Define Strict Routing Rules
When defining IP-to-Tel (IP-to-Trunk Group Routing table) and Tel-to-IP (Tel-to-IP Routing table) routing rules, it's crucial that you adhere to the following security guidelines:
|
■
|
Make sure that your routing rules are accurate and correctly defined for the desired routing outcome. Inaccurate or “loose” routing rules can easily result in service theft. |
|
■
|
Avoid, if possible, using the asterisk "*" symbol and Any option to indicate any for a specific parameter in your routing rules. This constitutes weak routing rules that can be vulnerable to attackers. For strong routing rules, enter specific alphanumerical values instead of the asterisk. |