Diameter Security. Ensuring the Transport and Application Layer Integrity of Diameter across Network Interconnections

Size: px
Start display at page:

Download "Diameter Security. Ensuring the Transport and Application Layer Integrity of Diameter across Network Interconnections"

Transcription

1 Diameter Security Ensuring the Transport and Application Layer Integrity of Diameter across Network Interconnections

2 Table of Contents Introduction Diameter Security Transport Security Transport Security How does it work Application Security Topology Hiding Topology Hiding How does it work Application Security Admission Control Admission Control How does it work Conclusion The Sonus Diameter Signaling Controller (DSC) Advantage About Sonus Appendix A. Differences between RFC 6733 and RFC

3 Introduction The Diameter protocol is closely linked with the evolution of IP Multimedia Subsystem (IMS) and mobile broadband network architectures. Diameter was first introduced for communication over the interfaces between the IMS core and application servers, charging systems and HSS databases. It was also specified by GSMA for Long Term Evolution (LTE) and Evolved Packet Core (EPC) network interworking. Diameter is the base protocol for authentication, authorization and accounting (AAA), enabling network access and IP mobility in both home and roaming mobile LTE networks. To simplify the roaming interface between peer networks, a functional entity the Diameter Edge Agent (DEA) has been defined in the LTE Roaming Guidelines (GSMA PRD IR.88). The DEA provides an entry point to provide efficient connection methodologies and network security. The DEA hides the topology of the network behind it and advertises itself to roaming partners as a Diameter relay, serving all Diameter applications in the network. The DEA should be considered as a signaling firewall that protects the internal network from malformed messages, unauthorized senders, and exposure of internal information to external networks. Figure 1 below shows this architecture. As the use of Diameter is increasing exponentially and as mobile operators implement Diameter Edge Agent (DEA) functionality, it is also important to consider how the DEA will scale while providing this important level of security. Figure 1. IR.88 Diameter Roaming Implementation Architecture This paper is focused on the security aspects of Diameter, why they exist and how they work. Diameter Security Any discussion of Diameter security needs to address three aspects: Transport security Guarantee the integrity of transmitted and received Diameter messages; Application security Topology hiding to prevent the exportation of network configuration information; Application security Admission control to ensure message validity. For reference, IETF originally defined Diameter in RFC 3588 and then updated it in RFC 6733, released in October See Appendix A for a list of key security-related changes between these two documents. Transport Security To address the transport security needs, RFC 6733 clearly states, all Diameter base protocol implementations MUST support the use of TLS/TCP and DTLS/SCTP, and the Diameter protocol MUST NOT be used without one of TLS, DTLS, or IPsec. 3

4 More specifically, these security protocols are Transport Layer Security [RFC 5246] when using Transmission Control Protocol (TCP) and Datagram Transport Layer Security [RFC 6083] when using Stream Control Transmission Protocol (SCTP). Diameter clients MUST support either TCP or SCTP, while Diameter Agents and Servers SHOULD support both. Optionally, IP Security [RFC 2401] can also be used. Figure 2 below shows the relationship between protocol layers. Transport Layer Security (TLS) TLS is used to provide private, reliable and secure communications over TCP. It ensures that sensitive data is safe from malicious attacks. The TLS protocol provides capabilities to perform client authentication, server authentication, data encryption and data integrity. RFC 5246 is the current TLS specification, defining TLS version 1.2. Figure 2. Protocol Relationships Datagram Transport Layer Security (DTLS) Some may wonder why they should not use TLS as a security protocol for SCTP, especially when TCP and SCTP are both connectionoriented protocols and TLS is used for TCP. The reason is that there are serious limitations of TLS related to SCTP, including: TLS does not support unordered delivery of SCTP user messages; TLS would only support the same number of data streams in both directions; TLS would have a connection for every bidirectional stream which would cause a large resource impact when a large quantity of SCTP is used. DTLS over SCTP was specified by IETF because it overcomes these issues by: Preserving SCTP message boundaries; Supporting a large quantity of either unidirectional or bidirectional streams; Allowing ordered and unordered delivery of SCTP messages IP Security (IPSec) The original Diameter Base Protocol specification (RFC 3588) stated, In order to provide universal support for transmission-level security, and enable both intra and inter domain AAA deployments, IPsec support is mandatory in Diameter, and TLS support is optional. However, one of the key updates in RFC 6733 modified this position. RFC 6733 states, The use of a secured transport for exchanging Diameter messages remains mandatory. TLS/TCP and DTLS/SCTP have become the primary methods of securing Diameter, with IPsec as a secondary alternative. Transport Security How does it work RFC 6733 states that in order to protect a Diameter connection via TLS/TCP and DTLS/SCTP (or IPSec), the TLS/TCP and DTLS/ SCTP (or IPSec/IKE) SHOULD begin prior to any Diameter message exchange. All security parameters for TLS/TCP and DTLS/SCTP (or IPSec) are to be configured independent of the Diameter protocol. This is the recommended handshake in RFC If RFC 6733 cannot be followed because one of the negotiating devices only supports RFC 3588, then the TLS/TCP and DTLS/SCTP handshake will begin when both ends successfully reach the open state, after completion of the Capabilities-Exchange-Request (CER) / Capabilities-Exchange-Answer (CEA) exchange. If the TLS/TCP and DTLS/SCTP handshake is successful, all further messages will be sent via TLS/TCP and DTLS/SCTP. If the handshake fails, both ends MUST move to the closed state. Diameter nodes using TLS/TCP and DTLS/SCTP for security MUST mutually authenticate as part of the TLS/TCP and DTLS/SCTP session establishment. Based on which specification a Diameter peer supports, the section below identifies the respective port numbers that should be used: 4

