Security Best Practices for Enterprise VoIP. Preventing Attacks and Managing Risk

Size: px
Start display at page:

Download "Security Best Practices for Enterprise VoIP. Preventing Attacks and Managing Risk"

Transcription

1 Security Best Practices for Enterprise VoIP Preventing Attacks and Managing Risk A Sipera White Paper September 2007

2 Summary To take full advantage of unified communications (UC), enterprises are extending their voice over IP (VoIP) network to soft phones, WiFi/dual-mode phones and other devices. At the same time, they are connecting to service providers using Session Initiation Protocol (SIP) trunks, creating federations with other enterprises, and integrating collaboration, multimedia and presence applications. By leveraging its internal IP PBX to handle external calls using VoIP and adding unified communications applications, enterprises can decrease costs, improve collaboration and ensure business continuity. But, many enterprises have yet to realize the potential security implications of extending their VoIP network over public and/or untrusted networks. There are a number of security best practices that must be followed to prevent attacks and minimize risk in order to extend VoIP securely. Some of these best practices can be borrowed from the data world and include: ensuring security patches are up-to-date, installing the latest anti-virus software, encrypting the traffic for privacy, and authenticating the users. But if you assume this is the end of the story and existing data security measures are enough to protect your unified communications, then this white paper would not be needed. Enterprises must understand that VoIP and UC applications have unique security requirements to data networks that need to be addressed to ensure your unified communications infrastructure is protected. At the same time, VoIP/UC threats, which are very different from data threats, can allow hackers to carry out spoofing and denial-of-service attacks, unwanted reboots, unauthorized toll calls (toll fraud), and to take over the device and either steal or delete confidential data that raises compliance and risk management concerns. This white paper will look at these VoIP/UC-specific security requirements and in particular threats targetting the enterprise VoIP/UC network and users including reconnaissance, eavesdropping, spoofing, denial of service (DoS), VoIP spam, and VoIP-to-data exploits. Once identified, this paper will explore VoIP/UC security best practices, the shortcomings of existing data security products in satisfying those best practices, and the requirements for a comprehensive VoIP/UC security solution.

3 Introduction Traditionally, threats from VoIP and unified communications do not make it to the list of the top information security issues. Such lists contain threats like system probing, attacks, default password attacks, and sniffing. However, like any complex computer network, VoIP/UC networks have their own unique security challenges that must be addressed. To give a simple example, standard security best practices recommend the separation of the voice virtual local area network (VLAN) from the data VLAN to prevent traffic from one network to reach another network. However, unified communications enable soft phones to be installed on the data VLAN but talk to hard VoIP phones on the voice VLAN. Completely blocking the traffic between the two VLANs will prevent this communication. Consequently, IT administrators may end up allowing traffic between the two VLANs freely but, if not monitored, it also allows worms, viruses and other attacks to cross over and vice-versa. While some enterprises may not deploy soft phones today, VoIP soft phones are an integral part of any unified communications framework. At the same time, enterprises could introduce other issues by extending the IP PBX to VoIP remote users working at home or integrating WiFi/dual-mode phones that may connect to any untrusted access point. Finally, to get the full benefits of unified communications, enterprises must open their VoIP/UC networks to their service provider using SIP trunks to bypass the PSTN or create federations among partners and bypass the service provider all together. In all these cases the VoIP/UC network is now open and exposed to untrusted networks, devices, or users. Therefore, because of the inherently open nature of unified communications, one cannot ignore VoIP/ UC threats while investing other resources to protect critical assets and confidential data residing on the data network. Equal importance must be given to protecting VoIP/UC devices to achieve comprehensive security across the enterprise. This paper outlines a number of potential attacks that puts VoIP/UC among the top information security concerns for CIOs/CSOs and looks at the VoIP security best practices for preventing them and managing risk. Benefits of Extending Unified Communications Real-time, unified communications have a significant and obvious appeal for enterprises and end-users because they allow the Internet and existing data networks to become a cost-effective transport for things most people want to do such as: placing voice calls, participating in video conferences, exchanging instant messages (IMs), and a host of other communications applications. In addition enterprises are embracing VoIP and unified communications to increase productivity and improve collaboration. Security Best Practices for Enterprise VoIP 2

