How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation
Introduction Enterprises are continuing to convert and upgrade their circuit switched voice systems to Voice over IP (VoIP). This process involves modification of many components of Customer Premise Equipment (CPE), including PBXs, contact centers, adjunct systems, handsets, and access to the public network. The adoption rate for internal campus VoIP equipment upgrades such as handsets and PBX has been fairly brisk, but in the majority of these enterprise VoIP deployments, access to the carrier network is still provided by Time Division Multiplexed (TDM) circuits. Enterprises are slowly replacing circuit switched trunks (ISDN PRI, T1 CAS, analog, etc.) for access to the public network with Session Initiation Protocol (SIP) trunks, but the adoption rate of this technology has been very slow, with perhaps 1% of the enterprise access in North America being converted to SIP. While adoption of carrier SIP trunks will continue, the rate is not expected to accelerate, and enterprises will use a combination of circuit switched and SIP trunks for many years. This is especially true for large enterprises with many sites, which will require many years to fully transition to SIP trunks. Sites with a large amount of traffic often retain some circuit switched trunking for backup. Most sites also retain some circuit switched trunking to enable legacy modems and fax machines. This is true despite availability of IP based protocols such as Fax over IP. The challenges for enterprises migrating to SIP services include the operational complexity of and lack of familiarity with new services, and in some cases, interoperability issues among products from different SIP device vendors (e.g., Broadsoft, Sonus, Avaya, Cisco, Nortel, Siemens). SIP specific security vulnerabilities may develop as an issue in the future. As enterprises migrate to SIP trunks, the need for an edge security device also arises. Some enterprises consider deploying an SBC as customer premises equipment (CPE) to address security. However, while SBCs have valid uses and may be necessary for interoperability, these devices cannot provide unified voice network security and management because they can only see VoIP traffic and are not designed to address the primary security threats and management challenges plaguing enterprise voice networks, regardless of transport type. A better solution is a unified security and management platform that monitors all voice circuits, whether circuitswitched or SIP or a mix of the two. About Session Border Controllers (SBCs) Session Border Controllers (SBCs) are security and management devices that were originally developed for the service provider market and used when they interconnected their VoIP networks with other service providers, enterprises, and consumers. In the early days of VoIP and SIP, SBCs were often necessary to enable different systems to interoperate. SBCs were also
used to provide security functions. Over the years, SBCs have added functions like protocol conversion, protocol fix up, network topology hiding, transcoding, far end Network Address Translation (NAT), security, and so forth. SBCs are often deployed on the service provider side of SIP trunks. Some enterprises are considering using SBCs as customer premises equipment (CPE) with carrier SIP trunks. The reasons for an enterprise to deploy an SBC as CPE vary, but usually include demarcation, troubleshooting, NAT, and interoperability services. SBCs can also provide a SIP based security function, which is necessary only if SIP is being delivered over the Internet. SIP security is less essential in a more typical enterprise deployment, where the SIP trunk is delivered over a private service provider network, because the threat of an attack on these types of circuits is low, and the service provider customarily has already provisioned an SBC for security at their end. Note that SBCs are neither relevant to nor compatible with circuitswitched trunking, which again, accounts for approximately 99% of the enterprise trunking in North America. While most of the major service providers support use of CPE SBCs on their SIP trunks, they usually do not require nor desire them, because they are just another device to debug. This, of course, varies by service provider. Some SBCs also provide limited management functions such as call recording, Call Detail Reporting (CDR), and performance management. However, these features are usually designed to accommodate service provider requirements for example, call recording to comply with the Communications Assistance for Law Enforcement Act (CALEA) and do not satisfy enterprise voice network management requirements. Several years ago, there were as many as 20 SBC vendors. With the slow adoption rate of VoIP in service provider and enterprise trunking deployments, many of these vendors went out of business or were purchased for low valuations and their technology abandoned or integrated into other products, such as soft switches and routers. Today, a few SBC vendors remain, including SIP security vendors that are adding SBC like features to their products. Addressing the Unified Security and Management Challenges of Hybrid Voice Networks Whether or not an SBC is present on a SIP trunk, enterprises need unified application level security and management functions that the SBC does not provide, especially while circuitswitched trunking continues to be used alongside VoIP for the foreseeable future. While SIPspecific attacks such as Denial of Service (DoS) and fuzzing get a lot of attention, the attacks that really affect enterprises are toll fraud, unauthorized and poorly secured modems, social engineering, harassing callers, fax spam, and so forth. SBCs address none of these issues. For example, toll fraud fraudulent, illegal use of a company s telecommunications resources by a third party from a remote location has been a major issue for enterprises for many years
