Snom 4S manual Web Server Integration

Page 54

5.

[ S N O M 4 S N A T F I L T E R ]

correctly.

The web requests that the SBC sends to the application server has the following parameters:

The parameter “action” is set to “auth”. By looking at this parameter, the application server can easily find out that it should do a pass- word lookup.

The parameter “from” contains the user/host pain. It has the format user@host, there is no scheme and no parameters included in this parameter.

The authentication cache is written with every web response. The response may contain any number of answered, but must at least contain the requests user/host pair. The answer must be encoded in a comma separated value format with no header line. The CSV response has the following fields:

The first cell contains the user/host pair in the same format as in the request. The SBC identifies the cache entry by this cell.

The second cell contains the user name that should be used for the challenging. Typically, this is identical with the user name part of the from cell, but sometimes the challenging should use a different name.

The third cell contains the realm that should be used for the chal- lenging. Again, this field should typically be identical to the host part of the from header, but in some situations this realm can be differ- ent (for example, when canonical realm names must be used).

The fourth cell contains the password in clear text.

The fifth cell contains the expiration of that cache entry in seconds. After this time the SBC will remove the entry from the list and issue another applications server request to refresh the values. A typical value would be one hour (3600 seconds).

The SBC interprets the presence of the parameters in the follow- ing way:

If the realm or the username are not set, that user will always be challenged with no hope for recovery. That practically means that the request is denied.

If realm and username are set but the password is empty, the re- quest will not be challenged; instead it will be assumed that the user

54 • Web Server Integration

Image 54
Contents Snom 4S NAT Filter Admin Manual Snom 4S NAT Filter Version Table of Contents Snmp Overview Features ApplicationsSnom technology AG Overview Architecture NAT Filter and SIPNAT Signalling SIP How does NAT work?Symmetrical RTP Media RTP Classification of User AgentsProbing Media Paths Role of the NAT FilterOptimizing the Media Path for Symmetrical NATSBC Behaviour RegisteringRTP Relay Snom technology AG Scaling and Redundancy NATDetecting the right NAT Filter Requirements on User Agents Non NAT-Aware User AgentsSTUN/ICE-Aware User Agents Defining the Maximum Session Time Architecture Installation WindowsInstallation Snom technology AG Installation Snom technology AG Linux Rpm -ihv snomnatf-2.10.*.rpm Installation Logging Port BindingStandard Port Random Port System Settings LoggingPreparing Recovery General Outound ProxyMedia Relay Media PortsPort Budgets Controlling RoutingMultiple 2xx Handling Challenging Trusted AddressesMaximum Packet Size Silence Suppression Connection Oriented MediaRemoving Headers Codec Control Web Server IntegrationClir Addresses Timeout Settings Register TimeoutsCall Timeouts Security Settings Snom technology AG Outbound Proxy List System Information Server LogTrace Call History Current Ports Currently Handled UA Memory StatisticsConfiguration Web Server Integration Authentication Interface to the Web ServerSnom technology AG Web Server Integration Registration Call Initiation Snom technology AG Call Termination Snom technology AG Web Server Integration Setup of the SBC Setup of the ToolsAvailable OID OIDSnom technology AG Snmp Checklist for Installation Checklist for Installation Reader‘s Feedback Snom technology AG All rights reserved