0% found this document useful (0 votes)
32 views29 pages

ZXSEC US IM P2P VoIP Technical Note

ZTE IM P2P VoIP Technical Note
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views29 pages

ZXSEC US IM P2P VoIP Technical Note

ZTE IM P2P VoIP Technical Note
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

ZXSEC US

IM/P2P/VoIP Technical Note

Version 3.6

ZTE CORPORATION
ZTE Plaza, Keji Road South,
Hi-Tech Industrial Park,
Nanshan District, Shenzhen,
P. R. China
518057
Tel: (86) 755 26771900 800-9830-9830
Fax: (86) 755 26772236
URL: http://support.zte.com.cn
E-mail: [email protected]
LEGAL INFORMATION

Copyright © 2006 ZTE CORPORATION.

The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.

All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.

This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.

ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.

The contents of this document and all policies of ZTE CORPORATION, including without limitation policies related to
support or training are subject to change without notice.

Revision History

Date Revision No. Serial No. Reason for Revision


Sep 26, 2008 R1.0 sjzl20084111 First edition
ZTE CORPORATION
Values Your Comments & Suggestions!
Your opinion is of great value and will help us improve the quality of our product
documentation and offer better services to our customers.
Please fax to: (86) 755-26772236; or mail to Documentation R&D Department,
ZTE CORPORATION, ZTE Plaza, A Wing, Keji Road South, Hi-Tech Industrial Park,
Shenzhen, P. R. China 518057.
Thank you for your cooperation!

Document
ZXSEC US IM/P2P/VoIP Technical Note
Name
Document Revision
Product Version V3.6 R1.0
Number
Equipment
Serial No. sjzl20084111
Installation Date

Presentation:
(Introductions, Procedures, Illustrations, Completeness, Level of Detail, Organization,
Appearance)
Good Fair Average Poor Bad N/A

Your evaluation Accessibility:


of this
(Contents, Index, Headings, Numbering, Glossary)
documentation
Good Fair Average Poor Bad N/A

Intelligibility:
(Language, Vocabulary, Readability & Clarity, Technical Accuracy, Content)
Good Fair Average Poor Bad N/A

Please check the suggestions which you feel can improve this documentation:
Improve the overview/introduction Make it more concise/brief
Improve the Contents Add more step-by-step procedures/tutorials
Improve the organization Add more troubleshooting information
Include more figures Make it less technical
Your Add more examples Add more/better quick reference aids
suggestions for Add more detail Improve the index
improvement of
this Other suggestions
documentation __________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
# Please feel free to write any comments on an attached sheet.

If you wish to be contacted regarding your comments, please complete the following:
Name Company
Postcode Address
Telephone E-mail
This page is intentionally blank.
Contents

About this Manual ............................................................. i


What is in This Manual ............................................................ i
Conventions ......................................................................... ii
How to Get in Touch............................................................. iii

Chapter 1.......................................................................... 1

Instant Messenger Protocols........................................... 1


Overview ............................................................................. 1
Firewall Control...............................................................2
IM Aware Firewalls ..........................................................2
Anti-Virus Control ...........................................................6
Detecting New IM Applications ..........................................6
Blocking Older Versions of IM Applications ..........................6
IM/P2P Applications Covered by IPS in ZXSEC US OS 3.6......7

Chapter 2.......................................................................... 9

Peer to Peer Protocols ..................................................... 9


Overview ............................................................................. 9
Rate Limiting ................................................................ 10
Detecting New P2P Applications....................................... 11

Chapter 3........................................................................ 13

Voice over Internet Protocol ......................................... 13


Overview ..................................................................... 13
Firewall Controls ........................................................... 13
VoIP Logging...................................................................... 13
VoIP Rate Limiting .............................................................. 14
Statistics ..................................................................... 14
Viewing overview statistics ................................................... 15
CLI commands.............................................................. 15

Figures............................................................................ 17
Tables .............................................................................19
About this Manual

