On Thu, 17 May 2018, Daniel Tryba wrote:

You can do nothing to stop this kind of traffic. The only thing you can do is block it, either using only a whitelist (cumbersome) or generate a blacklist with for example fail2ban or a more elaborate honeypot setup. Or setup a proxy that will filter patterns you discover from

Keep in mind that since this is UDP, source addresses can be spoofed so any automated solution will need a whitelist so you don't get tricked into blocking legitimate traffic.

And since you 'need a whitelist' why not just use that and block everything else?

A clever solution to a mobile user base is to use knockd to allow remote access.

Thanks in advance,
Steve Edwards       sedwa...@sedwards.com      Voice: +1-760-468-3867 PST

-- Bandwidth and Colocation Provided by http://www.api-digital.com --

Check out the new Asterisk community forum at: https://community.asterisk.org/

New to Asterisk? Start here:

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:

Reply via email to