SBC Gateway Recommended Security Guidelines Ver 74
SBC Gateway Recommended Security Guidelines Ver 74
SBC Gateway Recommended Security Guidelines Ver 74
Security Guidelines
Version 7.4
Notice SBC & Media Gateways | Security Guidelines
Notice
Information contained in this document is believed to be accurate and reliable at the time
of printing. However, due to ongoing product improvements and revisions, AudioCodes
cannot guarantee accuracy of printed material after the Date Published nor can it accept
responsibility for errors or omissions. Updates to this document can be downloaded
from https://www.audiocodes.com/library/technical-documents.
This document is subject to change without notice.
Date Published: January-14-2024
WEEE EU Directive
Pursuant to the WEEE EU Directive, electronic and electrical waste must not be disposed of with
unsorted waste. Please contact your local recycling authority for disposal of this product.
Customer Support
Customer technical support and services are provided by AudioCodes or by an authorized
AudioCodes Service Partner. For more information on how to buy technical support for
AudioCodes products and for contact information, please visit our website at
https://www.audiocodes.com/services-support/maintenance-and-support.
Documentation Feedback
AudioCodes continually strives to produce high quality documentation. If you have any
comments (suggestions or errors) regarding this document, please fill out the Documentation
Feedback form on our website at https://online.audiocodes.com/documentation-feedback.
Related Documentation
- ii -
Notice SBC & Media Gateways | Security Guidelines
LTRT Description
30217 SSL 3.0 removed; TLS 1.3 added; cross-reference fixed; classification last rule
deny removed.
30219 IP validation for classification; typo classification stages; OAuth 2.0; TLS
versions; enforce password complexity; Telnet disabled; SSH settings; syslog
servers; PII masking; storage deletion; persistent storage.
30220 Updated to Ver. 7.40A.300; web paths and screens updated; defense against
ICMP flooding; HTTP host header validation; encrypting SIP header value.
30223 Default port for SIP over WebSocket; port assignment table
30226 Updated to Ver. 7.40A.500-2; hostname for Web interface; DNS rebinding
removed; HTTP host header removed
- iii -
Content SBC & Media Gateways | Security Guidelines
Table of Contents
1 Introduction 1
Security Threats 1
AudioCodes Security Solution 3
2 Separate Network Traffic 5
Identify Trusted and Un-trusted Networks 5
Implement Physical Network Separation using Ethernet Port Groups 5
3 Implement Layer 3/4 (Network) Firewall 7
Block Unused Network Ports 7
Define VoIP Traffic Firewall Rules 7
4 Secure Management Access 10
Change Default Management User Login Passwords 10
User Authentication by Third-Party Server 11
LDAP-based User Authentication and Authorization 11
RADIUS-based User Authentication 11
OAuth 2.0 Authentication using Azure AD 12
Implement Two-Way Authentication with X.509 Certificates 12
Secure HTTP Access using HTTPS 14
Secure Telnet Sessions 14
Secure CLI Sessions by SSH 14
Define Web, Telnet, and SSH Authorized Access List 15
Define Hostname for Web Interface 15
Secure SNMP Interface Access 16
Prefer SNMPv3 over SNMPv2 16
Secure SMNPv2 Access 16
Secure LDAP Communication 17
Customizing Access Levels per Web Page 18
5 Secure SIP using TLS (SIPS) 19
Use Strong Authentication Passwords 19
Use TLS Version 1.2 or 1.3 19
Block Multiple Client-Initiated TLS Renegotiations 20
Use TLS for SIP Interfaces and Block TCP/UDP Ports 20
Use TLS for Routing Rules 21
Implement X.509 Certificates for SIPS (TLS) Sessions 21
Use an NTP Server 22
OAuth 2.0-based Authentication for SIP Requests using Azure AD 23
6 Implement LDAP-based Conditional Call Routing 24
7 Define SIP Message Blocklist/Allowlist 25
8 Monitor and Log Events 26
- iv -
Content SBC & Media Gateways | Security Guidelines
-v-
Content SBC & Media Gateways | Security Guidelines
- vi -
CHAPTER 1 Introduction SBC & Media Gateways | Security Guidelines
1 Introduction
This document provides recommended security guidelines for safeguarding your network and
your AudioCodes device against malicious attacks.
Security Threats
AudioCodes devices are commonly located at the demarcation point between safe (trusted)
and unsafe (untrusted) networks. A typical example of an un-trusted network would be a SIP
trunk connected to an Internet Telephony Service Provider (ITSP) network; the trusted network
would be the internal LAN. The following figure illustrates this basic concept of trusted and
untrusted networks.
-1-
CHAPTER 1 Introduction SBC & Media Gateways | Security Guidelines
Attacks on your network from the un-trusted network may include the following:
■ Denial of Service (DoS) attacks: Malicious attacks designed to cripple your VoIP network by
overloading it with calls or service requests.
■ Network abuse and fraud: Malicious intrusion or service theft may take the form of an
unauthorized user gaining access to your VoIP network by mimicking an authorized user or
seizing control of a SIP proxy and initiating outbound calls to the PSTN for free. Another
possibility is using a compromised endpoint to redirect or forward calls for eavesdropping.
-2-
CHAPTER 1 Introduction SBC & Media Gateways | Security Guidelines
■ Viruses and malware: Computer viruses, worms, Trojan horses, and other malware can
infect user agent phones and SIP-based ACD infrastructure - just as they can computers and
servers - and degrade performance or completely disrupt service. As devices become more
sophisticated with distinct operating systems, malware also serves as a way to subjugate
devices and launch DoS attacks that piggyback encrypted links.
■ Identity theft: Phishing and "man-in-the-middle" can be used to acquire caller identification
information to gain unauthorized access to services and information. Theft by phone (or
service theft), whereby access to your corporate phone system is attempted by users
posing as legitimate ones can sky-rocket your corporation's phone bill.
■ Eavesdropping: The ability to listen to or record calls is easier on VoIP networks than on
PSTN. This is a concern not only because of personal privacy violations, but also because
sensitive information can be compromised and exploited.
■ Spam over Internet Telephony (SPIT): The delivery of unsolicited calls or voicemails can
inundate networks, annoy subscribers, and diminish the usefulness of VoIP networks.
These threats can exist, for example, at the following main IP network border points:
■ Interconnect: SIP trunks to ITSPs, using SIP signaling for inbound and outbound calls.
■ Trusted access: Private, managed IP networks that connect service providers' residential,
enterprise, or mobile subscribers (as part of an emerging federation of trusted networks).
■ Securing the Service: Secures the call services by implementing separation and defense of
different network entities (e.g., SIP Trunk, softswitch, and users):
● Ensures that only authorized users can access the device's management interface
● Protection against attacks on the device from SIP signaling and media (RTP).