What is in This Manual


Instant Messenger (IM), Peer to Peer (P2P), and Voice over
Internet Protocol (VoIP) protocols are gaining in popularity as an
essential way to communicate between two or more individuals
in real time. Some companies even rely on IM protocols for
critical business applications such as Customer/Technical
Support.
The most common IM protocols in use today include AOL Instant
Messenger, Yahoo Instant Messenger, MSN messenger, and ICQ.
Although these are the most common currently in use, there are
always new protocols being developed as well as newer versions
of older ones.
P2P protocols are most commonly used to transfer files from one
user to another and can use large amounts of bandwidth.
VoIP is increasingly being used by businesses to cut down on the
cost of long distance voice communications.
Some organizations need to control or limit the use of IM/P2P
and VoIP protocols in order to more effectively manage
bandwidth use.
This technical note discusses the capabilities of the ZXSEC US
firewall to control various IM, P2P, and VoIP protocols. Although
previous versions were IM and P2P aware, the controls
appearing in the protection profile are new with ZXSEC US OS
V3.0.
This Manual contains the following chapters:

TABLE 1 CHAPTER SUMM ARY

Chapter Summary
Chapter 1, Instant Included Firewall Control,IM Aware
Messenger Protocols Firewalls,Anti-Virus Control,Detecting New
IM Applications,Blocking Older Versions of
IM Applications,IM/P2P Applications
Covered by IPS in ZXSEC US OS 3.6

Confidential and Proprietary Information of ZTE CORPORATION i


ZXSEC US IM/P2P/VoIP Technical Note

Chapter Summary
Chapter 2, Peer to Peer The ZXSEC US firewall does have protocol
Protocols decoders for most popular P2P protocols
including Skype, Gnutella, eDonkey, Bit
Torrent, KaZaa and WinNY. However at
this time it only provides allow, block, or
rate limiting capabilities since file transfers
are normally encrypted by the individual
protocol, which prevents the ZXSEC US
from being able to analyze or scan the
content for viruses
Chapter 3, Voice over Describe the two VoIP protocols which
Internet Protocol ZXSEC US OS supports

Conventions
Typographical ZTE documents employ the following typographical conventions.
Conventions
TABLE 2 TYPOGRAPHICAL CONVENTIONS

Typeface Meaning
Italics References to other Manuals and documents.
“Quotes” Links on screens.
Bold Menus, menu options, function names, input
fields, radio button names, check boxes, drop-
down lists, dialog box names, window names.
CAPS Keys on the keyboard and buttons on screens
and company name.
Constant width Text that you type, program code, files and
directory names, and function names.
[] Optional parameters.
{} Mandatory parameters.
| Select one of the parameters that are delimited
by it.
Note: Provides additional information about a
certain topic.

Mouse TABLE 3 MOUSE OPERATION CONVENTIONS


Operation
Conventions Typeface Meaning
Refers to clicking the primary mouse button (usually
Click
the left mouse button) once.
Refers to quickly clicking the primary mouse button
Double-click
(usually the left mouse button) twice.

ii Confidential and Proprietary Information of ZTE CORPORATION


About this Manual

Typeface Meaning
Refers to clicking the secondary mouse button
Right-click
(usually the right mouse button) once.
Refers to pressing and holding a mouse button and
Drag
moving the mouse.

How to Get in Touch


The following sections provide information on how to obtain
support for the documentation and the software.
Customer If you have problems, questions, comments, or suggestions
Support regarding your product, contact us by e-mail at
[email protected]. You can also call our customer support
center at (86) 755 26771900 and (86) 800-9830-9830.
Documentation ZTE welcomes your comments and suggestions on the quality
Support and usefulness of this document. For further questions,
comments, or suggestions on the documentation, you can
contact us by e-mail at [email protected]; or you can fax your
comments and suggestions to (86) 755 26772236. You can also
browse our website at http://support.zte.com.cn, which contains
various interesting subjects like documentation, knowledge base,
forum and service request.

