Version 7.2 449 Mediant MSBR
Reference Guide 68. sbc
Command Mode
Privileged User
Example
This example configures a Malicious Signature for the SIP scan attack:
(config-voip)# sbc malicious-signature-database 0
(malicious-signature-database-0)# name SCAN
(malicious-signature-database-0)# pattern header.user-
agent.content prefix 'sip-scan'
(malicious-signature-database-0)# activate
68.5 manipulation
This command configures SBC manipulation tables.
Syntax
(config-voip)# sbc manipulation
Command Description
ip-inbound-
See Section 449.
ip-outbound-
See Section 451.
Command Mode
Privileged User
68.5.1 ip-inbound-manipulation
This command configures the Inbound Manipulations table, which lets you define IP-to-IP
Inbound Manipulation rules. An Inbound Manipulation rule defines a manipulation sequence
for the source or destination SIP URI user part of inbound SIP dialog requests.
Syntax
(config-voip)# sbc manipulation ip-inbound-manipulation <Index>
(ip-inbound-manipulation-<Index>)#
Command Description
dst-host
Defines the destination SIP URI host name - full name,
typically located in the Request URI and To headers.
dst-user-name-pattern
Defines the prefix of the destination SIP URI user name,
typically located in the Request-URI and To headers.