IDS Reporting

The Oracle® Enterprise Session Border Controller supports a wide range of intrusion detection and protection capabilities for vulnerability and attack profiles identified to date. The IDS reporting feature is useful for enterprise customers requirement to report on intrusions and suspicious behavior that it currently monitors.

Basic Endpoint Demotion Behavior

Each session agent or endpoint is promoted or demoted among the trusted, untrusted, and denied queues depending on the trust-level parameter of the session agent or realm to which it belongs. Users can also configure access control rules to further classify signaling traffic so it can be promoted or demoted among trust queues as necessary.

An endpoint can be demoted in two cases:

  1. Oracle® Enterprise Session Border Controller receiving too many signaling packets within the configured time window (maximum signal threshold in realm config or access control)
  2. Oracle® Enterprise Session Border Controller receiving too many invalid signaling packets within the configured time window. (invalid signal threshold in realm config or access control)

Endpoint Demotion Reporting

The Oracle® Enterprise Session Border Controller counts the number of endpoint or session agent promotions and demotions. Further, the Oracle® Enterprise Session Border Controller counts when endpoints or session agents transition from trusted to untrusted and when endpoints transition from untrusted to denied queues. These counts are maintained for SIP signaling applications. They appear as the Trust->Untrust and Untrust->Deny rows in the show sipd acls command.

SNMP Reporting

These per-endpoint counters are available under APSYSMGMT-MIB -> acmepacketMgmt -> apSystemManagementModule -> apSysMgmtMIBObjects -> apSysMgmtMIBGeneralObjects.

MIB NAME MIB OID PURPOSE
apSysSipEndptDemTrustToUntrust .1.3.6.1.4.1.9148.3.2.1.1.19 Global counter for SIP endpoint demotions from trusted to untrusted.
apSysSipEndptDemUntrustToDeny .1.3.6.1.4.1.9148.3.2.1.1.20 Global counter for SIP endpoint demotions from untrusted to denied.

HDR Reporting

The SIP (sip-ACL-oper) HDR ACL status collection groups include the following two metrics:

  • Demote Trust-Untrust (Global counter of endpoint demotion from trusted to untrusted queue)
  • Demote Untrust-Deny (Global counter of endpoint demotion from untrusted to denied queue)

Endpoint Demotion SNMP Traps

An SNMP trap can be sent when the Oracle® Enterprise Session Border Controller demotes an endpoint to the denied queue. This is set by enabling the trap on demote to deny parameter located in the media manager config configuration element.

When the trap on demote to deny parameter is enabled, apSysMgmtInetAddrWithReasonDOSTrap trap is sent. This trap supersedes the apSysMgmtInetAddrDOSTrap trap.

When the trap on demote to deny parameter is disabled the apSysMgmtInetAddrWithReasonDOSTrap trap is not sent from the Oracle® Enterprise Session Border Controller, even when an endpoint is demoted to the denied queue.

This apSysMgmtInetAddrWithReasonDOSTrap contains the following data:

  • apSysMgmtDOSInetAddressType—Blocked IP address family (IPv4 or IPv6)
  • apSysMgmtDOSInetAddress—Blocked IP address
  • apSysMgmtDOSRealmID—Blocked Realm ID
  • apSysMgmtDOSFromURI—The FROM header of the message that caused the block (If available)
  • apSysMgmtDOSReason—The reason for demoting the endpoint to the denied queue: This field can report the following three values:
    • Too many errors
    • Too many messages
    • Too many admission control failures

    Note:

    By default, this parameter is enabled for upgrade configurations, as the current behavior is to send a trap for every endpoint that is demoted to deny. However, for a new configuration created, the value to this configuration is disabled.

Trusted to Untrusted Reporting

Endpoints, however, transition to an intermediate state, untrusted, prior to being denied service. The Oracle® Enterprise Session Border Controller provides an ACLI parameter, trap-on-demote-to-untrusted, that generates an SNMP trap when a previously trusted endpoint transitions to the untrusted state. Trap generation is disabled by default.

SNMP Reporting

Endpoint state transitions continue to be tracked by two counters available under APSYSMGMT-MIB -> acmepacketMgmt -> apSystemManagementModule -> apSysMgmtMIBObjects -> apSysMgmtMIBGeneralObjects.

MIB NAME MIB OID PURPOSE
apSysSipEndptDemTrustToUntrust .1.3.6.1.4.1.9148.3.2.1.1.19 Global counter for SIP endpoint demotions from trusted to untrusted.
apSysSipEndptDemUntrustToDeny .1.3.6.1.4.1.9148.3.2.1.1.20 Global counter for SIP endpoint demotions from untrusted to denied.

Endpoint Demotion Trusted-to-Untrusted SNMP Trap

The system can generate an SNMP trap when an endpoint transitions from the trusted to the untrusted state. The trap is structured as follows.

apSysMgmtInetAddrTrustedToUntrustedDOSTrap NOTIFICATION-TYPE
OBJECTS { apSysMgmtDOSInetAddressType,
apSysMgmtDOSInetAddress,
apSysMgmtDOSRealmID,
apSysMgmtDOSFromUri,
apSysMgmtDOSReason }
STATUS current
DESCRIPTION
"This trap is generated when an IP is placed on a untrusted list from trusted list, and provides the ip address that has been demoted, the realm-id of that IP, (if available) the URI portion of the SIP From header of the message that caused the demotion."
::= { apSysMgmtDOSNotifications 5 }

The trap OID is 1.3.6.1.4.1.9148.3.2.8.0.5.