4 But the true potential of these business applications have yet to be realized as most are deployed in a closed network. These benefits can be increased tenfold if the IP PBX and its real-time communications are extended outside the enterprise to remote and mobile workers, branches, and soft phones along with connecting to service providers using SIP trunks. More importantly, cost-savings, business continuity, mobility, and the trend towards outsourcing are compelling enterprises to open up its communications infrastructure beyond the enterprise perimeter, as shown in Figure 1. REMOTE WORKER Cost reductions & capital savings; Employee Lifestyle VOICE/DATA CENTER(S) IP PBX IP PBX Cost reductions; Disaster recovery & business continuity Internet VISP Mobile Worker WAN/VISP PSTN Cost reductions; Productivity & collaboration HEADQUARTERS Cost reductions & capital savings; Business continuity BRANCH(ES) Figure 1: Extending the IP PBX can help the enterprise realize many business benefits. By extending VoIP to remote workers and connecting branch offices, the enterprise can drastically decrease telecommunications charges by leveraging its internal IP PBX to handle calls to/from such locations without needing any telecom provider and route international calls over the Internet at much lower rates. Mobile workers can also significantly reduce plan overages and roaming charges while enjoying true mobility, with one phone and number, by using WiFi/dual-mode phones. But cost is only part of the appeal, these new communications applications enable increased efficiencies and collaboration with integration of soft clients and IT infrastructure such as Microsoft OCS into one converged network. Plus connecting to your service provider using a SIP trunk gives enterprises the ability to implement a crucial business continuity and disaster recovery plan. VoIP is Different These benefits do not come without a significant tradeoff as we can see by taking a step back and looking at what happened with Internet-based applications and communications. Because the Internet is an open system, any user can freely connect to it at any time from any place with little effort or oversight. This makes the Internet an untrusted network and a fertile breeding ground for a wide variety of malicious Security Best Practices for Enterprise VoIP 3

5 and unauthorized activities that can affect any enterprise, group, or user. Network protocols, operating systems, web browsers, clients and other applications are persistent targets of attacks. Real-time Peer-to-Peer Protocol and Feature Rich VoIP and Unified Communications are Different Separate signaling and media planes Low tolerance to false positives/negatives, non-availability and/or low quality Maintain call states in real-time for thousands of users with minimal QoS impact Figure 2: VoIP and Unified Communications are very different than data applications At the same time, it s important to understand that unified communications, including VoIP, are very different than web applications and , as shown in Figure 2. VoIP/UC is real-time by its very nature and involves maintaining several dozen states for thousands of users with minimal QoS impact. The protocols themselves, such as SIP, are feature-rich and involve the use of separate signaling and media planes which allow devices to talk peer-to-peer rather than the traditional client-server methods of the data world. Finally, there is an extremely low tolerance to false positives/negatives, non-availability or low quality as compared to the data world. It s easy to see that unified communications demand unique security best practices and a security solution that not only borrows applicable best security practices from the data world but adds specific VoIP/UC protection techniques that take into account the real-time, peer-to-peer, and feature-rich nature of these session-based protocols. But before we look at these VoIP/UC security best practices, it helps to understand the unique threats that a VoIP/UC network may face. VoIP/UC Security Risks and Vulnerabilities are Different As enterprises move to deploy unified communications, the traditionally closed phone network is now open to Internet-based software and connectivity. While this offers tremendous value and ubiquitous connectivity as shown above, it also makes the communications network prone to attacks similar to other Internet-based devices. More importantly, unlike other IP-based clients, the IP-based phone acts like a server in that it is always ready to receive calls so anyone can send unsolicited message to it and either ring it, cause a denial of service, or launch a variety of other attacks. Security Best Practices for Enterprise VoIP 4

6 In fact, VoIP networks have thousands of unique vulnerabilities that can be exploited to launch a variety of attacks. Over the last 4 years, the Sipera VIPER lab, which is comprised of knowledgeable VoIP and security developers, architects, and engineers, has identified over 20,000 threats that can be launched against SIP, UMA and IMS networks both endpoints and servers. Unique VoIP attacks as catalogued by Sipera VIPER Lab Signaling attacks on infrastructure SIP UMA IMS Fuzzing 3543 >20000 BNF Impractical Errors >4000 Syntax Errors >6000 Delimiter Errors >6000 Field Value Errors >3000 Context Dependent errors >1000 State Dependent errors >500 Reconnaissance Floods >30 47 >60 Distributed floods >30 32 >40 Total > >20108 Signaling attacks on end users SIP UMA IMS Misuse/spoofing Session anomalies Stealth Spam Total Media attacks RTP/RTCP/RTSP Fuzzing 10 Floods 4 Misuse/spoofing 7 Total 21 Table 1: Unique SIP, UMA and IMS vulnerabilities as catalogued by Sipera VIPER Lab All told, enterprises need to be aware of, and effectively protect their network from, these attacks against their infrastructure and the additional ones against end-users which are unique to unified communications. Some of the more prevalent and potentially damaging VoIP-specific threats include: Reconnaissance Unlike traditional phone networks, discovering VoIP endpoints and servers available on the corporate network is very easy and is generally the first step towards exploiting vulnerabilities and penetrating the network. Several well-known scanning tools may be used to discover VoIP endpoints and nodes in the network. Security Best Practices for Enterprise VoIP 5

