Delivering Reliability and Security in a VoIP Solution November 8, 2005 Michael Porter Avaya Inc. Government Marketing Director Today I’m going to talk.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
© 2009 Avaya Inc. All rights reserved. Introduction to SIP Trunking Alan Klein Consulting Systems Engineer February 2009.
 CHAPTER 2  Understanding the Pieces of Cisco Unified Communication.
The Voice Security Company Kirk Vaughan Product Director –VoIP SIP Application Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
The Future of Unified Communications Jim Greenway VP, Marketing, U4EA UC Definition SMB a Large Opportunity –Market for UC in SMB –Examples Conclusion.
VoIP in Disaster & Emergency Response Voice over IP in Disaster and Emergency Response Team Members: Muhammad Ali Mansoor A. Siddiqui Carlos Loarca de.
Unified Communications LITN Spring  A set of products that provides a consistent, unified user interface and user experience across multiple devices.
The Role of High Availability Software in Quality of Service Joe McFadden Vice President, Marketing, Nuasis.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Bridging Two Worlds Parting Is Such Sweet Sorrow: Adding IP Telephony to Existing "Big Iron" Mike Robinson CTO
Module 11: Designing Security for Network Perimeters.
Security fundamentals Topic 10 Securing the network perimeter.
UC Opportunities For Service Providers. Agenda Software + Services recap Services through SPLA –Exchange Hosted Services –Live Meeting –Dedicated Hosted.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
IS3220 Information Technology Infrastructure Security
Out of Sight, But Not Out of Touch Remote Office, Branch Office IP Telephony Solutions Charles Henderson Director, Product Management EADS TELECOM North.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
March 2009 Sipera Overview. 2 © 2009 Sipera Systems, Inc. All Rights Reserved. About Sipera  Leader in real-time Unified Communications (UC) security.
Onsite CRM Security
Security fundamentals
Chapter 1: Explore the Network
Network customization
OneNet USA Team Bob Brunmeier – President –
UNIFED COMMUNICATIONS MANAGEMENT
Chapter 7. Identifying Assets and Activities to Be Protected
CompTIA Security+ Study Guide (SY0-401)
Chapter 1: Exploring the Network
Working at a Small-to-Medium Business or ISP – Chapter 8
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Understand Wide Area Networks (WANs)
Microsoft Lync 2010: In the Cloud
Chapter 1: Explore the Network
Module 2: Configure Network Intrusion Detection and Prevention
The IP-PBX.
Introduction to Networking
Security of a Local Area Network
Security in Networking
CompTIA Security+ Study Guide (SY0-401)
Cloud Testing Shilpi Chugh.
IS4550 Security Policies and Implementation
Networx – Enterprise Services: Awarded May 31, 2007
Developing Innovative Unified Communications Applications
Unit 27: Network Operating Systems
11/12/2018.
Networx – Enterprise Services: Awarded May 31, 2007
Mitel Network – SIP Trunking Discussion
Goals Introduce the Windows Server 2003 family of operating systems
Virtual Private Network
Enterprise Infrastructure Solutions for SIP Trunking
Contact Center Security Strategies
Introduction to Network Security
Helping to Achieve ROI Targets with SIP Trunking
Network customization
Topic 12: Virtual Private Networks
AT&T Firewall Battlecard
Cloud Computing for Wireless Networks
Presentation transcript:

Delivering Reliability and Security in a VoIP Solution November 8, 2005 Michael Porter Avaya Inc. Government Marketing Director Today I’m going to talk about Avaya in a whole new way. We have grown a lot in a few years. I’m not talking about revenues, or number of employees. I’m talking about how we define business communications -- as more than just telephones and switches. Today we are providing open, standards-based business solutions that work with other technologies you have, resulting in new capabilities for your business to drive revenues and reduce costs. If I do my job right, you will see that we can help your enterprise work in ways that you haven’t even thought of. TIPS FOR SPEAKERS: Speakers notes in this document are not to be read like a script, although some of them appear to be a script. The notes are suggestions to be read ahead of your presentation, and learned, or “absorbed” so that you can speak to the slides with a few of your own ticklers to remind you of the most important points. There are multi-step builds on some of these slides. Practice moving through the presentation in slideshow mode so that they don’t throw you when it’s time to make the presentation. Pay particular attention to the “Fabric” slide with WAV files. Make sure that you have the animation software and WAV files in the same folder on your computer so that everything plays correctly. And do a test run. Don’t forget to put your name and presentation date on the title slide!

