DO NOT SHARE THESE DOCS WITH CUSTOMERS!
This is an LA release that will only be provided to a select number of PLM-sanctioned customers (PDFs only). Contact PLM for details.
In this section:
Create security group rules for the subnets associated with the following interfaces using the tables corresponding to each type of interface.
Customize security groups based on your network security requirements.
If you are installing SBC SWe for the first time, you must create a security group to allow HTTPS access.
It is recommended to open the following ports using Inbound/Ingress rules in the security groups associated with the management, HA and packet interfaces. Port recommendations are also provided for deployments that include an High-Availability Front End (HFE).
It is recommended to open all ports using Outbound/Egress rules in the security groups associated with the management, HA and packet interfaces. If an HFE is present, the same recommendation applies to its public-facing (eth0) port.
The HA solution works only if the mgt0 port has internet access. If the routing table (associated with the subnet of mgt0) fails to have all the traffic rules, the HA solution does not work.
If specific ports are opened in outbound security group rules, the remaining ports are blocked.
Refer to the Management Security Group, HA Security Group, and Packet Security Group tables for the minimum required security group rules for the SBC to function.
Considering that the SIP signaling port in SBC configuration is set to the default port (5060), the port numbers for UDP/TCP are set to 5060 and 5061.