Secure Voice over IP (VoIP) Networks

Size: px
Start display at page:

Download "Secure Voice over IP (VoIP) Networks"

Transcription

1 Secure Voice over IP (VoIP) Networks How to deploy a robust, secure VoIP solution that counters both external and internal threats and, at the same time, provides top quality of service. This White Paper: Discusses the key security challenges to consider when deploying VoIP solutions Describes Lucent s VPN Firewall Portfolio and how it can meet the security requirements of today s and tomorrow s VoIP networks and applications

2 Contents Executive Summary...3 Key Challenges in Securing a VoIP Network...3 Meeting the Challenge...4 Solution: Lucent VPN Firewall Portfolio...4 Lucent VPN Firewall Portfolio...5 Lucent Operating System...5 Lucent Security Management Server...5 VPN Firewall Brick Portfolio...6 Bandwidth Management...6 Lucent VPN Firewall Brick High Availability/Failover...7 Lucent IPsec Client...7 Complete Solution for Total VoIP Security...7 2

3 Executive Summary Creating high levels of security is essential to fully leverage VoIP technology and the many advantages it offers over traditional wireline solutions. Lucent s VPN Firewall Portfolio provides a complete solution to cope with the evolving threats that can slow down the deployment and use of VoIP applications. The portfolio combines the Lucent Security Management Server, Lucent VPN Firewall Brick appliances, and Lucent IPsec Client, along with third party applications, to ensure a robust, highly secure VoIP deployment. Lucent solutions, developed by Lucent s R&D arm, Bell Labs, offer blended communications that enable simple, seamless, secure networks that help drive your business forward. Lucent s unique security solution for your VoIP network provides: VoIP application layer filtering where you need it on your network Bandwidth control call by call to maintain voice quality on busy networks Failover capabilities that guarantee no voice or data session will be lost in case of network failure Key Challenges in Securing a VoIP Network VoIP is moving into the mainstream. According to Infonetics Research 1, the IP telephony market will grow at a healthy 21 percent CAGR between now and Organizations have the opportunity to take advantage of low cost, feature-rich VoIP solutions that can augment or even replace traditional wireline implementations. 1 Enterprise Telephony Report, Infonetics Research, Nov However, there are some stumbling blocks, and security is at the top of the list. Packet-based communications are particularly vulnerable to subversive attacks and illegal usage. Current technology serving data networks makes it easier to probe voice information on a packet network compared to physically tapping into a circuit switched network. Malefactors can conduct voice tapping through the use of sniffing packets and, by manipulating packets, obtain fraudulent service subscriptions that can be used without payment or charged to another actual customer. IP networks are also susceptible to identity theft, spoofing, loss of sensitive data, denial of service attacks, and eavesdropping. Hackers launch virus and worm attacks, and malefactors manipulate the networks to conduct internal espionage. IP PBXs can be hijacked and Windows-based servers are also vulnerable despite enhanced support for IPv6. If network hijackers successfully access network equipment, modify databases or replicate equipment, they can shut down, jam or takeover the voice network, or manipulate packet network protocols, such as and H.323. The challenge for network administrators is to secure the network against these many and varied threats while, at the same time, allowing the VoIP sessions to flow smoothly. 3

4 Meeting the Challenge Stateful inspection firewalls and Intrusion Detection Systems (IDS) commonly used for VoIP security offer limited defenses. Ideally, a VoIP security solution will dynamically adapt network resources and security based on VoIP application requests, regardless of the signaling protocol used or whether or not the signaling or media traffic is encrypted. A viable VoIP security solution must also: Understand and H.323 protocols to prevent the introduction of fraudulent packets Conduct packet inspection during and H.323 call setup to obtain the necessary information to dynamically open and close ports Be aware of emerging applications that require protection for example audio, web and video conferencing, as well as Unlicensed Mobile Access (UMA) for WiFi/cellular dual-mode handsets Support low latency, minimal jitter and negligible packet loss to ensure call quality and customer satisfaction Offer high availability to avoid loss of VoIP session in case of security device failure Solution: Lucent VPN Firewall Portfolio Lucent has taken a leadership role in VoIP security by offering a complete security solution that integrates with any existing VoIP application. Figure 1 shows Lucent s VPN Firewall Brick -based VoIP security system. Centralized VoIP Security policy & QoS management, distributed protection Centralized Data Center Virtual Office ClientCare Contact Center Enterprise VoIP Network Security Lucent Feature Server 3000 Hosted Enterprise Voic Corporate HQ VitalSuite Performance Management Lucent Security Policy Manager Lucent Brick Firewall APX-1000 PRI DSL CPE Branch Office Softphone Analog Phones Softphone Phone Enterprise Voic /H.323 Lucent Brick Firewall Analog Lines PRI PRI Phone PBX or Softphone IP PBX PBX/IP Phones Enterprise Directory, Call Logs, Voic Messaging & Database, DNS H.323 and application filters H.225, H.245, RTP, RTCP dynamic filtering Address and Port translation for H.323 & Stateful filtering for higher performance sessions filtered based on authentication and services authorization Flexible deployment models, to protect users, proxy servers and gatekeepers from attacks Bandwidth control: Brick shape the traffic to guaranty VoIP bandwidth between sites. Figure 1 Centralized Lucent VPN Firewall Brick -based VoIP Security 4

