RedMax EXtreme EX-LRT Guía para resolver problemas Pagina 14

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 142
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 13
Oracle SBC Security Guide
Access
In an access model the SBC is contacted by a SIP endpoint to relay endpoint signaling information. The
IP address of the endpoint is usually not known, so trust should be established through behavior such as
establishment of a successful registration. Once the endpoint becomes trusted, dynamic Access Control
Lists (ACL) and Call Admission Controls (CAC) can be applied. Monitoring of potentially abusive
behaviors provides a mechanism to “demote” or blacklist endpoints.
Hybrid
A hybrid model combines both Peering and Access topologies into a single configuration. This is a fairly
common model, where remote users use a registrar server in the core network, but their calls are
forwarded to a service provider on one of the peer connections.
Unified Session Manager
The Unified Session Manager (USM) provides edge security for an IMS network, and should be
positioned at access borders to integrate "traditional" SBC functionality with the core IMS session control
functions. It provides a user registrar, local subscriber tables and Call Session Control Function
components such as Proxy CSCF, Interrogating CSCF, Session CSCF, IMS Access Gateway, Emergency
CSCF and Breakout Gateway Control Function.
Vista de pagina 13
1 2 ... 9 10 11 12 13 14 15 16 17 18 19 ... 141 142

Comentarios a estos manuales

Sin comentarios