Include Page |
---|
| Transparency_Profile_Note |
---|
| Transparency_Profile_Note |
---|
|
Info |
---|
|
The instructions, commands and references in this document apply to the (, , , and ).This document does not apply to SBC Edge (SBC 1000 and 2000 systems). |
1. Introduction
This document provides configuration and provisioning guidance to enable SIP transparency on
systems. In addition to the configuration examples on the Session Border Controller (
), this document provides an introduction to key topics related to SIP headers and bodies on the
platform.
1.1 Audience
This document is intended for design engineers, system engineers and operations staff for the purpose of deploying SIP on a
system. Although this document provides some background on the concepts involved, the reader is expected to have a basic understanding of SIP.
1.2 Support
Technical Support can be obtained using the following methods:
2. SIP Transparency
For some SIP elements, transparency is a frequently-debated topic. When transparency for a SIP header or body is desired, the user may often compare the element against a SIP Proxy which is a typical benchmark for significant transparency. Considered a popular comparison, this topic needs to addressed up front when discussing SIP transparency.
2.1 SIP Proxy vs. SIP B2BUA
The SIP devices that connect most peers and endpoints are typically a SIP Proxy or Back-to-Back User Agent (B2BUA). The most transparent device is the SIP Proxy; its behaviors are primarily specified in RFC 3261 and are very basic in its message processing capabilities. The required transparency of a Proxy is one of its few strengths when compared to a B2BUA.
Caption |
---|
0 | Figure |
---|
1 | SIP Transparency Spectrum |
---|
|
|
Although an
is not defined in any IETF standard, it is most closely associated functionally with a SIP B2BUA (RFC 5853, 7092). Unless otherwise specified, this document will use B2BUA and
terms interchangeably.
While RFC 3261 goes into detail describing the required behavior of a SIP Proxy, its description for a B2BUA could be considered somewhat terse: "Since it is a concatenation of a UAC [User Agent Client] and UAS [User Agent Server], no explicit definitions are needed for its behavior." This statement notwithstanding, debate and research into the transparency behavior of a B2BUA continued, but seemingly without consensus. An often referenced IETF draft (draft-marjou-sipping-01) submitted to the SIPPING WG was not accepted as a working group document.
Admittedly, complete SIP transparency is not achievable due to the needs and requirements of changing some headers. Even a SIP Proxy is not completely transparent. In many scenarios the ability to control and even minimize transparency is a strength of a B2BUA/
. Some key selling points of an
highlight its ability to not be transparent:
- SIP Normalization (including arbitrary SIP Message Manipulation)
- Topology Hiding
- Protocol Translation
- Codec Transcoding (allowing a non-transparent SDP)
Fundamentally, the
behaves as a SIP Back-to-Back User Agent (B2BUA) and not as a SIP Proxy. (If SIP Proxy behavior is actually needed then use of the
PSX Policy Server should be considered as it can be deployed specifically as a SIP Proxy or Redirector.) Unlike a standard SIP Proxy, the
can provide a wide spectrum of SIP message transparency, from fairly transparent to almost completely non-transparent.
This document describes the
SIP transparency controls, how they behave, and how they interact. Some configuration examples using these transparency controls is also provided.
3.
SIP Transparency and Control Mechanisms
Since its inception, the
includes two related types of control flags: Relay Flags and Transparency Flags. Relay Flags primarily control SIP at the Request and Response level and are discussed later in a separate section. Transparency Flags control SIP headers and bodies that are generally not modified when received in a SIP message. While these controls are related, there is no direct overlap or precedence between them.
Caption |
---|
|
Image Added |
3.1 Existing
Transparency Mechanisms
Prior to release 4.0, SIP header and body transparency was controlled primarily by the use of individual Transparency Flags, mostly within the IP Signaling Profile (IPSP; ipSignalingProfile > commonIpAttributes > transparencyFlags) and apply on the egress leg of a session (egress relative to the SIP message).
Caption |
---|
0 | Table |
---|
1 | IP Signaling Profile Transparency Flags |
---|
|
acceptContactHeader | pVisitedNetworkIDHeader | acceptHeader | qsigBody | acceptLanguageHeader | reasonHeader | alertInformationHeader | referredByHeader | authcodeHeaders | requestURI | callInfoHeader | resourceListBody | contactHeader | resourcePriorityOptionTag | errorInfo | rlmiBody | externalBody | routeHeader | fromHeader | serverHeader | geolocation | serviceRouteHeader | geolocationError | simpleFilterBody | geolocationRouting | sipBody | historyInfo | sipfragBody | maxForwardsHeader | toHeader | mwiBody | toneBody | pAccessNetworkInfoHeader | unknownBody | passCompleteContactHeader | unknownHeader | pathHeader | userAgentHeader | pCalledPartyID | userToUserHeader | pChargingVectorHeader | viaHeader | pEarlyMedia | warningHeader | pidfBody | watcherInfoBody | pidfDiffBody | |
The message bodies are described in blue cells. |
If a header or body did not have a specific flag on the
, it was treated as
unknown, which meant it, along with any other
-unknown header, was controlled by the single unknownHeader flag (or unknownBody).
When a transparency flag was added for a header, it meant that the header was now known and that the unknownHeader flag no longer controlled it.
This methodology was problematic as headers transitioned from unknown to known on the
. It also meant that the unknownHeader flag was a very coarse control as it would allow any header that was unknown to the
.
The
introduced a more robust future-proofing mechanism in release 4.0 called the Transparency Profile.
version 4.2 extends the Transparency Profile with similar support for SIP message bodies and the flexible ability to explicitly exclude some headers and/or methods.
3.2 SIP Transparency Profile
Excerpt |
---|
A Transparency Profile is a user-configurable profile allowing the user to transparently pass almost any SIP header/body through the . It is no longer necessary for a user to request to create a specific Transparency Flag for the desired header/body.Both already-known and previously-unknown SIP headers and bodies can be configured in a Transparency Profile. By default, no headers or message bodies are present in a Transparency Profile. If a received Content-Type header value matches any “Message Body” entry configured in the Transparency Profile, the transparently passes the corresponding message body in the outgoing message. The supports configuring up to 256 Transparency Profiles.The following functionality is included: - Ability to transparently pass "all" SIP headers and message body types.
- Selectively ignore transparency of select headers and message body types (useful when transparency is enabled for all headers and/or message body types).
