nlinecomputers
Well-Known Member
- Reaction score
- 8,595
- Location
- Midland TX
I have a client that is using FreedomVoice VOIP service and they have been getting weird random calls with no one on the line. FV thinks it is a SIPvicious attack and have given me two IP ranges to accept on port 5060-5061. Everything else should be dropped.
I think I have setup correctly I just need confirmation.
I created services for the ports both TCP and UDP and then dropped that into a service group.
I created address ranges and dropped both into an address group.
I created a rule (actually changed the existing rule) WAN to LAN, using the service group, the IP group as the Source and my Phone MAC address group as the destination.
The firewall already has a deny everything WAN to LAN as the lowest rule.
This should be enough to only allow FreedomVoice access.
Is there a test for SIPvicious that I can run against the firewall to test this?
TIA.
nlinecomputers
I think I have setup correctly I just need confirmation.
I created services for the ports both TCP and UDP and then dropped that into a service group.
I created address ranges and dropped both into an address group.
I created a rule (actually changed the existing rule) WAN to LAN, using the service group, the IP group as the Source and my Phone MAC address group as the destination.
The firewall already has a deny everything WAN to LAN as the lowest rule.
This should be enough to only allow FreedomVoice access.
Is there a test for SIPvicious that I can run against the firewall to test this?
TIA.
nlinecomputers