Acme Packet - Mitigating SIP Attacks
(Doc ID 1996219.1)
Last updated on DECEMBER 31, 2020
Applies to:Acme Packet Legacy Platform Software - Version S-Cz6.3.9 and later
Information in this document applies to any platform.
The goal of this document is to provide configuration recommendations to be implemented on the Acme Packet Net-Net Session Director (SD) to reduce the negative effects of SIP scanning tools.
The configuration techniques described will reduce the impact of attacks by known tools. The intent is to drop all packets received from these tools without responding wherever possible. This is not possible in all cases. DDoS BCPs and configuration adjustments will be recommended to reduce the impact of attacks on SD resources and allow uninterrupted service to legitimate, trusted users.
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document