Access Mediation: Preserving Network Security and Integrity
|
|
- Francis Lucas
- 8 years ago
- Views:
Transcription
1 Access Mediation: Preserving Network Security and Integrity Definition Access mediation is the process of examining and controlling signaling traffic between networks, resources and users by filtering Signaling System 7 (SS7) traffic. This process enables carriers to inspect the syntax and content of every signaling message entering or exiting the network. Each message is checked against the carrier's operations policy to determine whether to permit, deny and/or modify the message traffic. Access mediation devices are typically used to mitigate the risks associated with widespread interconnection and network convergence. Overview The telecommunications market has changed dramatically since the SS7 network's inception. Deregulation and convergence have moved the industry beyond a relatively small group of carriers and equipment manufacturers. Now there are thousands of SS7 nodes connecting a wide variety of carriers across the globe. This pervasive interconnection has also introduced newer and more powerful technologies that don't always meet the existing telephone provider's reliability and certification standards. Growing demand for nontraditional services running on the SS7 network continues to make access that's not regulated even more commonplace. These changing market dynamics have left the door open to an inadvertent or malicious disruption--catalyzing the need for an access mediation device to mitigate risk. This tutorial will take its readers through the concept of access mediation and explain how it can be applied to help carrier's regain control of their signaling networks. Topics Definition and Overview 1. Historical Perspective 1/15
2 2. The Role of Access Mediation 3. System Requirements 4. Technological Benefits 5. Application Scenarios 6. Conclusion 1. Historical Perspective Service providers worldwide rely on the SS7 network. It is the backbone of the modern telecommunications network, enabling service providers to interconnect and offer the advanced voice services customer's demand. The SS7 network provides wireline and wireless call control as well as intelligent network (IN) services such as 8XX and 900 number calling, calling name (CNAM) and calling card verification. SS7 also supports government-mandated services like local and mobile number portability (LNP and MNP). Since the SS7 network was designed for a closed community, the standards bodies developing it were primarily concerned with high availability and redundancy. This ensured the network's ability to protect itself against system failures. The Telecom Act of 1996 and the advent of voice and data convergence brought unforeseen threats to the signaling environment. The 1996 Act mandated that the small community of incumbent carriers provide nondiscriminatory access to their SS7 networks on an unbundled basis. Unbundling introduced a host of new providers into the SS7 environment. Similar deregulation is occurring worldwide. At about the same time, demand for Internet Protocol (IP) telephony services interoperating with the SS7 network began to grow. The proliferation of IP to SS7 gateways that have made this possible, coupled with the added complexity and linked nature of SS7, has brought unprecedented instability to this once closed environment. To address growing security and reliability concerns, Telcordia developed gateway screening standards (GR-82-CORE). These standards set forth limited provisions for examining and controlling inappropriate and potentially harmful traffic. The Telcordia standards may have been adequate at the time. However, as the market evolves, the carrier's ability to control its network interconnections 2/15
3 continues to diminish. A more comprehensive approach must be taken to protect the SS7 network. 2. The Role of Access Mediation Carriers across the globe are now interconnected through SS7, and the demand for non-traditional voice services running on the network continues to grow. Unlike legacy providers, many new carriers are accessing the network with equipment based on off-the-shelf computing platforms. The inherent flexibility of this equipment makes it much more powerful and capable of generating signaling traffic at very high volumes, and often in non-standard forms. Inexperienced carriers using either new equipment or existing legacy technology could send inappropriate signaling traffic. While it's unlikely that inappropriate traffic sent to a single network node would cause a widespread outage, the last mile impact could be devastating to critical services like E-911. Perhaps more troubling than a potential inadvertent malfunction is the open door that deregulation and convergence has left this once closed, secure environment. The National Research Council (NRC) pointed out in its book titled "Trust in Cyberspace" that essentially anyone can interconnect to the SS7 network for the modest fee of $10,000. Unregulated access heightens the chance an attack orchestrated by a terrorist organization or a hacker could cause a widespread disruption capable of putting national security at risk and crippling the economy. Figure 1. Widespread SS7 Interconnection 3/15
