allowed-elements-profile

This configuration element is used to configure SIP allowlists which controls the passage of unknown headers and parameters in request and response traffic.

Parameters

name
A unique identifier of this allowed-elements-profile
description
A textual description for the allowed-elements-profile
allow-any
Enter list of headers that are allowed (with any parameter). When header-rules are added to a rule-set, they are automatically removed from this list. A header list is entered separated by a space, but without the “:” part of the header name. This parameter is initially populated with many allowed headers. Example syntax is shows below.
  • allow-any (Accept Accept-Resource-Priority Acme-Codec-Policy Acme-Rfc2833 Alert-Info Allow Allow-Events Authentication-Info Authorization Call-ID Contact Content-Disposition Content-Encoding Content-Length Content-Type CSeq Diversion Event Expires From History-Info Join Max-Forwards Min-Expires Min-SE P-Access-Network-Info P-Asserted-Identity P-Associated-URI P-Called-Party-ID P-Charging-Function-Addresses P-Charging-Vector P-DCS-LAES P-DCS-Redirect P-Preferred-Identity P-Subscription-MSISDN P-Visited-Network-ID Path Privacy Proxy-Authenticate Proxy-Authorization Proxy-Require RAck Reason Record-Route Refer-To Replaces request-uri Require Resource-Priority Retry-After Route RSeq Security-Client Security-Server Security-Verify Service-Route Session-Expires Session-ID Subscription-State Supported To Via WWW-Authenticate User-to-User)
rule-sets
See the rule-sets subelement that follows.

Path

allowed-elements-profile is an element under the session router path. The full path from the topmost ACLI prompt is: configure terminal > session-router > allowed-elements-profile