5 Port Numbers As per RFC 6733, the base Diameter protocol is run on port 3868 for both TCP [RFC 0793] and SCTP [RFC 4960]. For TLS and DTLS, a Diameter node that initiates a connection prior to any message exchanges MUST run on port It is assumed that TLS is run on top of TCP when it is used, and DTLS is run on top of SCTP when it is used. If the Diameter peer does not support receiving TLS/TCP and DTLS/SCTP connections on port 5658 (i.e., the peer complies only with RFC 3588), then the initiator MAY revert to using TCP or SCTP on port Note that this scheme is kept only for the purpose of backward compatibility, and that there are inherent security vulnerabilities when the initial CER/CEA messages are sent unprotected. A Diameter node MAY initiate connections from a source port other than the one that it declares it accepts incoming connections on, and it MUST always be prepared to receive connections on port 3868 for TCP or SCTP and port 5658 for TLS/TCP and DTLS/ SCTP connections. Peer Discovery During the session establishment process, there are two possible mechanisms to discover the next hop, each of which has advantages and disadvantages: Manually configured static entries in the Peer and Routing Tables; Dynamic Discovery using DNS (S) NAPTR. IR.88 states the use of static entries in the Peer and Routing Tables is recommended to enhance security, so if these are available they should take precedence and be used. However, this configuration method requires mobile operators to define provisioning procedures and ensure resources are allocated for this as changes occur. The use of dynamic discovery using DNS is allowed as it makes for simpler deployments; however, the use of dynamic discovery raises several security issues related to DNS vulnerabilities/attacks when a GRX/IPX DNS is used. At least two critical attacks to DNS infrastructure can be cited: An amplification and/or reflection attack can overload (DoS) a victim DEA with a huge number of unsolicited DNS answers; DNS Poisoning attack corrupts the association name/ip (i.e., Kaminsky attack). Once corrupted, the entry persists for a long time (TTL value), resulting in the DEA s routing table becoming improperly altered. If dynamic discovery is used, the DEA performs a Straightforward-Naming Authority Pointer (S-NAPTR) query for a server in a particular realm. Diameter Straightforward-Naming Authority Pointer (S-NAPTR) Usage [RFC 6408] defines an extended format for the S-NAPTR application service tag that allows for discovery of the supported applications without doing Diameter capability exchange beforehand. If no S-NAPTR records are found, the requester may directly query for an SRV record. Note, when DNS-based peer discovery is used, the port numbers received from SRV records take precedence over the default ports (3868 and 5658). Application Security Topology Hiding Some Diameter Attribute-Value Pairs (AVPs) may contain security-sensitive data, such as user passwords, location data, network addresses and cryptographic keys. IETF RFC 6733 provides a list of AVPs that are considered to be security sensitive; however, there are other 3GPP applications that use AVPs that are not part of the base Diameter protocol and many of those will also carry sensitive information. It is fair to say that in a 3GPP environment, Diameter peers must be considered trustworthy before any Diameter messages are exchanged. In the earlier releases of IR.88 (version 9 and earlier), DEA recommendations to provide topology hiding did not describe how topology hiding was to be implemented. This has now been corrected and topology hiding recommendations have been provided in GSMA PRD IR.88, Version Adherence to these rules and recommendations helps to secure and maintain LTE/EPC Diameter signaling networks at the application level. 5

