CHAPT ER
8-1
Cisco IOS XE Integrated Session Border Controller Configuration Guide for the Cisco ASR 1000 Series Aggregation Services Routers
OL-15421-01
8
Integrated Session Border Controller Security
Integrated Session Border Controller (SBC) for the Cisco ASR 1000 Series Routers offers high security
functions. Enterprise users want to protect their network and service providers want to protect their core
or backbone network. Because service providers allow direct users to come into their network to access
different services, it is critical to have high security. Customers also want to police the data coming into
their networks and require notification if any unwanted user tries to access the network. The data border
element (DBE) implementation supports various security features and policing of incoming data.
For example, the DBE supports the ETSI TS 102 333 Gate Management (GM) package to control
addressing for the local as well as the remote party. The DBE uses the source address mask and remote
source address filtering to specify a range of addresses rather than a specific address and port for the
source or remote address of the arriving packet. Data coming from other defined addresses are dropped
and reported to the Signaling Border Element (SBE) for security reasons. Local Source Properties
(Address and Port) and Remote Source Address Mask Filtering, described in this chapter, are supported
features of the GM package.
This chapter describes or cross-references supported security features. For a complete description of
commands used in this chapter, see the Cisco IOS Integrated Session Border Controller Command
Reference.
Contents
Firewall (Media Pinhole Control), page 8-2
H.248 Address Reporting Package, page 8-2
H.248 Session Failure Reaction Package, page 8-2
H.248 Termination State Control Package, page 8-2
Interim Authentication Header Support, page 8-3
IP NAPT Traversal Package and Latch and Relatch Support, page 8-3
Local Source Properties (Address and Port), page 8-4
NAPT and NAT Traversal, page 8-5
Remote Source Address Mask Filtering, page 8-5
Topology Hiding, page 8-6
Traffic Management Policing, page 8-6
Two-Rate Three-Color Policing and Marking, page 8-6