For the SBC application, the device provides built-in protection from Denial of Service
(DoS) and Distributed Denial of Service (DDoS) attacks:
-3-
CHAPTER 1 Introduction SBC & Media Gateways | Security Guidelines
Due to the vast number and types of potential attacks (some described in the previous section),
security of your trusted VoIP network should be your paramount concern. The device provides
a rich set of features to support perimeter defense for protecting your trusted network from
the un-trusted ones. However, the device's security features and capabilities are only effective
if implemented correctly. Improper use of the device for perimeter defense may render the
overall security solution ineffective, thereby exposing your network to multiple threats.
The benefits of an IP-based telephony network are quite clear, but so are the threats and
security implications that need to be addressed. The IP borders of the IP telephony network are
the attack points and it's AudioCodes security solutions that are designed to help safeguard
your trusted network from such threats.
-4-
CHAPTER 2 Separate Network Traffic SBC & Media Gateways | Security Guidelines
Once identified, you need to handle the un-trusted networks with extreme caution in order to
safeguard your trusted network from malicious attacks from them. One of the main precautions
is to separate your trusted network from the un- trusted network, using different logical
configuration entities such as SRDs etc. The precautions and security guidelines are described in
detail in subsequent sections.
1. Open the Ethernet Groups table (Setup menu > IP Network tab > Core Entities folder >
Ethernet Groups), and then assign ports to different Ethernet Group:
2. Open the Ethernet Devices table (Setup menu > IP Network tab > Core Entities folder >
Ethernet Devices), and then configure VLAN IDs per Ethernet Group:
-5-
CHAPTER 2 Separate Network Traffic SBC & Media Gateways | Security Guidelines
3. Open the IP Interfaces table (Setup menu > IP Network tab > Core Entities folder > IP
Interfaces), and then sssign the Ethernet Devices (VLANs) to the different traffic network
interfaces:
-6-
CHAPTER 3 Implement Layer 3/4 (Network) Firewall SBC & Media Gateways | Security Guidelines
■ Add firewall rules per network interface: It's recommended to configure firewall rules for
packets from source IP addresses received on the OAMP interface and each SIP Control
(SIP) interface (configured in the IP Interfaces table). A less recommended alternative is to
define a single rule that applies to all interfaces (by configuring the 'Use Specific Interface'
parameter to Disable).
■ Define bandwidth limitation per rule: For each IP network interface, it's advised to
configure a rate-limiting value (byte rate, burst bytes and maximum packet size).
Bandwidth limitation prevents overloading (flooding) of your network and thereby, helps in
preventing attacks such as DoS on your device (on each network).
■ Define rules as specific as possible: Define the rules as detailed as possible so that they
block only the intended traffic.
■ Add an ICMP firewall rule: ICMP is typically used for pinging. However, malicious attackers
can send over-sized (floods) ICMP packets to a specific network address. Therefore, it's
recommended to define a rule for limiting these packets.
■ Add a rule to block all traffic: You must define a firewall rule that blocks all incoming traffic
(i.e., block all protocol traffic from all source IP addresses and ports for all interfaces). This
rule must be the last rule listed in the table, so that rules above it that allow specific traffic
are valid (otherwise, all traffic is blocked).
● If the 'Prefix Length' field on the Firewall Settings page is set to "0", the rule will
apply to all IP addresses, regardless of whether an IP address is specified in the
'Source IP' field. Thus, if you need to apply a rule to a specific IP address, make
-7-
CHAPTER 3 Implement Layer 3/4 (Network) Firewall SBC & Media Gateways | Security Guidelines
sure that you also set the 'Prefix Length' field to a value other than "0".
● The device provides built-in firewall rules that allow High Availability (HA) traffic
between Active and Redundant devices on the Maintenance network interface.
The Layer 3-4 VoIP traffic firewall rules are configured in the Firewall table (Setup menu > IP
Network tab > Security folder > Firewall). The following table shows a configuration example of
firewall rules:
Parameter Index
1 2 3 4 5
Match
'Prefix 16 16 0 8 0
Length'
Action
■ Index 1 and 2: Typical firewall rules that allow packets ONLY from specified IP addresses
(e.g., proxy servers). Note that the prefix length is configured.
-8-
CHAPTER 3 Implement Layer 3/4 (Network) Firewall SBC & Media Gateways | Security Guidelines
■ Index 3: A more "advanced” firewall rule - bandwidth rule for ICMP, which allows a
maximum bandwidth of 40,000 bytes/sec with an additional allowance of 50,000 bytes. If,
for example, the actual traffic rate is 45,000 bytes/sec, then this allowance would be
consumed within 10 seconds, after which all traffic exceeding the allocated 40,000
bytes/sec is dropped. If the actual traffic rate then slowed to 30,000 bytes/sec, the
allowance would be replenished within 5 seconds.
■ Index 4: Allows traffic from the LAN voice interface and limits bandwidth.
-9-
CHAPTER 4 Secure Management Access SBC & Media Gateways | Security Guidelines
■ The device is shipped with a default Security Administrator access-level user account with
username Admin and password Admin. This user has full read-write access privileges to the
device. It's recommended to change this default password to a hard-to-hack string. You can
change the username and password in the Local Users table (Setup menu > Administration
tab > WEB & CLI folder > Local Users):
■ The device is shipped with a default Monitor access-level user account with username User
and password User. This user only has read access privileges to the device. The read access
privilege is also limited to certain Web pages. However, this user can view certain SIP
settings such as proxy server addresses. Therefore, to prevent an attacker from obtaining
sensitive SIP settings that could result in possible call theft etc., either delete this user
account or change its default login password to a hard-to-hack string. This is done in the
Local Users table:
■ If you have deployed multiple devices, use a unique password for each device.
- 10 -
CHAPTER 4 Secure Management Access SBC & Media Gateways | Security Guidelines
An alternative to using an LDAP server is to use a RADIUS server, as discussed in the next
section.
1. Open the Authentication Server page (Setup menu > Administration tab > WEB & CLI
folder > Authentication Server), and then configuring the following parameters:
2. Open the RADIUS Servers table (Setup menu > IP Network tab > AAA Servers folder >
RADIUS Servers), and then configure the RADIUS authentication server for authenticating
the device with the RADIUS server:
- 11 -
CHAPTER 4 Secure Management Access SBC & Media Gateways | Security Guidelines
OAuth authentication is configured in the OAuth Servers table and Login OAuth Servers table.
However, for full configuration details, refer to the User's Manual.
■ The management station possesses a client certificate from a Certification Authority (CA).
1. Install a client certificate on the management station (your network administrator should
provide you with a certificate).
