|
|
@ -1,4 +1,4 @@ |
|
|
route[TRAFFIC_FILTER] |
|
|
|
|
|
|
|
|
route[FILTER_REQUEST] |
|
|
{ |
|
|
{ |
|
|
# allow request from internal network or from whitelist |
|
|
# allow request from internal network or from whitelist |
|
|
if (isflagset(FLAG_TRUSTED_SOURCE)) { |
|
|
if (isflagset(FLAG_TRUSTED_SOURCE)) { |
|
|
@ -6,13 +6,13 @@ route[TRAFFIC_FILTER] |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
# drop requests with no To domain or IP To domain (friendly-scanner) |
|
|
# drop requests with no To domain or IP To domain (friendly-scanner) |
|
|
if (is_method("REGISTER|SUBSCRIBE") { |
|
|
|
|
|
|
|
|
if (is_method("REGISTER|SUBSCRIBE")) { |
|
|
route(FILTER_TO_DOMAIN); |
|
|
route(FILTER_TO_DOMAIN); |
|
|
route(FILTER_FROM_DOMAIN); |
|
|
route(FILTER_FROM_DOMAIN); |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
# drop Invite with IP auth realm |
|
|
# drop Invite with IP auth realm |
|
|
if (is_method("INVITE") { |
|
|
|
|
|
|
|
|
if (is_method("INVITE")) { |
|
|
route(FILTER_REQUEST_DOMAIN); |
|
|
route(FILTER_REQUEST_DOMAIN); |
|
|
route(FILTER_AUTHORIZATION_DOMAIN); |
|
|
route(FILTER_AUTHORIZATION_DOMAIN); |
|
|
} |
|
|
} |
|
|
|