Simple Law Enforcement Monitoring
|
|
- Amie Lawrence
- 8 years ago
- Views:
Transcription
1 Simple Law Enforcement Monitoring Fred Baker draft-baker-slem-architecture-01.txt ftp://ftpeng.cisco.com/fred/ietf/slem.ppt ftp://ftpeng.cisco.com/fred/ietf/slem.pdf
2 The message I wish had been found in many Raven messages I am not a lawyer I do not play one on TV
3 Lawfully Authorized Electronic Interception (LAES) Forensic investigation of specific persons or organizations Focuses on the crime/criminal being investigated Involves disclosure of a person's communications In most countries, the difference between voice and data communication is irrelevant
4 LAES in an Internet environment Who did they speak with? What did they say? Control Device: Call Manager, SIP Proxy, Authentication Server, etc Log Stream IP Control Traffic IP Data Control Mediation Warrant Intercept Configuration Data ACL Intercepted Information Intercepted Data Data Mediation
5 The legal mandate for Lawfully Authorized Electronic Interception
6 Current state of law Laws being worked on in western countries US CALEA and related laws European legislation resulting from legal normalization process Japan, Australia, and others 11 September attack used to push US legislation Cryptography limitations and export controls discussed during debate
7 EU Efforts Council of Europe-Convention on Cyber-crime Left to each country to implement requirements. Provides for mutual assistance among signing states Applies to public and private ISPs Requires ISPs to preserve communications data (e.g., origin, route, type of service) for up to 90 days and provide it to LEA. ISP must also provide for real-time collection or recording of traffic data and content for LEA. Open to EU members and drafters, including Canada and Japan
8 Overview of Electronic Surveillance Four fundamental types of requests: Past billing/statistical records of communications In telephone system, billing records Contents of computer long term storage Eg, search and seizure of computers and disk drives Current billing/statistical records of communications, desirable in real time In telephone system, pen register or trap and trace Delivery of content Content Intercept
9 Cybercrime Treaty, Article 20 Real-time collection of traffic data Each Party shall compel a service provider, within its existing technical capability, to: i. collect or record traffic data, in real-time, associated with specified communications in its territory transmitted by means of a computer system.
10 Cybercrime treaty, Article 21 Interception of content data Each Party shall a. b. i. ii. collect or record compel a service provider collect or record co-operate in the collection or recording of, content data, in real-time, of specified communications in its territory transmitted by means of a computer system.
11 CALEA wrinkles Communications Assistance for Law Enforcement Act Voice intercept mandated Features installed only for CALEA compliance subject to FBI funding Lack of capability cause for $10K/day fines Data intercept allowed for, especially Title III and FISA If an ISP has the capability, its use can be subpoenaed If it does not, an ISP must provide reasonable assistance to law enforcement (i.e., do what it can, or provide access to install LEA-owned equipment) to permit LAES
12 IETF Comments on the thrust of law
13 IETF Issues in Internet Privacy and Security IETF primary concern: Security of the infrastructure Two statements: RFC IETF Policy on Wiretapping RFC IAB and IESG Statement on Cryptographic Technology and the Internet
14 RFC 2804 on LAES Wiretapping... releases information that the information sender did not expect to be released. The system is less secure than it could be had this function not been present. The system is more complex than it could be had this function not been present. Being more complex, the risk of unintended security flaws in the system is larger. Wiretapping, even when it is not being exercised, therefore lowers the security of the system. RFC 2804
15 RFC 2804 major findings Six major considerations: IETF is wrong forum National definitions call for national standards IETF wants to maximize security LAES can already be accomplished Adding LAES to protocols adds complexity that reduces security Encryption is your friend LAES technology should be openly described
16 RFC 2804 will not statements IETF will not Take a moral position on LAES No consensus The IETF has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards. Implications At minimum, the question that triggered Raven, IETF will not add LAES capabilities to unrelated protocols Complexity and security issues Perhaps, IETF will not standardize LAES technology
17 Approaches to LAES
18 Fundamental Requirements Need to identify traffic related to a surveillance subject and (somehow) report it Need to maintain secrecy of the intercept from subject and uncleared staff Need to audit the use of intercept technology
19 Mediation Device/Delivery Function Request (a1) IRI (d2) Request (c1) Authorization (a/c) Mediation Device Content (d1) IRI (HI2) CC (HI3) Authorization Mediation Device: Formats to countryspecific handover interface Delivers to LEA(s) Replicates for multiple taps on same target Filtering of CC and IRI, and may do Request for IRI & CC
20 Three fundamental approaches Fiber splitting All traffic sent to a service center for reporting Port Mirroring All identified traffic sent to a mediation device for reporting without protection Router/Switch data intercept All identified traffic sent to a mediation device for reporting with protection
21 Trade-offs in approaches Cost/Scalability of solution Integrity of data intercepted Security perimeter Ability to handle special cases Hairpin calls, Dial access, tunnels Definition of Call Identifying Information (IRI) IPFix records? Every IP header? IP+TCP?