3. Open the TLS Contexts table (Setup menu > IP Network tab > Security folder > TLS
Contexts).
4. In the TLS Contexts table, add a new TLS Context or select the required TLS Context row,
and then click the Trusted Root Certificates link located at the bottom of the TLS Contexts
page.
- 12 -
CHAPTER 4 Secure Management Access SBC & Media Gateways | Security Guidelines
5. Click the Import button, browse to and select the Root CA certificate file (in base64-
encoded PEM format), and then click OK to import the file:
6. Since X.509 certificates have an expiration date and time, the device must be configured to
use Network Time Protocol (NTP) to obtain the current date and time. Without the correct
date and time, client certificates cannot operate.
7. Make sure that client certificates for HTTPS connections are required. Open the Web
Interfaces table (Setup menu > Administration tab > WEB & CLI folder > Web Interfaces),
and then from the 'Require Client Certificate' drop-down list of the OAMP Web interface,
select Yes:
- 13 -
CHAPTER 4 Secure Management Access SBC & Media Gateways | Security Guidelines
1. Open the Web Settings page (Setup menu > Administration tab > WEB & CLI folder > Web
Settings).
2. From the 'Secured Web Connection (HTTPS)' drop-down list, select HTTPS Only:
➢ To secure Telnet:
1. Open the CLI Settings page (Setup menu > Administration tab > WEB & CLI folder > CLI
Settings).
2. From the 'Enable Telnet Server' drop-down list, select Enable Secured:
➢ To enable SSH:
1. Open the SSH Settings page (Setup menu > Administration tab > WEB & CLI folder > SSH
Settings).
- 14 -
CHAPTER 4 Secure Management Access SBC & Media Gateways | Security Guidelines
● 'Kex Algorithms String': Define the Key Exchange Method (e.g., Diffie-Hellman-Group-
Exchange-SHA256).
For additional security, you can configure a public key for RSA key negotiation (instead of or in
addition to using a username and password) when accessing through SSH.
● The first authorized IP address in the list must be your computer's (terminal) IP
address; otherwise, access from your computer will be denied.
● The Web / Telnet / SSH authorized access list concerns OSI Layer 5 (Session).
However, you can also add firewall rules for Layer 3 (Network) and Layer 4
(Transport) with bandwidth limitation to limit access to management interfaces
(see Block Unused Network Ports on page 7).
1. Open the Access List page (Setup menu > Administration tab > WEB & CLI folder > Access
List).
Figure 4-9: Authorized IP Addresses for Accessing Web, Telnet and SSH Interfaces
- 15 -
CHAPTER 4 Secure Management Access SBC & Media Gateways | Security Guidelines
When there is an attempt to access the device with a hostname, the device checks that the
value of the Host header matches the configured hostname. If there is no match, the device
rejects the request with an HTTP 403 Forbidden response.
If you configure a hostname, you also need to define it on a DNS server so that it can
be resolved into an IP address.
1. Open the Web Settings page (Setup menu > Administration tab > Web & CLI folder > Web
Settings).
3. Click Apply.
1. Open the SNMPv3 Users table (Setup menu > Administration tab > SNMP folder > SNMP
V3 Users).
- 16 -
CHAPTER 4 Secure Management Access SBC & Media Gateways | Security Guidelines
read-only is "public".
In addition, by default, the SNMPv2 agent accepts SNMP Get and Set requests from any IP
address if the correct community string is used in the request. Therefore, to enhance security
with SNMPv2, implement Trusted Managers. A Trusted Manager is an IP address (management
station) from which the SNMP agent accepts and processes Get and Set requests. It's also
recommended that you periodically change these SNMP community string values.
➢ To secure SNMPv2:
1. Open the SNMP Community Settings page (Setup menu > Administration tab > SNMP
folder > SNMP Community Settings), and then configure the SNMPv2 community strings:
2. Open the SNMP Trusted Managers table (Setup menu > Administration tab > SNMP folder
> SNMP Trusted Managers), and then configure the SNMPv2 management stations:
1. Open the LDAP Servers table (Setup menu > IP Network tab > AAA Servers folder > LDAP
Servers).
- 17 -
CHAPTER 4 Secure Management Access SBC & Media Gateways | Security Guidelines
● From the 'TLS Context' drop-down list, select the TLS Context from the TLS Contexts
table.
1. Open the Customize Access Level table (Setup menu > Administration tab > Web & CLI
folder > Customize Access Level).
2. Configure customization rules. For example, the configuration below allows only users with
Security Administrator level to configure the Logging Filters page, while allowing users with
Monitor level to view only.
- 18 -
CHAPTER 5 Secure SIP using TLS (SIPS) SBC & Media Gateways | Security Guidelines
■ TLS: TLS 1.0, TLS 1.1, TLS 1.2, and TLS 1.3
■ Cipher: TLS cipher suites for server and client roles (per OpenSSL syntax)
■ Receipt of wildcards ('*') in X.509 Certificates when establishing TLS connections. These
wildcards can be part of the CN attribute of the Common Name field or the DNSName
attribute of the Subject Alternative Name field.
Recommended security guidelines for ensuring TLS for SIP signaling are described in the
subsequent subsections.
It's also recommended not to configure the device to use any TLS version (Any TLS1.x).
However, if some network entities use SSL 3.0 handshakes and some use a higher TLS version
(e.g., TLS 1.1), then you need to configure the device to use any version.
1. Open the TLS Contexts table (Setup menu > IP Network tab > Security folder > TLS
Contexts).
2. For the relevant TLS Context, from the 'TLS Version' drop-down list, select the required TLS
version. The example below assumes that the highest TLS versions supported by the
network entities are 1.1 and 1.2.
- 19 -
CHAPTER 5 Secure SIP using TLS (SIPS) SBC & Media Gateways | Security Guidelines
1. Open the TLS Contexts table (Setup menu > IP Network tab > Security folder > TLS
Contexts).
2. For the relevant TLS Context, from the 'TLS Renegotiation' drop-down list, select Disable:
1. Open the SIP Interfaces table (Setup menu > Signaling & Media tab > Core Entities folder >
SIP Interfaces).
- 20 -
CHAPTER 5 Secure SIP using TLS (SIPS) SBC & Media Gateways | Security Guidelines
1. Open the IP-to-IP Routing table (Setup menu > Signaling & Media tab > SBC folder >
Routing > IP-to-IP Routing).
2. For the relevant IP-to-IP Routing rule, from the 'Destination Transport Type' drop-down list,
select TLS:
The device supports the configuration of multiple TLS certificates, referred to as TLS Contexts.
TLS Contexts are assigned to Proxy Sets and/or SIP Interfaces, thereby enabling specific calls to
use specific TLS certificates.