6 Topology hiding is used to ensure that internal information of a Public Mobile Network (PMN), which is not required outside the PMN, is NOT disclosed by changing or removing it from all egress messages. Topology Hiding How does it work IR.88, Version 10.0, specifically states the rules expected to be applied. In general, all egress messages should hide: All Diameter Host Names; The number of Diameter Nodes in the network by hiding routing and identity details. More specifically, the DEA should determine messages to apply topology hiding based on: Their connection type and origin; Application Routing Rules-like criteria: Application-ID, Origin-Realm, Origin-Host, Destination-Realm, Destination-Host. In addition, topology hiding should also prevent other networks from determining the routing used within a network by hiding the path that Diameter messages use when being routed through the network. This is accomplished by: Hiding Diameter names in Route-Record AVP and using generic names in their place; Re-inserting the correct names if the request reenters the home network; Hiding Diameter host names in other base Diameter AVPs, such as Session-ID and Proxy-Info. To prevent other networks from discovering the number of HSS in the network and their identity, topology hiding should hide: Diameter name in Origin-Host AVP in requests from HSS to foreign MME; Diameter name in Origin-Host AVP for answers from HSS to foreign MME. Likewise, to prevent other networks from discovering the number of MMEs in the network and their identity, topology hiding should: Hide Diameter name in Origin-Host AVP in requests from MME to foreign HSS; Re-insert Host ID (Diameter name) in Destination-Host AVP in requests from foreign HSS to MME; Hide Diameter name in Origin-Host in answer message from MME to foreign HSS Application Security Admission Control In addition to providing topology hiding recommendations, GSMA IR.88 V10.0 also lists the following recommendations for admission control to ensure that only allowable messages are processed. The DEA is expected to filter Diameter messages to accept only supported Application IDs, Command Codes and AVPs. Custom AVPs are not allowed by default. Note that IR.88 does not define what is a custom AVP, so in fact this could be a vendor-specific AVP or an SVP that is only allowed in a message due to an [AVP] block in the ABNF. If custom AVPs are needed, they need to be bilaterally agreed to. Admission Control How does it work? IR.88, Version 10.0, specifically states: Compare all AVPs that identify the origin and the destination (that is Origin/Destination Realm/Host and Visited PMN ID) to determine consistency between them; Verify CER/CEA Diameter Messages against Diameter Servers and capabilities declared in IR.21 RAEX DB; Check if Origin Realm/Host and/or Visited PMN ID is from a PMN which has a roaming agreement with one s own PMN. Information related to this PMN is taken from IR.21 RAEX DB during provisioning of the ACLs in the DEA; Check if the Route Record AVPs (if they exist) are sound in that the documented route is possible for the source and destination given in the message; Egress Diameter messages are received by the DEA from an internal network element. They are only sent to their destination if all the AVPs which determine the origin are addressing a network element within the sending (i.e., one s own) PMN; Ingress Diameter messages are received by the DEA from an external network element. They are only sent to their destination if all the AVPs which determine the destination are addressing a recipient which is inside one s own PMN. 6

