EasyManua.ls Logo

AudioCodes Mediant MSBR Series

AudioCodes Mediant MSBR Series
801 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Version 7.2 449 Mediant MSBR
Reference Guide 68. sbc
Command Mode
Privileged User
Example
This example configures a Malicious Signature for the SIP scan attack:
(config-voip)# sbc malicious-signature-database 0
(malicious-signature-database-0)# name SCAN
(malicious-signature-database-0)# pattern header.user-
agent.content prefix 'sip-scan'
(malicious-signature-database-0)# activate
68.5 manipulation
This command configures SBC manipulation tables.
Syntax
(config-voip)# sbc manipulation
Command Description
ip-inbound-
manipulation
See Section 449.
ip-outbound-
manipulation
See Section 451.
Command Mode
Privileged User
68.5.1 ip-inbound-manipulation
This command configures the Inbound Manipulations table, which lets you define IP-to-IP
Inbound Manipulation rules. An Inbound Manipulation rule defines a manipulation sequence
for the source or destination SIP URI user part of inbound SIP dialog requests.
Syntax
(config-voip)# sbc manipulation ip-inbound-manipulation <Index>
(ip-inbound-manipulation-<Index>)#
Command Description
dst-host
Defines the destination SIP URI host name - full name,
typically located in the Request URI and To headers.
dst-user-name-pattern
Defines the prefix of the destination SIP URI user name,
typically located in the Request-URI and To headers.

Table of Contents

Other manuals for AudioCodes Mediant MSBR Series

Related product manuals