The device is shipped with a working TLS configuration (TLS Context ID 0), consisting of a unique
Self-Signed Server Certificate. Self-Signed Certificate is the simplest form of an X.509 Certificate
- 21 -
CHAPTER 5 Secure SIP using TLS (SIPS) SBC & Media Gateways | Security Guidelines
that is issued by the device itself without the use of any certificate signer (CA). The Self-Signed
Certificate consists of the Public Key of the device that is signed by the Private Key of the device
itself. However, use of this certificate is strongly discouraged. The Self-Signed Certificate is
typically used in testing environments or for a low-scale deployment where solution security
may be sacrificed in favor of simplified configuration procedures. The Self-Signed Certificate
does not utilize CA trust relationships and its authenticity cannot be reliably verified. Instead,
you should establish a PKI for your organization (provided by your security administrator) and
use certificates signed by genuine CAs.
In a typical PKI scheme, Certificates are issued by a CA and provide an attestation by the CA that
the identity information and the public key belong together. Each party has a list of Trusted
Root Certificates – certificates of the CAs (or their roots) that are well-known and trusted by the
party. When the certificate from the other party is received, its signing entity (CA) is compared
with the Trusted Root Certificates list and if a match is found, the certificate is accepted.
■ Private Key File: This file contains a private key that is used to perform decryption. It's the
most sensitive part of security data and should never be disclosed to other entities.
■ Certificate File: This file contains a digital signature that binds together the Public Key with
identity information. The Certificate may be issued by a CA or self-signed (issued by the
device itself, which is not recommended – see above).
■ Trusted Root Certificate File: This file is the certificate of the Trusted Root CA used to
authorize certificates received from remote parties, based on the identity of the CA that
issued it. If the root certificate of this CA matches one of the Trusted Root Certificates, the
remote party is authorized.
1. Open the Time & Date page (Setup menu > Administration tab > Time & Date home icon).
- 22 -
CHAPTER 5 Secure SIP using TLS (SIPS) SBC & Media Gateways | Security Guidelines
Azure AD is Microsoft's cloud-based identity and access management service, designed for
Internet- based applications. As Azure AD doesn't support OAuth Token Introspection, the
device validates the received token using its embedded NGINX server, which simulates an
OAuth 2.0 Introspection endpoint.
For configuring OAuth 2.0-based authentication of SIP messages, refer to the User's Manual.
- 23 -
CHAPTER 6 Implement LDAP-based Conditional Call Routing SBC & Media Gateways | Security Guidelines
1. For configuring LDAP, use the LDAP Settings page, LDAP Server Groups table, and LDAP
Servers table (Setup menu > IP Network tab > AAA Servers folder).
2. For configuring Call Setup rules, use the Call Setup Rules table (Setup menu > Signaling &
Media tab > SIP Definitions folder > Call Setup Rules). The below Call Setup rule example
routes the incoming call only if the source number of the incoming call exists in the AD
server. The device queries the AD server for the attribute record, "telephoneNumber"
whose value is the same as the received source number (e.g., "telephoneNumber=4064").
If such an attribute is found, the device routes the call to the destination as specified in the
IP-to-IP Routing table. If the query fails (i.e., source number doesn't exist in AD server), the
device rejects the call.
Make sure that you implement secure LDAP communication, as discussed in Section
Secure LDAP Communication on page 17.
- 24 -
CHAPTER 7 Define SIP Message Blocklist/Allowlist SBC & Media Gateways | Security Guidelines
SIP message policy is helpful against VoIP fuzzing (also known as robustness testing), which
sends different types of packets to its "victims" for finding bugs and vulnerabilities. For
example, the attacker might try sending a SIP message containing an oversized parameter or
too many occurrences of a parameter.
Each SIP message policy rule can be configured with, for example, maximum message length,
header length, body length, number of headers, and number of bodies. Each rule is then set as
a blocklist or allowlist.
1. Open the Message Policies table (Setup menu > Signaling & Media tab > Message
Manipulation folder > Message Policies).
The following displays an example of a configured rule that defines maximum SIP messages
to 32,768 characters, maximum header length to 512 characters, and bodies to 1024
characters. Invalid requests are rejected. Only INVITE and BYE requests are permitted.
Figure 7-1: Configuring Message Policy Rule
- 25 -
CHAPTER 8 Monitor and Log Events SBC & Media Gateways | Security Guidelines
■ Block (blocklist) remote hosts (IP addresses / ports) considered as malicious. The device
automatically blocks the malicious source for a user-defined period after which it's
removed from the blocklist.
■ Send SNMP traps to notify of the malicious activity and/or whether an attacker has been
added to or removed from the blocklist.
The IDS configuration is based on IDS Policies, where each policy can be configured with a set of
IDS rules. Each rule defines a type of malicious attack to detect and the number of attacks
(alarm threshold) during an interval (threshold window) before an SNMP trap is sent. Each
policy is then applied to a target under attack (SIP Interface) and/or source of attack (Proxy Set
and/or subnet address).
➢ To configure IDS:
1. Open the IDS General Settings page (Setup menu > Signaling & Media tab > Intrusion
Detection folder > IDS General Settings), and then from the 'Intrusion Detection System
(IDS)' drop-down list, select Enable:
2. Open the IDS Policies table (Setup menu > Signaling & Media tab > Intrusion Detection
folder > IDS Policies), and then configure an IDS policy "ITSP DoS", as shown selected
below:
- 26 -
CHAPTER 8 Monitor and Log Events SBC & Media Gateways | Security Guidelines
3. Open the IDS Rule table by clicking the IDS Rule link located below the IDS Policies table,
and then configure IDS rules for the "ITSP DoS" IDS policy:
4. Open the IDS Matches table (Setup menu > Signaling & Media tab > Intrusion Detection
folder > IDS Matches), and then assign the IDS Policy to a specific SIP interface and subnet:
Enable Syslog
The device supports generation and reporting of syslog messages and SNMP traps to external
logging servers. It's crucial that you enable one or both these features (preferably syslog) so
that you can monitor events on your device. In addition, as the device does not retain logged
reports (SNMP is limited), it's recommended that you make sure that your syslog server saves
all logged events for future analysis and reference.
➢ To enable syslog:
1. Open the Logging Settings page (Troubleshoot menu > Troubleshoot tab > Logging folder >
Logging Settings).