4 The carrier's need to regain control of the SS7 network, in order to ensure its integrity and reliability, underscores the need for access mediation technology. Access mediation can mitigate interconnection risks brought on by inexperienced carriers and unproven technologies, enforce interconnect agreements at a granular level, and enhance security to prevent a malicious attack. 3. System Requirements A comprehensive access mediation system provides a protective barrier against unwanted and inappropriate signaling traffic. The following system requirements are fundamental to ensuring the continued reliability, service quality and security of the SS7 network. Granular Inspection Access mediation devices shouldn't be limited to analyzing traffic based on the message header. These devices should be capable of both syntax and content inspection. Syntax inspection will ensure each message is properly formatted based on standards and requirements used in the network. Messages that are not coded correctly should not be permitted into the network. Content inspection will operate at multiple layers of the protocol stack to validate messages, parameters and their values for compliance with the carrier's policies and agreements. Coupling these two types of analysis gives carriers a strong barrier against traffic that threatens network security and integrity. Figure 2: Syntax and Content Inspection of Each Message Analyze every message Access mediation devices must be able to perform a detailed analysis of every message entering and exiting the network. The device should be capable of checking these messages against the service provider's operations policies and interconnect agreements. Using the results of its examination, the access mediation device should have the intelligence to pass, block, modify and/or alert on each message. In addition, the alerting function should have a logging capability that enables messages to be collected for further analysis. 4/15
5 Policy-based enforcement Access mediation devices should govern how the network can be used through policy-based enforcement. This type of enforcement should be interconnection specific. And each rule should determine how in-depth each message is examined. The level of detail must be configurable since each interconnection may require different levels of analysis depending on the types of traffic it carries. Network Transparency To minimize the impact of a new network infrastructure deployment, installation time and effort should be minimal. Therefore, deploying an access mediation device should not require a point code. Access mediation devices should be transparent, in-line devices. This eliminates the need for network re-engineering, enabling rapid deployment. 4. Technological Benefits Any service provider that relies on the PSTN and its SS7 interconnections can realize substantial benefits from an access mediation device that meets the aforementioned requirements. It can benefit ILECs, CLECs, wireless carriers, voice over IP (VoIP) providers, competitive access providers, call center operations, large enterprises, SS7 hub providers, government agencies and Internet service providers. Security Access mediation devices act as intelligent signaling firewalls. Using an access mediation device, network operators can control traffic based on protocol conformance and application level analysis. Both traffic streams and services can be examined based on information at any layer of the protocol stack. The enhanced security offered through access mediation mitigates the risks of inadvertent or malicious disturbances. Enforce Interconnect Agreements Interconnect agreements dictate network access between carriers. But whether or not interconnecting partners follow the terms of those agreements is largely left to trust. Access mediation devices enable carriers to enforce their agreements at a granular level. Prevent Fraud Since the PSTN relies on SS7 to maintain call control and provide advanced services, it's a major hotbed for fraudulent activity. Billions are lost annually to 5/15
6 corporate toll fraud, calls to hot for fraud destinations and interconnect agreement abuse. Most systems today can report on suspicious activity but lack the control necessary to stop fraud as it occurs. Access mediation devices can serve as the active component of a fraud system, enabling carriers to be proactive in the fight against fraud. Value-added Applications Access mediation can also be leveraged to enable a wide range of value-added applications. Access mediation devices can manipulate, monitor and control SS7 traffic. This functionality serves as a powerful troubleshooting device for network operators. Message modification capabilities can help carriers avoid costly equipment upgrades by quickly and efficiently resolving compatibility and interoperability problems. Access mediation technology can also perform intelligent filtering, a function that can be used to reroute high-volume traffic like SMS off of an overloaded network. And the intelligence gathered by examining every SS7 message traversing the network can be used to help make planning decisions. 5. Application Scenarios The following examples illustrate how to access mediation can be used: Deny badly formatted messages: For example, a carrier using new equipment might be generating messages with incorrect length. Access mediation can be used to block these messages, preventing them from having a detrimental effect on the network." Stop fraud in progress: Access mediation devices can be used to block calls to and from blacklisted phone numbers as well as abandoned international mobile subscriber identities. Restrict AIN traffic: ILECs can use access mediation devices to restrict Advanced Intelligent Network (AIN) messages allowed onto their networks. For example, ILECs can establish a policy that restricts AIN traffic originating from a CLEC's interconnected SCP that is used for offering enhanced services to the CLEC's customers who are part of the ILEC switch. Control ISUP traffic: For example, if ISUP traffic is being sent at random from a VoIP interconnection using trunk circuit values that do not exist. The recipient carrier can block that traffic, allowing only traffic expressly permitted by the interconnect agreement. 6/15