7 Conclusion Diameter signaling is the lynchpin for successful 4G/LTE interconnection and roaming. IETF and GSMA have highlighted the importance of Diameter security via their respective (RFC 6733 and IR.88) specifications. Therefore Mobile Operators (MNO, GRX and IPX) must have the utmost confidence in their deployment decisions for Diameter Edge Agent functionality in order to absolutely know their Diameter message exchange is secure at both the transport and application level. While this paper has shown how Diameter security is done at the transport and application level, it is still incumbent upon a Mobile Operator to test and verify the compliance of their DEA suppliers to these two key specifications in real world conditions. Specifically, Diameter message use is exponentially increasing, but many Diameter architectures cannot scale to perform securely at high message rates. The Sonus Diameter Signaling Controller (DSC) Advantage The Sonus DSC adheres to IETF and 3GPP specifications for security, including the implementation of Datagram Transport Layer Security (DTLS), Transport Layer Security (TLS) and optionally IP Security (IPsec). The DSC gives network operators the ability to route or screen on any AVP or message. This screening capability gives mobile network operators and IPX providers unparalleled control of information entering their network, including messages, AVPs and applications. Not just providing security, the Sonus DSC has been architected to provide this level of security at scale, where it is predicted that mobile network operators and IPX providers will be handling millions of Diameter messages per second. The DSC enables the definition of separate DEAs within a single DSC platform. Each of these virtual DEAs has its own separate routing and screening rules that include the ability to shape traffic on a per-peer basis. This shaping includes traffic flow control, throttling and congestion per-peer. Architected for extensibility and straightforward evolution to future Diameter applications, this high-powered platform makes the Sonus DSC ideal for LTE/EPC and IMS networks. Appendix A. Differences between RFC 6733 and RFC 3588 An overview of some the major changes between RFC 6733 and RFC 3588 that are security-related, are given below: Deprecated the use of the Inband-Security AVP for negotiating Transport Layer Security (TLS) [RFC 5246]. It has been generally considered that bootstrapping of TLS via Inband-Security AVP creates certain security risks because it does not completely protect the information carried in the CER/CEA ((Capabilities-Exchange-Request/Capabilities-Exchange-Answer). RFC 6733 adopts the common approach of defining a well-known secured port that peers should use when communicating via TLS/TCP and DTLS/SCTP. This new approach augments the existing in-band security negotiation, but it does not completely replace it. The old method is kept for backward compatibility reasons. Deprecated the exchange of CER/CEA messages in the open state. This feature was implied in the peer state machine table of RFC 3588, but it was not clearly defined anywhere else in that document. As work on RFC 6733 progressed, it became clear that the multiplicity of meaning and use of Application-ID AVPs in the CER/CEA messages (and the messages themselves) is seen as an abuse of the Diameter extensibility rules and thus required simplification. Capabilities exchange in the open state has been re-introduced in a separate specification [RFC 6737], which clearly defines new commands for this feature. 7

8 Simplified security requirements. The use of a secured transport for exchanging Diameter messages remains mandatory. However, TLS/TCP and DTLS/SCTP have become the primary methods of securing Diameter, with IPsec as a secondary alternative. The support for the End-to-End security framework (E2E-Sequence AVP and P -bit in the AVP header) has also been deprecated. Clarified Application ID usage. Clarify the proper use of Application Id information, which can be found in multiple places within a Diameter message. This includes correlating Application IDs found in the message headers and AVPs. These changes also clearly specify the proper Application ID value to use for specific base protocol messages (ASR/ASA, STR/STA) as well as clarifying the content and use of Vendor-Specific Application-ID. Simplified Diameter peer discovery. The Diameter discovery process now supports only widely used discovery schemes; the rest have been deprecated. There are many other miscellaneous fixes that have been introduced in RFC 6733; however, a comprehensive list of all changes is not shown here for practical reasons. About Sonus Networks Sonus brings intelligence and security to real-time communications. By helping the world embrace the next generation of Cloud-based SIP and 4G/LTE solutions, Sonus enables and secures latency-sensitive, mission-critical traffic for VoIP, video, instant messaging and online collaboration. With Sonus, enterprises can give priority to real-time communications based on smart business rules, while service providers can offer reliable, comprehensive and secure on-demand network services to their customers. With solutions deployed in more than 100 countries and nearly two decades of experience, Sonus offers a complete portfolio of hardware-based and virtualized Session Border Controllers (SBCs), Diameter Signaling Controllers (DSCs), Network-as-a-Service (NaaS) capabilities, policy/routing servers, and media and signaling gateways. Sonus Networks North American Headquarters Sonus Networks APAC Headquarters Sonus Networks EMEA Headquarters Sonus Networks CALA Headquarters 4 Technology Park Drive Westford, MA U.S.A. Tel: GO-SONUS 1 Fullerton Road #02-01 One Fullerton Singapore Singapore Tel: Edison House Edison Road Dorcan, Swindon Wiltshire SN3 5JX Tel: Homero No Col. Los Morales, C.P Mexico City, Mexico Distrito Federal Mexico Tel: Int l Tel: To learn more, call Sonus at 855-GO-SONUS or visit us online at The content in this document is for informational purposes only and is subject to change by Sonus Networks without notice. While reasonable efforts have been made in the preparation of this publication to assure its accuracy, Sonus Networks assumes no liability resulting from technical or editorial errors or omissions, or for any damages resulting from the use of this information. Unless specifically included in a written agreement with Sonus Networks, Sonus Networks has no obligation to develop or deliver any future release or upgrade, or any feature, enhancement or function. Copyright 2015 Sonus Networks, Inc. All rights reserved. Sonus is a registered trademark of Sonus Networks, Inc. All other trademarks, service marks, registered trademarks or registered service marks may be the property of their respective owners. DS /3 8

