Table of Contents
- Title and Copyright Information
- About this Guide
- Revision History
- 1 General Security Principles
- 2 Secure Installation and Configuration
-
3
Security
Features
- The Security Model
- R.226 Security Recommendations
- Net-SAFE Architecture: SBC & Core Infrastructure Protection
- Net-SAFE Architecture: Topology Hiding & SIP Manipulation
- Security Specific Feature Sets
- Configuring Monitoring and Performance Management Features
- Configuring AAA Integration
- Signaling and Media Interface Security Configuration
- IKE Configuration
- A Secure Deployment Checklist
- B Port Matrix
- C DDoS Prevention for Peer and Access Environments
- D Mitigating SIP Attacks
- E Intrusion Detection System
- F Blocklisting with Local Routing Tables
- G SNMP Monitoring
- H Syslog
- I Call Detail Records (CDR)
- J Historical Data Records (HDR)
- K ACLI Commands for Monitoring
- L SRTP Configuration and Troubleshooting
- M Increase SSRC changes allowed in a SRTP stream