Diameter Security. Ensuring the Transport and Application Layer Integrity of Diameter across Network Interconnections
|
|
|
- Logan Johnson
- 10 years ago
- Views:
Transcription
1 Diameter Security Ensuring the Transport and Application Layer Integrity of Diameter across Network Interconnections
2 Table of Contents Introduction Diameter Security Transport Security Transport Security How does it work Application Security Topology Hiding Topology Hiding How does it work Application Security Admission Control Admission Control How does it work Conclusion The Sonus Diameter Signaling Controller (DSC) Advantage About Sonus Appendix A. Differences between RFC 6733 and RFC
3 Introduction The Diameter protocol is closely linked with the evolution of IP Multimedia Subsystem (IMS) and mobile broadband network architectures. Diameter was first introduced for communication over the interfaces between the IMS core and application servers, charging systems and HSS databases. It was also specified by GSMA for Long Term Evolution (LTE) and Evolved Packet Core (EPC) network interworking. Diameter is the base protocol for authentication, authorization and accounting (AAA), enabling network access and IP mobility in both home and roaming mobile LTE networks. To simplify the roaming interface between peer networks, a functional entity the Diameter Edge Agent (DEA) has been defined in the LTE Roaming Guidelines (GSMA PRD IR.88). The DEA provides an entry point to provide efficient connection methodologies and network security. The DEA hides the topology of the network behind it and advertises itself to roaming partners as a Diameter relay, serving all Diameter applications in the network. The DEA should be considered as a signaling firewall that protects the internal network from malformed messages, unauthorized senders, and exposure of internal information to external networks. Figure 1 below shows this architecture. As the use of Diameter is increasing exponentially and as mobile operators implement Diameter Edge Agent (DEA) functionality, it is also important to consider how the DEA will scale while providing this important level of security. Figure 1. IR.88 Diameter Roaming Implementation Architecture This paper is focused on the security aspects of Diameter, why they exist and how they work. Diameter Security Any discussion of Diameter security needs to address three aspects: Transport security Guarantee the integrity of transmitted and received Diameter messages; Application security Topology hiding to prevent the exportation of network configuration information; Application security Admission control to ensure message validity. For reference, IETF originally defined Diameter in RFC 3588 and then updated it in RFC 6733, released in October See Appendix A for a list of key security-related changes between these two documents. Transport Security To address the transport security needs, RFC 6733 clearly states, all Diameter base protocol implementations MUST support the use of TLS/TCP and DTLS/SCTP, and the Diameter protocol MUST NOT be used without one of TLS, DTLS, or IPsec. 3
4 More specifically, these security protocols are Transport Layer Security [RFC 5246] when using Transmission Control Protocol (TCP) and Datagram Transport Layer Security [RFC 6083] when using Stream Control Transmission Protocol (SCTP). Diameter clients MUST support either TCP or SCTP, while Diameter Agents and Servers SHOULD support both. Optionally, IP Security [RFC 2401] can also be used. Figure 2 below shows the relationship between protocol layers. Transport Layer Security (TLS) TLS is used to provide private, reliable and secure communications over TCP. It ensures that sensitive data is safe from malicious attacks. The TLS protocol provides capabilities to perform client authentication, server authentication, data encryption and data integrity. RFC 5246 is the current TLS specification, defining TLS version 1.2. Figure 2. Protocol Relationships Datagram Transport Layer Security (DTLS) Some may wonder why they should not use TLS as a security protocol for SCTP, especially when TCP and SCTP are both connectionoriented protocols and TLS is used for TCP. The reason is that there are serious limitations of TLS related to SCTP, including: TLS does not support unordered delivery of SCTP user messages; TLS would only support the same number of data streams in both directions; TLS would have a connection for every bidirectional stream which would cause a large resource impact when a large quantity of SCTP is used. DTLS over SCTP was specified by IETF because it overcomes these issues by: Preserving SCTP message boundaries; Supporting a large quantity of either unidirectional or bidirectional streams; Allowing ordered and unordered delivery of SCTP messages IP Security (IPSec) The original Diameter Base Protocol specification (RFC 3588) stated, In order to provide universal support for transmission-level security, and enable both intra and inter domain AAA deployments, IPsec support is mandatory in Diameter, and TLS support is optional. However, one of the key updates in RFC 6733 modified this position. RFC 6733 states, The use of a secured transport for exchanging Diameter messages remains mandatory. TLS/TCP and DTLS/SCTP have become the primary methods