7 Block SMS spam: Wireless carriers can install access mediation devices at their network's entry points to block short message service (SMS) spam bogging down the network and causing customer dissatisfaction. New revenue source: SS7 hub providers can sell signaling security as part of their product suite. Secure gateway functionality: Carriers can integrate access mediation capabilities into existing signal transfer point (STP) nodes to enhance their functionality. SS7 proxy: Network operators can use access mediation devices to mask network and protocol differences. This helps carriers avoid costly upgrades by quickly and efficiently resolving compatibility and interoperability problems. SMS filtering and routing: Wireless carriers can implement access mediation devices to perform filtering and routing for different types of SMS traffic, enabling new back-end applications and premium services. Collect market intelligence: Carriers can use an access mediation system to collect subscriber and service provider calling patterns. LNP proxy: Carriers can use an access mediation device as an LNP proxy that allows a switch to process inbound LNP calls. That way, carriers can avoid purchasing new LNP switch software. Monitor network performance: Carriers can use access mediation devices to gather network performance statistics-track link utilization, message counts and link status in real-time to optimize network planning and maintenance. 6. Conclusion The signaling network is the carrier's most critical asset. Deregulation and convergence has been a double-edged sword for carriers. While these market changes have brought many exciting new opportunities, they have also opened the network up to serious threats. New carriers, technology and equipment are vastly connected worldwide to the PSTN via the signaling network. This increasingly complex interconnection brings greater risk of a network outage due to inadvertent or malicious malfunctions. Consequently, carriers need access mediation technology to examine and control the signaling traffic entering and 7/15
8 exiting the network. Access mediation protects the network against inappropriate signaling traffic to ensure network integrity and security in the evolving signaling environment. Self-Test 1. Deregulation and convergence have catalyzed the need for access mediation. 2. Any carrier that relies on the PSTN and its SS7 interconnections for service delivery can benefit from access mediation. 3. SMS filtering is a function that can be performed by access mediation. 4. Current gateway screening standards are adequate for ensuring the network is protected. 5. Access mediation is not able to mask protocol differences between networks. 6. If system implementation requires a point code, carriers must reconfigure the network for deployment. 8/15
9 7. The standards bodies developing SS7 were concerned about protecting the network from harmful outside sources. 8. Which is a main benefit or purpose for implementing access mediation? a. network security b. enforce interconnect agreements c. prevent fraud d. all of the above 9. Access mediation devices should provide both and inspection. a. syntax and header b. content and node c. syntax and content d. message and node 10. What is the key difference between gateway screening and access mediation? a. access mediation looks at the message header while gateway screening checks message syntax and content. b. gateway screening devices are limited to analyzing traffic based on the message header, while access mediation enables carriers to examine message syntax and content. c. there is no difference. Gateway screening and access mediation is the same thing. d. All of the above 9/15
10 11. ISUP traffic is being sent at random from a VoIP interconnection using trunk circuit values that do not exist. Which example demonstrates how access mediation can be used to resolve this problem? a. The recipient carrier can block those messages, allowing only the traffic permitted by the interconnect agreement. b. The network operations manager alerts the provider they are sending harmful messages and tells them not to do it again. c. Access mediation does not apply to this scenario. 12. What type of traffic can access mediation control? a. ISUP b. AIN c. SMS d. all of the above 13. Access mediation devices act as intelligent. a. gateways b. routers c. firewalls 14. Access mediation devices inspect SS7 message traversing the network to ensure compliance with the carrier s operations policy. a. every b. most c. none 15. What is syntax inspection? a. validating message parameters and their values b. validating protocol conformance c. validating protocol conformance 10/15