2. From the 'Enable Syslog' drop-down list, select Enable, and then configure the relevant
parameters:
3. Open the Syslog Servers table (Troubleshoot menu > Troubleshoot tab > Logging folder >
Syslog Servers), and then configure a syslog server(s):
- 27 -
CHAPTER 8 Monitor and Log Events SBC & Media Gateways | Security Guidelines
■ Unauthorized Web login attempts (attempts to access the Web interface with a false or
empty user name or password)
■ Access to restricted Web pages such as the page on which firewall rules are defined
■ Modifications to parameter values (for example, deletion of firewall rules, allowing future
unauthorized access)
1. Open the Logging Settings page (Troubleshoot menu > Troubleshoot tab > Logging folder >
Logging Settings).
- 28 -
CHAPTER 8 Monitor and Log Events SBC & Media Gateways | Security Guidelines
1. Open the Advanced Parameters page (Troubleshoot menu > Troubleshoot tab > Call Detail
Record folder > Call Detail Record Settings).
- 29 -
CHAPTER 8 Monitor and Log Events SBC & Media Gateways | Security Guidelines
- 30 -
CHAPTER 9 GDPR for Protecting Personal Information SBC & Media Gateways | Security Guidelines
Masking PII
■ AudioCodes PII Log Scrubber Tool: This tool is based on a Python script that masks PII from
syslog files created by the device. You can run this tool on any computer or server that has
Python 3 installed. To download the tool from AudioCodes website, click here.
■ Masking PII in CDRs and SDRs: You can mask PII in CDRs and SDRs that are displayed in the
Web interface and CLI, and mask PII in CDRs that are sent to syslog, REST, RADIUS, Local
Storage, or OVOC (depending on configuration). In addition, you can mask digits in syslog
and DR.
a. Open the SIP Definitions General Settings page (Setup menu > Signaling & Media tab >
SIP Definitions folder > SIP Definitions General Settings).
◆ 'Mask PII in CDRs': Defines where the masking is done – CDRs/SDRs displayed in
the Web interface and CLI only, or also in those that are sent to local storage and
remote servers (e.g., syslog).
◆ 'Mask PII in QoE CDRs for OVOC': Enables masking in CDRs (QoE) sent to OVOC.
◆ 'Mask URI Host Part in CDRs': Masks the host part of URIs (including IP addresses)
in CDRs.
◆ 'Mask Digits': Masks digits (typically, in-band DTMF) sent as events and detected
by the device, including SIP messages (INFO and NOTIFY) in syslog and Debug
Recording (message body) generated by the device.
- 31 -
CHAPTER 9 GDPR for Protecting Personal Information SBC & Media Gateways | Security Guidelines
■ CDRs:
■ SDRs:
If you configure an "age" period, the device creates a new file when either the configured file
size is reached ('Persistent Log Size' parameter) or the "age" is reached ('Persistent Log Period'
parameter) -- whichever occurs first. Therefore, even if the configured file size for file rotation is
not reached (even empty), when the period expires the device creates a new file, deleting the
oldest persistent log file from storage.
1. Open the Logging Settings page (Troubleshoot menu > Troubleshoot tab > Logging folder >
Logging Settings).
2. In the 'Persistent Log Size' field, enter the log size for file rotation.
3. In the 'Persistent Log Period' field, enter the age period for file rotation.
Persistent logging is applicable only to Mediant 90xx and Mediant Software SBCs.
- 32 -
CHAPTER 9 GDPR for Protecting Personal Information SBC & Media Gateways | Security Guidelines
This feature is intended for SIP headers that are not used by the device for
classification or routing. For example, you may want to encrypt the value of a
proprietary SIP header called "P-Access-Network-Info" that may contain sensitive
information.
1. Open the SIP Definitions General Settings page (Setup menu > Signaling & Media tab > SIP
Definitions folder > SIP Definitions General Settings), and then in the 'AES-256 Encryption
Key' parameter, configure the encryption key.
2. Open the Message Manipulations table (Setup menu > Signaling & Media tab > Message
Manipulation folder > Message Manipulations), and then configure a Message
Manipulation rule to specify the SIP header to encrypt. Use the Funct.Encrypt and
Funct.Decrypt keywords in the 'Action Value' field to encrypt and decrypt the header,
respectively. For more information, refer to the device's User's Manual.
3. Open the IP Groups table, and then assign the Manipulation Set ID (configured in the
previous step) to the relevant IP Group.
- 33 -
CHAPTER 10 Hiding Passwords SBC & Media Gateways | Security Guidelines
10 Hiding Passwords
By default, the device hides all passwords in the management interfaces, by replacing them
with asterisks (*). Passwords are hidden in all the different areas of the management interfaces,
for example:
■ Activity Log - in the Web interface and CLI, and sent in syslog messages.
■ CLI command history buffer - appears when pressing the up and down arrow keys to recall
previously run commands or when using the history command to view the buffer. You
can show passwords (not recommended), using this CLI command: conf system >
cli-settings > password-history-visible on
- 34 -
CHAPTER 10 Password-Protect (Encrypt) Configuration Package File SBC & Media Gateways | Security Guidelines
1. Open the Configuration File page (Setup menu > Administration tab > Maintenance folder
> Configuration File).
3. Click the Download Configuration Package button; the following dialog box appears:
4. In the 'Password' and 'Verify' fields, type a password to protect the file.
5. To include all the certificates, select the 'Include Private Keys and device Certificates' check
box.
6. Click Yes.
- 35 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
This section is applicable only to the Session Border Controller (SBC) application.
General Guidelines
It's crucial that you separate trusted from un-trusted networks:
■ Separate un-trusted networks from trusted networks, by using different SRDs, IP Groups,
SIP Interfaces, and SIP Media Realms (with limited port range).
■ Similarly, separate un-trusted networks from one another. In particular, far-end users must
be separated from the ITSP SIP trunk, using a different SRD, IP Group, SIP interface, and
Media Realms. This separation helps in preventing attacks targeted on far-end user ports
from affecting other users.
■ For un-trusted networks, use strict classification rules over vague rules. For example, if the
ITSP's proxy IP address, port and host name are known, then use them in the classification
rules. This ensures that all other potentially malicious SIP traffic is rejected.
■ Globally (all calls): Media Security page (Setup menu > Signaling & Media tab > Media
folder > Media Security) - from the 'Media Security' drop-down list, select Enable:
■ Per specific calls using IP Profile: SRTP is enforced on the SBC legs of an IP Profile (Setup
menu > Signaling & Media tab > Coders & Profiles folder > IP Profiles). For each IP Profile
associated with a leg, configure the 'SBC Media Security Mode' parameter to SRTP. This
- 36 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
enforces the SBC legs to negotiate only SRTP media lines; RTP media lines are removed
from the incoming SDP offer \ answer.
1. Open the Network Settings page (Setup menu > IP Network tab > Advanced folder >
Network Settings).