Confidential and Proprietary Information of ZTE CORPORATION iii


ZXSEC US IM/P2P/VoIP Technical Note

This page is intentionally blank.

iv Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1

Instant Messenger
Protocols

Overview
Many IM protocols are in use today. The ones most widely used
include:
„ AOL Instant Messenger (AIM)
Introduced by AOL as way to allow members to communicate
with one another in real-time to avoid the delay of standard
email. Latest versions of AIM allow users to not only text
chat, but also voice and video chat without using expensive
long distance metered services such as the public switched
telephone network (PSTN). AIM service is now free to non-
paying members as long as they register with AOL.
„ Yahoo Instant Messenger (YIM)
Yahoo, wanting to entice users to sign up for its advertiser
paid services, offers this popular free IM service which
provides all of the same chat capabilities of AIM and provides
a nimble client that is capable of discovering holes in
firewalls in order to get around blocked ports.
„ MSN Messenger
Microsoft offers a similar service to both AOL and Yahoo. In
addition to text message exchange, MSN Messenger offers
voice and video conferencing with multiple simultaneous
users as a way to entice business users to improve
communications, display presentations, and reduce travel
expense. MSN Messenger is SIP protocol-based which is a
well known IP telephony standard.
„ ICQ (abbreviated for "I Seek You")
A popular international IM protocol, ICQ is available on many
platforms and operating systems to provide the popular IM
features offered by AOL, YIM, and MSN Messenger, and is
now owned by AOL TimeWarner. Claiming to be the most

Confidential and Proprietary Information of ZTE CORPORATION 1


ZXSEC US IM/P2P/VoIP Technical Note

widely used chat protocol in the world, ICQ offers video chat,
dating, lists, and people search capabilities.
The following topics are included in this section:
„ Firewall Control
„ IM Aware Firewalls
„ Anti-Virus Control
„ Detecting New IM Applications
„ Blocking Older Versions of IM Applications
„ IM/P2P Applications Covered by IPS in ZXSEC US OS 3.6

Firewall Control
Firewalls can be used in many cases to block or rate limit certain
IM protocols.
The ZXSEC US firewall has predefined services used to block or
allow common IM protocols. For example, AIM uses ports 5190-
5194, and MSN Messenger uses port 1863 as standard ports for
default communications. These IM clients can easily be blocked
by closing these ports. Most firewalls are only effective in
blocking specific predefined ports so some IM protocols are
designed to find other open ports or can be configured to use
well known ports such as port 80 to get around the blocked
ports.
It is very difficult to block these protocols with standard firewall
technology.
Because of this, a more effective way of identifying and
controlling IM protocols is needed.

Note:
If virtual domains are enabled on the ZXSEC US unit, IM/P2P
features are configured globally. To access these features, select
Global Configuration on the main menu.

IM Aware Firewalls
The ZXSEC US Unified Threat Management System, an advanced
next generation firewall, is IM application aware and uses special
protocol decoders to track IM traffic. The ZXSEC US firewall can
block or allow AIM, YIM, MSN, and ICQ individually per protocol
by using the Intrusion Prevention System module.
In ZXSEC US V3.0 MR5 and earlier releases, go to Intrusion
Protection > Signatures > Predefined to set the IPS action on
each of the IM protocols.

2 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Instant Messenger Protocols

In ZXSEC US V3.0 MR6 and newer releases, go to Intrusion


Protection > IPS Sensor to create a sensor with customized IM
actions. For details, see the ZXSEC US Administration Guide or
online help.

FIGURE 1 EXAMPLE OF IPS SIGNATURES IN VERSION 2.8

FIGURE 2 EXAMPLE OF IPS SENSORS IN VERSION 3.6

Figure 1 As of ZXSEC USOS version 3.6, the ZXSEC US firewall


offers a new IM security module which can also use these special
protocol decoders to set up various rules for handling different
aspects of IM protocols such as user lists, text messaging,
voice/video chat, and file transfers.
User lists can be managed to allow or block certain users. Each
user can be assigned a policy to allow or block activity for each
IM protocol. Each IM function can be individually allowed or
blocked providing the administrator the granularity to block the
more bandwidth consuming features such as voice chat while
still allowing text messaging. There is also an option to block
older versions of the IM protocol if our protocol decoders can
only recognize the latest version.

Confidential and Proprietary Information of ZTE CORPORATION 3


ZXSEC US IM/P2P/VoIP Technical Note

FIGURE 3 EXAMPLE OF IM USER LIST UNDER IM, P2P&VOIP > USER > USER
LIST

FIGURE 4 EXAMPLE OF USER POLICY

Protocol decoders are also used to provide statistical monitoring


of IM usage as well as content logging of actual message traffic
on a ZXSEC US unit’s hard drive or a USLA appliance.

