Table of Contents
- Title and Copyright Information
- About this Guide
- Revision History
- 1 General Security Principles
- 2 Secure Installation and Configuration
-
3
Security
Features
- The Security Model
- R.226 Security Recommendations
- Net-SAFE Architecture: SBC & Core Infrastructure Protection
- Net-SAFE Architecture: Topology Hiding & SIP Manipulation
- Security Specific Feature Sets
- Configuring Monitoring and Performance Management Features
- Configuring AAA Integration
- Signaling and Media Interface Security Configuration
- IKE Configuration
- A Secure Deployment Checklist
- B Port Matrix
- C Mitigating SIP Attacks
- D Intrusion Detection System
- E Blocklisting with Local Routing Tables
- F SNMP Monitoring
- G Syslog
- H Call Detail Records (CDR)
- I Historical Data Records (HDR)
- J ACLI Commands for Monitoring
- K SRTP Configuration and Troubleshooting