RedMax EXtreme EX-LRT Guía para resolver problemas Pagina 4

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 142
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 3
Oracle SBC Security Guide
Part 3: Security Features ............................................................................................................................. 22
The Security Model ................................................................................................................................ 22
Net-SAFE Architecture: SBC & Core Infrastructure Protection ............................................................ 22
Net-SAFE Architecture: Topology Hiding & SIP Manipulation ........................................................... 24
Security Specific Licenses ...................................................................................................................... 24
IDS Reporting ..................................................................................................................................... 24
Administrative Security Features (Optional) ...................................................................................... 25
FIPS License ....................................................................................................................................... 26
Configuring Monitoring and Performance Management Features ......................................................... 26
SNMP .................................................................................................................................................. 26
RADIUS Accounting .......................................................................................................................... 26
HDR over SFTP .................................................................................................................................. 27
Syslog .................................................................................................................................................. 27
Configuring AAA Integration ................................................................................................................ 27
SSH RADIUS Authentication ............................................................................................................. 27
TACACS+........................................................................................................................................... 27
Configuring Signaling & Media Interface Security ................................................................................ 28
Signaling/Media Management Functions ........................................................................................... 28
SIP Interface Security ......................................................................................................................... 28
Services ACLs .................................................................................................................................... 29
TLS for SIP ......................................................................................................................................... 31
OCSP................................................................................................................................................... 32
SRTP ................................................................................................................................................... 33
IPsec for SIP ....................................................................................................................................... 33
Call Admission Control (CAC)........................................................................................................... 34
Media Policing .................................................................................................................................... 35
DoS/DDoS Prevention ........................................................................................................................ 35
Attack Tool Prevention ....................................................................................................................... 36
Lawful Interception ............................................................................................................................. 36
Part 4: Appendices ...................................................................................................................................... 37
Appendix A: Secure Deployment Checklist ........................................................................................... 37
Appendix B: Port Matrix ........................................................................................................................ 38
Appendix C: DDoS Prevention for Peering Environments .................................................................... 40
Configuration Models: ........................................................................................................................ 40
Supported platforms: ........................................................................................................................... 40
Configuration Parameters ................................................................................................................... 40
Vista de pagina 3
1 2 3 4 5 6 7 8 9 ... 141 142

Comentarios a estos manuales

Sin comentarios