4 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Instant Messenger Protocols

FIGURE 5 EXAMPLE OF IM USAGE STATISTICS UNDER IM, P2P&VOIP >


STATISTICS > PROTOCOL

Using the USLA system, you can even generate usage reports by
IM username in order to track usage over time. You can log IM
chat information and its limitations by enabling Archive full IM
chat info to USLA in the protection profile. You can also generate
a variety of different report types, including:
„ IM activity by date and action
„ Top permitted sources by date
„ Top blocked sources by date
„ Top permitted destinations by date
„ Top blocked destinations by date
„ IM activity by month and action
„ Top permitted sources by month
„ Top blocked sources by month
„ Top permitted destinations by month
„ Top blocked destinations by month
„ IM activity by day of week and action
„ IM activity by hour of day and action
For more information, see the USLA documentation.

Confidential and Proprietary Information of ZTE CORPORATION 5


ZXSEC US IM/P2P/VoIP Technical Note

Note:
IM users who are already logged on before changes are made to
the IM protection profile, will not be affected until their next
login. You cannot disconnect users who have already logged on
by enabling logon blocking.

Anti-Virus Control
Virus writers are constantly adapting to get around common
antivirus defense methods. IM protocols are becoming a new
vehicle for spreading viruses. Another benefit of having IM
protocol decoders is the ability to proxy the protocol though the
ZXSEC US antivirus engine. This allows any IM file transfers to
be scanned in real-time to prevent the spread of these new
viruses. The ZXSEC US firewall can now be used to configure IM
scanning per protection profile.

Detecting New IM
Applications
New versions of current IM/P2P applications are constantly being
produced. In some cases, new applications are readily available.
Although most IM/P2P controls are under Firewall > Protection
Profile, the detection of IM/P2P applications is done by IPS. To
detect new IM/P2P applications or new versions of the existing
applications, users only need to update the IPS package. No
firmware upgrade is needed.

Blocking Older Versions of


IM Applications
Use the following command, config imp2p old-version, in the CLI
to block IM applications that are older than the following
versions:
„ MSN 6.0
„ ICQ 4.0
„ AIM 5.0
„ Yahoo 6.0

6 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Instant Messenger Protocols

IM/P2P Applications Covered


by IPS in ZXSEC US OS 3.6
The table below is a list of IM/P2P applications that are currently
recognized by ZXSEC US OS 3.6. The table includes the
decoders, the applications associated with the decoders and the
location of the decoders in the ZXSEC US interface.

Note:
Applications marked as bold can connect to multiple P2P
networks.

TABLE 4 IM APPLICATIONS COVERED BY IPS IN ZXSEC US OS 3.6

IPS Applications
AIM (Protection Profile > IM/P2P) AIM, AIM Triton
ICQ (Protection Profile) ICQ
MSN (Protection Profile > IM/P2P) MSN Messenger
im_decoder:qq QQ
Yahoo! (Protection Profile > IM/P2P Yahoo Messenger
IPS predefined signature: MSN web
msn_web_messenger Messenger
Google Instant
IPS predefined signature: google_talk
Messenger
Rediff Instant
IPS predefined signature: rediff
Messenger

Note:
If you encounter an IM/P2P applications that is not listed above,
make sure that you have the latest upgrade for the IPS.If you
have the latest upgrade and the IM/P2P application is still
unrecognized, use Custom Signatures.

Confidential and Proprietary Information of ZTE CORPORATION 7


ZXSEC US IM/P2P/VoIP Technical Note

This page is intentionally blank.