- Exclude one or more methods for which transparency of headers or message body types is not needed.
|
When a header or body is specified in a Transparency Profile, the profile will take precedence over any applicable Transparency Flag. For headers not specified in a transparency profile, the setting of existing Transparency Flags will continue to determine the transparency of that header. In this way, a Transparency Profile can either override or augment existing Transparency Flag settings. This document will describe some usage scenarios where both mechanisms may be used together.
When configuring a Transparency Profile for specific SIP headers,
recommends that the unknownHeader flag be disabled (similarly, when configuring a Transparency Profile for specific SIP message bodies,
recommends that the unknownBody flag be disabled).
The following transparency is not supported by the
:
PRACK messages and responses to PRACK messages are not sent end-to-end through the . Therefore, the Spacevars |
---|
0 | product- does not support transparency of message-bodies or headers in these messages.ACK messages are not normally sent end-to-end through the . Transparency of ACK messages is not supported even if the
endToEndAck
flag is enabled in the "IP Signaling Profile". - In late media scenarios, the does not support transparency of headers and bodies.
- Transparency for headers and bodies is not supported for methods such as CANCEL and methods that are "hop-by-hop".
For configuration details, see Service Profiles - Transparency Profile (EMA) or Transparency Profile - CLI.
The
introduced the Transparency Profile in release 4.0 to configure one or more SIP headers in a single profile to be passed transparently through. Release 4.2 extended the abilities of the Transparency Profile further. It now supported transparency for out-of-dialog messages, the ability to exclude specific headers from transparency and the ability to configure transparency on a per-method basis (e.g. INVITE, REGISTER, SUBSCRIBE, REFER, etc...), where specific methods can be excluded from transparency for that header. If no methods are specified to be excluded, then the configured header will be transparent for all methods.
Code Block |
---|
|
set profiles services transparencyProfile <profile> sipHeader <SIP Header> |
where <SIP Header>
is case insensitive, supports up to 31 characters, and supports an "all" entry to match all headers (see section 3.3 for exceptions).
The ability to exclude specific headers from transparency is primarily intended for use in conjunction with the "all" header option.
SIP headers are also configurable using compact form. When configuring specific headers in a Transparency Profile,
recommends the configuration of both compact and long forms.
Compact form can be received by the
, but the
never generates the Compact form of any headers.
The
does not send multiple header instances as a comma separated list; they are always sent as separate headers.
The following SIP headers are not controlled by the Transparency Profile (or any Transparency Flags), and are ignored if configured in a Transparency Profile:
- Allow
- Call-ID
- CSeq
- Max-Forwards
- Require
- RSeq
- Supported
Info |
---|
|
The transparency of Allow, Supported, and Require headers can be controlled by using SIP Param Filter Profile. For more information, refer to SIP Param Filter Profile. |
If Contact Header is specified in a Transparency Profile, then it is treated as full Contact transparency and it will take precedence over other Contact related flags (such as useZoneLevelDomainNameInContact).
3.2.2 SIP Message Body
version 4.2 extends the Transparency Profile with similar support for SIP message bodies. In addition, both message header and body transparency is configurable on a per-method basis (e.g. INVITE, REGISTER, SUBSCRIBE, REFER, etc...), where specific methods can be excluded from transparency for that body. If no methods are specified to be excluded, then the configured body is transparent for all methods.
Code Block |
---|
|
set profiles services transparencyProfile <profile> sipMessageBody <Content-Type> |
where <Content-Type>
is case insensitive, supports up to 127 characters, and supports an "all" entry to match all message bodies except those described in the below list.
The following Content-Types are not controlled by the Transparency Profile and are ignored if configured in a profile:
- application/sdp
- application/dtmf
- application/dtmf-relay
- application/sonus-media
- application/broadsoft
- application/isup
- multipart/mixed
- multipart/alternative
Multipart/mixed and multipart/alternative are ignored because the
automatically matches each component message body contained within a multipart message independently. For example, if "application/qsig" is configured in a profile, the
will match it even if it is contained within a multipart/mixed message with no additional configuration needed.
A Transparency Profile cannot control the SDP (application/sdp). The SDP and its controls will be discussed later in this document.
The other exceptions are due to existing Relay Flags (see table below) elsewhere within the
.
Caption |
---|
0 | Table |
---|
1 | Relay Flags That Control SIP Message Bodies |
---|
|
Relay Flag | Configuration Location | Content Applicability |
---|
dtmfBody | IP Signaling Profile | application/dtmf and application/dtmf-relay | sonusMediaBody | IP Signaling Profile | application/sonus-media | thirdPartyBodies | IP Signaling Profile | application/broadsoft | isupMimeBodyRelay | SIP Trunk Group | application/isup |
|
See Relay Flags below for details.
3.2.3 Inter-working with IP Signaling Profile
SIP Transparency Profile provides advanced control of the transparency of headers and message bodies. However, customers may continue with the existing (albeit simple) IPSP transparency controls in PSX/e-PSX/ERE.
Using message body transparency as an example:
- If a message body is allowed by the IPSP but configured to be ignored by the Transparency Profile, it is not transparently passed through.
- If a message body is allowed by the IPSP but configured to be excluded by the Transparency Profile for a particular SIP method, it is not transparently passed through for that specific SIP method.
- If specific message bodies are allowed by the IPSP, but transparency of 'all' message bodies is configured in the Transparency Profile, all types of message bodies are transparently passed through.
- If 'Unknown Body' transparency is enabled in the IPSP, but an unknown message body is configured to be ignored (or excluded for a specific SIP method) by the Transparency Profile, it is not transparently passed through.
Header transparency is based on the headers that are present in the Transparency Profile of the egress trunk group for requests and headers that are present in the ingress trunk group for responses. By default, no headers are present in the Transparency Profile.
