Ingate Firewall & SIParator Product Training

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
SIP Trunk-UC Workshop IT Expo 2011.
©2012 ClearOne Communications. Confidential and proprietary. COLLABORATE ® Video Conferencing Networking Basics.
TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
CCNA – Network Fundamentals
Solutions for SIP The SIP enabler We enable SIP communication for business What the E-SBC can do for you.
Enabling SIP to the Enterprise Steve Johnson, Ingate Systems Security: How SIP Improves Telephony.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Module 5: Configuring Access for Remote Clients and Networks.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Security Awareness: Applying Practical Security in Your World
Wi-Fi Structures.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Advanced Networking for DVRs
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
SIP Trunking As a Managed Service Why an E-SBC Matters By: Alon Cohen, CTO Phone.com.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Unleashing the Power of IP Communications™ Calling Across The Boundaries Mike Burkett, VP Products September 2002.
Security fundamentals Topic 10 Securing the network perimeter.
Module 10: Windows Firewall and Caching Fundamentals.
NETGEAR CONFIDENTIAL FVS338 ProSafe VPN Firewall 50.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Windows Vista Configuration MCTS : Advanced Networking.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Defining Network Infrastructure and Network Security Lesson 8.
S ECURITY APPLIANCES Module 2 Unit 2. S ECURE NETWORK TOPOLOGIES A topology is a description of how a computer network is physically or logically organized.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Security fundamentals
IP Telephony (VoIP).
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Firewalls Chapter 8.
Introduction to Network Security
Ingate & Dialogic SIP Trunking
Ingate & Dialogic Technical Presentation
Presentation transcript:

Ingate Firewall & SIParator Product Training SIP Trunking Focused

Introduction & Today’s Agenda

Ingate Product Training Introductions Scott Beer Director, Product Support Ingate Systems 15 Years in Voice Communications 10 Years in SIP Protocol Audience – Show of Hands  How many of you are familiar with the SIP Protocol? How many of you own an Ingate? Are you planning to buy an Ingate in the near future? Are you concerned about SIP Interop? Are you concerned about SIP Security? PLEASE FEEL FREE TO ASK QUESTIONS (I enjoy playing “Stump the Teacher”)

Ingate Product Training Agenda Morning Session Common Applications of SIP (15 min) Common Deployment Issues (30 min) Deploying SIP Trunks -- Getting it Right the First Time (30 min) Special Guest – Graham Francis – The SIP School Introduction to Ingate Product (40 min) Ingate Startup Tool (40 min) Demonstration LUNCH BREAK (Lunch will be provided (2 doz)) Afternoon Session Web GUI Configuration (120 min) Demonstrations Troubleshooting (15 min) Security - Toll Fraud and DoS Prevention (30 min)

Common SIP Applications SIP Trunking Remote Desktop

Ingate Product Training Common SIP Applications SIP Trunking A SIP Trunk is a concurrent call that is routed over the IP backbone of a carrier (ITSP) using VoIP technology. SIP Trunks are used in conjunction with an IP-PBX and are thought of as replacements for traditional PRI or analog circuits. The popularity of SIP Trunks is due primarily to the cost savings; due to a true convergence of voice and data infrastructure, Increased ROI, the maximizing of bandwidth utilization, open source protocol standards, and more.

Ingate Product Training Common SIP Applications

Ingate Product Training Common SIP Applications Remote Desktop Extending SIP communications to Remote & Home Offices. Extension of IP-PBX services using Open Source standardized Protocol Use of off-the-self SIP Phones and Soft SIP Clients.