22 PacketCable Architecture CMS = Proxy + Gate Controller for SIP = Call Agent + Gate Controller for Call Agent-Based (NCS) Authorization Interface Demarcation Point LEA LEA ICE CMS CDC Mediation Device LEA LEA COPS IP Network CCC CDC CCC LEA Intercept Subject INE MTA Cable RF Network MGC ICE MGCP MG INE PSTN CDC Channels use Radius COPS Common Open Policy Service Protocol (RFC 2748) CDC Call Data Channels (IRI) CCC Call Content Channels (CC)
23 PacketCable Architecture Configuration Commands Service Provider Voice: CMS/Call Agent, MGC and ER ICE Request (a2) Request (a1) IRI (d2) LI Administration Function (a/c) Mediation Device IRI (HI2) CC (HI3) LEA Collection Function Content (d1) Request (c2) INE COPS or MGCP RADIUS Event Messages Edge router Trunk Gateway
24 Cisco Service-Independent Intercept (SII) Data Intercept Service Provider AAA Server, CMS ICE RADIUS messages SNMPv3 Request (a1) IRI (d2) Request (c1) LI Administration Function (a/c) Mediation Device Content (d1) INE IRI (HI2) CC (HI3) LEA Collection Function UDP or RTP Nack Oriented Retransmission (RTP-NOR) Access Router, NAS Aggregation Router, MGW
25 Cisco SII - Voice Intercept Service Provider Call Agent, H.323 GK, SIP Proxy ICE PacketCable Event Message Request (a1) IRI (d2) Request (c1) LI Administration Function (a/c) Mediation Device Content (d1) INE IRI (HI2) CC (HI3) LEA Collection Function PacketCable UDP or RTP-NOR SNMPV3 CISCO-TAP-MIB
26 Cisco SII - Data Intercept ICE (e.g., AAA server) IRI Config Cmd 3 rd Party MD Court Order LEA Authenticate SNMPv3 Intercepted Data RTP-NOR Target Subscriber Edge Router (INE) Data Stream
27 PC Voice Intercept Edge/Aggregation Router Gatekeeper, SIP Proxy, Call Agent Admin IRI 3 rd Party Mediation Device Admin IRI CC Law Enforcement Agency Voice Packets SIP, H.323 or MGCPbased GW Call Control COPS Request Call Control Target Subscriber RTP Stream Aggregation Router Aggregation Router Customer Premise IAD
28 SII Voice Intercept Edge/Aggregation Router Gatekeeper, SIP Proxy, Call Agent Admin IRI 3 rd Party Mediation Device Admin IRI CC Law Enforcement Agency Voice Packets SIP, H.323 or MGCPbased GW Call Control SNMPv3 SET Call Control Target Subscriber RTP Stream Aggregation Router Aggregation Router Customer Premise IAD
29 PC Voice Intercept Trunk Gateway Hairpin Case Gatekeeper, SIP Proxy, Call Agent Admin IRI 3 rd Party Mediation Device Admin IRI IRI CC Law Enforcement Agency Call Forward to PSTN SIP, H.323 or MGCP-based GW Call Control MGCP Hair-pin case Voice Packets Call to Target PSTN Target Subscriber Gateway Forwarded Call
30 SII Voice Intercept Trunk Gateway Hairpin Case Gatekeeper, SIP Proxy, Call Agent Admin IRI 3 rd Party Mediation Device Admin IRI IRI CC Law Enforcement Agency Call Forward to PSTN SIP, H.323 or MGCP-based GW Call Control Hair-pin case SNMPv3 Voice Packets Call to Target PSTN Target Subscriber Gateway Forwarded Call
31 Simple Law Enforcement Monitoring Fred Baker draft-baker-slem-architecture-01.txt ftp://ftpeng.cisco.com/fred/ietf/slem.ppt ftp://ftpeng.cisco.com/fred/ietf/slem.pdf
Introducing STAR-GATE Enhancements for Packet Cable Networks
STAR-GATE TM Annex: Intercepting PacketCable Compliance with CALEA and ETSI Delivery and Administration Standards. In this document USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: marketing.citi@cominfosys.com
More informationWHITE PAPER. Gaining Total Visibility for Lawful Interception
WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...
