D-Link DFL-800-AV-12 User Manual - Page 153

SIP Components, SIP Media-related Protocols, SIP Usage Scenarios, SIP Configuration Options

Page 153 highlights

6.2.7. SIP Chapter 6. Security Mechanisms VOIP see also Section 6.2.8, "H.323".) SIP Components The following components are the logical building blocks for SIP communication: User Agents Proxy Servers Registrars These are the end points or "peers" that are involved in the peer-to-peer communication. These would typically be the workstation or device used in an IP telephony conversation. The word peer will often be used in this section in this context. These act as routers in the SIP protocol, performing both as peer and server when receiving peer requests. They forward requests to a peer's current location as well as authenticating and authorizing access to services. They also implement provider call-routing policies. The proxy is typically located on the unprotected side of the D-Link Firewall and this is the proxy location supported by the NetDefendOS SIP ALG. A server that handles SIP REGISTER requests is given the special name of Registrar. The Registrar server has the task of locating the host where the other peer is reachable. The Registrar and Proxy Server are logical entities and my in fact reside in the same physical server. SIP Media-related Protocols SIP sessions make use of a number of sub-protocols: SDP Session Description Protocol (RFC4566) is used for media session initialization. RTP Real-time Transport Protocol (RFC3550) is used as the underlying packet format for delivering audio and video streaming via IP using the UDP protocol. RTCP Real-time Control Protocol (RFC3550) is used in conjunction with RTP to provide out-of-band control flow management. SIP Usage Scenarios The NetDefendOS SIP ALG supports the following usage scenarios: 1. Internal to External The SIP session is between a peer on the protected side of a D-Link Firewall and a peer which is on the external, unprotected side. Communication typically takes place across the public Internet. 2. Same Network A refinement of the internal to internal scenario is the case where the two peers in a session reside on the same network. In all these three scenarios the proxy server is assumed to be on the unprotected side of the D-Link Firewall. SIP Configuration Options The following options can be configured for a SIP ALG object: 153

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

VOIP see also Section 6.2.8, “H.323”.)
SIP Components
The following components are the logical building blocks for SIP communication:
User Agents
These are the end points or "peers" that are involved in the peer-to-peer
communication. These would typically be the workstation or device used in an
IP telephony conversation. The word
peer
will often be used in this section in
this context.
Proxy Servers
These act as routers in the SIP protocol, performing both as peer and server
when receiving peer requests. They forward requests to a peer's current
location as well as authenticating and authorizing access to services. They also
implement provider call-routing policies.
The proxy is typically located on the unprotected side of the D-Link Firewall
and this is the proxy location supported by the NetDefendOS SIP ALG.
Registrars
A server that handles SIP REGISTER requests is given the special name of
Registrar. The Registrar server has the task of locating the host where the
other peer is reachable.
The Registrar and Proxy Server are logical entities and my in fact reside in the
same physical server.
SIP Media-related Protocols
SIP sessions make use of a number of sub-protocols:
SDP
Session Description Protocol
(RFC4566) is used for media session initialization.
RTP
Real-time Transport Protocol
(RFC3550) is used as the underlying packet format for
delivering audio and video streaming via IP using the UDP protocol.
RTCP
Real-time Control Protocol
(RFC3550) is used in conjunction with RTP to provide
out-of-band control flow management.
SIP Usage Scenarios
The NetDefendOS SIP ALG supports the following usage scenarios:
1. Internal to External
The SIP session is between a peer on the protected side of a
D-Link
Firewall
and
a
peer
which
is
on
the
external,
unprotected side. Communication typically takes place across
the public Internet.
2. Same Network
A refinement of the internal to internal scenario is the case
where the two peers in a session reside on the same network.
In all these three scenarios the proxy server is assumed to be on the unprotected side of the D-Link
Firewall.
SIP Configuration Options
The following options can be configured for a SIP ALG object:
6.2.7. SIP
Chapter 6. Security Mechanisms
153