Avaya, The Leader in Business and Government Communications We enable businesses and governments, large to small, to communicate, serve, and excel Century of experience and innovation in our DNA Today: #1 positions in IP telephony, contact centers, mobility solutions, and services Avaya Labs, leader in communications software: 3,000 patents/applications Pioneered voice mail, IVR, skills-based call routing, unified communication, CTI, audio conferencing, virtual LAN 1 million customers -- 90% of FORTUNE 500® rely on Avaya 20,000 people in 50 countries 2,500 Business Partners

Today’s Discussion How reliability and security are different with VoIP systems How to architect reliability into a VoIP solution Going beyond reliability Security in a VoIP solution Managing security in VoIP Conclusion …. Q&A

How Are Reliability and Security Different in VoIP? Traditional Telephony PSTN Digital/Analog Phones PBX Telephones are directly wired to PBX ports Voice Mail IP Telephony Network Core IP Phones Analog Phones FAX Machines PSTN VoIP Gateway Analog Gateway Voice Communication Server(s) WAN Internet Message Servers Application Servers

Designing Reliability into a VoIP Solution IP Phones Message Servers Voice Communication Server(s) Location A Server Redundancy Network Redundancy Telephone Power PoE in Closet UPS in Closet PSTN Location B VoIP Gateway WAN Alternative Network Links Server Redundancy Voice Communication Server(s) Voice Messaging backup store Message Server Backup Alternative VoIP Gateway 5 - 7

Increasing Reliability with Additional Network Connections Satellite IP Phones Message Servers Voice Communication Server(s) Free Space Optics Outdoor Router PSTN Voice Communication Server(s) WAN Voice Messaging backup store 5 - 7

Beyond Reliability…. Availability Message Servers Backup Communications Server Message Servers Voice Communication Server(s) WAN VoIP Gateway Branch Office Location B Location A PSTN Backup Communications Server Increased Survivability Alternate WAN routes Connect to other communication servers Connect over the PSTN (dial backup) Automatic reconnect to main communication server Reroute “voice” over the PSTN when WAN connection constricted 5 - 7

Managing Availability at the Application Level Manage your network quality, and therefore availability at the application level Voice Applications require more of the network as delay and packet jitter can significantly affect the user perception of quality Proactively monitor your network to ensure end-to-end QoS Proactively monitor your ISP’s to ensure SLA’s are being met Implement a flexible network that allows automatic routing to avoid potential problems in your, or your ISP’s network

Voice Security Concerns System and Server Tampering Direct access to admin, etc Virus or Worm attacks Denial of Service – targeting servers, gateways, and routers Backdoor access through rogue modems or soft phones VPN Security – leaving ports open for voice Content Security – wiretapping in the IP world Unauthorized Access – man in the middle, etc

Securing a VoIP Solution Hardened Application Server Secure OS Locked-down ports Secure Access (e.g., no telnet) Network Region & Segmentation Support DoS Protection No file sharing Secure access Separate physical interface for Admin & Control Network Core IP Phones Analog Phones FAX Machines PSTN VoIP Gateway Analog Gateway Voice Communication Server(s) WAN Internet Message Servers Application Servers Encrypted Control Channels (H.248) Signed Downloads Encrypted Media and Signaling (H.323, SIP)

Security Must Be Achieved at Various Points Extended Perimeter Remote Users/ Telecommuters Customers Business Partners Branch Offices Road Warriors Mobile Workers Wireless LAN Web Apps Perimeter VPN Firewall IDS Wireless Access Point Email Scanning Virus Checking Managed Security Services Control RADIUS Access Control Identity Management Single Sign-on Policy Enforcement Policy Management VLAN Resources Devices Applications Voice, CRM, UC Operating systems Data Video Host Based IDS Modified from The Burton Group From Avaya Converged Security WP

End-to-End VoIP Application Security System & Perimeter Protection Protect against common attacks such as viruses, worms and generic attacks Denial of Service Resistance Vulnerability Reduction; Intrusion Prevention Secure Management Protects against attacks and confidential information disclosure Secure Provisioning; Roles & Policy Monitoring, Auditing and Accounting Confidentiality and Integrity Ensures privacy by encrypting confidential information such as voice media Message and File Integrity Secure Storage Converged Identity & Access Protects against identity theft Authentication and Authorization Certificate Framework

Trusted Communications User Authentication & authorization App roles Media encryption Data privacy Initiate Contact Server hardening Firewall, NAT VoIP aware VPN 802.1x auth. Device authentication and registration Authenticated Authentication of contacted party Complete Secure Communications DoS protection WLAN Security App roles Media encryption Data privacy Application Level Network Level Device Level

Conclusions VoIP Communications can be architected for reliability….and can even exceed traditional voice systems in being more available. Communications connections can be more redundant Communications resources can be configured for fallback support Users can be provided multiple means for accessing their communications VoIP Communications introduces new security challenges that are best addressed leveraging best practices At the various communications layers (e.g., device, network & application) Managed from various access points (e.g., resources, control, & perimeter)

Q & A Now that you have had an overview of our approach to business continuity through communications, I would like to spend a few minutes addressing your specific issues and concerns and discussing how one or more Avaya solutions can help you achieve your preparedness and continuity objectives. I hope today’s discussion gives you some new ideas and considerations for how to tackle your security issues. Thank you!

Official Convergence Communication Provider for the 2002 and 2006 FIFA World Cup™ FIFA Women’s World Cup USA 2003