Technical data

ServerIron ADX Advanced Server Load Balancing Guide 21
53-1002435-03
Configuring SIP SLB
1
The command should adjust the default number of concurrent SIP transactions supported on a
local barrel processor (BP). Normally, the default value is more than sufficient. Changing this value
is not recommended.
Real server commands for SIP over TCP
The commands in this section are entered under the SIP real server configuration level.
Use the following command to specify the maximum number of SIP connections allowed for a real
server.
ServerIronADX(config-rs1)#sip max-tcp-connections 15
Syntax: [no] sip max-tcp-connections <#-of-connections>
The <#-of-connections> can be from 1 through 64 connections. The default is 64 for connection
reuse cases (source NAT or non-source NAT). For non-connection reuse cases, the default value is
determined by the value configured for the max-conn command.
NOTE
This command takes precedence over the server sip tcp max-client-tcp-connections and server sip
max-server-tcp-connections (global) commands.
To enable server-side connection reuse when source NAT is not configured, enter the following
command.
ServerIronADX(config-rs1)# sip enable-tcp-connection-reuse
Syntax: [no] sip enable-tcp-connection-reuse
Use the following command to specify an alternate real server IP address for the SIP real server.
This is the IP address that the real server will use to send out SIP requests and responses. This
configuration is required for those SIP servers that may use an IP address other than the
configured real server IP address. This configuration helps a ServerIron ADX to identify the traffic
as real server traffic.
ServerIronADX(config-rs-sip)# sip alternative-server-ip 10.120.5.34
Syntax: [no] sip alternative-server-ip <alternate-ip>
The <alternate-ip> variable is the alternate real server IP address.
By default, real server traffic is deeply scanned by the ServerIron ADX SIP parser. In some cases,
you may want to prevent traffic from being deeply scanned because the real server initiated traffic
other than SIP traffic (such as HTTP, DNS, and others). For these cases, configure an ACL for SIP. If
the ACL action is "permit", packets should be forwarded without being deeply scanned by the SIP
parser.
ServerIronADX(config-rs-sip)# sip tcp-access-list 2
Syntax: [no] sip tcp-access-list <acl-id>
The <acl-id> variable is the access list ID that will be used only for TCP.
Virtual server commands for SIP over TCP
Configure an alternate virtual port to be used by TCP-based SIP and the maximum local
connections for a client. This port is configured under the SIP virtual server configuration level.