Security & Reliability in VoIP Solution



Similar documents
VoIPon Solutions Tel: +44 (0) Ranch Asterisk VoIP Solution

Securing SIP Trunks APPLICATION NOTE.

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

Recommended IP Telephony Architecture

VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP.

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

SIP Trunking The Provider s Perspective

Best Practices for Securing IP Telephony

Session Border Controllers in Enterprise

SIP Trunking with Microsoft Office Communication Server 2007 R2

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

High Availability Configuration Guide

VoIP Survivor s s Guide

How To Implement A Cisco Vip From Scratch

White Paper. avaya.com 1. Table of Contents. Starting Points

Secure Voice over IP (VoIP) Networks

Cisco Virtual Office Unified Contact Center Architecture

An outline of the security threats that face SIP based VoIP and other real-time applications

ETM System SIP Trunk Support Technical Discussion

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

UX5000 with CommPartners SIP Trunks

Voice over IP Basics for IT Technicians

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border

Ram Dantu. VOIP: Are We Secured?

Secure VoIP for optimal business communication

Small Business Phone System Solutions HOSTED PBX OVERVIEW

Prepare your IP network for HD video conferencing

MIT s Current SIP Infrastructure. Mark Silis MIT Information Services and Technology February 2, 2006

Release the full potential of your Cisco Call Manager with Ingate Systems

SIP and VoIP 1 / 44. SIP and VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

Secure Voice over IP (VoIP) Solutions

VOIP Security Essentials. Jeff Waldron

Contents. Specialty Answering Service. All rights reserved.

Implementing VoIP monitoring solutions. Deployment note

Gateways and Their Roles

Voice over IP (VoIP) Basics for IT Technicians

IP Telephony Deployment Models

Voice Over IP and Firewalls

Ingate Firewall/SIParator SIP Security for the Enterprise

Telephony Denial of Service (TDoS) Attacks. Dan York, CISSP Chair, VoIP Security Alliance

Hosted PBX Platform-asa-Service. Offering

IP Telephony Management

Cisco Unified Communications 500 Series

Threats to be considered (1) ERSTE GROUP

Across China: The State Information Center s Nationwide Voice-over-IP Network

CounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief.

VoIP Resilience and Security Jim Credland

Voice over IP Security

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Presenter. Zane Ryan. Director Dot Force

Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording

VoIP Trunking with Session Border Controllers

Welltel - Session Border Controller SBC 120

How to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions

Voice over IP Networks: Ensuring quality through proactive link management

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER

SIP Trunking Configuration with

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Enabling Users for Lync services

Managing SIP traffic with Zeus Traffic Manager

How To Support An Ip Trunking Service

White Paper. SIP Trunking. Abstract

Troubleshooting Voice Over IP with WireShark

SIP Security Controllers. Product Overview

WHITE PAPER. Testing Voice over IP (VolP) Networks

IP-PBX for Small to Large Enterprises

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

Setup Reference guide for PBX to SBC interconnection

Skype Connect Requirements Guide

PETER CUTLER SCOTT PAGE. November 15, 2011

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Building Voice VPN with Simton IPX

Small, Medium and Large Businesses

VOLUME 1, SECTION 9: TECHNICAL NARRATIVE TO AMPLIFY TECHNICAL NARRATIVE TABLES

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Configuring SIP Trunking and Networking for the NetVanta 7000 Series

Functional Specifications Document

The SIP School- 'Mitel Style'

Packetized Telephony Networks

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)

AT&T IP Flex Reach/ IP Toll Free Configuration Guide IC 3.0 with Interaction SIP Proxy

Cloud Phone 365 Glossary of Terms

Security issues in Voice over IP: A Review

Whitepaper. Are Firewalls Enough for End-to-End. VoIP Security

IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

V310 Support Note Version 1.0 November, 2011

CVOICE Exam Topics Cisco Voice over IP Exam # /14/2005

Implementation Guide. Simplify, Save, Scale VoIP: The Next Generation Phone Service. A single source for quality voice and data services.

VOICE OVER IP SECURITY

Figure 1. Traditional PBX system based on TDM (Time Division Multiplexing).

