Access Rules Configuration for Session Border Controller Peering Architecture

Allowing Access from Session Agents

Question

You are configuring access rules in a Session Border Controller Peering architecture.

Which two configuration steps are required to allow access only from User Agents (UAs) configured as session agents? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

BE.

In a Session Border Controller (SBC) peering architecture, access rules can be configured to allow access only from trusted User Agents (UAs) that have been configured as session agents. To implement this configuration, the following two steps are required:

  1. Configure the trusted UAs as session agents: To configure the UAs as session agents, navigate to the session-agent configuration element and set the ip-address parameter to the IP subnet of your trusted UA. This allows only UAs from the specified IP subnet to connect to the SBC.

  2. Set the allow-anonymous parameter to agents-only: The allow-anonymous parameter specifies whether anonymous connections are allowed to the SBC. To allow access only from trusted UAs, set the allow-anonymous parameter to agents-only. This parameter setting ensures that only session agents are allowed to connect to the SBC.

Therefore, the correct answers to this question are B and D. Answer A is incorrect because it sets the allow-anonymous parameter to all, which allows anonymous connections to the SBC. Answer C is incorrect because it sets the addr-prefix parameter in the realm-config configuration element, which is not related to UA access control. Answer E is incorrect because it sets the allow-anonymous parameter to address-prefix, which is not a valid setting for this parameter.