Views

Difference between revisions of "How to enable blocked SIP Providers"

The Wiki of Unify contains information on clients and devices, communications systems and unified communications. - Unify GmbH & Co. KG is a Trademark Licensee of Siemens AG.

Jump to: navigation, search
(Draft)
 
m (improve wording)
Line 1: Line 1:
The SIP protocol is used heavily for attacks from the Internet. OpenScape Office V3.2 and HiPath 3000 V9 have implemented blocking of unknown peers to prevent unautorized access.
+
The SIP protocol is used heavily for attacks from the Internet. As counter measure, OpenScape Office V3.2 and HiPath 3000 V9 have implemented a number of security mechanisms including the blocking of unknown peers.
  
[[ITSP]] communication is only possible with IP addresses and ports known to the system. If several servers are used by the ITSP they have to be communicated via DNS-SRV to the SEN platform. If this is not done by the provider a workaround described in the following document may be used.
+
External SIP communication e.g. with [[ITSP]]s is only possible via IP addresses and ports known to the system. If different servers are used by the ITSP, they have to be communicated via DNS-SRV to the SEN platform. If this is not done by the provider, the workaround described in the following document may be used.
  
 
{{File-DL|SIP Attack Protection - Diagnostics and Configuration Hints|pdf}}
 
{{File-DL|SIP Attack Protection - Diagnostics and Configuration Hints|pdf}}
  
The document gives a description of all protection mechanisms, diagostic data and recommended measures as well.
+
The document gives a description of all protection mechanisms, diagnostic data and recommended measures as well.

Revision as of 16:15, 13 December 2011

The SIP protocol is used heavily for attacks from the Internet. As counter measure, OpenScape Office V3.2 and HiPath 3000 V9 have implemented a number of security mechanisms including the blocking of unknown peers.

External SIP communication e.g. with ITSPs is only possible via IP addresses and ports known to the system. If different servers are used by the ITSP, they have to be communicated via DNS-SRV to the SEN platform. If this is not done by the provider, the workaround described in the following document may be used.

pdf.png  SIP Attack Protection - Diagnostics and Configuration Hints

The document gives a description of all protection mechanisms, diagnostic data and recommended measures as well.