Info |
---|
|
Headers may be configured in compact form and transparently passed using a Transparency Profile. It is advisable to configure both compact and long formats to ensure both types of received headers in the PDU are transparently passed. |
A 'sipHeader' in the Transparency Profile can be composed of:
- Any string with a maximum length of 31 characters
- Any case, lower/upper/mixed
- Special characters are allowed
Some headers are not under the control of transparency flags in relay scenarios. These headers can be classified into three categories as shown in the below table:
Caption |
---|
0 | Table |
---|
1 | SIP Headers not Under Control of Transparency Flags in Relay Scenarios |
---|
3 | SIP Headers not Under Control of Transparency Flags in Relay Scenarios |
---|
|
Header Classifications |
---|
Transparently sent irrespective of transparency settings | Added/modified by the SBC | Not sent at all |
---|
Accept-Language | Also | Allow | Alert-Info | Anonymity | Max-Forwards | Authorization | Diversion | Require | Content-Length | Path | Supported | Error-Info | P-Charge-Info | | Event | P-DCS-Billing-Info | P-Associated-URI | Expires | P-K-Cfl | | Min-Expires | P-K-Cfo | | Min-SE | P-Preferred-Identity | | Proxy-Authenticate | P-Sig-Info | | Proxy-Authorization | Record-Route | | Proxy-Require | Remote-Party-ID | | RAck | Reply-To | | Reason | Requested-By | | Refer-Sub | Service-Route | | Resource-Priority | | | Retry-After | | | RSeq | | | Session-Expires | | | Subscription-State | | | Warning | | | WWW-Authenticate | | |
|
The following SIP headers are not supported by a Transparency Profile (or any Transparency flags):
- Call-ID
- RSeq
- Allow
- CSeq
- Max-Forwards
- Require
- Supported
RAck
- P-Associated-URI
These SIP headers are entirely added and/or modified by the
itself and cannot be transparently passed.
Previously, the following headers were transparently passed by the
. From release 4.2 onwards, these headers are controlled using transparency flags.
- Accept
- SIP-ETag
- SIP-If-Match
- Suppress-If-Match
transparency mechanisms control the initial INVITE, its responses, and other requests/responses within the INVITE dialog, as well as REGISTER, BYE, UPDATE, REFER, INFO, PUBLISH, MESSAGE, OPTIONS, SUBSCRIBE, NOTIFY requests and their responses (this assumes that the request method has been allowed by the applicable Relay Flag: INFO, MESSAGE, etc…).
There are some exceptions to the transparency mechanisms. Some SIP Methods and some SIP headers are not affected by any configurable transparency mechanism, while other headers may not be affected by transparency controls in some scenarios (in-dialog vs. out-of-dialog).
3.3.6 Non-Transparent Methods and Scenarios
The following SIP methods are method is not supported by a Transparency Profile (or any Transparency flags):
Option tags/methods of the following SIP headers can be transparently passed or blocked by configuring the SIP Param Filter Profile.
Info |
---|
|
For configuration details, see: |
3.3.8 In-Dialog vs. Out-of-Dialog
Some header behaviors vary depending on whether they are received in or out of an existing dialog. While the Transparency Profile has been extended in 4.2 to apply to out-of-dialog messages, there are some specific headers whose behavior is not under the control of a Transparency Profile (or Transparency Flags) when received in out-of-dialog messages.
A Dialog "represents a peer-to-peer SIP relationship between two user agents that persists for some time. The dialog facilitates sequencing of messages between the user agents and proper routing of requests between both of them. The dialog represents a context in which to interpret SIP messages." (reference: RFC 3261)
The
can receive messages within a dialog or outside of a dialog, and treats them differently based upon that relationship (or lack thereof).
If "Session-Expires" header is configured, the SBC passes the "Min-SE" header and their values transparently to the egress remote peer. This behavior is achieved either by configuring “all” header or “Session-Expires” and “Min-SE” header in the Transparency Profile. The Keep-Alive behavior must be disabled by setting “Session-Expires” to “0” in the respective SIP Trunk Group.
For example,
Code Block |
---|
% set profiles services transparencyProfile ALL_HEADER sipHeader all |
or
Code Block |
---|
%
set profiles services transparencyProfile SIP_HEADER sipHeader Session-Expires ignoreTransparency no
% set profiles services transparencyProfile SIP_HEADER sipHeader Min-SE ignoreTransparency no
% set addressContext default zone Zone1 sipTrunkGroup TG1 signaling timers sessionKeepalive 0 |
If "all" header in Transparency Profile is configured and SBC supports "Session Keep Alive" mechanism, the "Session-Expiry" and "Min-SE" headers are excluded from the Transparency Profile by setting ignoreTransparency
as “yes”.
For example,
Code Block |
---|
% set profiles services transparencyProfile ALL_HEADER sipHeader all
% set profiles services transparencyProfile ALL_HEADER sipHeader Session-Expires ignoreTransparency yes
% set profiles services transparencyProfile ALL_HEADER sipHeader Min-SE ignoreTransparency yes |
Out-of-Dialog header behavior irrespective of the Transparency Profile or Flags:
Caption |
---|
0 | Table |
---|
1 | Out-of-Dialog SIP Header Behavior |
---|
|
SIP Header | Out-of-Dialog Behavior |
---|
Accept-Language | Sent | Alert-Info | Sent | Also | Dropped | Anonymity | Dropped | Authorization | Sent | Content-Length | Sent | Diversion | Dropped | Error-Info | Sent | Event | Sent | Expires | Sent | Min-Expires | Sent | Min-SE | Sent | P-Charge-Info | Dropped | P-DCS-Billing-Info | Dropped | P-K-Cfl | Dropped | P-K-Cfo | Dropped | P-Preferred-Identity | Dropped | P-Sig-Info | Dropped | Path | Dropped | Proxy-Authenticate | Sent | Proxy-Authorization | Sent | Proxy-Require | Sent | RAck | Sent | Reason | Sent | Record-Route | Dropped | Refer-Sub | Sent | Remote-Party-ID | Dropped | Reply-To | Dropped | Requested-By | Dropped | Resource-Priority | Sent | Retry-After | Sent | RSeq | Sent | Service-Route | Dropped | Session-Expires | Sent | Subscription-State | Sent | Warning | Sent | WWW-Authenticate | Sent |
|
3.4 SIP Message Body Transparency
Message body transparency is based on message bodies that are present in the Transparency Profile of the egress trunk group for requests and content-types/bodies that are present in the ingress trunk group for responses. By default, no message bodies are present in the Transparency Profile.caption
|
Image Removed |
3.4.1 Allowed Values for a Content Type in the Transparency Profile
The allowed range for a "contentType" in the Transparency Profile includes:
- Any string with a maximum length of 127 characters
- Any case, lower/upper/mixed
- Special characters are allowed
- An existing transparency flag for that Content-Type in IP Signaling Profile (IPSP) is not required
3.4.2 Transparency of Multi-part Message Bodies
The
treats constituent parts of a 'multipart/mixed' message body just as it treats any message with a single body. Therefore, a constituent part of a 'multipart/mixed' message body will be transparently passed through only if the Content-Type specified in the MIME envelope of the corresponding part has been configured in the Transparency Profile.
For example, consider a SIP message with content-type 'multipart/mixed' with two parts in its body: the first part is type 'application/foo' and the other type 'application/bar'. If the Transparency Profile is configured to transparently pass 'application/foo', then the first part of the message body is passed transparently in the egress SIP message.