8 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2

Peer to Peer Protocols

Overview
Peer to Peer (P2P) protocols also have some of the same
capabilities as IM protocols, such as live text chat and file
transfers. P2P differs from IM however in that instead of having
a sponsor controlled central server system, you can set up as
many servers as you want independent of the sponsor. P2P is
typically used to set up file sharing networks, where the files can
be hosted by anyone willing to install the P2P server software.
Skype is a popular new P2P protocol which can be used for text
message and voice chat over the Internet for free. The ZXSEC
US firewall does have protocol decoders for most popular P2P
protocols including Skype, Gnutella, eDonkey, Bit Torrent, KaZaa
and WinNY. However at this time it only provides allow, block, or
rate limiting capabilities since file transfers are normally
encrypted by the individual protocol, which prevents the ZXSEC
US from being able to analyze or scan the content for viruses.
In ZXSEC US OS version 3.6 MR5 and earlier releases, go to
Intrusion Protection > Signatures > Predefined to configure the
P2P IPS predefined signatures.
Starting from ZXSEC US OS version 3.6 MR6, go to Intrusion
Protection > IPS Sensor to configure the predefined signatures
in a sensor. For details, see the ZXSEC US Administration Guide.
In ZXSEC US OS 3.6, the ZXSEC US firewall can also monitor
statistics on P2P usage. For each protocol, you can view average
bandwidth consumption in bytes per second.

Note:
Note that due to the encrypted nature of Skype, the ZXSEC US
firewall is unable to monitor usage for that particular protocol.

Confidential and Proprietary Information of ZTE CORPORATION 9


ZXSEC US IM/P2P/VoIP Technical Note

FIGURE 6 P2P USAGE STATISTICS UNDER IM, P2P&VOIP > STATISTICS >
SUMM ARY

Note:
If virtual domains are enabled on the ZXSEC US unit, IM/P2P
features are configured globally. To access these features, select
Global Configuration on the main menu.

Rate Limiting
Another advanced capability of ZXSEC US firewalls is P2P rate
limiting. Rate limiting can be used to block or limit the amount
of bandwidth consumed by P2P protocols and more effectively
manage limited Internet resources.
Rate limiting is also done in the firewall policy protection profile
so that it can be enabled on a per-policy basis. You can limit
each protocol to a maximum amount of bandwidth consumed in
kilobytes per second.

Note:
Due to the encrypted nature of Skype, the ZXSEC US firewall is
unable to rate-limit for that protocol. Only the Block and Pass
options are available for that protocol.

10 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Peer to Peer Protocols

Detecting New P2P


Applications
New versions of current IM/P2P applications are constantly being
produced. In some cases, new applications are readily available.

Although most IM/P2P controls are under Firewall > Protection


Profile, the detection of IM/P2P applications is done by IPS. To
detect new IM/P2P applications or new versions of the existing
applications, users only need to update the IPS package. No
firmware upgrade is needed.

Note:
Applications marked as bold can connect to multiple P2P
networks.

TABLE 5 P2P APPLICATIONS COVERED BY IPS IN ZXSEC US OS 3.6

IPS Applications
BitComet
Bitspirit
BitTorrent (Protection Profile > IM/P2P)
Azureus
Shareaza
eMule
Overnet
Edonkey2K
eDonkey (Protection Profile > IM/P2P) Shareaza
BearShare
MLdonkey
iMesh

Confidential and Proprietary Information of ZTE CORPORATION 11


ZXSEC US IM/P2P/VoIP Technical Note

IPS Applications
BearShare
Shareaza
LimeWire
Xolox
Swapper
iMesh
MLdonkey
Gnucleus
Gnutella (Protection Profile > IM/P2P)
Morpheus
Openext
Mutella
Qtella
Qcquisition
Acquisition
NapShare
gtk-gnutella
KaZaA (Protection Profile > IM/P2P) KaZaA
Skype (Protection Profile > IM/P2P) Skype
WinNY (Protection Profile > IM/P2P) WinNY
IPS predefined signature: ares Ares Galaxy
IPS predefined signature:direct_connect DC++

Note:
If you encounter an IM/P2P applications that is not listed above,
make sure that you have the latest upgrade for the IPS.
If you have the latest upgrade and the IM/P2P application is still
unrecognized, use Custom Signatures.

12 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 3

Voice over Internet


Protocol

Overview
Starting from ZXSEC US V3.0 MR4 release, you can control and
monitor the usage of VoIP protocols.
The VoIP menu provides statistics for network VoIP usage.
ZXSEC US OS supports two VoIP protocols: Session Initiation
Protocol (SIP) and Skinny Client Control Protocol (SCCP).
The following topics are included in this section:
„ Firewall Controls
„ Statistics
„ CLI Commands

Firewall Controls
In the Firewall Protection Profiles, you are able to control two
functions within the VoIP protocols: logging and rate limiting.
Logging allows you to enable tracking of information available in
the Statistics section.
The VoIP options allow you to set the rate limiting for each of
the VoIP protocols supported by the ZXSEC US unit.

