Configure Telephony Fraud Protection - ACLI

The telephony fraud protection feature requires configuration, which you can perform from the Oracle® Enterprise Session Border Controller (E-SBC) ACLI by way of the fraud-protection configuration element under System.

Before You Begin
  • Confirm that you own the Advanced license.
  • Add or upload at least one telephony fraud protection file to the E-SBC.
  • Note the name of the fraud protection file that you want to use. Confirm that the system displays the ACLI.

Procedure

Use this procedure to enable telephony fraud protection management on the E-SBC. You must also specify the fraud protection file name and activate the configuration. You cannot specify multiple fraud protection files because the system recognizes only one file as the active source file.

Note:

The first time you configure the E-SBC to manage fraud protection, the system activates the file when you save and activate the configuration. After the initial configuration, the system does not refresh the fraud protection file when you save and activate other configuration changes on the E-SBC. The exception occurs when you specify a new file name in the fraud protection configuration, make changes to other configurations, and save and activate all of the changes at one time.
  1. Access the fraud-protection configuration element.
    ORACLE# configure terminal
    ORACLE(configure)# system
    ORACLE(session-router)# fraud-protection
    
  2. Type select, and press ENTER.
  3. Type show, and press ENTER.
  4. Enter the following settings:
    Attributes Instructions
    mode Type one of the following modes:
    • local—To use the E-SBC as the source of the fraud protection file.
    • comm-monitor—Not currently supported.
    • disabled—Default.
    file-name Enter the name of the fraud protection file.
    options Add fraud protection options. (Not supported in some releases. )
    allow-remote-call-terminate Not currently supported.
  5. Save and activate the configuration.