3.4.3 Support for Message Body Transparency Across Sonus Gateways
This feature will be supported across Sonus Gateways (using Sonus Proprietary GW to GW Signalling) only for SIP INVITE messages.
3.4.4 SDP
he
supports anchoring the following media types:
- Audio
- Video Main
- Video Extended (for Content Share)
- Binary Floor Control Protocol (UDP and TCP)
- Far End Camera Control (FECC)
- Message Session Relay Protocol ( MSRP)
For all the above mentioned media types (with the exception of Audio), the
consumes (hence does not transparently relay) the following attributes that are required to anchor the media:
- C line
- RTCP attributes
- Media direction (a= sendrecv/sendonly/inactive/recvonly)
- supports Secure Real-Time Transport Protocol (SRTP) media pass-through for SRTP and Secure Real-Time Transport Control Protocol (SRTCP) media streams.
For Audio, the
does not transparently relay the ptime and maxptime attributes in addition to the above mentioned attributes.
You must enable Video (assign a valid video bandwidth) and Audio transparency to achieve the above described behavior using the below CLI syntax.
Info |
---|
|
Associate the following configuration with both Trunk Groups. |
Code Block |
---|
|
% set profiles media packetServiceProfile <packetServiceProfileName> packetToPacketControl transcode transcoderFreeTransparency
% set addressContext <addressContextName> zone <zoneName> sipTrunkGroup <trunkGroupName> media sdpAttributesSelectiveRelay enabled
% set addressContext <addressContextName> zone <zoneName> sipTrunkGroup <trunkGroupName> media lateMediaSupport passthru |
3.4.4.1 SDP Transparency Flag
Make note that the sdpTransparencyState
signaling object within the SIP Trunk Group must not be considered a general use parameter. It is specific to some functionality (mainly ICE) and environments; however, this flag does not apply to all types of call flows.
Info |
---|
|
Do not enable the sdpTransparencyState flag unless specifically directed to do so by Design or Support engineers. |
3.4.5 Audio Transparency
The
for the audio m line allows relaying unknown attributes. The
allows transparency for subset of the attributes like
rtpmap
,
fmtp
, and
T38
fax
. Audio transparency functionality is used to manage bandwidth for audio stream in the pass-through calls. By enabling this feature, audio codecs that are unknown to the system are available to establish audio calls or streams.
supports audio transparency for known attributes by relaying attributes and codecs transparently in pass-through scenarios for SIP-SIP calls only. However, the following exceptions require system handling:
- recvonly/sendonly/sendrecv/inactive
- crypto
- X-dmi
- rtcp
- fingerprint
- OMR
Info |
---|
|
This feature does not support H323-H323 and GW-GW calls. |
Audio Transparency Feature is controlled by two flags:
- Enable Transcoder-Free-Transparency for the session (enable on either of the PSPs).
- Enable Selective-SDP-Transparency on both ingress and egress Trunk Groups that receive the relayed SDP.
Bandwidth (b) lines are transparently relayed and do not play any role in calculating the unknown audio codec bandwidth. The following PSP configuration bits for Audio Transparency feature are included for Unknown audio bandwidth reservation to calculate the Unknown audio bandwidth:
unknownCodecBitRate
unknownCodecPacketSize
Info |
---|
|
If the bandwidth is not configured, the default settings (Packet Size—10 ms and Bit Rate—124 KB/s) are used for a pass-through call. |
3.4.5.1 Audio Transparency and Reserve Bandwidth for Preferred Common Codec
By default for pass-through calls,
reserves the worst case common audio codec bandwidth on Trunk Groups and IP interfaces, and polices for the same bandwidth. To facilitate pass-through calls scenarios/cases, where media uses the preferred common codec the flag
reserveBwForPreferredAudioCommonCodec
is added to reserve the bandwidth associated with the preferred common codec (instead of the worst case common codec) on the Trunk Groups and IP interfaces. When this flag is enabled, bandwidth of the first common codec from Answer (SIP) is used for reservation and bandwidth of the heaviest common codec is used for policer.
Info |
---|
|
This flag can be used independently or in conjunction with Audio Transparency feature and/or policeOnHeaviestAudioCodec flag. This functionality is currently supported for SIP-SIP call scenarios only. In the event that policeOnHeaviestAudioCodec and reserveBwForPreferredAudioCommonCodec are both configured, the following behavior applies: reserveBwForPreferredAudioCommonCodec impacts the bandwidth reservation policy. That is, first common codec from Answer (SIP) and,policeOnHeaviestAudioCodec impacts the policer configuration. That is, heaviest codec in the offer or answer.
|
Info |
---|
|
The flag reserveBwForPreferredAudioCommonCodec is active for a call when both the PSPs have this flag enabled. If this flag is disabled in any of the PSPs, the flag is not applied. |
By default for pass-through calls, the
reserves the worst case common audio codec bandwidth on trunk groups and IP interfaces, and polices for the same bandwidth. To facilitate asymmetric pass-through calls scenarios/cases and to police on the heaviest codec in the offer or answer, the flag
policeOnHeaviestAudioCodec
is used in the PSP.