11 Correct Answers 1. Deregulation and convergence have catalyzed the need for access mediation. 2. Any carrier that relies on the PSTN and its SS7 interconnections for service delivery can benefit from access mediation. 3. SMS filtering is a function that can be performed by access mediation. 4. Current gateway screening standards are adequate for ensuring the network is protected. 5. Access mediation is not able to mask protocol differences between networks. 6. If system implementation requires a point code, carriers must reconfigure the network for deployment. 11/15
12 7. The standards bodies developing SS7 were concerned about protecting the network from harmful outside sources. 8. Which is a main benefit or purpose for implementing access mediation? a. network security b. enforce interconnect agreements c. prevent fraud d. all of the above 9. Access mediation devices should provide both and inspection. a. syntax and header b. content and node c. syntax and content d. message and node 10. What is the key difference between gateway screening and access mediation? a. access mediation looks at the message header while gateway screening checks message syntax and content. b. gateway screening devices are limited to analyzing traffic based on the message header, while access mediation enables carriers to examine message syntax and content. c. there is no difference. Gateway screening and access mediation is the same thing. d. All of the above 12/15
13 11. ISUP traffic is being sent at random from a VoIP interconnection using trunk circuit values that do not exist. Which example demonstrates how access mediation can be used to resolve this problem? a. The recipient carrier can block those messages, allowing only the traffic permitted by the interconnect agreement. b. The network operations manager alerts the provider they are sending harmful messages and tells them not to do it again. c. Access mediation does not apply to this scenario. 12. What type of traffic can access mediation control? a. ISUP b. AIN c. SMS d. all of the above 13. Access mediation devices act as intelligent. a. gateways b. routers c. firewalls 14. Access mediation devices inspect SS7 message traversing the network to ensure compliance with the carrier s operations policy. a. every b. most c. none 13/15
14 15. What is syntax inspection? a. validating message parameters and their values b. validating protocol conformance c. validating protocol conformance Glossary Acronyms Guide AIN advanced intelligent network CLEC competitive local exchange carrier CNAM calling name delivery service ILEC incumbent local exchange carrier IN intelligent network IP internet protocol ISUP ISDN user part LNP local number portability MNP mobile number portability NRC National Research Council 14/15
15 PSTN public switched telephone network SCP service control point SMS short message service SS7 signaling system 7 SSN subsystem number STP signal transfer point VoIp Voice over Internet protocol 15/15
Internet Protocol (IP)/Intelligent Network (IN) Integration
Internet Protocol (IP)/Intelligent Network (IN) Integration Definition The convergence of the public switched telephone network (PSTN) and Internet protocol (IP) data networks promises exciting opportunities
More information1. Public Switched Telephone Networks vs. Internet Protocol Networks
Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol
More informationIntroduction to SS7 Signaling This tutorial provides an overview of Signaling System No. 7 (SS7) network architecture and protocols
Introduction to SS7 Signaling This tutorial provides an overview of Signaling System No. 7 (SS7) network architecture and protocols SS7 is a set of telephony signaling protocols that are used to set up
More informationWhite Paper. avaya.com 1. Table of Contents. Starting Points
White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting
More informationHamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP. Table of Contents
Hamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP Table of Contents Section Page Definitions 2 Terms of Service and Network Management Practices 2 Devices & Software that may be
More informationHow the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation
How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation Introduction Enterprises are continuing to convert and
More informationSignaling System 7 (SS7) Gateway Solution for Internet Access
Signaling System 7 (SS7) Gateway Solution for Internet Access Definition A signaling system 7 (SS7) gateway is an intelligent network (IN) based system that can be used in conjunction with network-access
More informationDialogic. BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge
Dialogic BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge Versatile Dialogic BorderNet Products Handle Network Transitions for Today s Critical Services and Solutions
More informationHOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION
HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION 01 INTRODUCTION Inclarity is the UK s leading provider of Hosted Telephony, Hosted UC and Hosted Video solutions. We help our customers to communicate
More informationS-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009
