The sip rules (IMO) need to have a cps feature if the source is not trusted.

It would be desirable (imo) for tje framework rules to auto setup ports
12000/5269/5222 etc. for related services if enabled.

Is there any feature to disallow certain ua's or auto blacklist?

=====================
Tony Graziano, Manager Telephone: 434.984.8430
sip: [email protected]
Fax: 434.326.5325
Email: [email protected]

LAN/Telephony/Security and Control Systems Helpdesk: Telephone: 434.984.8426

sip: [email protected]

Helpdesk Contract Customers: http://support.myitdepartment.net

Blog: http://blog.myitdepartment.net

Linked-In Profile: http://www.linkedin.com/pub/ tony-graziano/14/4a6/7a4
On Apr 12, 2011 7:52 AM, "Eda Ercan" <[email protected]> wrote:
> Hi all,
>
> Regarding this http://track.sipfoundry.org/browse/XX-5197 issue to create
a
> framework for managing iptables rules, a UI will be added to the patch
> attached to this issue. I've added a UI mockup to the issue. Can you have
a
> look at this mockup and give me feedback if this makes sense?
>
> In Firewall rules tab, the rules will be displayed with an option to
> enable/disable them.
> In Custom rules tab, there will be the ability to add new rules and modify
> the existing ones. However not all the rules will be included in this tab
-
> such as SIP port which can be configured from SipXproxy service, if this
> port is modified from that page, firewall will be updated by the system.
>
> How does this sound?
>
> Eda
_______________________________________________
sipx-users mailing list
[email protected]
List Archive: http://list.sipfoundry.org/archive/sipx-users/

Reply via email to