Info |
---|
|
This flag can be used independent of or in conjunction with Audio transparency feature and/or reserveBwForPreferredAudioCommonCodec flag. This functionality is currently supported for SIP-SIP call scenarios only. |
3.4.5.3 Configuring Audio Transparency
Configuring the basic audio transparency feature contains:
Anchor |
---|
| Enabling the sdpAttributesSelectiveRelay Parameter on Both Ingress and Egress Trunk Groups |
---|
| Enabling the sdpAttributesSelectiveRelay Parameter on Both Ingress and Egress Trunk Groups |
---|
|
Enabling the sdpAttributesSelectiveRelay
Parameter on Both Ingress and Egress Trunk Groups Code Block |
---|
|
% set addressContext default zone ZONE1 sipTrunkGroup TG_SBX_INT media sdpAttributesSelectiveRelay enabled
% set addressContext default zone ZONE2 sipTrunkGroup TG_SBX_EXT media sdpAttributesSelectiveRelay enabled |
Anchor |
---|
| Configuring the transcoderFreeTransparency Parameter on Packet Service Profile |
---|
| Configuring the transcoderFreeTransparency Parameter on Packet Service Profile |
---|
|
Configuring the transcoderFreeTransparency
Parameter on Packet Service Profile Code Block |
---|
|
% set profiles media packetServiceProfile PSP_INT packetToPacketControl transcode transcoderFreeTransparency
% set profiles media packetServiceProfile PSP_EXT packetToPacketControl transcode transcoderFreeTransparency |
Anchor |
---|
| Configuring audioTransparecy Parameter on Packet Service Profile |
---|
| Configuring audioTransparecy Parameter on Packet Service Profile |
---|
|
Configuring AudioTransparecy Parameter on Packet Service Profile Code Block |
---|
|
% set profiles media packetServiceProfile PSP_INT audioTransparency unknownCodecBitRate 124
% set profiles media packetServiceProfile PSP_EXT audioTransparency unknownCodecBitRate 124
% set profiles media packetServiceProfile PSP_INT audioTransparency unknownCodecPacketSize 10
% set profiles media packetServiceProfile PSP_EXT audioTransparency unknownCodecPacketSize 10
% set profiles media packetServiceProfile PSP_INT flags reserveBwForPreferredAudioCommonCodec enable
% set profiles media packetServiceProfile PSP_EXT flags reserveBwForPreferredAudioCommonCodec enable |
Info |
---|
|
For configuring Bit Rate (kbps), Packet Size (ms) and Reserve BW For Preferred Audio Common Codec for pass-through calls flags on PSX, refer to PSX Documentation. |
3.5 Transparency Profile Usage
As discussed previously, the Transparency Profile does not deprecate any existing Transparency Flag. Those flags continue to function as designed. When a header/body is specified in a Transparency Profile, then the profile takes precedence over any applicable Transparency Flag. For headers/bodies not specified in a transparency profile, the setting of existing Transparency Flags continues to determine the transparency of that header.
When configuring a Transparency Profile for specific SIP headers,
recommends disabling the unknownHeader flag (similarly, when configuring a Transparency Profile for specific SIP message bodies,
recommends disabling the unknownBody flag).
There are three modes of using Transparency Profile:
Anchor |
---|
| Positive Enumeration |
---|
| Positive Enumeration |
---|
|
3.5.1 Transparency Profile with Specific Headers (Positive Enumeration)
In this mode, only headers/bodies explicitly configured in the Transparency Profile are allowed to pass-through.
For example, the following scenario allows only the headers "p-asserted-identity" and "xyzHdr" and message bodies of type "application/simple-message-summary" and "xyzContentType" to pass transparently.
Code Block |
---|
set profiles services transparencyProfile ALLOW_SPECIFIC_HDRS_BODIES sipHeader p-asserted-identity
set profiles services transparencyProfile ALLOW_SPECIFIC_HDRS_BODIES sipHeader xyzHdr
set profiles services transparencyProfile ALLOW_SPECIFIC_HDRS_BODIES sipMessageBody application/simple-message-summary
set profiles services transparencyProfile ALLOW_SPECIFIC_HDRS_BODIES sipMessageBody xyzContentType
set profiles services transparencyProfile ALLOW_SPECIFIC_HDRS_BODIES state enabled
commit
|
Anchor |
---|
| Maximum Transparency |
---|
| Maximum Transparency |
---|
|
3.5.2 Maximum Transparency using the Transparency Profile
Complete or maximum transparency is occasionally desired, especially during initial integration testing to determine if specific headers are required for the success of certain call flows.
Code Block |
---|
|
set profiles services transparencyProfile MAX_TRANSPARENCY sipHeader all
set profiles services transparencyProfile MAX_TRANSPARENCY sipMessageBody all
set profiles services transparencyProfile MAX_TRANSPARENCY state enabled
commit
set addressContext <AC> zone <ZONE> sipTrunkGroup <TG> services transparencyProfile MAX_TRANSPARENCY
commit |
Additional Relay Flags also need to be enabled to maximize the transparency of the Trunk Group for testing. See Relay Flags above.
Anchor |
---|
| Negative Transparency |
---|
| Negative Transparency |
---|
|
3.5.3 Transparency Profile, All Headers with Exceptions (Negative Enumeration)
All headers/bodies are allowed to pass-through unless they are explicitly disallowed by Transparency Profile configuration. The ignoreTransparency
header option within the Transparency Profile is primarily used for excluding one or more specific headers when paired with the "all" header option. In the example below, the user wishes to pass all SIP headers except for the History-Info header.
For example, in the following scenario, the rules are configured and all the headers and message bodies except "history-info" and "application/resource-lists+xml" are passed transparently. The "xyzHeader" is passed transparently in all methods except INFO and REGISTER. The "xyzContentType" is passed transparently in all methods except INVITE.
Code Block |
---|
|
set profiles services transparencyProfile ALMOST_ALL_TRANSPARENCY sipHeader all
set profiles services transparencyProfile ALMOST_ALL_TRANSPARENCY sipMessageBody all
set profiles services transparencyProfile ALMOST_ALL_HDRS sipHeader history-info ignoreTransparency yes
set profiles services transparencyProfile ALMOST_ALL_HDRS sipMessageBody application/resource-lists+xml ignoreTransparency yes
set profiles services transparencyProfile ALMOST_ALL_HDRS sipHeader xyzHeader excludedMethods info,register
set profiles services transparencyProfile ALMOST_ALL_HDRS sipMessageBody xyzContentType excludedMethods invite
set profiles services transparencyProfile ALMOST_ALL_HDRS state enabled
commit |
The excludedMethods
parameter indicates the list of methods for which the transparency is not allowed and is common to both header and body entries.
Code Block |
---|
set profiles services transparencyProfile TP1 sipHeader all
set profiles services transparencyProfile TP1 sipHeader all excludedMethods bye,info,notify
commit |
Info |
---|
|
If a specific header is configured, ignoreTransparency and excludedMethods are exclusive. Once ignoreTransparency is configured, excludedMethods no longer displays. Likewise, once excludedMethods is configured, ignoreTransparency no longer displays. |
Info |
---|
|
Use the ignoreTransparency flag in a configuration to allow all SIP headers, or use it when one of the SIP header transparency flags is enabled in the IP Signaling Profile. |
3.5.4 Existing Deployment Augmented with a Transparency Profile
Existing deployments will likely utilize Transparency Flags, and those that must pass proprietary or otherwise
unsupported SIP headers will most likely make use of the unknownHeader transparency flag in an IP Signaling Profile.
While a Transparency Profile can be configured to completely overlap with any existing Transparency Flags settings, it is not required. A Transparency Profile can be configured to simply augment existing Transparency Flags settings with a more surgical configuration and allowing unknownHeader to be disabled.
For example, a user may wish to have the
transparently pass RFC 4474 identity headers. Prior to the introduction of the Transparency Profile, the user would have had to enable the unknownHeader transparency flag.