S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need
More informationSIP Signaling Router (SSR) Use Cases
APPLICATION GUIDE SIP Signaling Router (R) Use Cases Using SIP to improve network performance and deliver advanced services This application guide discusses how operators can use a SIP Signaling Router
More informationOracle s Session Initiation Protocol Trunking Solution. Increase Agility and Reduce Costs with Session Initiation Protocol Trunks
Oracle s Session Initiation Protocol Trunking Solution Increase Agility and Reduce Costs with Session Initiation Protocol Trunks Oracle s SIP trunking solution is designed to enable the hyperconnected
More informationCase Study. PAETEC minimizes Fraud Costs using Equinox Protector
Case Study PAETEC minimizes Fraud Costs using Equinox Protector One of the things I immediately enjoyed about the Equinox Protector system is that I could understand how the system worked and how much
More informationInternational Dialing and Roaming: Preventing Fraud and Revenue Leakage
page 1 of 7 International Dialing and Roaming: Preventing Fraud and Revenue Leakage Abstract By enhancing global dialing code information management, mobile and fixed operators can reduce unforeseen fraud-related
More informationWhite Paper. Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers
TeleCommunication Systems, Inc. www.telecomsys.com Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers Notices 2004 TeleCommunication Systems,
More informationDialogic BorderNet Session Border Controller Solutions
Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controllers Transform, Connect and Secure Today s Networks and Services Dialogic BorderNet Session Border Controller
More informationIngate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
More informationEasily Protect Your Voice Network From Attack
ETM SYSTEM WE SEE YOUR VOICE We know some important things about your enterprise things that you may not know yourself. We know that you are significantly overpaying for your corporate voice network and
More informationHow To Protect Your Business From A Voice Firewall
VOICE FIREWALL Secure your voice network edge and prevent financial losses. The ETM Voice Firewall secures your critical networking resources and lowers telecom expenses by protecting your enterprise voice
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationEXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens
Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : Nick.Marly@alcatel.be Tel : (+32)
More informationToday s TDM PBX Deployment in the Enterprise
The Resilient VoIP Enterprise: True Voice Resiliency for the Enterprise Peter Sandstrom, Chief Technology Officer, BandTel March 31, 2009 Call BandTel Sales 800-730-2870 www.bandtel.com Rev- 090409a Synopsis
More informationVoice over IP is Transforming Business Communications
White Paper Voice over IP is Transforming Business Communications Voice over IP (VoIP) is changing the world of telecommunications. It entails the transmission of voice calls over data networks that support
More informationPaving the Way to Next Generation Media and Signaling VoIP Gateways
Small Logo Paving the Way to Next Generation Media and Signaling VoIP Gateways Executive Summary This white paper examines how the rapid adoption of SIP and the distribution of network elements are moving
More informationPSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.
As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched
More informationSIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
More informationState of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network
State of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network Website: Geography: Solution: Type: www.delaware.gov State of Delaware Acme Packet Net-Net SBCs Unified Communications
More informationState of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
More informationCONSULTATION. National Numbering Plan Review. A short Consultation issued by the Telecommunications Regulatory Authority 28 August 2007
National Numbering Plan Review A short Consultation issued by the Telecommunications Regulatory Authority 28 August 2007 The address for responses to this document is: The General Director, Telecommunications
More informationVoIP in the Enterprise
VoIP in the Enterprise Date: March. 2005 Author: Sonia Hanson Version: 1.1 1 1 Background Voice over IP In the late 1990s Voice over IP (VoIP) was seen as a disruptive new technology that had the potential
More informationGHEM Secure Access Control
White Paper Copyright 2013. Valbrea Technologies Inc. All rights reserved. Table of Contents Contents Executive Summary 3 Background 3 Price of a Security Breach 3 Cost of Neglect 4 Solution 4 Manage Access
More informationOpen and Distributed VoIP Switching and Service Delivery Solutions
Open and Distributed VoIP Switching and Service Delivery Solutions sentito Networks offers open and distributed Voice over IP (VoIP) switching and service delivery solutions that help telecommunications
More informationSITEL Voice Architecture
SITEL Voice Architecture www.sitel.com SIP Voice Architecture: What is it? And how contact center operators can save money using it. By: Kevin Weier, Director, Global Voice Infrastructure and Architecture,
More informationMigrating from Circuit to Packet: The Business Case for IP Telephony. Or What s In it for Me?