5 Lucent security solutions are based on the Lucent Network Security Model, which is the foundation of ITU-T Recommendation X.805 Security Architecture for Systems Providing End-to-End Communications. This model provides a framework that supports the Lucent VPN Firewall Portfolio. Lucent VPN Firewall Portfolio The Lucent VPN Firewall Portfolio offers a flexible platform that enables you to implement multiple security policies tailored to your individual application. The portfolio includes a broad range of carrier-class platforms that provide low price/performance and total cost of ownership (TCO). The Lucent VPN Firewall portfolio includes: Lucent Operating System (OS) based on Bell Labs Inferno developments Lucent Security Management Server VPN Firewall Brick platforms Lucent IPsec Client Lucent Operating System Lucent Technologies provides a real-time network Operating System (OS) based on innovative software developments by Bell Labs called Inferno. The operating system provides a software infrastructure for VoIP and other distributed network applications. It enables end-to-end connectivity over the public telephone network, the Internet, corporate networks, cable television, and satellite broadcast. Networking and security protocols are built into the OS, and applications run unchanged across any communications network or device. The product has a very small memory footprint, allowing it to act as a stand-alone OS on information appliances and run as an application on network elements such as servers, routers and switches using UNIX or Microsoft NT platforms. The Lucent OS creates a distributed architecture that allows security policies to be created in the heart of the system the Lucent Security Management Server and instantly pushes the policies to the point on the network where they need to be enforced. The VPN Firewall Brick allows the security administrator to enforce security policies anywhere on the network. This tight connection simplifies management operations and guarantees high levels of security in a distributed network. Bell Labs Innovations and VoIP Security Lucent s VoIP security solutions make full use of Bell Labs innovations. Bell Labs has numerous patents and seminal publications in the field of security, and essentially wrote the book on firewalls. Bell Labs, the R&D development arm of Lucent, designed and built the Lucent Firewall, among the first of its kind to obtain NSA GPP (National Security Agency General Purpose Processor) certification. The Lab conducts advanced cryptography research and has developed missioncritical secure networks for the Department of Defense. Bell Lab s Internet Research Laboratory develops network mapping and analysis techniques and research on protocols, particularly as they affect network infrastructure and services. The Lab provides recommendations and analysis for vulnerabilities in cooperation with Carnegie Mellon s Computer Emergency Response Team (CERT). Lucent Security Management Server Working with Lucent s VPN Firewall Brick portfolio and Lucent IPsec client software, Lucent Security Management Server allows you to rapidly provision and manage security, VPN and QoS services for thousands of users from a single console. It provides network-wide control of multiple systems, security policies, VPN tunnels and remote clients. Totally secure remote management eliminates the need for network reconfigurations, truck-rolls, and on-site support. 5