7 Spoofing Several VoIP phones may accept requests from random source IP addresses without authenticating the sender. This vulnerability can be used to send spoofed messages directly to the phone. Either source IP address or application level information like caller ID can be spoofed. Additionally, malformed messages may be directed to the phone to exploit vulnerabilities. Eavesdropping There are several tools which may sniff data over networks. If the signaling and/or media traffic used for voice communication is not sufficiently encrypted, it may be possible to capture media packets and reconstruct an intelligible conversation. Weak Authentication Authentication mechanisms used in VoIP infrastructures may have implementation flaws. For example, it may not cross-check username in credentials with username requesting service access allowing usernames and caller-ids to be spoofed. Easy caller ID spoofing simplifies social engineering attacks. Signaling and Media Manipulation Unencrypted signaling channels can be easily sniffed to inject spoofed messages and either disconnect or redirect voice communication. Similarly, injecting specially crafted low volume media packets may be possible in unencrypted media channels to degrade voice quality. DoS/DDoS Flooding the phone with spoofed requests is a very simple and effective way to overwhelm the phone s protocol stack and cause denial of service (DoS). Some phones may even reboot when under such an attack. In the case of distributed DoS (DDoS) attacks, the attacker(s) will use multiple sources to launch the assault or a single source masquerading as multiple sources to attack the target system. Unique to VoIP phones is a low volume attack, called stealth DoS that causes the phone to ring continuously. VoIP Spam / Phishing VoIP spam or Spam-over-Internet Telephony (SPIT) is unsolicited and unwanted bulk messages broadcast over VoIP to an enterprise network s end-users. The cost of launching millions of such spam calls is greatly reduced compared to the cost using traditional telephone network. Additionally, phishing attacks have been seen which ask un-suspecting users to go to a particular web-site or call a specific number to verify their personal details and account information. Security Best Practices for Enterprise VoIP 6

8 Fuzzing Malicious users employ fuzzing techniques to create maliciously formatted messages to exploit vulnerabilities like buffer overflow, format string, and other implementation flaws. Several phones accept requests from random source IP address making it easier to send malicious packets to the phone directly by bypassing security mechanism employed at the server. Service Theft/Fraud Using spoofing, replayed authentication credentials and a whole host of other techniques it may be possible for hackers to steal the VoIP service for their own financial gain. A well-publicized incident of this occurred in June 2006 when Edwin Pena was charged for allegedly defrauding VoIP service providers to garner as much as $1 million from un-suspecting customers. Regulatory and Compliance Depending on the industry, unified communications may be subject to various regulatory requirements. In the US the most high-profile acts that may apply include the Sarbanes-Oxley Act (SOX), the Gramm- Leach-Bliley Act (GLBA), or the Health Insurance Portability and Accountability Act (HIPAA). Because your VoIP network is subject to all of the same security threats as the data network and several unique ones as outlined in this paper it s important to see how these regulatory requirements apply to your specific industry. VoIP-to-Data Exploits Even with fully deployed, traditional data security in place, it is also possible to launch a buffer overflow which allows an attacker hacker to take control of an enterprise softphone and get access to all the data that is stored on the victim s laptop. Furthermore, the attacker can also do following damage to victim s laptop: Copy the confidential data to a remote computer Delete the data Deny access to the data Change system registry Shutdown or reboot the laptop New VoIP-specific Threats The threats above are unique to VoIP when VoIP is compared to traditional phone systems and should obviously be a major concern to the enterprise as they transition their TDM network to VoIP/UC. While many of these threats are similar to data threats, such as spoofing, eavesdropping, and weak authentication, there are also new VoIP threats that are not found in either TDM or data networks and may be of bigger concern to the enterprise and require new VoIP/UC security best practices. These new VoIPspecific threats include: Security Best Practices for Enterprise VoIP 7

9 Gaining access to the network using a VoIP phone: The LAN port available on several VoIP phones can directly connect a malicious laptop to the private LAN. Exploiting the management interface of the VoIP phone: Several phones can be accessed over http and used to get into private call records and to initiate unauthorized calls. Negotiating less secure signaling and media encryption options: Unless a policy is enforced to ensure all calls are setup for media to be encrypted in the first place, a malicious phone that refuses to use SRTP will result in unencrypted media between the phones which makes it easy to eavesdrop into the coversation. Voic flooding: Unless a time-of-day based policy is applied, a VoIP voic server can be flooded with un-solicited messages to fill up everyone s voic boxes. Adopting and Enforcing VoIP/UC Security Best Practices So far, we have discussed numerous vulnerabilities in VoIP/UC applications that can be exploited to steal service, cause a denial of service, eavesdrop on the conversation, steal confidential data and cause other damage to data and VoIP networks. These attacks can be from external sources such as hackers, malicious users and spammers or internal threats from disgruntled employees, infected PCs or attachments. Despite these concerns, the enterprise should not shy away from extending their IP PBX and deploying unified communications. These issues are easily addressed through up front planning and assessment of risk, ongoing maintenance and proper configuration of the infrastructure, and installing a comprehensive VoIP security solution which proactively solves many of these security best practices. The best practices below may seem straightforward enough but, in spite of this white paper and several other documents on this topic, they are not always enforced or correctly followed. The reasons behind this may be budgets, time, misunderstandings, or even just apathy towards security. Whatever the reasons, leaving VoIP/UC networks unprotected makes it and the co-existing data networks vulnerable to numerous security threats. To truly secure data and VoIP/UC networks, enterprises must adopt and enforce some security best practices that are borrowed from data security but there are also new and unique VoIP/UC-specific security best practices that are even more important and will be explored first. Perform a VoIP/UC vulnerability assessment As part of your VoIP/UC planning, a thorough security assessment should be performed to identify the risks and potential vulnerabilities. These services should start with the discovery of all VoIP/UC Security Best Practices for Enterprise VoIP 8