Migrating from Circuit to Packet: The Business Case for IP Telephony Or What s In it for Me? Even amidst the turmoil the telecommunications industry finds itself in, industry pundits are still expounding
More informationHow To Support An Ip Trunking Service
Small Logo SIP Trunking: Deployment Considerations at the Network Edge at the Network Edge Executive Summary The move to Voice over IP (VoIP) and Fax over IP (FoIP) in the enterprise has, until relatively
More informationBrochure. Dialogic BorderNet Session Border Controller Solutions
Brochure Dialogic BorderNet Solutions Supercharge Connections between Networks, Services and Subscribers with Ease and Scale The BorderNet family of session border controllers (SBCs) from Dialogic helps
More informationContents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
More informationOfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
More informationBest Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
More informationEnabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs)
www.pipelinepub.com Volume 5, Issue 5 Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs) Operators encounter it daily: They work to provide their subscribers
More informationTABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
More informationConverged Voice Service Summary
SERVICE DELIVERY OVERVIEW Zayo Enterprise Networks (ZEN) offers a managed converged voice and Internet solution for businesses owning and managing a premise-based KTS or PBX system. Voice and Internet
More informationOpenScape UC Firewall and OpenScape Session Border Controller
UC Firewall and Session Border Controller Security within and beyond the boundaries Security within and beyond your network s boundaries Our connected world We are living and working in a new world that
More informationSolutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
More informationVoIP Virtual Private Networks: Bringing the Benefits of Convergence to the Enterprise
VoIP Virtual Private Networks: Bringing the Benefits of Convergence to the Enterprise By Robert VanSickle Vice President Sales, Americas Region & Worldwide Sales Strategy VocalTec Communications www.vocaltec.com
More informationGeographic Routing of Toll Free Services
Introduction Routing calls based on the caller s location is an important aspect of many toll free services, whether a call originates from a wireline, wireless, or VOIP caller. For example, a toll free
More informationYour new VoIP Network is working great Right? How to Know. April 2012 WHITE PAPER
Your new VoIP Network is working great Right? How to Know April 2012 Executive Summary This paper discusses the importance of measuring and monitoring the voice quality of VoIP calls traversing the data
More informationParlay i60 - Application
Parlay i60 ISDN Access Multiplexer with advanced call routing features Solutions for Carriers & Service Providers Parlay i60 ISDN Access Multiplexer a miracle in terms of possible applications Cost efficient
More informationSprint s Partner Interexchange Network (PIN) A New Approach to Scalable Voice Peering
Sprint s Partner Interexchange Network (PIN) A New Approach to Scalable Voice Peering Sprint Wholesale White Paper October, 2009 Executive Overview has caused Sprint to develop a a larger community of
More informationProtecting Mobile Networks from SS7 Attacks. Telesoft White Papers
Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected
More informationIntroduction. Channel Associated Signaling (CAS) Common Channel Signaling (CCS) Still widely deployed today Considered as old technology
VoIP and SS7 Introduction Channel Associated Signaling (CAS) Still widely deployed today Considered as old technology Common Channel Signaling (CCS) Separation of signaling and call paths Signaling System
More informationHow To Save Money On An Ip Trunking (Ip Trunking)
SIP Trunking The line is virtual. The benefits are real. Savings, scalability, and service for any business What is SIP trunking? In the days before the internet, a trunk was the name for a dedicated line
More informationBT Assure DoS Mitigation UK
BT Assure DoS Mitigation UK Annex to the Internet Connect UK Schedule Contents A note on we and you... 2 1. Service Summary... 2 2. Service Standard Components... 2 3. Service Options... 2 4. Service Management
More informationSIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
More informationSecuring SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
More informationNETWORK NEUTRALITY NETWORK MANAGEMENT POLICY WEBSITE TEXT
NETWORK NEUTRALITY NETWORK MANAGEMENT POLICY WEBSITE TEXT November 14, 2011 Table of Contents Section Page Definitions 3 Terms of Service and Network Management Practices 3 Devices & Software that may
More informationGateways and Their Roles
Gateways and Their Roles Understanding Gateways This topic describes the role of voice gateways and their application when connecting VoIP to traditional PSTN and telephony equipment. Analog vs. Digital
More informationVoice Network Management Best Practices
Voice Network Management Best Practices A white paper from SecureLogix Corporation Introduction Traditionally, voice networks have been managed from the switch room, with limited enterprise-wide visibility.