6 The Lucent Security Management Server provides real-time monitoring, robust logging, and customized reporting. The server supports 10,000 VPN Firewall Brick devices and 100,000 Lucent IPsec Client users from one console. It accommodates up to 100 simultaneous administrators. In addition to scalability, the Lucent Security Management Server provides carrier grade reliability and a number of VPN authentication features such as Internal Key Exchange (IKE), Advanced Encryption Standards (AES), Department of Defense Public Key Infrastructure (PKI), and X.509 digital certificates. VPN Firewall Brick Portfolio The VPN Firewall Brick portfolio delivers service-level-assured advanced security, IP VPN, and QoS services for your VoIP environment. These integrated firewall/vpn gateway appliances offer unparallel performance. They are hybrid L2/L3 devices that allow any combination of interfaces to be set to bridge or route. Each VPN Firewall Brick is centrally staged and remotely managed by the Lucent Security Management Server for security reasons you cannot manage a VPN Firewall Brick through a serial cable or from a web browser. Unlike pure router-based security platforms, you can add advanced security services without costly network reconfiguration, truckrolls or on-site support. The VPN Firewall Brick supports 801.q VLAN tagging and virtual firewalls. This means that you can securely share one device among multiple customers for network-based VoIP managed security services. The components of this security solution, in combination with third-party software from Lucent trusted partners, provide completely integrated, high performance content security services including command blocking, URL filtering and virus scanning. High availability is a feature that comes standard with the VPN Firewall Brick through the use of redundant configurations. and H.323 open ports dynamically during VoIP calls and if the firewall were to leave all of these ports open there would be almost no network security. In order to secure the network and, at the same time, allow VoIP channels to open dynamically, the firewall needs to participate in the call setup and teardown. The VPN Firewall Brick inspects H.323 and VoIP traffic and opens dynamic pinholes that dynamically secure each voice call on a call-by-call basis without degrading performance. Unlike many other solutions, the VPN Firewall Brick acts like a packet sniffer, monitoring the call setup and opening the ports dynamically for an individual call only between the calling and called endpoints. Bandwidth Management In addition to dynamic pinholing capabilities, expert bandwidth management is absolutely essential for VoIP security. Most solutions have either no bandwidth management or management at the interface level only. At the interface level, you might have hundreds of VoIP calls active at any one time. If a heavy data application or download starts running on that interface, you could lose all or some of your VoIP calls or experience a severe drop in quality. 6

7 The Lucent VPN Firewall Brick solves these problems by managing bandwidth at the interface, rule-set, the rule, and session levels. This is a critical component when working with VoIP or any other real-time application, including streaming video and video conferencing. Your ability to guarantee bandwidth for each individual session allows you to ensure the quality of the session or VoIP call, and also allows you to sell Service Level Agreements to your customers. Lucent VPN Firewall Brick High Availability/Failover The Lucent Security Management Server includes a Lucent VPN Firewall Brick feature that provides automatic failover configuration to ensure VoIP calls are not dropped if a device fails. The feature allows an administrator to deploy two Lucent VPN Firewall Brick devices as a failover pair. Both devices share the same identity, including IP address, name, and virtual MAC addresses (one per port). The first device to boot becomes the active device. The second device is designated the standby, ready to take over should the first device fail. From the administrator s viewpoint, the two devices are treated as one both are connected to the same LAN and wired identically. Both the active and standby Lucent VPN Firewall Brick devices issue regular heartbeat messages. The heartbeat indicates the presence of an active device and allows the devices to share health, status, and priority information. If the standby device does not receive appropriate heartbeats from the active device, it automatically becomes active. The active device may also yield to the standby if it determines that the standby has better LAN connectivity. Also, the active Lucent VPN Firewall Brick continuously sends session state information to the standby device. If the standby device has to take over, it already has all the information it needs regarding the active sessions to keep them alive. Lucent IPsec Client Lucent IPsec Client is specifically built to support carrier-managed IP services. When deployed with Lucent VPN Firewall Brick platforms, the IPsec Client is completely integrated and centrally managed by Lucent Security Management Server, simplifying administration of large-scale, remote access VPNs. Complete Solution for Total VoIP Security Essential VoIP Applications Features If you re on the hunt for a firewall for your VoIP application or other real time solutions, there is a must have set of features you won t want to do without. They include: H.323 application layer filtering (including NAT for H.323) application layer filtering (including NAT for ) Failover capabilities including redundant firewalls to ensure quality of service with no outages ( Five Nines reliability) General Packet Radio Service (GPRS)-3G (for mobile VoIP) GPRS Tunnel Protocol (GTP)-3G Bandwidth controls at the session layer to ensure quality of service Layer two capabilities to keep the firewall in stealth mode Dynamic pinhole capabilities that open and close ports on a per call basis to ensure that the rest of the network is secured To ensure that your VoIP application is not compromised, make sure that you use a firewall that has all these essential features. The combination of the Security Management Server, Lucent VPN Firewall Brick portfolio, and Lucent IPsec Client, enables VoIP services that are secure and robust. With these security solutions from Lucent, you are able to implement VoIP deployments that are secure, always available, and scale to meet your changing requirements. 7