10 assets, protocols, and applications on the networks which are then analyzed using the most up-to-date vulnerability information databases. If possible, a penetration test of the applications, infrastructure and devices themselves should be conducted to ensure they are protected from VoIP/UC-related attacks. Implementation of strong UC policies Defining groups and applying policies for each provides an additional layer of security within the VoIP/UC network and allows the enterprise IT manager to control who talks to whom using which device and from which network. To implement this best practice, it s imperative to be able to apply granular UC security policies based on network, user, device and time of day. This enables the policies to not only be strong but also flexible and ensure applications, users and devices are controlled. Police interconnection points with VoIP/UC-specific firewall VoIP/UC relies on opening and closing a range of media ports while signaling protocols use well-known ports on the firewall. To maintain security between the enterprise network and the Internet or between data and voice VLANs, firewalls that are VoIP-aware and track call state must be deployed to dynamically handle NAT (Network Address Translation) and inspect all traffic that goes through it. Even better, deploying a VoIP/UC security product that can simplify existing firewall rules and minimize the number of ports that must be opened makes the system even more secure. Apply sophisticated VoIP/UC-specific intrusion prevention techniques When implementing an intrusion prevention system, enterprise should look for those that are aware of the complex nature of VoIP/UC protocols, and can conduct detection, mitigation and prevention in realtime. Further, such a device should also be able to understand user behavior, as this is the most effective method of analyzing and eliminating false positives/negatives, which can be extremely damaging to the VoIP/UC service and user experience. Together, this intrusion prevention system (IPS) functionality proactively protects the VoIP/UC service from attacks, misuse and service abuse. Other VoIP/UC security best practices There are some additional best practices that are specific to VoIP/UC which are crucial to addressing the new VoIP-specific threats that are not seen in either TDM or data networks and include: Ensuring QoS while enforcing security. Disable LAN ports on VoIP phones since these ports can be used to connect a laptop and get directly onto enterprise LAN. For example, what if such a port is on a public lobby phone. Disable unencrypted signaling and media options on all phone to enforce TLS and SRTP encryption of the signaling and media at all times Have a strategy to keep the phone system available during emergencies Apply time-of-day security policies since some behavior which is not suspicious during day can be suspicious at night in a VoIP/UC system. Security Best Practices for Enterprise VoIP 9

11 Data security best practices needed for VoIP/UC Along with these new VoIP/UC-specific security best practices above, the following best practices borrowed from the data must also be implemented: Keep security patches up to date: Inadequate patching exposes the VoIP and data network to risks that could easily be avoided. Many attacks target software vulnerabilities and flaws in the implementation to achieve very specific and potentially damaging aims. A very systematic approach to monitoring and installing patches from the vendor must be formed and religiously followed to protect your assets. Install and maintain a good anti-virus system: Ensure all laptops, servers and other devices have a sophisticated anti-virus systems installed and updated regularly to prevent viruses, worms and other malware from affecting both the data and VoIP network. While existing anti-virus solutions do not adequately protect against VoIP attacks because it does not recognize them, you do want to ensure that a virus or worm does not impact the VoIP/UC network or applications from the data side as the infrastructures converge. Enforce strong authentication and encryption wherever possible: It s imperative that all signaling be encrypted but just as important is that all media be encrypted to ensure privacy and confidentiality of the conversation. At the same time, all end-points should be verified using digest, certificates or ideally 2-factor authentication techniques. Inbound calls should only be accepted from trusted or verifiable sources. Secure WiFi access points: Anyone implementing a WiFi network knows that you need to secure it and ensure only authorized endpoints have access and the traffic is encrypted. Now with WiFi/ dual-mode phones being deployed in the enterprise, similar precautions need to be taken to ensure no rogue devices gain access to the network for either VoIP or data communications. Use VLANs to keep voice and data traffic separate: By segmenting voice and data traffic using virtual LANs, VoIP traffic is prioritized resulting in lower latency and better quality. VLAN separation also helps to prevent data attacks from affecting the VoIP network. However, if you re rolling out soft clients, enabling Microsoft OCS or incorporating other collaboration applications then this separation will be far less effective as you need to allow voice traffic to go on the data VLAN and vice-versa which means you need to police the interconnection point. Security Best Practices for Enterprise VoIP 10