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf (Team Lead) Imran Bashir Khadija Akram

Transcription:

Security & Reliability in VoIP Solution July 19 th, 2006 Ram Ayyakad ram@ranchnetworks.com

About My background Founder, Ranch Networks 20 years experience in the telecom industry Part of of architecture team that built the prestigious IP and ATM switches Recipient of the 1998 Bell Laboratories President s Gold Award Page 2

About Ranch Networks Ranch manufactures Network appliances built to advance VoIP telephony deployments The RN series of products provide security, reliability, and scalability to VoIP applications The only PBX controlled VoIP Appliance The only integrated Asterisk security solution Per-call QoS rate limiting & BW guarantee Protocol and Encryption independence Scales PBX to handle a lot more calls Page 3

Ranch Networks Products Ranch agent code is integrated into Asterisk VoIP appliances that enable service providers to secure, scale and provide reliable VoIP RN300 RN20L RN20 RN40 RN41 Page 4

VoIP Deployment Objectives Seamless Connectivity Call should succeed irrespective of the locations of caller & called party High Call Quality No Voice Clipping & call drops Security Prevent attacks on PBX, phones and the rest of the network Prevent Eavesdropping of VoIP signaling / media High Availability Minimal interruption or downtime Scalability Dynamically increase capacity with minimal impact Page 5

Enterprise Challenges VoIP Security & Data Security Call Quality & Data Traffic Scalability Reliability Page 6

VoIP Security Challenges Educating COIs/CTOs - security threats are real Picking the appropriate security appliances Future proofing (encryption, protocol changes) Security enforcement methodologies Traditional firewalls SIP firewalls SBCs PBX controlled appliances VoIP & data traffic on the same physical cable Preventing voice quality/call drops due to viruses/worms Page 7

VoIP Security Issues Eaves dropping Media (Sensitive Information Revelation) Signaling (Identity Revelation) Man in the middle attack Denial of Service attack Limitations of traditional firewalls Non-awareness of above issues Page 8

VoIP Security Objectives Robustness Scalability Future Proof (encryption, protocol changes) Easily Manageable Agnostic to Vendor/Protocol revisions Reliability Page 9

VoIP Security Solutions Traditional Firewalls VoIP Protocol aware firewalls Session Border Controllers PBX Controlled appliances Page 10

Protecting Converged Infrastructure Security appliance MUST be able to segregate & prioritize voice/data traffic ALL access to IP PBX MUST go through the security appliance Security appliance MUST raise alerts for ANY unauthorized access Security appliance MUST have the ability to mirror traffic to an IDS system Look for the solutions being promoted by the IP PBX vendor Allocate guaranteed BW for VoIP traffic Page 11

VoIP Security Implementation Choose the solution(s) that meet the objectives Use VPN for encrypting VoIP traffic Educate the Network Admins on VoIP security Page 12

SIP issues in a Typical Deployment Internal VoIP phones Enterprise Network L2 Switch Corporate firewall * Asterisk IP PBX and Media Gateway PSTN Internet Connectivity Issue: SIP is NAT unfriendly Security Issue: Media is firewall unfriendly Quality Issue: Bandwidth contention with data L2 Switch Residential VoIP phone Branch VoIP phones Page 13

Ranch Asterisk solution NetSec PSTN Default: SIP allow with rate limit & RTP deny Call Setup: SIP Invite & Authenticate Forward invite, Receive 200 OK and finish call setup Asterisk (NetSec) applies real-time POLICIES to RN: Security policies what pin holes to open NAT policies how to provide NAT Internet Bandwidth policies what Pipe width to use Bridging policies how to connect the phones Call in progress. Call tear down SIP Phone A SIP Phone B Page 14

1+1 High Availability (HA) Central Office RN20 Single Public IP SIP based health check will initiate switchover Single public IP address for Asterisk servers ALL SIP messages forwarded to current Active PBX Switchover does not terminate current conversations Seamless switchover between active/standby Internet Firewall Branch Office Page 15

Hosted PBX with local fail over to PSTN Active Standby PSTN Asterisk * * Ranch benefits: VoIP Service Provider Ranch RN 20/40 Internet RN20 initiates the Asterisk fail over within the service provider network Single IP public address for Asterisk servers in service provider network RN300 initiates the fail over from service provider to local Asterisk Local Asterisk provides local PSTN backup PSTN Ranch RN300 Asterisk Enterprise Network * SIP L2 Switch VoIP phones Page 16

Clustering Allows one or more Asterisk IP PBXs to be grouped (Cluster) as a single IP PBX Cluster visible to the user as a single public IP and PBX have private IPs A PBX can be added or removed from a cluster at any time When a PBX is removed from the cluster current active calls should not be dropped, at a minimum conversations should go on Health checks determine if a PBX should handle new calls New calls should be sent to a PBX if-and-only-if PBX is accessible (ex: SIP based pings) PBX has access to critical resources such as an data base, external auth server such as RADIUS/LDAP Should scale linearly Page 17

Low Cost Large Scale PBX Solution Registrars-A ** Registrars-B ** Proxies-A * * Proxies-B ** * Large Scale PBX Clusters Low cost Asterisk Proxies * SIP based health check Ranch RN40 Redundant, Carrier Class Heartbeat Gigabit interfaces Highly scalable solution SIP based health check determines if an Asterisk within a cluster is active or not Each Asterisk cluster is accessible using single public IP address Supports multiple Asterisk clusters Making a server inactive server does not terminate current conversations Each registrar and proxy cluster share a single public IP Asterisk proxies handles the calls Page 18