The sip rules (IMO) need to have a cps feature if the source is not trusted.
It would be desirable (imo) for tje framework rules to auto setup ports 12000/5269/5222 etc. for related services if enabled. Is there any feature to disallow certain ua's or auto blacklist? ===================== Tony Graziano, Manager Telephone: 434.984.8430 sip: [email protected] Fax: 434.326.5325 Email: [email protected] LAN/Telephony/Security and Control Systems Helpdesk: Telephone: 434.984.8426 sip: [email protected] Helpdesk Contract Customers: http://support.myitdepartment.net Blog: http://blog.myitdepartment.net Linked-In Profile: http://www.linkedin.com/pub/ tony-graziano/14/4a6/7a4 On Apr 12, 2011 7:52 AM, "Eda Ercan" <[email protected]> wrote: > Hi all, > > Regarding this http://track.sipfoundry.org/browse/XX-5197 issue to create a > framework for managing iptables rules, a UI will be added to the patch > attached to this issue. I've added a UI mockup to the issue. Can you have a > look at this mockup and give me feedback if this makes sense? > > In Firewall rules tab, the rules will be displayed with an option to > enable/disable them. > In Custom rules tab, there will be the ability to add new rules and modify > the existing ones. However not all the rules will be included in this tab - > such as SIP port which can be configured from SipXproxy service, if this > port is modified from that page, firewall will be updated by the system. > > How does this sound? > > Eda
_______________________________________________ sipx-users mailing list [email protected] List Archive: http://list.sipfoundry.org/archive/sipx-users/
