EasyManuals Logo
Home>AudioCodes>Network Router>Mediant MSBR Series

AudioCodes Mediant MSBR Series User Manual

AudioCodes Mediant MSBR Series
801 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #449 background imageLoading...
Page #449 background image
Version 7.2 449 Mediant MSBR
Reference Guide 68. sbc
Command Mode
Privileged User
Example
This example configures a Malicious Signature for the SIP scan attack:
(config-voip)# sbc malicious-signature-database 0
(malicious-signature-database-0)# name SCAN
(malicious-signature-database-0)# pattern header.user-
agent.content prefix 'sip-scan'
(malicious-signature-database-0)# activate
68.5 manipulation
This command configures SBC manipulation tables.
Syntax
(config-voip)# sbc manipulation
Command Description
ip-inbound-
manipulation
See Section 449.
ip-outbound-
manipulation
See Section 451.
Command Mode
Privileged User
68.5.1 ip-inbound-manipulation
This command configures the Inbound Manipulations table, which lets you define IP-to-IP
Inbound Manipulation rules. An Inbound Manipulation rule defines a manipulation sequence
for the source or destination SIP URI user part of inbound SIP dialog requests.
Syntax
(config-voip)# sbc manipulation ip-inbound-manipulation <Index>
(ip-inbound-manipulation-<Index>)#
Command Description
dst-host
Defines the destination SIP URI host name - full name,
typically located in the Request URI and To headers.
dst-user-name-pattern
Defines the prefix of the destination SIP URI user name,
typically located in the Request-URI and To headers.

Table of Contents

Other manuals for AudioCodes Mediant MSBR Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the AudioCodes Mediant MSBR Series and is the answer not in the manual?

AudioCodes Mediant MSBR Series Specifications

General IconGeneral
BrandAudioCodes
ModelMediant MSBR Series
CategoryNetwork Router
LanguageEnglish

Related product manuals