Rather than continue to allow all unknown headers through the
, the user can configure a Transparency Profile that only allows the RFC 4474 identity headers (configured in standard and compact forms) and disable the unknownHeader transparency flag.
Code Block |
---|
|
set profiles services transparencyProfile IDENTITY_HDRS sipHeader Identity
set profiles services transparencyProfile IDENTITY_HDRS sipHeader y
set profiles services transparencyProfile IDENTITY_HDRS sipHeader Identity-Info
set profiles services transparencyProfile IDENTITY_HDRS sipHeader n
set profiles services transparencyProfile IDENTITY_HDRS state enabled
commit
set addressContext <AC> zone <ZONE> sipTrunkGroup <TG> services transparencyProfile IDENTITY_HDRS
commit
set profiles signaling ipSignalingProfile <IPSP> commonIpAttributes transparencyFlags unknownHeader disable
commit |
3.6 SRTP Pass-through
supports SRTP media pass-through for SRTP and SRTCP media streams. SBC does not terminate the SDP security description or SRTP media streams and passes them through without authenticating, decrypting, and encrypting. In this pass-through mode of operation, SBC treats SRTP media as plain text RTP pass-through media.
The following diagram illustrates the media flow for an SRTP pass-through call.
Caption |
---|
0 | Figure |
---|
1 | SRTP Packet to Packet Media Call Flow |
---|
|
|
Info |
---|
|
- Secure RTP and Secure RTCP pass-through flows are supported for end-to-end security-associated peers.
- This feature does not support media transcoding, DTMF interworking, and Lawful Intercept (LI).
|
To control this SRTP media pass-through, the allowPassthru
flag is available from the secureRtpRtcp
parameter of the PSP. When allowPassthru
flag is enabled along with the security enableSrtp
flag, it allows SBC topass-through SRTPmedia without authenticating, decrypting, and encrypting it internally. When selected, this flag prioritizes SRTP pass-through media over terminated SRTP media. When disabled, this flag terminates all SRTP and SRTCP media for authentication, encryption, or decryption. This flag is disabled by default.
3.7 Relay Flags
Relay Flags exist mostly within the IP Signaling Profile (IPSP; ipSignalingProfile > commonIpAttributes > relayFlags) and apply on the ingress leg of a session (ingress relative to the SIP message).
Relay Flags are intended mainly for SIP Methods (Requests) and Responses (and some SIP message bodies) that normally get consumed or modified by the
when received in the incoming SIP message.
Albeit imprecise, a good method to contrast Relay Flags and Transparency Flags/Profiles is to consider that Relay controls whether a SIP request/response is sent through the
, while the
Transparency controls whether a header/body in a SIP request/response is sent through the
.
Caption |
---|
0 | Table |
---|
1 | Configuration Locations of Relay Flags |
---|
|
Relay Flags | Configuration Location |
---|
conferenceEventPackage | IP Signaling Profile > Common IP Attributes | dialogEventPackage | IP Signaling Profile > Common IP Attributes | dtmfBody | IP Signaling Profile > Common IP Attributes | force503to500Relay | IP Signaling Profile > Common IP Attributes | info | IP Signaling Profile > Common IP Attributes | message | IP Signaling Profile > Common IP Attributes | notify | IP Signaling Profile > Common IP Attributes | options | IP Signaling Profile > Common IP Attributes | publish | IP Signaling Profile > Common IP Attributes | refer | IP Signaling Profile > Common IP Attributes | referToHeaderRelay | IP Signaling Profile > Common IP Attributes | regEventPackage | IP Signaling Profile > Common IP Attributes | sonusMediaBody | IP Signaling Profile > Common IP Attributes | statusCode3xx | IP Signaling Profile > Common IP Attributes | statusCode4xx6xx | IP Signaling Profile > Common IP Attributes | thirdPartyBodies | IP Signaling Profile > Common IP Attributes | updateWithoutSdp | IP Signaling Profile > Common IP Attributes | isupMimeBodyRelay | SIP Trunk Group > Signaling | relayUpdatewithSdp | SIP Trunk Group > Signaling |
|
3.8 Relaying REFER Request
The
is enhanced to relay REFER request, even though the
refer
relay flag is disabled. To support this enhancement, Conditional Relay Matching criteria is provided by the
. Using this criteria,
decides whether to relay and process the REFER request message or not.
If the refer
relay flag is disabled, the Call Control (CC) mechanism forwards the REFER request to Digital Signaling (DS). DS exchanges information with the PSX to check the match criteria set in Conditional Relay Matching.
The matched criteria includes call parameters such as Username, Directory Number (DN), or Fully Qualified Domain Name (FQDN).
- If the call parameters received with the REFER request match the call routing criteria, relays the REFER request to Egress SIPSG.
- If the call parameters received with the REFER request do not match the call routing criteria, the REFER request is processed locally by . The REFER request acts as the transferor and the call is forwarded to the Egress SIPSG, resulting in call bridging. In this scenario, sends back a 202 response and proceeds for local processing.
Info |
---|
|
If a REFER request is sent after a switchover and: - If the
refer relay flag is enabled, relays REFER request. - If the
refer relay flag is disabled and DN/username/FQDN match, relays the REFER request. - If the refer relay flag is disabled and no DN/username/FQDN match, the REFER request is rejected. cannot locally process the REFER request
|
Info |
---|
|
This feature is supported only for Blind/Unattended Transfer calls and not for Attended Transfer (refer with replaces) calls. |
Caption |
---|
0 | Figure |
---|
1 | The following figure shows the enhanced REFER request processing call flow: |
---|
|
|
3.8.1 Configuring
For Enhanced Refer Processing
To configure this feature, perform the following steps:
- Configure for regular REFER call Blind Transfer.
Create SIP_MSG_TYPE_REFER call parameter filter profile (CPFP) in the PSX. Execute the following command to view the CPFP SIP_MSG_TYPE_REFER. This profile is already present in ERE.
Code Block |
---|
> show table profiles callParameterFilterProfile
Description:
Profile used for routing based on SIP message type.