12 Comprehensive VoIP/UC Security Sitting at the edge of the enterprise network or in front of the IP PBX, as shown in Figure 3, a dedicated, comprehensive VoIP security applicance can address the most important and VoIP/UC-specific issues raised above and ensure best practices are followed. Hacker VOICE/DATA CENTER(S) IP PBX IP PBX Centralized EMS Spammer REMOTE WORKER VoIP Remote User Security SIP Trunk Security Internet IP PBX Security VISP Mobile Worker WAN PSTN Rogue Device HEADQUARTERS Infected PC Rogue Employee BRANCH(ES) Figure 3: A comprehensive VoIP security appliance can be deployed within the enterprise network to protect the IP PBX and securely enable VoIP remote users and SIP trunks. Such a purpose-built appliance must solve firewall/nat traversal, simplify firewall rules, terminate encrypted traffic to the enterprise when the VoIP phone is external to the enterprise, and offer finegrained policy enforcement to apply different security and call routing rules, based on user, device, access network and time of day. But, most importantly, any dedicated VoIP security solution should offer VoIP-specific IPS functionality to protect against signaling and media vulnerabilities through sophisticated security methodologies while maintaining the highest media quality. UC Threat Prevention UC Policy Compliance Secure UC Access Figure 4: Comprehensive VoIP/UC security includes 3 core pieces of functionality. Security Best Practices for Enterprise VoIP 11

13 The ideal comprehensive VoIP/UC security solution would incorporate three core pieces of functionality, as shown in Figure 4: UC threat prevention to ensure unique VoIP/UC attacks are proactively recognized, detected, and eliminated; UC policy compliance to enforce granular polices to all UC traffic based on user, device, network and time of day; and secure UC access to guarantee the privacy and authentication of all UC traffic to the enterprise and limit the number of ports open on existing firewalls. This functionality for comprehensively securing unified communications must include the following features: VoIP/UC Threat Prevention Floods and fuzzing prevention: Protection from volume based denial of service attacks and malformed message fuzzing attacks. Customized scrubbing rules detect and remove malformed messages which may crash, make it vulnerable or degrade the performance of the VoIP systems (servers and end points). Media anomaly prevention: Selectively enables the media traffic and enforces rules on the type of traffic carried based on the negotiated signaling and other configured policies (for example prevent video, prevent modem/fax). This also prevents bandwidth abuse. Spoofing prevention: Various validation techniques are applied to detect and prevent device and caller ID spoofing including the use of fingerprints for different protocol fields/messages which trigger further validations and verifications. Stealth attack prevention: Based on behavior learning, the product can detect nuisance/annoying calls to individual users and selectively block these calls. Stealth attacks are typically undetectable by traditional data security devices and SBCs that rely on rate-limiting. Reconnaissance prevention: It must monitor source behavior to detect application layer scans and block out the attackers. Spam protection: Unlike spam, where the content is available to perform text analysis, VoIP spam must be prevented by blocking a call even before the actual message is delivered. Compute and maintain network-wide caller trust scores and apply various policies to detect and protect against spammers, including VoIP Turing tests to identify machine generated calls. Signature updates: New signatures for detecting new known and potential attacks must be easily added to a central attack signatures database and automatically distributed to all appliances in the network. VoIP/UC Policy Compliance Whitelist/Blacklist: Used to allow/block specific endpoints based on caller identity, SIP URI, IP Address, or device name. Entire domains can also be blocked. Signaling Firewall: Signaling rules allow you to define the action to be taken (allow or deny) for each type of signaling request and response message. Signaling rules allow fine grained control over protocol headers, methods, and requests. Security Best Practices for Enterprise VoIP 12

14 Media Firewall: Media rules allow you to enforce RTP media packet parameters such as codec types (both audio and video), codec matching priority, firewall rules and NAT considerations. Application Control: Application rules allow you to enforce which types of and how many unified communication sessions are allowed for applications such as: voice, video, and/or IM. Call Routing Policies: Routing rules allow fine grained control over inbound packet transport settings, name server addresses and resolution methods, next hop routing information, and outbound packet transport types. Secure VoIP/UC Access Message integrity: Message integrity means that the recipient is assured that what they receive is exactly what the sender transmitted. This is achieved by standard HMAC techniques used in TLS and SRTP Privacy: Privacy prevents unauthorized network users to eavesdrop on data sent to and from the network by encrypting it, thereby assuring confidentiality to authorized users. This is achieved by standard encryption algorithms used by TLS and SRTP. Authentication: Authentication identifies the parties exchanging information and ensures each party can be sure of whom they are communicating with. This is achieved by using two-factor authentication such as RSA SecurID, exchanging digital certificates and/or encrypted password based digest authentication techniques. Replay protection: Replay protection ensures that transmitted data cannot be captured and replayed at another time. This is achieved by integrity protection of sequence numbers or random nonces. Firewall/NAT traversal: Media uses ephemeral UDP ports that need to be open during the call. Enforce signaling/media integrity by allowing media traffic to use only the negotiated port numbers while blocking all non-negotiated ports to prevent media attacks. And for remote users behind NAT, the VoIP Firewall must keep the port mapping on the remote NAT refreshed to be able to successfully connect new calls. Secure Firewall Channel: Tunnel VoIP/UC traffic to the IP PBX to ensure only one port is open in the internal firewall and that there is no access to other data services. This functionality is crucial to simplifying firewall rules and ensuring the security of the system making it a key advantage over traditional firewalls. Call Admission Control: Set limit on maximum number of simultaneous calls, bandwidth usage, and call rate for each network, domain, and user group. Security Best Practices for Enterprise VoIP 13

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

Ingate Firewall/SIParator SIP Security for the Enterprise

Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...