Endpoint Demotion Syslog Message

A Syslog message can be generated when an endpoint is demoted. Setting the media manager config, syslog-on-demote-to-deny parameter to enabled writes and endpoint demotion warning to the syslog every time an endpoint is demoted to the denied queue. By default, this configuration option is set to disabled. The syslog message has a WARNING Level and looks like this:

Jan 15 12:22:48 172.30.60.12 ACMESYSTEM sipd[1c6e0b90] WARNING SigAddr[access:168.192.24.40:0=low:DENY] ttl=3632 guard=798 exp=30 Demoted to Black-List (Too many admission control failures)

Event Log Notification Demotion from Trusted to Untrusted

You can enable your Oracle® Enterprise Session Border Controller to provide event log notification (a syslog message) any time it demotes an endpoint from trusted to untrusted. The log message contains this data: IP address of the demoted endpoint, the endpoint’s configured trust level, and the reason for demotion. This feature is enabled with the syslog-on-demote-to-untrusted parameter in the media manager.

Endpoint Demotion Configuration

To configure the Oracle® Enterprise Session Border Controller to send traps and/or write syslog messages on endpoint demotion:

  1. In Superuser mode, type configure terminal and press Enter.
    ORACLE# configure terminal
  2. Type media-manager and press Enter to access the media-level configuration elements.
    ORACLE(configure)# media-manager
    ORACLE(media-manager)#
  3. Type media-manager and press Enter.
    ORACLE(media-manager)# media-manager
    ORACLE(media-manager-config)#
  4. trap-on-demote-to-deny—Set this parameter to enabled for the Oracle® Enterprise Session Border Controller to send the apSysMgmtInetAddrWithReasonDOSTrap trap when applicable.
  5. syslog-on-demote-to-deny—Set this parameter to enabled for the Oracle® Enterprise Session Border Controller to write an endpoint demotion warning message to the syslog.
  6. syslog-on-demote-to-untrusted—Change this parameter from disabled (default), to enabled so the Oracle® Enterprise Session Border Controller will generate event notifications (syslog messages) when an endpoint becomes untrusted. For this capability to work, the IDS license must be installed on your system.
  7. trap-on-demote-to-untrusted—Set this parameter to enabled for the Oracle® Enterprise Session Border Controller to send the apSysMgmtInetAddrTrustedToUntrustedDOSTrap when the endpoint identified within the trap transitions from the trusted to untrusted state.
  8. Save your work.

Endpoint Demotion due to CAC overage

The Oracle® Enterprise Session Border Controller can demote endpoints from trusted to untrusted queues when CAC failures exceed a configured threshold. The Oracle® Enterprise Session Border Controller can also demote endpoints from untrusted to denied queues when CAC failures exceed a another configured threshold.

The Oracle® Enterprise Session Border Controller maintains CAC failures per-endpoint. The CAC failure counter is incremented upon certain admission control failures only if either one of cac-failure-threshold or untrust-cac-fail-threshold is non-zero.

The cac failure threshold parameter is available in the access control and realm configuration elements. Exceeding this parameter demotes an endpoint from the trusted queue to the untrusted queue. The untrust cac-failure-threshold parameter is available in the access control and realm configuration elements. Exceeding this parameter demotes an endpoint from the untrusted queue to the denied queue.

If both the cac failure threshold and untrusted cac failure threshold are configured to 0, then admission control failures are considered and counted as invalid signaling messages for determining if the invalid-signal-threshold parameter value has been exceeded.

CAC Attributes used for Endpoint Demotion

The Oracle® Enterprise Session Border Controller determines CAC failures only by considering the calling endpoint’s signaling messages traversing the calling realms' configuration. If an endpoint exceeds the following CAC thresholds, the Oracle® Enterprise Session Border Controller will demote the endpoint when the CAC failure thresholds are enabled.

  1. sip-interface user CAC sessions (realm-config, user-cac-sessions)
  2. sip-interface user CAC bandwidth (realm-config, user-cac-bandwidth)
  3. External policy server rejects a session

Authentication Failures used for Endpoint Demotion

If an endpoint fails to authenticate with the Oracle® Enterprise Session Border Controller using SIP HTTP digest authentication OR endpoint fails authentication with an INVITE with authentication incase registration-caching is disabled, and receives back a 401 or 407 response from the registrar

When the Oracle® Enterprise Session Border Controller receives a 401 or 407 message from the registrar in response to one of the following conditions, the endpoint attempting authentication is demoted.

  • endpoint fails to authenticate with the Oracle® Enterprise Session Border Controller using SIP HTTP digest authentication
  • endpoint fails to authenticate with the Oracle® Enterprise Session Border Controller using INVITE message when registration-caching is disabled

Endpoint Demotion Configuration on CAC Failures

To configure endpoint demotion on CAC failures:

  1. In Superuser mode, type configure terminal and press Enter.
    ORACLE# configure terminal
    ORACLE(configure)#
  2. Type session-router and press Enter.
    ORACLE(configure)# session-router
    ORACLE(session-router)#
  3. Type access-control and press Enter.
    ORACLE(session-router)# access-control
    ORACLE(access-control)#

    If you are adding this feature to an existing configuration, then you will need to select the configuration you want to edit.

  4. cac-failure-threshold—Enter the number of CAC failures for any single endpoint that will demote it from the trusted queue to the untrusted queue.
  5. untrust-cac-failure-threshold—Enter the number of CAC failures for any single endpoint that will demote it from the untrusted queue to the denied queue.
  6. Save your work.