Overview 17
Copyright © 2003, Nortel Networks MCP SIP Application Module Basics
Nortel Networks Confidential
devices. Information for each component is stored in .xml format to
provide flexibility when describing the capabilities of the component.
Bearer Path Control
The SIPApplication Module uses the RTP Media Portal to control
media streams originating from and terminating to non-compliant SIP
devices if they do not support media negotiations. The exception to this
occurs when the originating and terminating parties are both the same
device type. If both gateways are CSE 2000s, for example, the SIP
Application Module does not use the RTP Media Portal.
Privacy Control service
The SIP Application Module supports Privacy Control based on
draft-ietf-sip-privacy. This draft defines a mechanism that allows clients
to supply a network server with their private user information while at
the same time instructing the server not to pass that information outside
the boundaries of the trusted network. The information is passed in a
Remote-Party-ID header with the privacy indicator set to “full.” The SIP
Application Module removes this header any time it forwards the
message out over a public network interface.
Service package enforcement
A service package is made up of a user’s enabled network services,
such as audio conferencing, and subscriber profile. The service
provider defines the available service packages for the domain. The
domain provisioner can then assign a specific service package to a
subscriber.
Authentication services
The SIP Application Module performs user authentication when the
server receives an incoming SIP request. The SIP Application Module
supports the challenge-based Digest method for SIP Client-to-Proxy
authentication. In Digest authentication, the SIP Application Module
challenges a client when a SIP request is received. The SIP Client
re-sends a SIP request with a valid password and user name attached.
The request types to be authenticated are configurable.
Note: Only US ASCII is supported for user names.
The software performs authentication using the password of the
subscriber originating the call. Only subscribers from a local domain
actually have a password stored in the database to authenticate
against. If a subscriber from a foreign domain (refer to the note below
for definitions of these types of domains) places a call and
authentication is required for a known foreign domain, the