More information

Voice Over IP and Firewalls

Voice Over IP and Firewalls Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Use of Voice Over IP (VoIP) in enterprises is becoming more and more

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

Basic Vulnerability Issues for SIP Security

Basic Vulnerability Issues for SIP Security Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future

More information

Securing Unified Communications for Healthcare

Securing Unified Communications for Healthcare Securing Unified Communications for Healthcare Table of Contents Securing UC A Unique Process... 2 Fundamental Components of a Healthcare UC Security Architecture... 3 Making Unified Communications Secure

More information

VOICE OVER IP SECURITY

VOICE OVER IP SECURITY VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

White Paper. avaya.com 1. Table of Contents. Starting Points

White Paper. avaya.com 1. Table of Contents. Starting Points White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting

More information

Just as the ecommerce companies have

Just as the ecommerce companies have Protecting IMS Networks From Attack Krishna Kurapati Krishna Kurapati is the founder and CTO of Sipera Systems (www.sipera.com), a company that specializes in security for VOIP, mobile and multimedia communications.

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Voice Over IP (VoIP) Denial of Service (DoS)

Voice Over IP (VoIP) Denial of Service (DoS) Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Denial of Service (DoS) is an issue for any IP network-based

More information

VoIP Security regarding the Open Source Software Asterisk

VoIP Security regarding the Open Source Software Asterisk Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de

More information

DoS/DDoS Attacks and Protection on VoIP/UC

DoS/DDoS Attacks and Protection on VoIP/UC DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

Voice over IP Security

Voice over IP Security Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page

More information

Best Practices for Securing IP Telephony

Best Practices for Securing IP Telephony Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram

More information

Voice over IP (VoIP) Vulnerabilities

Voice over IP (VoIP) Vulnerabilities Voice over IP (VoIP) Vulnerabilities The Technical Presentation Diane Davidowicz NOAA Computer Incident Response Team N-CIRT diane.davidowicz@noaa.gov "Security problems in state of the art IP-Telephony

More information

SIP Security Controllers. Product Overview

SIP Security Controllers. Product Overview SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running

More information

An outline of the security threats that face SIP based VoIP and other real-time applications

An outline of the security threats that face SIP based VoIP and other real-time applications A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications

More information

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

VoIP Security Challenges: 25 Ways to Secure your VoIP Network from Versign Security, Dec 01, 2006

VoIP Security Challenges: 25 Ways to Secure your VoIP Network from Versign Security, Dec 01, 2006 VoIP Security Challenges: 25 Ways to Secure your VoIP Network from Versign Security, Dec 01, 2006 VoIP technology has the tech geeks buzzing. It has been touted as: - the killer of telecoms - a solution

More information

Session Border Controllers in Enterprise

Session Border Controllers in Enterprise A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Cconducted at the Cisco facility and Miercom lab. Specific areas examined Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

Multi-layered Security Solutions for VoIP Protection

Multi-layered Security Solutions for VoIP Protection Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper

More information

Cisco ASA 5500 Series Unified Communications Deployments

Cisco ASA 5500 Series Unified Communications Deployments 5500 Series Unified Communications Deployments Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time,

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Challenges and opportunities for Open Source solutions

Challenges and opportunities for Open Source solutions GDS20910 39HA83090K2 D3 S20910 328MGD 7 W510200RQ1 UT 10 T28GHY620 JH7 BE4ET276 90K2 D39HA83 0K2 D39HA830 8JD6200NS12 RQ1 UTW510200 H7 BE4ET2763J 8HGDOI0912 M1 Y620110 T28GH UTW510200 83090K2 GDS20910

More information

What is an E-SBC? WHITE PAPER

What is an E-SBC? WHITE PAPER Executive Summary Enterprise communications is in a state of transformation. Businesses are replacing conventional PBX systems with VoIP and Unified Communications (UC) solutions and cloud-based services

More information

Implementing VoIP monitoring solutions. Deployment note

Implementing VoIP monitoring solutions. Deployment note Implementing VoIP monitoring solutions Deployment note Introduction With VoIP being an integral part of modern day business communications, enterprises are placing greater emphasis on the monitoring and

More information

CPNI VIEWPOINT 02/2007 ENTERPRISE VOICE OVER IP

CPNI VIEWPOINT 02/2007 ENTERPRISE VOICE OVER IP ENTERPRISE VOICE OVER IP AUGUST 2007 Abstract Voice over IP (VoIP) is the term used for a set of technologies that enable real time voice or video conversations to take place across IP networks. VoIP devices