Diameter Interworking. Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues

Diameter Interworking. Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues Diameter Interworking Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues Table of Contents Introduction..................................... 3 Business

More information

Network Functions Virtualization and Diameter Signaling Controllers. Enabling the telecom network migration to the Cloud!

Network Functions Virtualization and Diameter Signaling Controllers. Enabling the telecom network migration to the Cloud! Network Functions Virtualization and Diameter Signaling Controllers Enabling the telecom network migration to the Cloud! Table of Contents Introduction..................................... 3 Business Challenges

More information

How Service Providers Can Seize the SBC as a Service Opportunity

How Service Providers Can Seize the SBC as a Service Opportunity How Service Providers Can Seize the SBC as a Service Opportunity Table of Contents Introduction..................................... 3 More Business for Service Providers....................... 3 Bringing

More information

SDN Orchestration Explained. A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks

SDN Orchestration Explained. A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks SDN Orchestration Explained A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks Table of Contents Introduction. 3 Back Story: Defining Terms. 3 Cloud Exchange Network. 3 Orchestration

More information

Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications

Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications Network Function Virtualization Primer Understanding NFV, Its Benefits, and Its Applications Table of Contents Introduction..................................... 3 NFV The Basics...................................

More information

Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks

Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks Today, the mobile industry is in the midst of a fundamental transformation. Circuit-switched TDM technology, which has been the

More information

Office 365 Cloud PBX. Options of Migrating to a Skype for Business Cloud Deployment

Office 365 Cloud PBX. Options of Migrating to a Skype for Business Cloud Deployment Office 365 Cloud PBX Options of Migrating to a Skype for Business Cloud Deployment Table of Contents Introduction..................................... 3 Skype for Business within Your Enterprise...........................

More information

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With

More information

Lecture 4b AAA protocols (Authentication Authorization Accounting)

Lecture 4b AAA protocols (Authentication Authorization Accounting) Lecture 4b AAA protocols (Authentication Authorization Accounting) Network security (19265400 / 201000086) Lecturers: Aiko Pras Pieter-Tjerk de Boer Anna Sperotto Ramin Sadre Georgios Karagiannis Lecture

More information

Signaling Delivery Controller : Control Your 4G Network

Signaling Delivery Controller : Control Your 4G Network Data Sheet Traffix Systems Signaling Delivery Controller : Control Your 4G Network The Traffix Signaling Delivery Controller (SDC) assists operators in scaling and managing services and applications in

More information

Implementing LTE International Data Roaming

Implementing LTE International Data Roaming Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between

More information

Securing the Interconnect Signaling Network Security

Securing the Interconnect Signaling Network Security Securing the Interconnect Signaling Network Security Travis Russell Director, Cyber Security, Service Provider Networks Oracle Communications August, 2015 Current security landscape Much attention has

More information

SIP, Security and Session Border Controllers

SIP, Security and Session Border Controllers SIP, Security and Session Border Controllers SIP, Security and Session Border Controllers Executive Summary Rolling out a public SIP service brings with it several security issues. Both users and Service

More information

Authentication, Authorization and Accounting (AAA) Protocols

Authentication, Authorization and Accounting (AAA) Protocols Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian [email protected] 10.06.2009 Agententechnologien

More information

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice

More information

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture

More information

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

How to secure an LTE-network: Just applying the 3GPP security standards and that's it? How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro

More information

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.

More information

Diameter in the Evolved Packet Core

Diameter in the Evolved Packet Core Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband

More information

Sonus SBC 2000 Web Based Management

Sonus SBC 2000 Web Based Management Sonus SBC 2000 Web Based Management Sonus SBC 2000 Web Based Management Today IT organizations need a cost effective way of managing branch office appliances. The Sonus SBC 2000 web based management tool

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

SIP and VoIP 1 / 44. SIP and VoIP

SIP and VoIP 1 / 44. SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies

More information

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009 S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need

More information

March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...