of securing Diameter, with IPsec as a secondary alternative. Transport Security How does it work RFC 6733 states that in order to protect a Diameter connection via TLS/TCP and DTLS/SCTP (or IPSec), the TLS/TCP and DTLS/ SCTP (or IPSec/IKE) SHOULD begin prior to any Diameter message exchange. All security parameters for TLS/TCP and DTLS/SCTP (or IPSec) are to be configured independent of the Diameter protocol. This is the recommended handshake in RFC If RFC 6733 cannot be followed because one of the negotiating devices only supports RFC 3588, then the TLS/TCP and DTLS/SCTP handshake will begin when both ends successfully reach the open state, after completion of the Capabilities-Exchange-Request (CER) / Capabilities-Exchange-Answer (CEA) exchange. If the TLS/TCP and DTLS/SCTP handshake is successful, all further messages will be sent via TLS/TCP and DTLS/SCTP. If the handshake fails, both ends MUST move to the closed state. Diameter nodes using TLS/TCP and DTLS/SCTP for security MUST mutually authenticate as part of the TLS/TCP and DTLS/SCTP session establishment. Based on which specification a Diameter peer supports, the section below identifies the respective port numbers that should be used: 4
5 Port Numbers As per RFC 6733, the base Diameter protocol is run on port 3868 for both TCP [RFC 0793] and SCTP [RFC 4960]. For TLS and DTLS, a Diameter node that initiates a connection prior to any message exchanges MUST run on port It is assumed that TLS is run on top of TCP when it is used, and DTLS is run on top of SCTP when it is used. If the Diameter peer does not support receiving TLS/TCP and DTLS/SCTP connections on port 5658 (i.e., the peer complies only with RFC 3588), then the initiator MAY revert to using TCP or SCTP on port Note that this scheme is kept only for the purpose of backward compatibility, and that there are inherent security vulnerabilities when the initial CER/CEA messages are sent unprotected. A Diameter node MAY initiate connections from a source port other than the one that it declares it accepts incoming connections on, and it MUST always be prepared to receive connections on port 3868 for TCP or SCTP and port 5658 for TLS/TCP and DTLS/ SCTP connections. Peer Discovery During the session establishment process, there are two possible mechanisms to discover the next hop, each of which has advantages and disadvantages: Manually configured static entries in the Peer and Routing Tables; Dynamic Discovery using DNS (S) NAPTR. IR.88 states the use of static entries in the Peer and Routing Tables is recommended to enhance security, so if these are available they should take precedence and be used. However, this configuration method requires mobile operators to define provisioning procedures and ensure resources are allocated for this as changes occur. The use of dynamic discovery using DNS is allowed as it makes for simpler deployments; however, the use of dynamic discovery raises several security issues related to DNS vulnerabilities/attacks when a GRX/IPX DNS is used. At least two critical attacks to DNS infrastructure can be cited: An amplification and/or reflection attack can overload (DoS) a victim DEA with a huge number of unsolicited DNS answers; DNS Poisoning attack corrupts the association name/ip (i.e., Kaminsky attack). Once corrupted, the entry persists for a long time (TTL value), resulting in the DEA s routing table becoming improperly altered. If dynamic discovery is used, the DEA performs a Straightforward-Naming Authority Pointer (S-NAPTR) query for a server in a particular realm. Diameter Straightforward-Naming Authority Pointer (S-NAPTR) Usage [RFC 6408] defines an extended format for the S-NAPTR application service tag that allows for discovery of the supported applications without doing Diameter capability exchange beforehand. If no S-NAPTR records are found, the requester may directly query for an SRV record. Note, when DNS-based peer discovery is used, the port numbers received from SRV records take precedence over the default ports (3868 and 5658). Application Security Topology Hiding Some Diameter Attribute-Value Pairs (AVPs) may contain security-sensitive data, such as user passwords, location data, network addresses and cryptographic keys. IETF RFC 6733 provides a list of AVPs that are considered to be security sensitive; however, there are other 3GPP applications that use AVPs that are not part of the base Diameter protocol and many of those will also carry sensitive information. It is fair to say that in a 3GPP environment, Diameter peers must be considered trustworthy before any Diameter messages are exchanged. In the earlier releases of IR.88 (version 9 and earlier), DEA recommendations to provide topology hiding did not describe how topology hiding was to be implemented. This has now been corrected and topology hiding recommendations have been provided in GSMA PRD IR.88, Version Adherence to these rules and recommendations helps to secure and maintain LTE/EPC Diameter signaling networks at the application level. 5