More informationLawful Interception in P2Pbased
Lawful Interception in P2Pbased VoIP Systems Jan Seedorf (jan.seedorf_at_nw.neclab.eu) NEC Laboratories Europe Heidelberg, Germany July Page 2008 1-1 IPTCOMM 2008 Heidelberg, Germany Outline 1.
More informationSociety, Law Enforcement and the Internet
Society, Law Enforcement and the Internet Models for Give-and-Take Carter Bullard CEO/President QoSient, LLC 150 E 57th Street Suite 12D New York, New York 10022 ICCS 2010 New York, New York carter@qosient.com
More informationAdvanced Computer Networks IN2097. 1 Dec 2015
Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department
More informationConnecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
More informationBrocade Telemetry Solutions
WHITE PAPER www.brocade.com Service provider Brocade Telemetry Solutions telemetry applications such as Monitoring and Lawful Intercept are important to Service Providers and impose unique requirements
More informationOverview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
More informationCurso de Telefonía IP para el MTC. Sesión 1 Introducción. Mg. Antonio Ocampo Zúñiga
Curso de Telefonía IP para el MTC Sesión 1 Introducción Mg. Antonio Ocampo Zúñiga Conceptos Generales VoIP Essentials Family of technologies Carries voice calls over an IP network VoIP services convert
More informationIntranet Security Solution
Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their
More informationETSI TR 102 528 V1.1.1 (2006-10)
TR 102 528 V1.1.1 (2006-10) Technical Report Lawful Interception (LI); Interception domain Architecture for IP networks 2 TR 102 528 V1.1.1 (2006-10) Reference DTR/LI-00025 Keywords Lawful Interception,
More informationSTAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.
STAR-GATE TM Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards. In this document USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: marketing.citi@cominfosys.com
More informationVoIP Signaling and Call Control
VoIP Signaling and Call Control Cisco Networking Academy Program 1 Need for Signaling and Call Control 2 Model for VoIP Signaling and Call Control VoIP signaling components Endpoints Common control Common
More informationVoice over IP Security
Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with
More informationVOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationVoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service
VoIP Architecture VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service Marcin Godlewski Lead Engineer Scientific Atlanta, a Cisco Company Charles Moreman
More informationStrategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
More informationSecurity Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
More informationFirewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
More informationDeploying Media Probes in Evolving VoIP Networks
Deploying Media Probes in Evolving VoIP Networks Dave Gladwin dave.gladwin@newport-networks.com Presentation Template V4.00 Nov-05 Agenda! Convergence of Fixed and Mobile services are driving networks
More informationA Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
More informationNTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: chgan@csie.nctu.edu.tw Date: 2006/05/02 1 Outline Introduction NTP VoIP
More informationApplication Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
More informationTroubleshooting Voice Over IP with WireShark
Hands-On Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services are maintaining the quality of the voice service
More informationChapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security
Chapter 12 Network Security Security Policy Life Cycle A method for the development of a comprehensive network security policy is known as the security policy development life cycle (SPDLC). Network Security
More informationTECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
More informationProvisioning of VoIP Phones
Provisioning of VoIP Phones ipdialog, Inc. Phone (408) 451-1430 1430 1762 Technology Drive Suite 124 Fax (408) 451-1440 1440 San Jose CA 95110-1307 1307 USA URL www.ipdialog.com Joon Maeng, jmaeng@ipdialog.com
More informationMethods for Lawful Interception in IP Telephony Networks Based on H.323
Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering
More informationLawful Interception in German VoIP Networks
Lawful Interception in German VoIP Networks 22C3, Berlin Hendrik Scholz hscholz@raisdorf.net http://www.wormulon.net/ Agenda What is Lawful Interception (LI)? Terms, Laws Lawful Interception in PSTN networks
More informationVoice over Internet Protocol. Kristie Prinz. The Prinz Law Office
Voice over Internet Protocol Kristie Prinz The Prinz Law Office I. What is Voice over Internet Protocol ( VoIP )? Voice over Internet Protocol ( VoIP ) is a technology, which facilitates the transmission
More informationSecuring SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
More informationOperation Manual Voice Overview (Voice Volume) Table of Contents
Operation Manual Voice Over (Voice Volume) Table of Contents Table of Contents Chapter 1 Voice Over... 1-1 1.1 Introduction to VoIP... 1-1 1.1.1 VoIP System... 1-1 1.1.2 Basic VoIP Call Flow... 1-2 1.1.3
More informationLawful Interception of VoIP. Rudolf Winschuh Business Development Transaction Security / Telecommunications
Lawful Interception of VoIP Rudolf Winschuh Business Development Transaction Security / Telecommunications Agenda Company Overview Lawful Interception Definition and Terms Legal Framework Functional Overview
More informationSIPSTATION User Guide. Schmooze Com Inc.
