These are sample ACLs and should be customized for your specific deployment. One use-case for access controls lists is to isolate management traffic on the SBC 2000 to accomplish the following: the SBC WebUI is available only through certain ports on the SBC (i.e., Admin port) and the SBC WebUI is not accessible on those ports. In a hosted or multi-tenant environment, the SBC is managed by a service provider and is shared with multiple end-customers. The ADMIN port is used solely for managing the SBC by the service provider. In order to configure this ACL, you must do the following: - Create ACLs that describe the type of traffic that should be accepted or denied.
- Bind the ACLs to the ports for the designated purpose.
Sample ACL "usertraffic"This ACL allows packets related to VoIP application only and bound to all user ports. This example is for SBC 2000 and should be customized for your specific requirements. ID | Source IP Subnet | Dest IP Subnet | Protocol | Source port | Destination port | Action | Notes |
---|
1 | 192.168.7.7/24 | ANY | ANY | ANY | 5060 | ACCEPT | Accepts all traffic from Lync server to the SBC's SIP port 5060 or ASM's SIP port 5060. | 2 | 192.168.9.8/24 | ANY | UDP | 53 | ANY | ACCEPT | Accepts DNS traffic from the DNS server 192.168.9.8. | 3 | ANY | ANY | UDP | ANY | 16000-17000 | ACCEPT | Accepts all UDP traffic carrying RTP and RTCP payload from other devices to the SBC. The port range should be same as the range configured under Media System Configuration. See |
|