6 Topology hiding is used to ensure that internal information of a Public Mobile Network (PMN), which is not required outside the PMN, is NOT disclosed by changing or removing it from all egress messages. Topology Hiding How does it work IR.88, Version 10.0, specifically states the rules expected to be applied. In general, all egress messages should hide: All Diameter Host Names; The number of Diameter Nodes in the network by hiding routing and identity details. More specifically, the DEA should determine messages to apply topology hiding based on: Their connection type and origin; Application Routing Rules-like criteria: Application-ID, Origin-Realm, Origin-Host, Destination-Realm, Destination-Host. In addition, topology hiding should also prevent other networks from determining the routing used within a network by hiding the path that Diameter messages use when being routed through the network. This is accomplished by: Hiding Diameter names in Route-Record AVP and using generic names in their place; Re-inserting the correct names if the request reenters the home network; Hiding Diameter host names in other base Diameter AVPs, such as Session-ID and Proxy-Info. To prevent other networks from discovering the number of HSS in the network and their identity, topology hiding should hide: Diameter name in Origin-Host AVP in requests from HSS to foreign MME; Diameter name in Origin-Host AVP for answers from HSS to foreign MME. Likewise, to prevent other networks from discovering the number of MMEs in the network and their identity, topology hiding should: Hide Diameter name in Origin-Host AVP in requests from MME to foreign HSS; Re-insert Host ID (Diameter name) in Destination-Host AVP in requests from foreign HSS to MME; Hide Diameter name in Origin-Host in answer message from MME to foreign HSS Application Security Admission Control In addition to providing topology hiding recommendations, GSMA IR.88 V10.0 also lists the following recommendations for admission control to ensure that only allowable messages are processed. The DEA is expected to filter Diameter messages to accept only supported Application IDs, Command Codes and AVPs. Custom AVPs are not allowed by default. Note that IR.88 does not define what is a custom AVP, so in fact this could be a vendor-specific AVP or an SVP that is only allowed in a message due to an [AVP] block in the ABNF. If custom AVPs are needed, they need to be bilaterally agreed to. Admission Control How does it work? IR.88, Version 10.0, specifically states: Compare all AVPs that identify the origin and the destination (that is Origin/Destination Realm/Host and Visited PMN ID) to determine consistency between them; Verify CER/CEA Diameter Messages against Diameter Servers and capabilities declared in IR.21 RAEX DB; Check if Origin Realm/Host and/or Visited PMN ID is from a PMN which has a roaming agreement with one s own PMN. Information related to this PMN is taken from IR.21 RAEX DB during provisioning of the ACLs in the DEA; Check if the Route Record AVPs (if they exist) are sound in that the documented route is possible for the source and destination given in the message; Egress Diameter messages are received by the DEA from an internal network element. They are only sent to their destination if all the AVPs which determine the origin are addressing a network element within the sending (i.e., one s own) PMN; Ingress Diameter messages are received by the DEA from an external network element. They are only sent to their destination if all the AVPs which determine the destination are addressing a recipient which is inside one s own PMN. 6
7 Conclusion Diameter signaling is the lynchpin for successful 4G/LTE interconnection and roaming. IETF and GSMA have highlighted the importance of Diameter security via their respective (RFC 6733 and IR.88) specifications. Therefore Mobile Operators (MNO, GRX and IPX) must have the utmost confidence in their deployment decisions for Diameter Edge Agent functionality in order to absolutely know their Diameter message exchange is secure at both the transport and application level. While this paper has shown how Diameter security is done at the transport and application level, it is still incumbent upon a Mobile Operator to test and verify the compliance of their DEA suppliers to these two key specifications in real world conditions. Specifically, Diameter message use is exponentially increasing, but many Diameter architectures cannot scale to perform securely at high message rates. The Sonus Diameter Signaling Controller (DSC) Advantage The Sonus DSC adheres to IETF and 3GPP specifications for security, including the implementation of Datagram Transport Layer Security (DTLS), Transport Layer Security (TLS) and optionally IP Security (IPsec). The DSC gives network operators the ability to route or screen on any AVP or message. This screening capability gives mobile network operators and IPX providers unparalleled control of information entering their network, including messages, AVPs and applications. Not just providing security, the Sonus DSC has been architected to provide this level of security at scale, where it is predicted that mobile network operators and IPX providers will be handling millions of Diameter messages per second. The DSC enables the definition of separate DEAs within a single DSC platform. Each of these virtual DEAs has its own separate routing and screening rules that include the ability to shape traffic on a per-peer basis. This shaping includes traffic flow control, throttling