Table of Contents
- Title and Copyright Information
- Related Documentation
- 1 General Security Principles
- 2 Secure Installation and Configuration
-
3
Security
Features
- The Security Model
- R.226 Security Recommendations
- Net-SAFE Architecture: SBC & Core Infrastructure Protection
- Net-SAFE Architecture: Topology Hiding & SIP Manipulation
- Security Specific Feature Sets
- Configuring Monitoring and Performance Management Features
- Configuring AAA Integration
- Signaling and Media Interface Security Configuration
- A Secure Deployment Checklist
- B Port Matrix
- C DDoS Prevention for Peering Environments
- D DDoS Prevention for Access Environments
- E Mitigating SIP Attacks
- F Intrusion Detection System
- G Blacklisting with Local Routing Tables
- H SNMP Monitoring
- I Syslog
- J Call Detail Records (CDR)
- K Historical Data Records (HDR)
- L ACLI Commands for Monitoring
- M SRTP Configuration and Troubleshooting