allowed-elements-profile

This configuration element is used to configure SIP allowlists which controls the passage of unknown headers and parameters in request and response traffic.

Parameters

name
A unique identifier of this allowed-elements-profile
description
A textual description for the allowed-elements-profile
allow-any
Enter list of headers that are allowed (with any parameter). When header-rules are added to a rule-set, they are automatically removed from this list. A header list is entered separated by commas, but without the “:” part of the header name. This parameter is initially populated with many allowed headers.
  • Default: Accept,Accept-Resource-Priority,Acme-Codec-Policy,Acme-Rfc2833,Alert-Info,Allow,Allow-Events,Authentication-Info,Authorization,Call-ID,Contact,Content-Disposition,Content-Encoding,Content-Length,Content-Type,CSeq,Diversion,Event,Expires,From,History-Info,Join,Max-Forwards,Min-Expires,Min-SE,P-Access-Network-Info,P-Asserted-Identity,P-Associated-URI,P-Called-Party-ID,P-Charging-Function-Addresses,P-Charging-Vector,P-DCS-LAES,P-DCS-Redirect,P-Preferred-Identity,P-Subscription-MSISDN,P-Visited-Network-ID,Path,Privacy,Proxy-Authenticate,Proxy-Authorization,Proxy-Require,RAck,Reason,Record-Route,Refer-To,Replaces,request-uri,Require,Resource-Priority,Retry-After,Route,RSeq,Security-Client,Security-Server,Security-Verify,Service-Route,Session-Expires,Session-ID,Subscription-State,Supported,To,Via,WWW-Authenticate
rule-sets
See the rule-sets subelement that follows.

Path

allowed-elements-profile is an element under the session router path. The full path from the topmost ACLI prompt is: configure terminal > session-router > allowed-elements-profile