and congestion per-peer. Architected for extensibility and straightforward evolution to future Diameter applications, this high-powered platform makes the Sonus DSC ideal for LTE/EPC and IMS networks. Appendix A. Differences between RFC 6733 and RFC 3588 An overview of some the major changes between RFC 6733 and RFC 3588 that are security-related, are given below: Deprecated the use of the Inband-Security AVP for negotiating Transport Layer Security (TLS) [RFC 5246]. It has been generally considered that bootstrapping of TLS via Inband-Security AVP creates certain security risks because it does not completely protect the information carried in the CER/CEA ((Capabilities-Exchange-Request/Capabilities-Exchange-Answer). RFC 6733 adopts the common approach of defining a well-known secured port that peers should use when communicating via TLS/TCP and DTLS/SCTP. This new approach augments the existing in-band security negotiation, but it does not completely replace it. The old method is kept for backward compatibility reasons. Deprecated the exchange of CER/CEA messages in the open state. This feature was implied in the peer state machine table of RFC 3588, but it was not clearly defined anywhere else in that document. As work on RFC 6733 progressed, it became clear that the multiplicity of meaning and use of Application-ID AVPs in the CER/CEA messages (and the messages themselves) is seen as an abuse of the Diameter extensibility rules and thus required simplification. Capabilities exchange in the open state has been re-introduced in a separate specification [RFC 6737], which clearly defines new commands for this feature. 7
8 Simplified security requirements. The use of a secured transport for exchanging Diameter messages remains mandatory. However, TLS/TCP and DTLS/SCTP have become the primary methods of securing Diameter, with IPsec as a secondary alternative. The support for the End-to-End security framework (E2E-Sequence AVP and P -bit in the AVP header) has also been deprecated. Clarified Application ID usage. Clarify the proper use of Application Id information, which can be found in multiple places within a Diameter message. This includes correlating Application IDs found in the message headers and AVPs. These changes also clearly specify the proper Application ID value to use for specific base protocol messages (ASR/ASA, STR/STA) as well as clarifying the content and use of Vendor-Specific Application-ID. Simplified Diameter peer discovery. The Diameter discovery process now supports only widely used discovery schemes; the rest have been deprecated. There are many other miscellaneous fixes that have been introduced in RFC 6733; however, a comprehensive list of all changes is not shown here for practical reasons. About Sonus Networks Sonus brings intelligence and security to real-time communications. By helping the world embrace the next generation of Cloud-based SIP and 4G/LTE solutions, Sonus enables and secures latency-sensitive, mission-critical traffic for VoIP, video, instant messaging and online collaboration. With Sonus, enterprises can give priority to real-time communications based on smart business rules, while service providers can offer reliable, comprehensive and secure on-demand network services to their customers. With solutions deployed in more than 100 countries and nearly two decades of experience, Sonus offers a complete portfolio of hardware-based and virtualized Session Border Controllers (SBCs), Diameter Signaling Controllers (DSCs), Network-as-a-Service (NaaS) capabilities, policy/routing servers, and media and signaling gateways. Sonus Networks North American Headquarters Sonus Networks APAC Headquarters Sonus Networks EMEA Headquarters Sonus Networks CALA Headquarters 4 Technology Park Drive Westford, MA U.S.A. Tel: GO-SONUS 1 Fullerton Road #02-01 One Fullerton Singapore Singapore Tel: Edison House Edison Road Dorcan, Swindon Wiltshire SN3 5JX Tel: Homero No Col. Los Morales, C.P Mexico City, Mexico Distrito Federal Mexico Tel: Int l Tel: To learn more, call Sonus at 855-GO-SONUS or visit us online at The content in this document is for informational purposes only and is subject to change by Sonus Networks without notice. While reasonable efforts have been made in the preparation of this publication to assure its accuracy, Sonus Networks assumes no liability resulting from technical or editorial errors or omissions, or for any damages resulting from the use of this information. Unless specifically included in a written agreement with Sonus Networks, Sonus Networks has no obligation to develop or deliver any future release or upgrade, or any feature, enhancement or function. Copyright 2015 Sonus Networks, Inc. All rights reserved. Sonus is a registered trademark of Sonus Networks, Inc. All other trademarks, service marks, registered trademarks or registered service marks may be the property of their respective owners. DS /3 8
Diameter Interworking. Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues
Diameter Interworking Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues Table of Contents Introduction..................................... 3 Business
Network Functions Virtualization and Diameter Signaling Controllers. Enabling the telecom network migration to the Cloud!