2. From the 'Enable ICMP echo requests rate limiting' drop-down list, select Enable:
3. Click Apply.
The cryptographic hash algorithm used when the device sends the authentication challenge in
the SIP 401 or 407 response can be configured, using the [SIPServerDigestAlgorithm]
parameter.
- 37 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
➢ To authenticate users:
1. Open the IP Groups table (Setup menu > Signaling & Media tab > Core Identities folder >
IP Groups).
● In the 'Authentication Method List' field, enter the SIP message(s) to authenticate (e.g.,
"INVITE\REGISTER").
a. Open the Proxy & Registration page (Setup menu > Signaling & Media tab > SIP
Definitions folder>, and then from the 'User-Information Usage' drop-down list, select
Enable to enable the SBC User Info feature:
The 'User- Information Usage' field is available only if your device's License Key
includes a license for far-end users ("FEU").
b. Open the SBC User Information table (Setup menu > Signaling & Media tab > SBC
folder > SBC User Information), and then add users with authentication usernames
and passwords:
When the device receives a SIP request (with an OAuth access token) from a client application
(e.g., WebRTC client), the device introspects the token with the OAuth Authorization server
(HTTP server). Upon successful introspection, the device allows the client access to the device's
resources (e.g., registration and calls) and continues to handle and process the SIP request as
usual.
- 38 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
1. Open the Remote Web Services table (Setup menu > IP Network tab > Web Services folder
> Remote Web Services), add then configure a Remote Web Service to represent the
OAuth Authentication server.
2. Open the IP Groups table (Setup menu > Signaling & Media tab > Core Identities folder >
IP Groups), and then configure the following parameters:
● 'OAuth HTTP Service': Assign the Remote Web Service that you configured in Step 1
1. Open the RADIUS Servers table (Setup menu > IP Network tab > AAA Servers folder >
RADIUS Servers), and then configure the RADIUS sever (IP address, port and shared secret
password):
- 39 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
shared with the remote server. From such a challenge, the device can check if the server's
identity is genuine. The type of SIP message (e.g., INVITE) to authenticate can also be specified.
1. Open the IP Groups table (Setup menu > Signaling & Media tab > Core Identities folder >
IP Groups).
● In the 'Authentication Method List' field, enter the SIP message(s) to authenticate.
- 40 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
The device provides two optional mechanisms that can be employed to identify incoming
dialogs as coming from a specific Server-type IP Group:
Recommended usage:
If the IP address of the IP Group entity is known, it's recommended to employ classification
based on a Classification rule, where the rule is configured with not only the IP address, but
also with SIP message characteristics to increase strictness of the classification process.
When Classification rules are used and classify by Proxy Set is disabled (see below), it's
recommended to enable the 'Validate Source IP' parameter in the IP Groups table. This
setting verifies that the incoming dialog was sent from one of the IP addresses (including
DNS-resolved IP addresses) of the Proxy Set associated with the classified IP Group (see
Validate Source IP Address of Incoming SIP Dialog Requests on page 44). IP address
validation is also typically needed when multiple IP Groups are assigned to the same Proxy
Set and therefore, Classification rules are necessary to produce the desired mapping
(classification) of the incoming SIP dialogs to the different IP Groups.
Figure 11-9: Enabling Source IP Validation in IP Groups Table
The device uses the Classification table for classification only if the following
classification stages fail (listed chronologically):
1. The incoming SIP dialog is not from a SIP UA that is registered with the device
(i.e., not in user registration database).
2. The Classify by Proxy Set feature is disabled for the IP Group (i.e., source IP
address of incoming dialog is matched with a Proxy Set associated with the IP
Group but Classify by Proxy Set is disabled for the IP Group).
■ Classification by Proxy Set: Identifies incoming dialogs based on source IP address (Layer 3)
only. The Proxy Set defines the address of the IP Group. For this method, the device
searches for a Proxy Set that has the same source IP address as the incoming dialog, and
then classifies it to the IP Group that is assigned to this Proxy Set. Classification by Proxy Set
is enabled in the IP Groups table, using the 'Classify By Proxy Set' parameter:
Recommended usage:
If the IP address is unknown, in other words, the Proxy Set associated with the IP Group is
configured with an FQDN, it's recommended to employ SIP dialog classification based on
Proxy Set. This allows the SBC to classify the incoming dialog based on the DNS-resolved IP
- 41 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
address. The reason for classifying by Proxy Set is that IP address forgery (commonly known
as IP spoofing) is more difficult than malicious SIP message tampering and therefore, using
a Classification rule without an IP address offers a weaker form of security.
■ For Server-type IP Groups, use Classification rules only if the IP address of the IP Group is
known. If known, include the IP address in the Classification rule ('Source IP Address'
parameter). In addition, to increase classification strictness, configure SIP message
characteristics in the rule as well.
If the IP address is unknown (i.e., the Proxy Set associated with the IP Group is
configured with an FQDN), it's recommended to employ SIP dialog classification
based on Proxy Set (see Classify by Classification Rules versus Proxy Set on
page 40).
■ It's recommended to enable the 'Validate Source IP' parameter in the IP Groups table. This
setting verifies that the incoming dialog was sent from one of the IP addresses (including
DNS-resolved IP addresses) of the Proxy Set associated with the classified IP Group (see
Validate Source IP Address of Incoming SIP Dialog Requests on page 44). IP address
validation is also typically needed when multiple IP Groups are assigned to the same Proxy
Set and therefore, Classification rules are necessary to produce the desired mapping
(classification) of the incoming SIP dialogs to the different IP Groups.
■ For Server-type IP Groups whose IP addresses are known, it's recommended to also
configure VoIP firewall rules (see Block Unused Network Ports on page 7).
■ Use strict Classification rules over vague ones so that all other potentially malicious SIP
traffic is rejected. In other words, configure the rule with as much information as possible
that accurately characterizes the incoming SIP dialog (e.g., source and destination host
name).
■ Make sure that you configure the device to block unclassified calls, as described in Section
Validate Source IP Address of Incoming SIP Dialog Requests on page 44.
■ Use Message Condition rules to increase the strictness of the Classification process.
Message Condition rules enhance the process of classifying incoming SIP dialogs to an IP
Group. When a Classification rule is associated with a Message Condition rule, the
- 42 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
Classification rule is used only if its' associated Message Condition rule are matched.