Possible completions:
SIP_MSG_TYPE_INFO - SIP Message Type is Info
SIP_MSG_TYPE_MESSAGE - SIP Message Type is Message
SIP_MSG_TYPE_NOTIFY - SIP Message Type is Notify
SIP_MSG_TYPE_REFER - SIP Message Type is Refer
SIP_MSG_TYPE_REGISTER - SIP Message Type is Register
SIP_MSG_TYPE_SUBSCRIBE - SIP Message Type is Subscribe
none - seed data for provisioning support
|
All > Profiles > Call Parameter Filter Profile
Caption |
---|
0 | Figure |
---|
1 | Call Parameter Filter Profile List showing SIP_MSG_TYPE_REFER profile |
---|
|
|
Info |
---|
|
A new script SONS_SIP_REFER_RELAY is seeded in both ERE and PSX. |
Disable the Refer relay flag in IPSP.
Code Block |
---|
% set profiles signaling ipSignalingProfile DEFAULT_SIP commonIpAttributes relayFlags refer disable |
Enable the Notify relay in Egress side on IPSP to relay REFER for DN/Username/FQDN match.
Code Block |
---|
% set profiles signaling ipSignalingProfile DEFAULT_SIP commonIpAttributes relayFlags notify enable |
All > Profiles > Signaling > Ip Signaling Profile > Common Ip Attributes > Relay Flags
Caption |
---|
0 | Figure |
---|
1 | Notify and Refer relay flags |
---|
|
|
Create a new routing label with the script SONS_SIP_REFER_RELAY to trigger process refer request feature.
Info |
---|
|
The routing label action must be set as script. |
Code Block |
---|
% set global callRouting routingLabel <routing_label> script SONS_SIP_REFER_RELAY action script |
All > Global > Call Routing > Routing Label
Caption |
---|
0 | Figure |
---|
1 | Creating a Routing Label |
---|
|
|
Caption |
---|
0 | Figure |
---|
1 | Routing Label screen |
---|
|
|
Configure a DN criteria in the standard route and attach the SIP_MSG_TYPE_REFER profile to the standard route by executing the following command:
Code Block |
---|
% set global callRouting route none Sonus_NULL Sonus_NULL standard <Matched_DN or FQDN> 1 all ALL SIP_MSG_TYPE_REFER Sonus_NULL routingLabel <routing_label> |
For DN (Directory Number) or username
Code Block |
---|
% set global callRouting route none Sonus_NULL Sonus_NULL standard <Matched_DN or Username> 1 all ALL SIP_MSG_TYPE_REFER Sonus_NULL routingLabel <routing_label> |
For FQDN with DN or username
Info |
---|
|
The corresponding Sip domain group must be configured in . |
Code Block |
---|
% set global sipDomain <Matched_domain_name >name>
% set global callRouting route none Sonus_NULL Sonus_NULL standard <Matched_DN or Username> 1 all ALL SIP_MSG_TYPE_REFER <Matched_domain_name> routingLabel <routing_label>
|
All > Global > Call Routing > Route
Caption |
---|
|
|
Caption |
---|
|
|
Execute the following commands to view the call detail status and call media status.
Code Block |
---|
> show status global callDetailStatus
or
> show status global callMediaStatus
|
Anchor |
---|
| SIP Param Filter Profile |
---|
| SIP Param Filter Profile |
---|
|
3.9 SIP Param Filter Profile
The
is enhanced to support SIP Param Filter Profile to allow the operator to create a profile defining a set of SIP header tags and methods to transparently pass or block, and then assign that profile to a trunk group. The SIP headers configured in this profile for pass-through are transparently passed to the Egress trunk group if received in the Ingress SIP message.
The SIP Param Filter Profile includes the following characteristics:
- This profile takes precedence over existing mechanism/flags when transparently passing Allow/Supported/Require headers, but does not impact corresponding configurations established by the operator. It is operators responsibility to ensure the system is configured properly so that transparently-passed values do not conflict with existing configurations. For example, do not configure 100rel as pass-through if 100rel support fro SIP Trunk Group Signaling is disabled.
- The settings of SIP Param Filter Profiles for both ingress and egress legs dictate the actual pass-through results (see SIP Param Filter Profile Behavior table below for details.)
- Pass-through of individual header values is configurable.
- SIP tags are provided for unknown SIP parameter transparency only. Known SIP parameter transparency is still determined using existing SBC application logic (from Ingress leg to Egress leg) and configurations.
Info |
---|
|
The SBC supports configuring up to 32 SIP Param Filter Profiles. Each profile can be configured using any/all of the SIP headers Allow/Supported/Require. |
The following table explains the SIP Param Filter Profile behavior when using the Allow, Supported and Require headers.
Caption |
---|
0 | Table |
---|
1 | SIP Param Filter Profile Behavior |
---|
3 | SIP Param Filter Profile Behavior |
---|
|
Header | SIP Param Filter Profile Processing |
---|
Allow | Ingress leg: The Allow header in the received message is processed after Ingress SIP Message Manipulation (SMM) processing but before any other SBC processing occurs. - Pass-through <method list> – Any methods present in the Allow header but not included in the method list are removed.
- Pass-through "all" – All methods present in the Allow header are left intact.
- Block <method list> – Methods specified in the <method list> which exist in the Allow header are removed.
- Block "all" – All methods present in the Allow header are removed.
Egress leg: The Allow header in the message to be egressed by SBC is processed after all SBC processing but before Egress SMM processing is performed. - Pass-through <method list> – Any methods present in the Allow header to be egressed but not specified in the <method list> are removed.
- Pass-through "all" – All methods present in the Allow header are left intact.
- Block <method list> – Any methods present in the <method list> are removed if they exist in the Allow header.
- Block "all" – All methods present in the Allow header are removed.
| Require/Supported | Ingress leg: The Require/Supported header in the received message is processed after Ingress SMM processing but before any other SBC processing occurs. - Pass-through <option tag list> – Any Option tags present in the Require/Supported header but not specified in the <option tag list> are removed.
- Pass-through "all" – All Option tags present in the Require/Supported header are left intact.
- Block <option tag list> – Any Option tags present in the <option tag list> are removed if they exist in the Require/Supported header.
- Block "all" – All Option tags present in the Require/Supported header are removed.
Egress leg: The Require/Supported header in the message to be egressed by SBC is processed after all SBC processing but before Egress SMM processing occurs. Pass-through <option tag list> – Any Option tags present in the Require/Supported header to be egressed but not in the <option tag list> are removed. Pass-through "all" –All Option tags present in the Require/Supported header are left intact. - Block <option tag list> – Any Option tags present in the <option tag list> are removed if they exist in the Require/Supported header.
- Block "all" – All Option tags present in the Require/Supported header are removed.