Network Functions Virtualization and Diameter Signaling Controllers Enabling the telecom network migration to the Cloud! Table of Contents Introduction..................................... 3 Business Challenges
How Service Providers Can Seize the SBC as a Service Opportunity
How Service Providers Can Seize the SBC as a Service Opportunity Table of Contents Introduction..................................... 3 More Business for Service Providers....................... 3 Bringing
SDN Orchestration Explained. A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks
SDN Orchestration Explained A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks Table of Contents Introduction. 3 Back Story: Defining Terms. 3 Cloud Exchange Network. 3 Orchestration
Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications
Network Function Virtualization Primer Understanding NFV, Its Benefits, and Its Applications Table of Contents Introduction..................................... 3 NFV The Basics...................................
Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks
Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks Today, the mobile industry is in the midst of a fundamental transformation. Circuit-switched TDM technology, which has been the
Office 365 Cloud PBX. Options of Migrating to a Skype for Business Cloud Deployment
Office 365 Cloud PBX Options of Migrating to a Skype for Business Cloud Deployment Table of Contents Introduction..................................... 3 Skype for Business within Your Enterprise...........................
An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
Lecture 4b AAA protocols (Authentication Authorization Accounting)
Lecture 4b AAA protocols (Authentication Authorization Accounting) Network security (19265400 / 201000086) Lecturers: Aiko Pras Pieter-Tjerk de Boer Anna Sperotto Ramin Sadre Georgios Karagiannis Lecture
Signaling Delivery Controller : Control Your 4G Network
Data Sheet Traffix Systems Signaling Delivery Controller : Control Your 4G Network The Traffix Signaling Delivery Controller (SDC) assists operators in scaling and managing services and applications in
Implementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
Securing the Interconnect Signaling Network Security
Securing the Interconnect Signaling Network Security Travis Russell Director, Cyber Security, Service Provider Networks Oracle Communications August, 2015 Current security landscape Much attention has
SIP, Security and Session Border Controllers
SIP, Security and Session Border Controllers SIP, Security and Session Border Controllers Executive Summary Rolling out a public SIP service brings with it several security issues. Both users and Service
Authentication, Authorization and Accounting (AAA) Protocols
Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian [email protected] 10.06.2009 Agententechnologien
Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios
An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice
of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier
VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture
How to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
Diameter in the Evolved Packet Core
Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband
Sonus SBC 2000 Web Based Management
Sonus SBC 2000 Web Based Management Sonus SBC 2000 Web Based Management Today IT organizations need a cost effective way of managing branch office appliances. The Sonus SBC 2000 web based management tool
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009
S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
Diameter Signaling Controller in next-generation signaling networks
284 23-3176 Uen Diameter Signaling Controller in next-generation signaling networks At the heart of the evolved mobile data network almost everything uses the Diameter protocol to communicate. JÖRG EWERT,
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Need for Signaling and Call Control
Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice
Best Practices for SIP Security
Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting
Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture
Wanderlust: Enabling roaming in the LTE era Don Troshynski Vice President, Solutions Architecture Acme Packet Trusted, first-class services and applications Apps & services Session delivery network April
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Acme Packet Net-Net SIP Multimedia-Xpress
Acme Packet Net-Net SIP Overview Net-Net SIP (SMX) combines IP Multimedia Subsystem (IMS) session management with leading session border control (SBC) functions to reduce the complexity and cost of delivering
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
UK Interconnect White Paper
UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Oracle Communications Session Border Controller: Driving Oracle s SIP Interconnect Solution. Extending Service Reach and Quality
Oracle Communications Session Border Controller: Driving Oracle s SIP Interconnect Solution Extending Service Reach and Quality Networks cannot stand alone and must connect to other service providers to
Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS
Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS What is Quality of Service (QoS)?... 2 Differentiated Services (DiffServ)... 2 Overview... 2 Example XYZ Corporation... 2 Components of
SANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
Jibe Hub. RCS Exchange for Mobile Operators. The Global Communications Cloud. Anil Sharma Director, Engineering @ Jibe Mobile anil@jibemobile.