More informationOracle s SIP Network Consolidation Solutions. Using SIP to Reduce Expenditures and Improve Communications
Oracle s SIP Network Consolidation Solutions Using SIP to Reduce Expenditures and Improve Communications A typical large enterprise could enjoy 401 percent three-year ROI on the Net-Net Enterprise Session
More informationGARTNER REPORT: SIP TRUNKING
GARTNER REPORT: SIP TRUNKING SIP Trunking Slashes U.S. Telecom Expenses by Up to 50%. SUMMARY Network architects and procurement managers can leverage SIP trunking services to slash enterprise telecom
More informationRESERVATION TELEPHONE COOPERATIVE BROADBAND INTERNET SERVICE DISCLOSURES
Updated January 2012 RESERVATION TELEPHONE COOPERATIVE BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC regulations, 1 Reservation Telephone Cooperative ( RTC ) provides this information about
More informationAn Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision
An Oracle White Paper February 2014 Centralized vs. Distributed SIP Trunking: Making an Informed Decision Executive Overview Businesses across the globe are migrating from TDM access services to SIP trunks
More informationVoice Over Internet Protocol (VoIP) Issues and Challenges William McCrum mccrum.william@ic.gc.ca
Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum Phone: +1 613-990-4493 Fax: Email: +1 613-957-8845 mccrum.william@ic.gc.ca Content Network Evolution and drivers VoIP Realizations
More informationDatawire Secure Transport Value Proposition
Transport Value Proposition Contents: What is Transport? Transport is a patented connectivity service Datawire Defined that transports financial transactions securely and reliably over Datawire Value Proposition
More informationHow To Make A Phone Line A Network Connection With An Ipnet (Ipnet) On An Ip Network On An Hp Network On A Pc Or Ipnet On A Microsoft Phone (Ip) On A Pbnet On An Pc Or P
Voice over Internet Protocol (VoIP) solutions portfolio Building the bridge to IP everywhere Network and Service Provider Solutions HP is the only company that maintains expertise in telecom core network
More informationTELECOM FRAUD CALL SCENARIOS
TELECOM FRAUD CALL SCENARIOS Contents Introduction to Telecom Fraud... 2 Three Major Categories of Telecom Fraud... 2 Premium Rate Numbers... 2 Traffic Pumping Schemes... 2 Call Forwarding Fraud... 3 Multiple
More informationSIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There
SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There Q&A Session Date: Wednesday, April 13, 2011 Q: You have to partner with a provider in order to do SIP trunking, correct?
More informationBusiness Continuity protection for SIP trunking service
An Allstream White Paper Business Continuity protection for SIP trunking service An Allstream White Paper 1 Table of contents The value of SIP trunking 1 The issue of business continuity 1 SIP trunking
More informationConnecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
More informationOracle s Unified Communications Infrastructure Solution. Delivering Secure, Reliable, and Scalable Unified Communications Services
Oracle s Unified Communications Infrastructure Solution Delivering Secure, Reliable, and Scalable Unified Communications Services Oracle s UC infrastructure solution combines tightly coupled session management,
More informationSPRINT SIP TRUNKING SERVICE PRODUCT ANNEX
SPRINT SIP TRUNKING SERVICE PRODUCT ANNEX The following terms and conditions in this Sprint SIP Trunking Service Product Annex ( Annex ), together with the applicable Sprint service agreement ( Agreement
More informationUW CAMPUS SITE CONFIGURATION STANDARDS
Overview Networks, Data Centers & Telecommunications UW CAMPUS SITE CONFIGURATION STANDARDS UW-IT is deploying a converged voice and data network. This service will improve and expand existing voice services
More informationSymantec Enterprise Firewalls. From the Internet Thomas Jerry Scott
Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are
More informationThe benefits of using a perimeter-based managed service
W H I T E P A P E R Ensuring Email Security The benefits of using a perimeter-based managed service Ensuring Email Security page 1 Executive Overview With unsolicited email costing businesses millions
More informationWhat is an E-SBC? WHITE PAPER
Executive Summary Enterprise communications is in a state of transformation. Businesses are replacing conventional PBX systems with VoIP and Unified Communications (UC) solutions and cloud-based services
More informationAVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
More informationWhitepaper. Are Firewalls Enough for End-to-End. VoIP Security
Whitepaper Are Firewalls Enough for End-to-End VoIP Security Table of Contents I. Introduction... 3 II. Definitions... 3 III. Security... 4 IV. Interoperability... 5 V. Availability... 5 VI. A single demarcation
More informationPBX Security in the VoIP environment
PBX Security in the VoIP environment Defending against telephony fraud Executive Summary In today s communications environment a voice network is just as likely to come under attack as a data network.
