protection, the system activates the file when you save and activate the configuration. After the initial configuration, the system does not refresh the fraud protection file when you save and activate other configuration changes on the E-SBC. The exception occurs when you specify a new file name in the fraud protection configuration, make changes to other configurations, and save and activate all of the changes at one time.