8 To learn more about our comprehensive portfolio, please contact your Lucent Technologies Sales Representative or visit our web site at This document is for informational or planning purposes only, and is not intended to create, modify or supplement any Lucent Technologies specifications or warranties relating to these products or services. Information and/or technical specifications supplied within this document do not waive (directly or indirectly) any rights or licenses including but not limited to patents or other protective rights of Lucent Technologies or others. Specifications are subject to change without notice. Copyright 2006 Lucent Technologies Inc. All rights reserved SecurityVoIP v Lucent VPN Firewall Brick is a registered trademark of Lucent Technologies. Inferno is a trademark of Lucent Technologies.

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

ETM System SIP Trunk Support Technical Discussion

ETM System SIP Trunk Support Technical Discussion ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings

More information

Voice Over IP and Firewalls

Voice Over IP and Firewalls Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Use of Voice Over IP (VoIP) in enterprises is becoming more and more

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

Secure VoIP for optimal business communication

Secure VoIP for optimal business communication White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product

More information

Security & Reliability in VoIP Solution

Security & Reliability in VoIP Solution Security & Reliability in VoIP Solution July 19 th, 2006 Ram Ayyakad [email protected] About My background Founder, Ranch Networks 20 years experience in the telecom industry Part of of architecture

More information

Session Border Controllers in Enterprise

Session Border Controllers in Enterprise A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing

More information

Voice over IP Networks: Ensuring quality through proactive link management

Voice over IP Networks: Ensuring quality through proactive link management White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

VoIP Solutions Guide Everything You Need to Know

VoIP Solutions Guide Everything You Need to Know VoIP Solutions Guide Everything You Need to Know Simplify, Save, Scale VoIP: The Next Generation Phone Service Ready to Adopt VoIP? 10 Things You Need to Know 1. What are my phone system options? Simplify,

More information

Private Cloud Solutions Virtual Onsite Data Center

Private Cloud Solutions Virtual Onsite Data Center ZEROOUTAGES WHITE PAPER Private Cloud Solutions Virtual Onsite Data Center ZEROOUTAGES - WHITE PAPER Single Side / Balancing The ZeroOutages solution makes for a perfect link bonding/balancing device for

More information

VOICE OVER IP SECURITY

VOICE OVER IP SECURITY VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 Coral IP Solutions TABLE OF CONTENTS 1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 2.1 UGW 4 2.2 IPG 4 2.3 FLEXSET IP 5 2.4 FLEXIP SOFTPHONE 6 2.5 TELEPORT FXS/FXO GATEWAYS 7 2.6 CORAL SENTINEL 7 3 CORAL IP

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

WAN Traffic Management with PowerLink Pro100

WAN Traffic Management with PowerLink Pro100 Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management

More information

Voice Over IP (VoIP) Denial of Service (DoS)

Voice Over IP (VoIP) Denial of Service (DoS) Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based

More information

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,

More information

Best Practices for Securing IP Telephony

Best Practices for Securing IP Telephony Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram

More information

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet

More information

SonicWALL Advantages Over WatchGuard

SonicWALL Advantages Over WatchGuard Competitive Analysis August 2001 WatchGuard SOHO - Product Overview WatchGuard Technologies extended its product offerings to the fast-growing broadband market through the acquisition of BeadleNet, LLC,

More information

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network 10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

IP Telephony Deployment Models

IP Telephony Deployment Models CHAPTER 2 Sections in this chapter address the following topics: Single Site, page 2-1 Multisite Implementation with Distributed Call Processing, page 2-3 Design Considerations for Section 508 Conformance,

More information

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology Voice Over Internet Protocol (VOIP) SECURITY Rick Kuhn Computer Security Division National Institute of Standards and Technology What is VOIP? Voice Over Internet Protocol Voice Communications over data-style

More information

The term Virtual Private Networks comes with a simple three-letter acronym VPN

The term Virtual Private Networks comes with a simple three-letter acronym VPN Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively

More information

Integrate VoIP with your existing network

Integrate VoIP with your existing network Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A

More information

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ALCATEL-LUCENT OPENTOUCH SESSION BORDER CONTROLLER A SECURE SOLUTION FOR BORDERLESS CONVERSATIONS APPLICATION

More information

Cisco Virtual Office Flexibility and Productivity for the Remote Workforce

Cisco Virtual Office Flexibility and Productivity for the Remote Workforce Cisco Virtual Office Flexibility and Productivity for the Remote Workforce Cisco Virtual Office Overview Q. What is the Cisco Virtual Office? A. The Cisco Virtual Office solution provides secure, rich

More information

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks Document Overview This document provides an overview of how to effectively and securely provide IP-based videoconferencing

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs. Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

Cisco Virtual Office Unified Contact Center Architecture

Cisco Virtual Office Unified Contact Center Architecture Guide Cisco Virtual Office Unified Contact Center Architecture Contents Scope of Document... 1 Introduction... 1 Platforms and Images... 2 Deployment Options for Cisco Unified Contact Center with Cisco

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by

More information

Multi-layered Security Solutions for VoIP Protection

Multi-layered Security Solutions for VoIP Protection Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

VitalPBX. Hosted Voice That Works. For You

VitalPBX. Hosted Voice That Works. For You VitalPBX Hosted Voice That Works For You Vital Voice & Data s VitalPBX VVD Hosted PBX solutions provide you with the stability of a traditional telephone PBX system and the flexibility that only a next

More information

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management

More information

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and

More information

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Load Balancing for Microsoft Office Communication Server 2007 Release 2 Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks

More information

IVCi s IntelliNet SM Network

IVCi s IntelliNet SM Network IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class

More information

WAN Failover Scenarios Using Digi Wireless WAN Routers

WAN Failover Scenarios Using Digi Wireless WAN Routers WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Contents. Specialty Answering Service. All rights reserved.

Contents. Specialty Answering Service. All rights reserved. Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from

More information

PRODUCTS & TECHNOLOGY

PRODUCTS & TECHNOLOGY PRODUCTS & TECHNOLOGY DATA CENTER CLASS WAN OPTIMIZATION Today s major IT initiatives all have one thing in common: they require a well performing Wide Area Network (WAN). However, many enterprise WANs

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

Industrial Firewalls Endpoint Security

Industrial Firewalls Endpoint Security Industrial Firewalls Endpoint Security Is there a need for a new type of industrial firewall? Industries have a huge park of different management and control systems to monitor their production. These

More information

Is Your Network Ready For IP Telephony?

Is Your Network Ready For IP Telephony? WHITE PAPER Is Your Network Ready For IP Telephony? Straight facts about IP telephony planning and deployment 1. Introduction Enterprises are rapidly adopting IP telephony for cost savings, productivity

More information

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes. This unit has 6 learning outcomes. 1. Know telephony principles. 1.1. Demonstrate application of traffic engineering concepts Prioritization of voice traffic Trunking requirements Traffic shaping. 1.2.

More information

Gateways and Their Roles

Gateways and Their Roles Gateways and Their Roles Understanding Gateways This topic describes the role of voice gateways and their application when connecting VoIP to traditional PSTN and telephony equipment. Analog vs. Digital

More information

Marratech Technology Whitepaper

Marratech Technology Whitepaper Marratech Technology Whitepaper Marratech s technology builds on many years of focused R&D and key reference deployments. It has evolved into a market leading platform for Real Time Collaboration (RTC)

More information

Firewall Environments. Name

Firewall Environments. Name Complliiance Componentt DEEFFI INITION Description Rationale Firewall Environments Firewall Environment is a term used to describe the set of systems and components that are involved in providing or supporting

More information

VoIPon Solutions www.voipon.co.uk [email protected] Tel: +44 (0) 1245 600560. Ranch Asterisk VoIP Solution

VoIPon Solutions www.voipon.co.uk sales@voipon.co.uk Tel: +44 (0) 1245 600560. Ranch Asterisk VoIP Solution Ranch Asterisk VoIP Solution Ranch Networks manufactures Network appliances built to advance VoIP telephony deployments. The RN series of products provide security, reliability, and scalability to VoIP