Schmooze Com Inc. Chapters Overview Logging In & Adding a Key Account Settings Route & Trunk Configuration DID Configuration Recap Overview The SIPSTATION module, when combined with a SIPSTATION SIP Trunk
More informationT.38 fax transmission over Internet Security FAQ
August 17, 2011 T.38 fax transmission over Internet Security FAQ Give me a rundown on the basics of T.38 Fax over IP security. Real time faxing using T.38 SIP trunks is just as secure as sending faxes
More informationVoIP Services. Maurice Duault mduault@cisco.com. 2001, Cisco Systems, Inc. All rights reserved.
VoIP Services Maurice Duault mduault@cisco.com 2001, Cisco Systems, Inc. All rights reserved. 1 Agenda Distributed Softswitch Residential Business VoIP access Multiservice over VPN Managed IP Telephony
More informationQfiniti Enterprise and VoIP for Avaya. Qfiniti Enterprise and VoIP. An etalk Technical White Paper
Qfiniti Enterprise and VoIP for Avaya Qfiniti Enterprise and VoIP An etalk Technical White Paper Table of Contents etalk Product Briefing...3 Integration Overview...3 VoIP Connection...4 Layer 2 Connectivity...4
More informationCTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
More informationTLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
More informationVoice Over Internet Protocol (VoIP) Issues and Challenges William McCrum mccrum.william@ic.gc.ca
Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum Phone: +1 613-990-4493 Fax: Email: +1 613-957-8845 mccrum.william@ic.gc.ca Content Network Evolution and drivers VoIP Realizations
More informationINTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
More informationEncapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
More informationL2F Case Study Overview
LF Case Study Overview Introduction This case study describes how one Internet service provider (ISP) plans, designs, and implements an access virtual private network (VPN) by using Layer Forwarding (LF)
More informationInteractive communications over IP networks
How many times have you heard "IP networks don't make any money!" Probably way too many! Compared to the PSTN, IP networks are big zeroes in terms of financial appeal. Today, while data consumes more than
More informationVoice Peering: Interworking SIP and BGP
Voice Peering: Interworking SIP and BGP 2010 Feb 23 Comcast Cable National Engineering & Technical Operations (NE&TO) Network Engineering Matt Christopher Principal Engineer, VoIP Architecture Integration
More informationVoice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
More informationSIP Trunking and Voice over IP
SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential
More informationAvaya Aura SIP Trunking Training
Avaya Aura SIP Trunking Training 5 Day Course Lecture & Demo WHO NEEDS TO ATTEND This class is suited to those who are new to administering Avaya systems, need to know how to send calls through an Avaya
More informationAuthentication, Authorization and Accounting (AAA) Protocols
Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian babak.shafieian@dai-labor.de 10.06.2009 Agententechnologien
More informationConfiguring Voice Quality Monitoring in AOS
61200796L1-29.2E September 2010 Configuration Guide Configuring Voice Quality Monitoring in AOS This configuration guide describes the configuration and use of the voice quality monitoring (VQM) feature
More informationOfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
More informationComputer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
More informationReview: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
More informationStrategies to Protect Against Distributed Denial of Service (DDoS) Attacks
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Document ID: 13634 Contents Introduction Understanding the Basics of DDoS Attacks Characteristics of Common Programs Used to Facilitate
More informationFirewalls and Virtual Private Networks
CHAPTER 9 Firewalls and Virtual Private Networks Introduction In Chapter 8, we discussed the issue of security in remote access networks. In this chapter we will consider how security is applied in remote
More informationNGN Interconnection Standards & Protocols
NGN Interconnection Standards & Protocols A G E N D A NGN ENVIRONMENT LICENSING CONDITIONS REGULATORY INITIATIVES INTERCONNECTION PROTOCOLS ISSUES R. R. Mittar DDG(NGN), TEC NGN CONCEPT Central Office
More informationAsymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
More informationIP-based Delivery Network via OpenVPN Provider Handbook
Federal Department of Justice and Police FDJP IT Service Centre ISC-FDJP Post and Telecommunications Surveillance Service IP-based Delivery Network via OpenVPN Provider Handbook Date: 04 July 2012 Version
More informationSIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
More informationHands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationPacketCable Electronic Surveillance Delivery Function to Collection Function Interface Specification
PacketCable 2.0 PacketCable Electronic Surveillance Delivery Function to Collection Function Interface Specification ISSUED Notice This PacketCable specification is the result of a cooperative effort undertaken
More informationSERIES A : GUIDANCE DOCUMENTS. Document Nr 3
DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationCisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
More informationMeasuring VoIP QoS. Going Beyond Can You Hear Me Now? Kaynam Hedayat. MPLScon May 2005
Measuring VoIP QoS Going Beyond Can You Hear Me Now? Kaynam Hedayat MPLScon May 2005 Overview Why Real-Time VoIP Quality Assurance Matters? Challenges - Going Beyond Can You Hear Me Now? Monitoring Technologies