More information

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and

More information

Solution Brief. Secure and Assured Networking for Financial Services

Solution Brief. Secure and Assured Networking for Financial Services Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to

More information

nexvortex SIP Trunking Implementation & Planning Guide V1.5

nexvortex SIP Trunking Implementation & Planning Guide V1.5 nexvortex SIP Trunking Implementation & Planning Guide V1.5 510 S PRING S TREET H ERNDON VA 20170 +1 855.639.8888 Introduction Welcome to nexvortex! This document is intended for nexvortex Customers and

More information

The Need for Session Delivery Networks

The Need for Session Delivery Networks Executive Summary Service providers, enterprises and contact centers continue to build IP-based infrastructure to lower their operating costs and introduce new IP-enabled offerings such as VoIP, video-over-ip

More information

ETM System SIP Trunk Support Technical Discussion

ETM System SIP Trunk Support Technical Discussion ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with

More information

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be

More information

COORDINATED THREAT CONTROL

COORDINATED THREAT CONTROL APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,

More information

Mitigating the Security Risks of Unified Communications

Mitigating the Security Risks of Unified Communications 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Mitigating the Security Risks of Unified Communications Fernando Almeida 1 +, Jose

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

IP Ports and Protocols used by H.323 Devices

IP Ports and Protocols used by H.323 Devices IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential

More information

SBC WHITE PAPER. The Critical Component

SBC WHITE PAPER. The Critical Component SBC WHITE PAPER The Critical Component Table of Contents of your VoIP Infrastructure... 3 Enter the SBC... 4 Functions... 5 Security... 5 Denial of Service... 5 Toll Fraud... 6 Encryption... 6 Policy...

More information

Release the full potential of your Cisco Call Manager with Ingate Systems

Release the full potential of your Cisco Call Manager with Ingate Systems Release the full potential of your Cisco Call Manager with Ingate Systems -Save cost with flexible connection to Service Providers. -Save mobile costs, give VoIP mobility to your workforce. -Setup an effective

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

Acme Packet session border controllers in the enterprise

Acme Packet session border controllers in the enterprise Acme Packet session border controllers in the enterprise Large enterprises have been expanding their deployments of IP telephony (IPT) for several years now. Planning has already begun to extend the benefits

More information

How To Prevent Hacker Attacks With Network Behavior Analysis

How To Prevent Hacker Attacks With Network Behavior Analysis E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal

More information

VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide

VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide VoIP: The Evolving Solution and the Evolving Threat Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide VoIP: The Evolving Solution and the Evolving Threat An ISS Whitepaper 2

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

T.38 fax transmission over Internet Security FAQ

T.38 fax transmission over Internet Security FAQ August 17, 2011 T.38 fax transmission over Internet Security FAQ Give me a rundown on the basics of T.38 Fax over IP security. Real time faxing using T.38 SIP trunks is just as secure as sending faxes

More information

VOIP SECURITY ISSUES AND RECOMMENDATIONS

VOIP SECURITY ISSUES AND RECOMMENDATIONS VOIP SECURITY ISSUES AND RECOMMENDATIONS Sathasivam Mathiyalakan MSIS Department, College of Management, University of Massachusetts Boston Phone: (617) 287 7881; Email: Satha.Mathiyalakan@umb.edu ABSTRACT

More information

Whitepaper. Are Firewalls Enough for End-to-End. VoIP Security

Whitepaper. Are Firewalls Enough for End-to-End. VoIP Security Whitepaper Are Firewalls Enough for End-to-End VoIP Security Table of Contents I. Introduction... 3 II. Definitions... 3 III. Security... 4 IV. Interoperability... 5 V. Availability... 5 VI. A single demarcation

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications Oracle s Solution for Secure Remote Workers Providing Protected Access to Enterprise Communications Our forecast shows that the worldwide mobile worker population will increase to more than 1.3 billion

More information

CPNI VIEWPOINT 01/2007 INTERNET VOICE OVER IP

CPNI VIEWPOINT 01/2007 INTERNET VOICE OVER IP INTERNET VOICE OVER IP AUGUST 2007 Abstract Voice over IP (VoIP) is the term used for a set of technologies that enable real time voice or video conversations to take place across IP networks. VoIP devices

More information

Oracle s SIP Network Consolidation Solutions. Using SIP to Reduce Expenditures and Improve Communications

Oracle s SIP Network Consolidation Solutions. Using SIP to Reduce Expenditures and Improve Communications Oracle s SIP Network Consolidation Solutions Using SIP to Reduce Expenditures and Improve Communications A typical large enterprise could enjoy 401 percent three-year ROI on the Net-Net Enterprise Session

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

BlackRidge Technology Transport Access Control: Overview

BlackRidge Technology Transport Access Control: Overview 2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service

More information

Session Border Controllers: Securing Real-Time Communications

Session Border Controllers: Securing Real-Time Communications Session Border Controllers: Securing Real-Time Communications Why do I need an SBC if I already have a firewall? It s not uncommon for enterprises to believe that the same device that protects their data

More information

VoIP Security. Customer Best Practices Guide. August 2015. 2015 IntelePeer

VoIP Security. Customer Best Practices Guide. August 2015. 2015 IntelePeer VoIP Security Customer Best Practices Guide August 2015 2015 IntelePeer Contents Contents... 2 Getting Started... 3 Pre-Deployment Considerations... 3 Preparation Check-List... 3 Common Security Threats...