VoIP Logging
You can log VoIP calls.
To enable VoIP logs

Confidential and Proprietary Information of ZTE CORPORATION 13


ZXSEC US IM/P2P/VoIP Technical Note

1. Go to Firewall > Protection Profile.


2. Select create New to create a new protection profile or the
Edit icon to edit a profile.
3. Select the blue arrow to expand the Logging options.
4. Select Log VoIP Activity.
5. Select OK.

VoIP Rate Limiting


You can configure VoIP rate limiting for Session Initiated
Protocol (SIP) and Skinny Client Control Protocol (SCCP) or
Skinny protocol. SIP and SCCP are two types of VoIP protocols.
Rate limiting is generally different between SCCP and SIP. For
SIP, rate limiting is for that SIP traffic flowing through the
ZXSEC US unit.
For SCCP, the call setup rate is between the ZXSEC US unit and
the clients because the call manager normally resides on the
opposite side of the ZXSEC US unit from the clients.
To configure VoIP rate limiting
1. Go to Firewall > Protection Profile.
2. Select create New to create a new protection profile or the
Edit icon to edit a profile.
3. Select the blue arrow to expand the VoIP options.
4. Select the SIP and SCCP checkboxes.
5. Enter a number for requests per second in the Limit
REGISTER request (requests/sec) (SIP only) field.
6. Enter a number for requests per second in the Limit INVITE
request (requests/sec) (SIP only) field
7. Enter a number for the maximum calls per minute in the
Limit Call Setup (calls/min) (SCCP only) field.
8. Select OK.

Statistics
You can view the VoIP statistics to gain insight into how the
protocols are being used within the network. Overview statistics
are provided for all supported VoIP protocols.

Note:
If virtual domains are enabled on the Instant Messanging, Peer
to Peer, and Voice over Internet Protocols unit, IM, P2P and VoIP

14 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 3 Voice over Internet Protocol

features are configured globally. To access these features, select


Global Configuration on the main menu.

Viewing overview statistics


The IM, P2P&VoIP > Statistics > Summary page provides a
summary of statistics for all VoIP protocols.

FIGURE 7 VOIP STATISTICS SUMM ARY

VoIP Usage For SIP and SCCP protocol


Active Sessions(phones connected)
Number of sessions that are
currently active
Total calls (since last reset)
Total VoIP calls since the last ZXSEC
US unit reset.
Calls failed/Dropped Number of VoIP sessions that failed
during the reporting period.
Calls Succeeded
Number of VoIP sessions that were
successfully completed during the
reporting session.

CLI commands
The CLI commands to configure SIP and SCCP settings are under:
config firewall profile For details, see the config firewall chapter
of the ZXSEC US CLI Guide.

Confidential and Proprietary Information of ZTE CORPORATION 15


Figures

Figure 1 Example of IPS signatures in version 2.8 ..................3


Figure 2 Example of IPS sensors in version 3.6 ......................3
Figure 3 Example of IM user list under IM, P2P&VoIP > User >
User List ...........................................................................4
Figure 4 Example of user policy ...........................................4
Figure 5 Example of IM usage statistics under IM, P2P&VoIP >
Statistics > Protocol............................................................5
Figure 6 P2P usage statistics under IM, P2P&VoIP > Statistics >
Summary ........................................................................ 10
Figure 7 VoIP statistics summary ....................................... 15

Confidential and Proprietary Information of ZTE CORPORATION 17


ZXSEC US IM/P2P/VoIP Technical Note

This page is intentionally blank.

18 Confidential and Proprietary Information of ZTE CORPORATION


Tables

Table 1 Chapter Summary ...................................................i


Table 2 Typographical Conventions ...................................... ii
Table 3 Mouse Operation Conventions .................................. ii
Table 4 IM applications covered by IPS in ZXSEC US OS 3.6 ....7
Table 5 P2P applications covered by IPS in ZXSEC US OS 3.6 11

Confidential and Proprietary Information of ZTE CORPORATION 19

You might also like