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

VoIP Deployment Options

VoIP Deployment Options AN ATLANTIC-IT.NET WHITEPAPER VoIP Deployment Options Whether cloud-based or on premises, IP-based voice platforms can deliver a wide range of significant business benefits. 2 VoIP Deployment Options EXECUTIVE

More information

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information

The Next Generation Network:

The Next Generation Network: JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

Voice over IP (VoIP) for Telephony. Advantages of VoIP Migration for SMBs BLACK BOX. 724-746-5500 blackbox.com

Voice over IP (VoIP) for Telephony. Advantages of VoIP Migration for SMBs BLACK BOX. 724-746-5500 blackbox.com Voice over IP (VoIP) for Telephony Advantages of VoIP Migration for SMBs BLACK BOX Hybrid PBX VoIP Gateways SIP Phones Headsets 724-746-5500 blackbox.com Table of Contents Introduction...3 About Voice

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

Cisco 2600 Series Modular Access Routers

Cisco 2600 Series Modular Access Routers Cisco 2600 Series Modular Access Routers The Cisco 2600 Series is an award-winning series of modular multiservice access routers, providing flexible LAN and WAN configurations, multiple security options,

More information

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border Siemens Enterprise Communications Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border April 2011 Agenda 1 Industry Trends 2 Customer Initiatives

More information

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key

More information

Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording

Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording 9-1-1 Magazine / published in December 2007 Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording by Andreas Potyka, Product Management, ASC telecom AG VoIP communications

More information

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008 Making the Case for Satellite: Ensuring Business Continuity and Beyond July 2008 Ensuring Business Continuity and Beyond Ensuring business continuity is a major concern of any company in today s technology

More information

Small, Medium and Large Businesses

Small, Medium and Large Businesses Providing Productivity and Security for Small, Medium and Large Businesses Series Series Super Fast broadband technology High Availability with Multi-WAN Load Balancing Enterprise-level Firewall security

More information

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1 Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...

More information

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service Solution Overview Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service What You Will Learn With the arrival of the fourth-generation (4G) or Long Term Evolution (LTE) cellular wireless

More information

Security & Encryption

Security & Encryption Security & Encryption Introduction: the importance of encryption nected networks, spies can tap into the connection from Encryption for security is thousands of years old. With the No longer can any business

More information

Security Guidance for Deploying IP Telephony Systems

Security Guidance for Deploying IP Telephony Systems Report Number: I332-016R-2005 Security Guidance for Deploying IP Telephony Systems Systems and Network Attack Center (SNAC) Released: 14 February 2006 Version 1.01 [email protected] ii This Page Intentionally

More information

BroadCloud PBX Customer Minimum Requirements

BroadCloud PBX Customer Minimum Requirements BroadCloud PBX Customer Minimum Requirements Service Guide Version 2.0 1009 Pruitt Road The Woodlands, TX 77380 Tel +1 281.465.3320 WWW.BROADSOFT.COM BroadCloud PBX Customer Minimum Requirements Service

More information

Convergence Technologies Professional (CTP) Course 1: Data Networking

Convergence Technologies Professional (CTP) Course 1: Data Networking Convergence Technologies Professional (CTP) Course 1: Data Networking The Data Networking course teaches you the fundamentals of networking. Through hands-on training, you will learn the vendor-independent

More information

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

Virtual Privacy vs. Real Security

Virtual Privacy vs. Real Security Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing

More information

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using

More information

Firewall Architecture

Firewall Architecture NEXTEP Broadband White Paper Firewall Architecture Understanding the purpose of a firewall when connecting to ADSL network services. A Nextep Broadband White Paper June 2001 Firewall Architecture WHAT

More information

Wireless Network Quality of Service WHITE PAPER

Wireless Network Quality of Service WHITE PAPER Wireless Network Quality of Service WHITE PAPER Executive Summary Most wireless deployments rely on cellular data networks for connectivity, which have bandwidth constraints. The quality of service (QoS)

More information

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access. Solutions Guide Secure Remote Access Allied Telesis provides comprehensive solutions for secure remote access. Introduction The world is generating electronic data at an astonishing rate, and that data

More information

What is an E-SBC? WHITE PAPER

What is an E-SBC? WHITE PAPER Executive Summary Enterprise communications is in a state of transformation. Businesses are replacing conventional PBX systems with VoIP and Unified Communications (UC) solutions and cloud-based services

More information

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice

More information