More information

Diameter Signaling Controller in next-generation signaling networks

Diameter Signaling Controller in next-generation signaling networks 284 23-3176 Uen Diameter Signaling Controller in next-generation signaling networks At the heart of the evolved mobile data network almost everything uses the Diameter protocol to communicate. JÖRG EWERT,

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

SIP Security Controllers. Product Overview

SIP Security Controllers. Product Overview SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running

More information

Need for Signaling and Call Control

Need for Signaling and Call Control Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice

More information

Best Practices for SIP Security

Best Practices for SIP Security Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting

More information

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture Wanderlust: Enabling roaming in the LTE era Don Troshynski Vice President, Solutions Architecture Acme Packet Trusted, first-class services and applications Apps & services Session delivery network April

More information

SS7 & LTE Stack Attack

SS7 & LTE Stack Attack SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network

More information

Acme Packet Net-Net SIP Multimedia-Xpress

Acme Packet Net-Net SIP Multimedia-Xpress Acme Packet Net-Net SIP Overview Net-Net SIP (SMX) combines IP Multimedia Subsystem (IMS) session management with leading session border control (SBC) functions to reduce the complexity and cost of delivering

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

UK Interconnect White Paper

UK Interconnect White Paper UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

Oracle Communications Session Border Controller: Driving Oracle s SIP Interconnect Solution. Extending Service Reach and Quality

Oracle Communications Session Border Controller: Driving Oracle s SIP Interconnect Solution. Extending Service Reach and Quality Oracle Communications Session Border Controller: Driving Oracle s SIP Interconnect Solution Extending Service Reach and Quality Networks cannot stand alone and must connect to other service providers to

More information

Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS

Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS What is Quality of Service (QoS)?... 2 Differentiated Services (DiffServ)... 2 Overview... 2 Example XYZ Corporation... 2 Components of

More information

SANE: A Protection Architecture For Enterprise Networks

SANE: A Protection Architecture For Enterprise Networks Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS

More information

Jibe Hub. RCS Exchange for Mobile Operators. The Global Communications Cloud. Anil Sharma Director, Engineering @ Jibe Mobile anil@jibemobile.

Jibe Hub. RCS Exchange for Mobile Operators. The Global Communications Cloud. Anil Sharma Director, Engineering @ Jibe Mobile anil@jibemobile. The Global Communications Cloud Jibe Hub RCS Exchange for Mobile Operators Anil Sharma Director, Engineering @ Jibe Mobile [email protected] Our Thirty minutes Jibe Introductions Who we are RCS What

More information

Session Border Controller and IP Multimedia Standards. Mika Lehtinen [email protected]

Session Border Controller and IP Multimedia Standards. Mika Lehtinen mika.lehtinen@teliasonera.com Session Border Controller and IP Multimedia Standards Mika Lehtinen [email protected] December 1, 2005 Contents Introduction Motivation Research problem Research method Results Conclusion December

More information

Practical VoIP Peering. Klaus Darilion enum.at [email protected]

Practical VoIP Peering. Klaus Darilion enum.at klaus.darilion@enum.at Klaus Darilion enum.at [email protected] Peering* Peering: negotiation of reciprocal interconnection arrangements between service providers Layer 3 peering Layer 5 peering *definitions from draft-ietf-speermint-terminology-06.txt

More information

Session Border Controllers: Addressing Tomorrow s Requirements

Session Border Controllers: Addressing Tomorrow s Requirements White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction

More information

Understanding Lync 911 for Enterprises

Understanding Lync 911 for Enterprises Understanding Lync 911 for Enterprises Introduction Microsoft Lync delivers a complete Enterprise Voice solution through an easy-to-use interface. Enhanced 911 (E911) support is a critical component of

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................