More informationAdvOSS Session Border Controller
AdvOSS Session Border Controller Product Data Sheet Find latest copy of this document from http://www.advoss.com/pdf/advoss-sbc-productdatasheet.pdf Copyright AdvOSS.com, 2007-2011 All Rights Reserved
More informationinformation security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
More informationBest Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
More informationPOTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 19, 2011
POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES Updated November 19, 2011 Consistent with FCC regulations, 1 Pottawatomie Telephone Company provides this information about our broadband
More informationVirtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
More informationIP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
More informationRecommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
More informationConnecting with Vonage
Connecting with Vonage Vonage (http://www.vonage.com/) offers telephone service using the VoIP (Voice over Internet Protocol) standard SIP (Session Initiation Protocol). The service allow users making
More informationCISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
More informationOutline. VoIP Research Workshop February, Canberra. VoIP Workshop. VoIP in AARNet (+) Group discussion. Summary, what s next?
VoIP Research Workshop February, Canberra HAI VU Outline VoIP Workshop VoIP in AARNet (+) Group discussion Summary, what s next? http://caia.swin.edu.au hvu@swin.edu.au 8/March/2006 Page 2 Swinburne University
More informationApplication Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security
Patton Electronics Co. www.patton.com 7622 Rickenbacker Drive, Gaithersburg, MD 20879, USA tel: +1 301-975-10001000 fax: +1 301-869-9293 Application Note Patton SmartNode in combination with a CheckPoint
More informationApplication Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
More informationEAGLE EYE IP TAP. 1. Introduction
1. Introduction The Eagle Eye - IP tap is a passive IP network application platform for lawful interception and network monitoring. Designed to be used in distributed surveillance environments, the Eagle
More informationADTRAN SBC and Avaya IP Office PBX SIP Trunk Interoperability
6AOSSG001-42B March 2014 Interoperability Guide ADTRAN SBC and Avaya IP Office PBX SIP Trunk Interoperability This guide describes an example configuration used in testing the interoperability of an ADTRAN
More informationCisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
More informationSFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004
SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality
More informationAvaya Aura SIP Trunking Training
Avaya Aura SIP Trunking Training 5 Day Course Lecture & Demo WHO NEEDS TO ATTEND This class is suited to those who are new to administering Avaya systems and would like to know more about the SIP protocol.
More informationInternet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
More informationOpenSER the open SIP Server. Bogdan-Andrei Iancu CEO Voice System Co-Founder OpenSER Project
penser the open SIP Server Bogdan-Andrei Iancu CE Voice System Co-Founder penser Project About penser verview penser is an open source, GPLed SIP server with High scalability (up to thousands of calls
More informationNetwork Overview. Background Traditional PSTN Equipment CHAPTER
CHAPTER 1 Background Traditional PSTN Equipment Traditional telephone services are engineered and offered over the public switched telephone network (PSTN) via plain old telephone service (POTS) equipment
More informationHigh Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
More informationFIREWALLS & CBAC. philip.heimer@hh.se
FIREWALLS & CBAC philip.heimer@hh.se Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
More informationApplications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
More informationVoice over IP (VoIP) Basics for IT Technicians
Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides
More information1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
More informationApplied Networks & Security
Applied Networks & Security VoIP with Critical Analysis http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Spring 2006/2007 John Kristoff - DePaul University 1 Critical analysis
More informationIntroduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
More informationUnit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
More informationLAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES. Updated September, 2013
LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES Updated September, 2013 Consistent with FCC regulations, 1 Lake Region Electric Cooperative, Inc. provides this information
More informationCOSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
More informationVega 100G and Vega 200G Gamma Config Guide
Vega 100G and Vega 200G Gamma Config Guide This document aims to go through the steps necessary to configure the Vega SBC to be used with a Gamma SIP Trunk. When a SIP trunk is provisioned by Gamma a list
More informationState of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
More informationSHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 20, 2011
SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES Updated November 20, 2011 Consistent with FCC regulations, 1 Shidler Telephone Company provides this information about our broadband Internet
More informationVoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
More information