Message Condition rules are SIP message conditions based on the same syntax used in the
Message Manipulations table. You can define complex rules using the "AND" or "OR"
Boolean operands. You can also use regular expressions (regex) as Message Condition
rules, for example:
● "body.sdp regex pcmu" can be used to enable routing based on the offered codec
(G.711 Mu) in the incoming SDP message
a. Configure a Message Condition rule in the Message Conditions table (Setup menu >
Signaling & Media tab > Message Manipulation folder > Message Conditions). The
following figure shows a Message Condition rule example for P-Asserted-Identity
headers that contain "abc":
b. Assign the Message Condition rule to the Classification rule in the Classification table,
using the 'Message Condition' parameter:
Classification rules are configured in the Classification table (Setup menu > Signaling & Media
tab > SBC folder > Classification). The following figure shows an example of two Classification
rules:
■ Index 0 "ITSP": Classifies received calls to Server-type IP Group "ITSP" if they have the
following incoming matching characteristics:
- 43 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
The device checks that it matches an IP address (or DNS-resolved IP address) of the Proxy Set
that is associated with the IP Group to which it's classified.
1. Open the IP Groups table (Setup menu > Signaling & Media tab > Core Entities folder > IP
Groups).
Validation is done for the IP address only (not port, transport, or SIP Interface).
1. Open the SBC General Settings page (Setup menu > Signaling & Media tab > SBC folder >
SBC General Settings).
- 44 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
recommended to configure the device so that it accepts only calls with a specific User-Agent
header value.
1. Open the Message Conditions table (Setup menu > Signaling & Media tab > Message
Manipulation folder > Message Conditions), and then add a rule that specifies a value for
the User-Agent header.
The following figure shows a rule where the SIP User-Agent header value is "abc.com":
Figure 11-16: Message Condition Rule for SIP User-Agent Header
2. Open the Classification table (Setup menu > Signaling & Media tab > SBC folder >
Classification), and then assign the Message Condition rule to the relevant Classification
rule.
■ Make sure that your routing rules are accurate and correctly defined. Inaccurate or weak
routing rules can easily result in Service Theft.
■ Make sure that your routing rules from source IP Group to destination IP Group are
accurately defined for the desired call routing outcome.
■ If possible, avoid using the asterisk (*) symbol to indicate "any" for a specific parameter in
your routing rule. This constitutes weak routing rules that can be vulnerable to attackers.
For strong routing rules, enter specific alphanumerical values instead of the asterisk.
CAC rules can limit the number of concurrent calls (SIP dialogs) per IP Group, SIP Interface or
SRD. The call limitation can be defined per SIP-dialog initiating request type (e.g., INVITE or
REGISTER messages), request direction (inbound, outbound, or both), and user. Requests that
exceed the user-defined limits are rejected (with SIP 480 "Temporarily Unavailable" responses).
You can also limit the incoming packet rate based on the "token bucket" mechanism.
■ It's crucial that your CAC rules include call limitations per user. This ensures that a user
doesn't make unlimited, simultaneous calls.
- 45 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
■ Define rules as specific as possible. For example, instead of defining one rule for all SIP
request types, create rules per request type.
If call routing to a specific IP Group is blocked due to a CAC rule, the device searches
for an alternative route (if configured) in the SBC IP- to- IP Routing table. If this
alternative route doesn't exceed the CAC rule limitation, the device uses it to route the
call.
1. Open the Call Admission Control Profile table (Setup menu > Signaling & Media tab > SBC
folder > Call Admission Control Profile).
The following displays an example of a CAC rule that defines a maximum of 100 concurrent
SIP INVITE requests. SIP requests received above this threshold are rejected:
Figure 11-17: Configuring CAC Rules in Call Admission Control Profile Table
1. Open the Gateway Advanced Settings page (Setup menu > Signaling & Media tab > SBC
folder > SBC General Settings).
2. In the 'Max Call Duration' field, enter the maximum call duration:
- 46 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
is because the AOR already exists in the device's registration database. Therefore, if an
illegitimate user attempts to connect with a legitimate IP address and phone number (without
authentication), the malicious user can connect and steal calls.
To overcome this issue and prevent stealing of calls, make sure that you configure the user and
proxy registration times with identical values.
1. Open the SBC General Settings page (Setup menu > Signaling & Media tab > SIP Definitions
folder > Proxy & Registration).
2. In the 'User Registration Time' field, configure the duration of the periodic registrations
between the user and the device.
3. In the 'Proxy Registration Time' field, configure the time interval (in seconds) that the
device must register to the server (e.g., PBX).
1. Open either the IP Groups table (Setup menu > Signaling & Media tab > Core Identities
folder > IP Groups), SIP Interfaces table (Setup menu > Signaling & Media tab > Core
Identities folder > SIP Interfaces), or SRDs table (Setup menu > Signaling & Media tab >
Core Identities folder > SRDs).
2. For the relevant IP Group, SIP Interface or SRD, in the 'Max. Number of Registered Users'
field, enter the maximum number of registered users:
- 47 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
1. Open the SIP Interfaces table (Setup menu > Signaling & Media tab > Core Identities folder
> SIP Interfaces) or SRDs table (Setup menu > Signaling & Media tab > Core Identities
folder > SRDs).
2. For the relevant SIP Interface or SRD, from the 'User Security Mode' drop-down list, select
Accept Registered Users:
1. Open the SIP Interfaces table (Setup menu > Signaling & Media tab > Core Identities folder
> SIP Interfaces) or SRDs table (Setup menu > Signaling & Media tab > Core Identities
folder > SRDs).
2. For the relevant SIP Interface or SRD, from the 'Enable Un-Authenticated Registrations'
drop-down list, select Disable:
The device accepts registration refreshes from users already in its database.
When the device is configured to authenticate BYE messages, it sends a SIP authentication
response to the sender of the BYE request and waits for the sender (user) to authenticate it.
The call is disconnected only if the authenticating server responds with a 200 OK.
- 48 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
1. Open the Proxy & Registration page (Setup menu > Signaling & Media tab > SIP Definitions
folder > Proxy & Registration).
The device employs topology hiding by implementing back-to-back user agent (B2BUA) leg
routing:
■ Strips all incoming SIP Via header fields and creates a new Via value for the outgoing
message
■ Performs Layer-3 topology hiding by modifying the source IP address in the SIP IP header
(for example, IP addresses of ITSPs equipment such as proxies, gateways, and application
servers can be hidden from outside parties)
In addition, to enhance topology hiding, you can modify the SIP To header, From header,
and/or Request-URI host name. This can be done using the Message Manipulation table or the
IP Group (for SIP URI host part manipulations). The Message Manipulation table also supports
Regular Expressions (Regex).
- 49 -
CHAPTER 11 SBC-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
1. Open the Malicious Signature table (Setup menu > Signaling & Media tab > SBC folder >
Malicious Signature), and then configure malicious signatures. The device provides
preconfigured malicious signatures.
2. Open the Message Policies table (Setup menu > Signaling & Media tab > Message
Manipulation folder > Message Policies), and then configure a Message Policy and enable
it to use the malicious signatures, by configuring 'Malicious Signature Database' to Enable:
3. Open the SIP Interfaces table (Setup menu > Signaling & Media tab > Core Entities folder >
SIP Interfaces).
