Basic DDoS protection in hybrid access-peer environment
Hello,
I'm testing basic DDoS protection in hybrid configuration.
I have one egress realm where both endpoints and session-agents reside. Namely I have realm called "access" with sip-interface/steering pool configured and nested (child) realm called access1 where session-agent mapped to.Thus all access endpoints and SA PBXes use the same SD sip-interface and steering-pool.
I would like to protect my SD from "password brute force"-kind attacks, thus as far as I read in docs I should use access-control-trust-level low and untrusted-signal-threshold 10 (just example) in my "access" realm (also deny-period in realm and tolerance-window in media-manager configs are set to appropriate values).