allowed-elements-profile
This configuration element is used to configure SIP allowlists which controls the passage of unknown headers and parameters in request and response traffic.
Parameters
- name
- A unique identifier of this allowed-elements-profile
- description
- A textual description for the allowed-elements-profile
- allow-any
- Enter list of headers that are allowed (with any parameter). When header-rules
are added to a rule-set, they are automatically removed from this list. A
header list is entered separated by a space, but without the “:” part of the
header name. This parameter is initially populated with many allowed
headers. Example syntax is shows below.
- allow-any (Accept Accept-Resource-Priority Acme-Codec-Policy Acme-Rfc2833 Alert-Info Allow Allow-Events Authentication-Info Authorization Call-ID Contact Content-Disposition Content-Encoding Content-Length Content-Type CSeq Diversion Event Expires From History-Info Join Max-Forwards Min-Expires Min-SE P-Access-Network-Info P-Asserted-Identity P-Associated-URI P-Called-Party-ID P-Charging-Function-Addresses P-Charging-Vector P-DCS-LAES P-DCS-Redirect P-Preferred-Identity P-Subscription-MSISDN P-Visited-Network-ID Path Privacy Proxy-Authenticate Proxy-Authorization Proxy-Require RAck Reason Record-Route Refer-To Replaces request-uri Require Resource-Priority Retry-After Route RSeq Security-Client Security-Server Security-Verify Service-Route Session-Expires Session-ID Subscription-State Supported To Via WWW-Authenticate User-to-User)
- rule-sets
- See the rule-sets subelement that follows.
Path
allowed-elements-profile is an element under the session router path. The full path from the topmost ACLI prompt is: configure terminal > session-router > allowed-elements-profile