Login | Register For Free | Help
Search for: (Advanced)

Mailing List Archive: Cisco: VOIP

15.1(2)T Toll Fraud Enhancements (show ip address trusted list)

 

 

Cisco voip RSS feed   Index | Next | Previous | View Threaded


jason.aarons at us

Sep 19, 2010, 1:05 AM

Post #1 of 1 (994 views)
Permalink
15.1(2)T Toll Fraud Enhancements (show ip address trusted list)

Noticed some new banners at bootup of 15.1(2T) and heard that out-of-box sip blocking was coming at Cisco Live;

15.1(2)T What's New
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps8802/ps10587/ps10592/ps10952/product_bulletin_c25-620744.html

Understanding Toll Fraud Enhancements in 15.1(2)T
https://supportforums.cisco.com/docs/DOC-12228
A new feature introduced with 15.(1)2T is the default behavior of a toll-fraud prevention feature.
This purpose of this document is to raise awareness of this new feature, as upgrading to this release will require additional configuration to allow for these calls to route. It is important to note that upgrading to 15.1(2)T will block all inbound VoIP call setups, until the gateway is properly configured to trust these sources. Hence, any plans to upgrade to releases with this feature must include extra steps to configure trusted VoIP hosts after the upgrade, in order for calls to route successfully. Additionally, two-stage dialing is no longer enabled by default with this release.
Behavior Prior to 15.1(2)T

For all IOS releases prior to 15.1(2)T, the default behavior for IOS voice gateways is to accept call setups from all sources. As long as voice services are running on the router, the default configuration will treat a call setup from any source IP address as a legitimate and trusted source to set a call up for.

Also, FXO ports and inbound calls on ISDN circuits will present secondary-dial tone for inbound calls, allowing for two-stage dialing. This assumes a proper inbound dial-peer is being matched.
Behavior With 15.1(2)T and later releases

Upon booting on a version of IOS with the toll-fraud prevention application, the following will be printed to the device's console during the boot sequence:

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!Following voice command is enabled: !!
!! voice service voip !!
!! ip address trusted authenticate !!
!! !!
!!The command enables the ip address authentication !!
!!on incoming H.323 or SIP trunk calls for toll fraud !!
!!prevention supports. !!
!! !!
!!Please use "show ip address trusted list" command !!
!!to display a list of valid ip addresses for incoming !!
!!H.323 or SIP trunk calls. !!
!! !!
!!Additional valid ip addresses can be added via the !!
!!following command line: !!
!! voice service voip !!
!! ip address trusted list !!
!! ipv4 <ipv4-address> [<ipv4 network-mask>] !!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!


The router will automatically add any destinations that are defined as an ipv4 target in a VoIP dial-peer to the trusted source list. You can observe this behavior with the output of the following command:
Router# show ip address trusted list
IP Address Trusted Authentication
Administration State: UP
Operation State: UP
IP Address Trusted Call Block Cause: call-reject (21)
VoIP Dial-peer IPv4 Session Targets:
Peer Tag Oper State Session Target
-------- ---------- --------------
3000 UP ipv4:203.0.113.100
1001 UP ipv4:192.0.2.100




-----------------------------------------
Disclaimer:

This e-mail communication and any attachments may contain
confidential and privileged information and is for use by the
designated addressee(s) named above only. If you are not the
intended addressee, you are hereby notified that you have received
this communication in error and that any use or reproduction of
this email or its contents is strictly prohibited and may be
unlawful. If you have received this communication in error, please
notify us immediately by replying to this message and deleting it
from your computer. Thank you.

Cisco voip RSS feed   Index | Next | Previous | View Threaded
 
 


Interested in having your list archived? Contact Gossamer Threads
 
  Web Applications & Managed Hosting Powered by Gossamer Threads Inc.