More information

Session Border Controller

Session Border Controller Session Border Controller SBC OVERVIEW: Media Routes SBC is an advanced, comprehensive Policy enforcement point, Session Management and Service Orchestration engine deployed as a network border element

More information

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures

More information

NICC ND 1647 V1.1.1 (2013-06)

NICC ND 1647 V1.1.1 (2013-06) NICC ND 1647 V1.1.1 (2013-06) NICC Document SIP-NNI Basic Voice Architecture Michael Faraday House, Six Hills Way, Stevenage SG1 2AY Tel.: +44(0) 20 7036 3636 Registered in England and Wales under number

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Network Address Translation (NAT) Good Practice Guideline

Network Address Translation (NAT) Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell

More information

SIP Signaling Router (SSR) Use Cases

SIP Signaling Router (SSR) Use Cases APPLICATION GUIDE SIP Signaling Router (R) Use Cases Using SIP to improve network performance and deliver advanced services This application guide discusses how operators can use a SIP Signaling Router

More information

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Requirements and Service Scenarios for QoS enabled Mobile VoIP Service

Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Kyu Ouk Lee, Ho Young Song Electronics and Telecommunications Research Institute (ETRI) [email protected], [email protected] Abstract.

More information

Cisco Collaboration with Microsoft Interoperability

Cisco Collaboration with Microsoft Interoperability Cisco Collaboration with Microsoft Interoperability Infrastructure Cheatsheet First Published: June 2016 Cisco Expressway X8.8 Cisco Unified Communications Manager 10.x or later Microsoft Lync Server 2010

More information

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

Secured Communications using Linphone & Flexisip

Secured Communications using Linphone & Flexisip Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts

More information

End-2-End QoS Provisioning in UMTS networks

End-2-End QoS Provisioning in UMTS networks End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1

More information

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England March 2-7, 2014 Presented by: Lionel Morand Co-authored

More information

Differentiated Services

Differentiated Services March 19, 1998 Gordon Chaffee Berkeley Multimedia Research Center University of California, Berkeley Email: [email protected] URL: http://bmrc.berkeley.edu/people/chaffee 1 Outline Architecture

More information

IP Phone Presence Setup

IP Phone Presence Setup Static Route Configuration on IM and Presence Service, page 1 Presence Gateway Configuration on IM and Presence Service, page 6 Configure SIP Publish Trunk on IM and Presence Service, page 7 Configure

More information

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1 Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller July 24, 2015 Version 1 1 Table of Contents 1 Introduction... 4 1.1 Conformance Claims...4 1.2 How to

More information

MOBILE VIDEO WITH MOBILE IPv6

MOBILE VIDEO WITH MOBILE IPv6 MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),

More information

SIP Proxy. SIP Proxy. Bicom SYSTEMS. SIP Proxy... Advanced Simplicity

SIP Proxy. SIP Proxy. Bicom SYSTEMS. SIP Proxy... Advanced Simplicity Session border controller solution offering high performance, security and SIP compliance connectivity. 1 DIAGRAM : Registration SIP Client registration for all users (, Business, Hosted PBXware and Wholesale)

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

ABC SBC: Securing the PBX. FRAFOS GmbH

ABC SBC: Securing the PBX. FRAFOS GmbH ABC SBC: Securing the PBX FRAFOS GmbH Introduction A widely reported fraud scenarios is the case of a malicious user detecting the address of a company s PBX and accessing that PBX directly. Once the attacker

More information

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com 1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Session Border Controllers in Enterprise

Session Border Controllers in Enterprise A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing

More information

White Paper. Interconnecting Networks with Dialogic s Global Multimedia Exchange Platform

White Paper. Interconnecting Networks with Dialogic s Global Multimedia Exchange Platform Interconnecting Networks with Dialogic s Global Multimedia Exchange Platform Executive Summary The architecture and approach that network operators have traditionally used for network interconnection have

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

Configuration Example

Configuration Example Configuration Example Use a Branch Office VPN for Failover From a Private Network Link Example configuration files created with WSM v11.10.1 Revised 7/22/2015 Use Case In this configuration example, an

More information

White paper. SIP An introduction

White paper. SIP An introduction White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information

MED: Voice over IP systems

MED: Voice over IP systems www.ptt.co.uk Online course specification MED: Voice over IP systems Target audience: This online course is designed for those who will be responsible for the design or maintenance of Voice over IP (VoIP)

More information

DNS SRV Usage June 22, 2011

DNS SRV Usage June 22, 2011 DNS SRV Usage June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Scope of this Document... 3 DNS SRV (RFC 2782)... 3 Deployment Scenario... 4 Mediatrix Unit Configuration... 5 Scenario

More information

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity Secure Remote Monitoring of the Critical System Infrastructure An Application Note from the Experts in Business-Critical Continuity TABLE OF CONTENTS Introduction................................................2

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

464XLAT in mobile networks

464XLAT in mobile networks STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address

More information