and is becoming a bigger issue, mainly because it is the one VoIP vulnerability that is worth exploiting due to the potential financial gain. While accurate cost estimates for toll fraud are difficult to pin down because many companies are reluctant to publicly admit they have been targeted, experts worldwide estimate the costs to run in the billions of dollars annually. According to the most recent figures available from the Communications Fraud Control Association (CFCA) Telecom Fraud Survey, annual global telecom fraud losses amount to an estimated $54.4 $60 billion (USD). Social engineering, whereby criminals attempt to acquire personal information such as usernames, passwords and credit card account information by fraudulently representing themselves as trusted entities, is also on the rise. Many corporations, especially financial, insurance, retail and healthcare organizations are now becoming victims of these types of social engineering/identity theft attacks conducted over corporate phone lines. Modem security remains a major issue for the enterprise. Authorized modems are still very commonly used for remote access to critical systems. Unauthorized modem connections represent a significant security risk to any organization. Unauthorized modem connections can occur from two sources: misuse/unauthorized access of legitimate modems, such as PBX maintenance port modems, and employee installed personal use modems. Authorized modems have a legitimate business purpose, but still pose a risk to the data network if they are improperly secured or unlawfully accessed by an unauthorized person. An even greater threat arises from employee installed modems, a hidden threat in most enterprises. Employeeinstalled modems, used for unmonitored Internet access or deliberate data transfer by a disgruntled employee, bypass the data firewall and create unsecured phone line access points into corporate data networks, opening the back door for hackers, viruses, data leakage, and other threats. Since traditional data firewalls cannot see traffic on the phone network, and PBX systems cannot distinguish call types, this threat is invisible to traditional network monitoring equipment and practices. These voice network security and management issues and more are present whether trunking is purely circuit switched or includes SIP based trunking, and they need to be addressed in a unified manner that is independent of the underlying trunking. The ETM (Enterprise Telephony Management) System addresses these issues and more. Since SBCs only provide visibility into traffic on SIP trunks, they cannot address unified security and management issues such as proactively alerting and preventing toll fraud or gathering CDR across all circuits in the enterprise, independent of the underlying transport. For SIP trunks, the ETM System is designed to operate alone or to co exist with an SBC, such as Cisco s CUBE, as shown in Figures 1 and 2 below.
Figure 1 ETM System without SBC Figure 2 ETM System with SBC The ETM System provides the same application level security and management functions for SIP trunks that it provides for circuit switched trunks. The ETM System also has substantial and direct ROI that can help finance VoIP deployments. SBCs have little in the way of a direct, hard
dollar ROI. Rather, their ROI is nebulously tied to SIP trunking ROI through service enablement. The ETM System can truly unify all voice across the enterprise. SBCs cannot offer this because they do not support circuit switched trunking. The ETM System will also offer a SIP firewall and Intrusion Prevention System (IPS) in a coming release. This optional application, which runs on the same hardware as used to support SIP trunking, can be added when the threat of SIP based attacks ( DoS, fuzzing, registration hijacking, etc.) become a reality. Note that while an SBC can also provide this function, it makes no sense to deploy the identical security solution inline twice on the same circuit. If the same SBC is used on the network and CPE side, an attack that gets though the network SBC will not be foiled by the identical CPE SBC, but it may be foiled by a different SIP firewall/ips solution. 13750 San Pedro, Suite 820 San Antonio, Texas 78232 PH: 210.402.9669 FX: 210.402.6996 TF: 800.817.4837 www.securelogix.com ETM, TeleWatch Secure, TWSA, We See Your Voice, Unified Communications Policy Manager, SecureLogix, SecureLogix Corporation, as well as the ETM Emblem, SecureLogix Emblem and the SecureLogix Diamond Emblem are trademarks and/or service marks or registered trademarks and/or service marks of SecureLogix Corporation in the U.S.A. and other countries. All other trademarks mentioned herein are believed to be trademarks of their respective owners. SecureLogix technologies are protected by one or more of the following patents: US 6,249,575 B1, US 6,320,948 B1, US 6,687,353 B1, US 6,700,964 B1, US 6,718,024 B1, US 6,735,291 B1, US 6,760,420 B2, US 6,760,421 B2, US 6,879,671 B1, US 7,133,511 B2, US 7,231,027 B2, US 6,226,372 B1, US 7,440,558 B2, and CA 2,354,149. U.S. and Foreign Patents Pending.