More informationReview Of The Commission Workplace (O1) And Its Role In SIP Interconnection Services
Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of Petition for Declaratory Ruling That tw telecom inc. Has The Right To Direct IP-to-IP Interconnection Pursuant To Section
More informationA Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
More informationSolace s Solutions for Communications Services Providers
Solace s Solutions for Communications Services Providers Providers of communications services are facing new competitive pressures to increase the rate of innovation around both enterprise and consumer
More informationWHITE PAPER. Gaining Total Visibility for Lawful Interception
WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...
More informationAPPENDIX 800-SBC-13STATES Page 1 SBC-13STATES /SPRINT COMMUNICATIONS COMPANY L.P. 09/11/01 APPENDIX 800
Page 1 APPENDIX 800 Page 2 TABLE OF CONTENTS 1. INTRODUCTION... 3 2. DESCRIPTION... 3 3. GENERAL TERMS AND CONDITIONS... 5 4. RATE REGULATIONS... 7 5. MONTHLY BILLING... 8 6. APPLICABILITY OF OTHER RATES,
More informationVoice Over IP and Firewalls
Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Use of Voice Over IP (VoIP) in enterprises is becoming more and more
More informationUK Interconnect White Paper
UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have
More informationAn Oracle White Paper October 2013. Gneis Turns to Oracle to Secure and Manage SIP Trunks
An Oracle White Paper October 2013 Gneis Turns to Oracle to Secure and Manage s Gneis Turns to Oracle to Secure and Manage s Executive Overview Gneis Global Services SA planned to introduce Session Initiation
More informationIP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
More information2 Voice over IP Network
2 Voice over IP Network VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 8 2.1 VoIP Network Elements...3 2.2 Single-Site VoIP Location...4 2.3 Multi-Site VoIP Location...5 2.4 PBX Networking
More informationSPRINT GLOBAL SIP TRUNKING EUROPE PRODUCT ANNEX
SPRINT GLOBAL SIP TRUNKING EUROPE PRODUCT ANNEX The following terms and conditions in this Sprint European SIP Trunking Service Product Annex ( Annex ), together with the applicable Sprint service agreement
More information9-1-1 Services for Interconnected VoIP and Local Exchange Carriers
WHITE PAPER 9-1-1 Services for Interconnected VoIP and Local Exchange Carriers Frequently Asked s 9-1-1 Services for Interconnected VoIP and Local Exchange Carriers Frequently Asked s 2 WHITE PAPER 9-1-1
More informationLow Investment, High Returns
Leveraging Standards for Low Investment, High Returns Out of the box clearinghouse billing system uses OSP to capture new VoIP traffic, provide low cost termination, and generate new revenue streams. The
More informationVOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call
More informationConfessions of a Telecommunications Provider. Five things you MUST know about Global Voice over IP (VoIP) Providers
Confessions of a Telecommunications Provider Five things you MUST know about Global Voice over IP (VoIP) Providers http://tatacommunications-newworld.com www.youtube.com/tatcomms 1 ' 2015 Tata Communications
More informationHosted PBX Platform-asa-Service. Offering
Hosted PBX Platform-asa-Service Offering Hosted PBX Platform Overview VoIP Logic s Hosted PBX Platform-as-a-Service (PaaS) delivers cloud-based PBX functionality encompassing traditional PBX features as
More informationFundamentals of Interconnection and Convergence
Fundamentals of Interconnection and Convergence Prepared for: Contact: Gary Richenaker Chief Architect Telcordia Technologies Interconnection Solutions 732 699.3264 grichena@telcordia.com Copyright 2007
More informationKey Drivers of Hosted Voip
Key Drivers of Hosted Voip CONTENTS Overview.... 3 Capital Cost savings:.... 4 Stress free implementation:... 4 Lower phone bills:... 4 Easily set up remote workers:... 5 No busy signals:... 5 Save on
More informationBuilding integrated services intranets
Building integrated services intranets A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com CONTENTS CONTENTS...2 1 EXECUTIVE SUMMARY...3 2 INTRODUCTION...4
More informationEnhancing VoIP with Voice Peering
Enhancing VoIP with Voice Peering The Voice Peering Fabric is a service of Stealth Communications. Jinci Liu, Stealth Communications, Inc. Published: July 2005 (last revised January 2006) Abstract From
More informationNetworking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
More informationNOS for Network Support (903)
NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure
More information