The Global Communications Cloud Jibe Hub RCS Exchange for Mobile Operators Anil Sharma Director, Engineering @ Jibe Mobile [email protected] Our Thirty minutes Jibe Introductions Who we are RCS What
Session Border Controller and IP Multimedia Standards. Mika Lehtinen [email protected]
Session Border Controller and IP Multimedia Standards Mika Lehtinen [email protected] December 1, 2005 Contents Introduction Motivation Research problem Research method Results Conclusion December
Practical VoIP Peering. Klaus Darilion enum.at [email protected]
Klaus Darilion enum.at [email protected] Peering* Peering: negotiation of reciprocal interconnection arrangements between service providers Layer 3 peering Layer 5 peering *definitions from draft-ietf-speermint-terminology-06.txt
Session Border Controllers: Addressing Tomorrow s Requirements
White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction
Understanding Lync 911 for Enterprises
Understanding Lync 911 for Enterprises Introduction Microsoft Lync delivers a complete Enterprise Voice solution through an easy-to-use interface. Enhanced 911 (E911) support is a critical component of
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)
Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................
Session Border Controller
Session Border Controller SBC OVERVIEW: Media Routes SBC is an advanced, comprehensive Policy enforcement point, Session Management and Service Orchestration engine deployed as a network border element
COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments
Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures
NICC ND 1647 V1.1.1 (2013-06)
NICC ND 1647 V1.1.1 (2013-06) NICC Document SIP-NNI Basic Voice Architecture Michael Faraday House, Six Hills Way, Stevenage SG1 2AY Tel.: +44(0) 20 7036 3636 Registered in England and Wales under number
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Network Address Translation (NAT) Good Practice Guideline
Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell
SIP Signaling Router (SSR) Use Cases
APPLICATION GUIDE SIP Signaling Router (R) Use Cases Using SIP to improve network performance and deliver advanced services This application guide discusses how operators can use a SIP Signaling Router
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Requirements and Service Scenarios for QoS enabled Mobile VoIP Service
Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Kyu Ouk Lee, Ho Young Song Electronics and Telecommunications Research Institute (ETRI) [email protected], [email protected] Abstract.
Cisco Collaboration with Microsoft Interoperability
Cisco Collaboration with Microsoft Interoperability Infrastructure Cheatsheet First Published: June 2016 Cisco Expressway X8.8 Cisco Unified Communications Manager 10.x or later Microsoft Lync Server 2010
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
Secured Communications using Linphone & Flexisip
Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks
Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England March 2-7, 2014 Presented by: Lionel Morand Co-authored
Differentiated Services
March 19, 1998 Gordon Chaffee Berkeley Multimedia Research Center University of California, Berkeley Email: [email protected] URL: http://bmrc.berkeley.edu/people/chaffee 1 Outline Architecture
IP Phone Presence Setup
Static Route Configuration on IM and Presence Service, page 1 Presence Gateway Configuration on IM and Presence Service, page 6 Configure SIP Publish Trunk on IM and Presence Service, page 7 Configure
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller July 24, 2015 Version 1 1 Table of Contents 1 Introduction... 4 1.1 Conformance Claims...4 1.2 How to
MOBILE VIDEO WITH MOBILE IPv6
MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),
SIP Proxy. SIP Proxy. Bicom SYSTEMS. SIP Proxy... Advanced Simplicity
Session border controller solution offering high performance, security and SIP compliance connectivity. 1 DIAGRAM : Registration SIP Client registration for all users (, Business, Hosted PBXware and Wholesale)
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
ABC SBC: Securing the PBX. FRAFOS GmbH
ABC SBC: Securing the PBX FRAFOS GmbH Introduction A widely reported fraud scenarios is the case of a malicious user detecting the address of a company s PBX and accessing that PBX directly. Once the attacker
Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com
1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Session Border Controllers in Enterprise
A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing
White Paper. Interconnecting Networks with Dialogic s Global Multimedia Exchange Platform
Interconnecting Networks with Dialogic s Global Multimedia Exchange Platform Executive Summary The architecture and approach that network operators have traditionally used for network interconnection have
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
Configuration Example
Configuration Example Use a Branch Office VPN for Failover From a Private Network Link Example configuration files created with WSM v11.10.1 Revised 7/22/2015 Use Case In this configuration example, an
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
MED: Voice over IP systems
www.ptt.co.uk Online course specification MED: Voice over IP systems Target audience: This online course is designed for those who will be responsible for the design or maintenance of Voice over IP (VoIP)
DNS SRV Usage June 22, 2011
DNS SRV Usage June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Scope of this Document... 3 DNS SRV (RFC 2782)... 3 Deployment Scenario... 4 Mediatrix Unit Configuration... 5 Scenario
Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity
Secure Remote Monitoring of the Critical System Infrastructure An Application Note from the Experts in Business-Critical Continuity TABLE OF CONTENTS Introduction................................................2
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
464XLAT in mobile networks
STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address
