Application-layer Policy Enforcement at SIP Firewalls
draft-jfp-sipfw-policy-00
Document | Type | Expired Internet-Draft (individual) | |
---|---|---|---|
Author | Jon Peterson | ||
Last updated | 2000-07-17 | ||
Stream | (None) | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Stream | Stream state | (No stream defined) | |
Consensus Boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of
the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-jfp-sipfw-policy-00.txt
https://www.ietf.org/archive/id/draft-jfp-sipfw-policy-00.txt
Abstract
At the boundaries of some networks, administrators may want to implement policies that govern the application-layer traversal of SIP signaling. This document serves as an introduction to application- layer policies for SIP, discusses the architectures of network boundaries at which policies might be deployed, and provides examples of policies tailored to particular network services.
Authors
Jon Peterson (jon.peterson@neustar.biz)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)