More information

VoIP Security Threats and Vulnerabilities

VoIP Security Threats and Vulnerabilities Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: info@network-research-group.org This paper presents the

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Secure VoIP for optimal business communication

Secure VoIP for optimal business communication White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product

More information

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005 Voice over IP VoIP (In) Security Presented by Darren Bilby NZISF 14 July 2005 Security-Assessment.com Who We Are NZ s only pure-play security firm Largest team of security professionals in NZ Offices in

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

Data Security in a Converged Network

Data Security in a Converged Network Data Security in a Converged Network A Siemens White Paper Author: Contributors: Joel A. Pogar National Practice Manager Secure Network Services Joel.Pogar@icn.siemens.com Jeff Corcoran Solutions Architect,

More information

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems VOIP Components Common Threats How Threats are Used Future Trends Provides basic network connectivity and transport

More information

PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com

PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure

More information

Grandstream Networks, Inc. UCM6100 Security Manual

Grandstream Networks, Inc. UCM6100 Security Manual Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL

More information

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and

More information

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network 10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity

More information

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma shorton@sangoma.com

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma shorton@sangoma.com SangomaSBCs Keeping Your VoIP Network Secure Simon Horton Sangoma shorton@sangoma.com Inside this Deck About Sangoma/ProVu SIP Market SBCs Demystified Business Applications and Use Cases Portfolio of SBCs

More information

Threat Mitigation for VoIP

Threat Mitigation for VoIP Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities

More information

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP

More information

Recommendations for secure deployment of an IP-PBX

Recommendations for secure deployment of an IP-PBX Internet Telephony Services Providers Association Recommendations for secure deployment of an IP-PBX Version 2 November 2013 Contact: admin@itspa.org.uk Contents Introduction... 3 Health Warning!... 3

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

Acme Packet session border controllers in the enterprise

Acme Packet session border controllers in the enterprise Acme Packet session border controllers in the enterprise Acme Packet session border controllers enable the delivery of trusted, firstclass enterprise IP telephony today and Unified Communications tomorrow

More information

Security Guidance for Deploying IP Telephony Systems

Security Guidance for Deploying IP Telephony Systems Report Number: I332-016R-2005 Security Guidance for Deploying IP Telephony Systems Systems and Network Attack Center (SNAC) Released: 14 February 2006 Version 1.01 SNAC.Guides@nsa.gov ii This Page Intentionally

More information

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP)

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP) 2010 White Paper Series Top Ten Security Issues Voice over IP (VoIP) Top Ten Security Issues with Voice over IP (VoIP) Voice over IP (VoIP), the use of the packet switched internet for telephony, has grown

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Top Defense Strategies and

Top Defense Strategies and E-Guide Top Defense Strategies and Security Considerations for Unified Communications (UC) Organizations turn to unified communications as a cost-effective alternative to traditional communication systems.

More information

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures

More information

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011 10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s

More information

Secure Voice over IP (VoIP) Networks

Secure Voice over IP (VoIP) Networks Secure Voice over IP (VoIP) Networks How to deploy a robust, secure VoIP solution that counters both external and internal threats and, at the same time, provides top quality of service. This White Paper:

More information

Kommunikationsdienste im Internet Möglichkeiten und Risiken

Kommunikationsdienste im Internet Möglichkeiten und Risiken Die Zukunft der Kommunikationsdienste im Internet Möglichkeiten und Risiken Erwin P. Rathgeb Technik der Rechnernetze, Universität Duisburg-Essen Jochen Kögel, Marc Barisch IKR, Universität Stuttgart Steffen

More information

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 Coral IP Solutions TABLE OF CONTENTS 1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 2.1 UGW 4 2.2 IPG 4 2.3 FLEXSET IP 5 2.4 FLEXIP SOFTPHONE 6 2.5 TELEPORT FXS/FXO GATEWAYS 7 2.6 CORAL SENTINEL 7 3 CORAL IP

More information

Security Considerations

Security Considerations 112 SIP Trunking VoIP endpoints and call agents such as CUCM and CUCMExpress also have facilities to control and mark packets. These can be used directly if the enterprise markings are the same as the

More information

VoIP Security, an overview of the Threat Landscape

VoIP Security, an overview of the Threat Landscape VoIP Security, an overview of the Threat Landscape Peter Cox CTO Borderware Technologies peter@borderware.com Abstract Voice over IP (VoIP) services are, as the name suggests a method of running Voice

More information