If an option tag present in the received Ingress request is dropped due to Require transparency settings, and if rejectRequest is configured, the request is rejected with a new internal cause code. This internal cause code is mapped to 420 "Bad Extension" by default. Option tags added to Require header due to SBC processing (e.g. path) are not rejected even if they are eventually dropped by the Require transparency functionality. |
|
3.10 SIP Filter Profile
The SIP Filter Profile is a collection of the configurable filter settings of individual SIP headers. Depending on the filter settings of each of the SIP headers in the SIP Filter Profile, the SBC either relays the SIP messages without parsing the header, or parses the headers of the messages.
For every SIP message associated with the ingress leg of the call, the SBC first checks the SIP Filter Profile for the filter setting of the SIP header. If the SIP Filter Profile indicates that a particular SIP header needs filtering, the SBC stores it without parsing.
The SIP header of the egress leg is populated on the basis of the configuration in the IP Signaling Profile and the Transparency Profile. In the egress leg of a call, the transparency bit mask is set to identify the headers that are transparently passed. If the transparency settings of all unknown headers in the IP Signaling Profile is enabled, all the stored headers (including the ones filtered in the ingress leg), is copied to the SIP header of the egress leg.
If the Transparency Profile attached with the Egress Trunk Group indicates that specific headers are allowed to pass transparently, and those headers are present as filtered headers, they are individually copied to the SIP header of the egress leg. In this case, the transparency bits are enabled, either by the IP Signaling Profile or through the flexible header transparency.
Include Page |
---|
| GW_GW_Scenario_Header_Transparency |
---|
| GW_GW_Scenario_Header_Transparency |
---|
|
Info |
---|
|
The SIP Filter Profile is not used for the egress leg of a call. |
Info |
---|
|
The mandatory headers which are not part of the sipFilterProfie are as follows: From To Via Call-id Cseq Max-Forwards
|
Configuring a SIP Filter Profile
Info |
---|
|
Avoid filtering headers pertaining to SIP call routing/protocol processing, as it may cause unexpected results such as call failures. Some of the headers that should not be filtered are as follows: Contact RSeq RAck Record-Route Route Content-Type Content-Length WWW-Authenticate
|
Perform the following:
Anchor |
---|
| Creating a new SIP Filter Profile |
---|
| Creating a new SIP Filter Profile |
---|
|
Creating a new SIP Filter Profile
Code Block |
---|
|
% set profiles signaling sipFilterProfile doc_FILTER2
|
Anchor |
---|
| Changing the Transparency Setting of a Header Under a SIP Filter Profile |
---|
| Changing the Transparency Setting of a Header Under a SIP Filter Profile |
---|
|
Changing the Transparency Setting of a Header Under a SIP Filter Profile
Code Block |
---|
% set profiles signaling sipFilterProfile doc_FILTER2 header Also enabled |
Info |
---|
|
If sipFilterProfile is used for Allow , Require , and Supported headers, their transparency cannot be achieved using sipParamFilterProfile . |
Anchor |
---|
| Configuring the Zone ID for the Selected Zone |
---|
| Configuring the Zone ID for the Selected Zone |
---|
|
Configuring the Zone ID for the Selected Zone
Code Block |
---|
% set addressContext default zone doc_ZONE_IAD id 10 |
Anchor |
---|
| Configuring the Media IP Interface Group Name for a SIP Trunk Group |
---|
| Configuring the Media IP Interface Group Name for a SIP Trunk Group |
---|
|
Configuring the Media IP Interface Group Name for the SIP Trunk Group
Code Block |
---|
% set addressContext default zone doc_ZONE_IAD sipTrunkGroup doc_SBX10_IAD media mediaIpInterfaceGroupName LIF1 |
Anchor |
---|
| Attaching the SIP Filter Profile to the SIP Trunk Group |
---|
| Attaching the SIP Filter Profile to the SIP Trunk Group |
---|
|
Attaching the SIP Filter Profile to the SIP Trunk Group
Code Block |
---|
% set addressContext default zone doc_ZONE_IAD sipTrunkGroup doc_SBX10_IAD signaling sipFilterProfile doc_FILTER2 |
Info |
---|
|
- In the SIP Filter Profile, the default filter setting of all the headers is
disabled . To filter a particular SIP header, change the setting to enabled . - The SBC supports attaching a SIP Filter Profile to a SIP Trunk Group. If no SIP Filter Profile is configured for a SIP Trunk Group at the time of its creation, the default SIP Filter Profile is attached with the SIP Trunk Group.
- Even if the filter setting for an unknown header is set to
disabled , the SBC transparently relays the SIP messages containing that header in the following cases:- The flexible header transparency indicates that the particular header should be transparently relayed.
- The IP Signaling Profile indicates that the particular header should be transparently relayed. To transparently pass all unknown headers, set the transparency of the unknown headers to
enabled in the IP Signaling Profile.
|
3.11 Privacy Transparency
A new flag anonymizeHostIpAddress
is introduced for the privacy
parameter of the IP Signaling Profile to enable or disable this feature. When this flag is activated, the SBC anonymizes the incoming host IP portion of the private headers (P-AID, P-PID, RPID) by replacing it with the IP address of the SBC, before sending it to the egress leg of a call.
This feature supports anonymizing the host IP address for the following message types:
- INVITE
- BYE
- OPTIONS
- SUBSCRIBE
- NOTIFY
- UPDATE
- PUBLISH
- MESSAGE
Info |
---|
|
This feature currently supports only in-dialog messages, and not out-of-dialog messages. |
Anonymizing the Host Ip Address
Info |
---|
|
- The flag
anonymizeHostIpAddress is available for configuration only when the transparency flag is enabled for egressIpAttributes of an ipSignalingProfile . For more information on Privacy Transparency of Egress IP Attributes, refer to Privacy Parameters - Egress IP Attributes. - By default, the flags
transparency and anonymizeHostIpAddress are set to disable .
|
Perform the following:
Anchor |
---|
| Enabling the transparency flag |
---|
| Enabling the transparency flag |
---|
|
Enabling the transparency
Flag
To enable the transparency
flag for an ipSignalingProfile
, enter the following command:
Code Block |
---|
% set profiles signaling ipSignalingProfile DEFAULT_SIP egressIpAttributes privacy transparency enable |
Anchor |
---|
| Enabling the anonymizeHostIpAddress Flag |
---|
| Enabling the anonymizeHostIpAddress Flag |
---|
|
Enabling the anonymizeHostIpAddress
FlagTo enable the anonymizeHostIpAddress
flag to activate this feature, enter the following command:
Code Block |
---|
% set profiles signaling ipSignalingProfile DEFAULT_SIP egressIpAttributes privacy anonymizeHostIpPortion enable |