4. For the SIP Interface of the calls that you want to apply the malicious signatures policy,
from the 'Message Policy' drop-down list, select the Message Policy that you configured in
Step 1:
- 50 -
CHAPTER 12 Gateway-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
1. Open the Gateway Advanced Settings page (Setup menu > Signaling & Media tab >
Gateway folder > Gateway Advanced Settings).
2. From the 'IP Security' drop-down list, select Secure All calls:
➢ To enable SIPS:
1. Open the Transport Settings page (Setup menu > Signaling & Media tab > SIP Definitions
folder > Transport Settings).
- 51 -
CHAPTER 12 Gateway-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
It's recommended to use the 'SIPS' parameter and not the 'SIP Transport Type'
parameter to define TLS. The 'SIP Transport Type' parameter provides only a TLS
connection to the next network hop whereas the 'SIPS' parameter provides TLS to the
final destination (over multiple hops).
3. Configure the local SIP TLS port for the SIP Interface in the SIP Interfaces table.
■ Make sure that your routing rules are accurate and correctly defined for the desired routing
outcome. Inaccurate or “loose” routing rules can easily result in service theft.
■ Avoid, if possible, using the asterisk "*" symbol and Any option to indicate any for a specific
parameter in your routing rules. This constitutes weak routing rules that can be vulnerable
to attackers. For strong routing rules, enter specific alphanumerical values instead of the
asterisk.
1. Open the IP Profiles table (Setup menu > Signaling & Media tab > Coders & Profiles folder
> IP Profiles).
2. For the relevant IP Profile, in the 'Number of Calls Limit' field, enter the maximum number
of concurrent calls:
3. Assign the IP Profile in the IP-to-Tel Routing table, Tel-to-IP Routing table, or IP Groups
table.
The maximum number of concurrent calls considers incoming and outgoing calls (i.e.,
summation of all calls).
- 52 -
CHAPTER 12 Gateway-Specific Security Guidelines SBC & Media Gateways | Security Guidelines
1. Open the Gateway Advanced Settings page (Setup menu > Signaling & Media tab >
Gateway folder > Gateway Advanced Settings).
2. In the 'Max Call Duration' field, enter the maximum call duration:
- 53 -
CHAPTER 13 Network Port Assignment SBC & Media Gateways | Security Guidelines
For increased security against attacks, it's highly recommended to change the default
port numbers (especially for the SIP application).
■ Port Number:
SSH Interfaces
table - 'Port'
■ Access Control:
Firewall table
(Layer 3/4) and
Access List table
■ Port Number:
Telnet Interfaces
table - 'Port'
■ Access Control:
Firewall table
(Layer 3/4) and
Access List table
- 54 -
CHAPTER 13 Network Port Assignment SBC & Media Gateways | Security Guidelines
■ Port Number:
Web Interfaces
table - 'HTTP
Port'
■ Access Control:
Firewall table
(Layer 3/4) and
Access List table
■ Port Number:
Web Interfaces
table - 'HTTPS
Port'
■ Access Control:
Firewall table
(Layer 3/4) and
Access List table
✔ SNMP traps:
SNMP Trap
Destinations
table - 'Trap
Port'
■ Access Control:
Firewall table
(Layer 3/4) and
SNMP Trusted
- 55 -
CHAPTER 13 Network Port Assignment SBC & Media Gateways | Security Guidelines
Managers table
■ Local interface:
DHCP Servers
table - 'Interface
Name'
■ Port Number:
Non-
configurable
■ Access Control:
Firewall table
(Layer 3/4)
■ Port Number:
SIP Interfaces
table – 'UDP
Port' or 'TCP
Port'
■ Access Control:
Firewall table
(Layer 3/4)
■ Port Number:
SIP Interfaces
table – 'TLS Port'
■ Access Control:
Firewall table
(Layer 3/4)
- 56 -
CHAPTER 13 Network Port Assignment SBC & Media Gateways | Security Guidelines
■ Access Control:
Firewall table
(Layer 3/4)
■ Port Number:
Media Realms
table – 'UDP Port
Range Start' and
'Number Of
Media Session
Legs'
■ Access Control:
n/a
■ Port Number:
n/a
Note: Applicable to
the following:
■ Standalone SBC
■ Signaling
Component in
Mediant CE
■ Signaling
Component in
Media
- 57 -
CHAPTER 13 Network Port Assignment SBC & Media Gateways | Security Guidelines
Transcoding
Cluster
■ Port Number:
n/a
Note: Applicable to
the following:
■ Standalone SBC
■ Signaling
Component in in
Mediant CE
■ Signaling
Component in
Media
Transcoding
Cluster
■ Port Number:
n/a
Note: Applicable to
the following:
■ Standalone SBC
■ Signaling
Component in in
Mediant CE
■ Signaling
Component in
Media
Transcoding
Cluster
■ Port Number:
- 58 -
CHAPTER 13 Network Port Assignment SBC & Media Gateways | Security Guidelines
n/a
Note: Applicable to
the following:
■ Standalone SBC
■ Signaling
Component in in
Mediant CE
■ Signaling
Component in
Media
Transcoding
Cluster
■ Port Number:
n/a
■ Port Number:
n/a
Note: Applicable to
the following:
■ Signaling
Component in in
Mediant CE
■ Media
Component in in
Mediant CE
■ Signaling
Component in
Media
Transcoding
Cluster
■ Media
Component in
Media
- 59 -
CHAPTER 13 Network Port Assignment SBC & Media Gateways | Security Guidelines
Transcoding
Cluster
- 60 -
CHAPTER 13 Network Port Assignment SBC & Media Gateways | Security Guidelines
- 61 -
International Headquarters
1 Hayarden Street,
Airport City
Tel: +972-3-976-4000
Fax: +972-3-976-4040
AudioCodes Inc.
80 Kingsbridge Rd
Tel: +1-732-469-0880
Fax: +1-732-469-2298
Website: https://www.audiocodes.com/
©2024 AudioCodes Ltd.. All rights reserved. AudioCodes, AC, HD VoIP, HD VoIP Sounds Better, IPmedia,
Mediant, MediaPack, What’s Inside Matters, OSN, SmartTAP, User Management Pack, VMAS, VoIPer-
fect, VoIPerfectHD, Your Gateway To VoIP, 3GX, VocaNom, AudioCodes One Voice, AudioCodes Meeting
Insights, and AudioCodes Room Experience are trademarks or registered trademarks of AudioCodes Lim-
ited. All other products or trademarks are property of their respective owners. Product specifications
are subject to change without notice.
Document #: LTRT-30226