RedMax EXtreme EX-LRT Guía para resolver problemas Pagina 52

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 142
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 51
Oracle SBC Security Guide
The following are Media Manager parameters that have platform specific defaults. For this appendix,
these defaults will be used and are indicated in the platform results by system model.
Parameter
min-media-allocation
min-trusted-allocation
deny-allocation
Realm Configuration
The following realm-config parameters are used in the basic DDoS configuration. Only the bold
values are changes from the default configuration
Parameter
Access Realm
Core Realm
access-control-trust-level
low
high
invalid-signal-threshold
1
0
average-rate-limit
0
0
maximum-signal-threshold
4000
0
untrusted-signal-threshold
1
0
Note that the maximum-signal-threshold of 4000 is very high so as not to impact service. It should be
reduced to a number close to the maximum number of signaling messages from one client within the
tolerance-window on the realm, which by default is 30 seconds. Base the threshold on an actual trace to
account for the extraneous messages that are normally not considered, and make sure to account for
network loss and/or renegotiations.
SIP Interface
The following sip-interface->sip-ports parameter should be used for access environments.
Parameter
Access Realm
Core Realm
allow-anonymous
registered
all
DDoS-2 for software release S-CX6.3.0 and above
Software release S-CX6.3.0F2 and above introduces DDoS-2 for platforms: Acme Packet 3820, Acme
Packet 4500 CPU-1, Acme Packet 4500 CPU-2. DDoS-2 increases the number of trusted endpoints to a
maximum of 250K for Acme Packet 4500 and 125K for Acme Packet 3820. It also increases the number
of denied endpoints to a maximum 32K for Acme Packet 4500 and 16K for Acme Packet 3820. In the
new design, instead of providing a dedicated Traffic Manager flow for each endpoint, it provides 1024
TM-flows for each physical interface. A group of endpoints share one of the TM-flows. Dynamic trusted
endpoints are stored in the HASH table. Dynamic denied endpoints are stored in the CAM table.
show commands
The command show acl info provides information about present usage of the HASH table.
Vista de pagina 51
1 2 ... 47 48 49 50 51 52 53 54 55 56 57 ... 141 142

Comentarios a estos manuales

Sin comentarios