Ingate Product Training Common SIP Applications

Common SIP Deployment Issues

Ingate Product Training Common Deployment Issues Problem #1 - “NAT BREAKS SIP” SIP Protocol is an Application Layer Protocol Network Address Translation (NAT) resides at the Transport Layer (TCP/IP) NAT will not change the SIP addressing within the TCP/UDP datagram Firewalls are a NATing device and BLOCK all Incoming SIP Traffic to the LAN Any NAT device, either Far End (remote) or Near End (on prem) can effect the call

Ingate Product Training Common Deployment Issues Before NAT TCP/IP Header is Private Space SIP Headers are Private Space LAN IP Address and Port Information LAN IP Address LAN IP Address An INVITE usually contains the IP address and port to where the caller should direct its media stream. The IP address usually is the client’s own IP. If the client is located on a NAT:ed network, this means that the IP address in the INVITE isn’t reachable outside the NAT:ed network. As part of the SIP signaling, the client sends an IP address and a port number indicating to where the media stream should be sent. There are almost no restrictions to how this port number can be chosen. With both clients on the Internet, or both on a LAN, there is no problem, but if one of the clients is located behind a firewall, problems arise. Usually the ports used for media streams (high ports) are blocked for incoming traffic by the firewall. To open relevant ports statically in the firewall is not an option. The clients can select a port at random, which means that you would have to open every port in the firewall. This would make the firewall quite pointless, and you could just as well remove it. You don’t want to unnecessarily keep ports on the firewall open. When a call is disconnected, the best would be that the firewall immediately blocks the used port. LAN IP Address

Ingate Product Training Common Deployment Issues After NAT TCP/IP Header is Public Space SIP Headers are Private Space WAN IP Address LAN IP Address LAN IP Address An INVITE usually contains the IP address and port to where the caller should direct its media stream. The IP address usually is the client’s own IP. If the client is located on a NAT:ed network, this means that the IP address in the INVITE isn’t reachable outside the NAT:ed network. As part of the SIP signaling, the client sends an IP address and a port number indicating to where the media stream should be sent. There are almost no restrictions to how this port number can be chosen. With both clients on the Internet, or both on a LAN, there is no problem, but if one of the clients is located behind a firewall, problems arise. Usually the ports used for media streams (high ports) are blocked for incoming traffic by the firewall. To open relevant ports statically in the firewall is not an option. The clients can select a port at random, which means that you would have to open every port in the firewall. This would make the firewall quite pointless, and you could just as well remove it. You don’t want to unnecessarily keep ports on the firewall open. When a call is disconnected, the best would be that the firewall immediately blocks the used port. LAN IP Address

Ingate Product Training Common Deployment Issues Resolution #1 - “NAT BREAKS SIP” SIP Protocol requires a SIP Proxy or Application Layer Gateway and NAT SIP Proxy (SIP-Aware Firewall) will correct IP Addresses and Port allocation in SIP Protocol from Private LAN addresses to Public WAN address. SIP Proxy monitors all SIP Traffic IN and OUT and can apply routing rules

Ingate Product Training Common Deployment Issues After NAT & Ingate TCP/IP Header is Public Space SIP Headers are Private Space WAN IP Address WAN IP Address WAN IP Address An INVITE usually contains the IP address and port to where the caller should direct its media stream. The IP address usually is the client’s own IP. If the client is located on a NAT:ed network, this means that the IP address in the INVITE isn’t reachable outside the NAT:ed network. As part of the SIP signaling, the client sends an IP address and a port number indicating to where the media stream should be sent. There are almost no restrictions to how this port number can be chosen. With both clients on the Internet, or both on a LAN, there is no problem, but if one of the clients is located behind a firewall, problems arise. Usually the ports used for media streams (high ports) are blocked for incoming traffic by the firewall. To open relevant ports statically in the firewall is not an option. The clients can select a port at random, which means that you would have to open every port in the firewall. This would make the firewall quite pointless, and you could just as well remove it. You don’t want to unnecessarily keep ports on the firewall open. When a call is disconnected, the best would be that the firewall immediately blocks the used port. WAN IP Address

Ingate Product Training Common Deployment Issues Ingate Benefits - “NAT BREAKS SIP” Ingate products are ICSA Certified VoIP Firewalls Ingate have a SIP Proxy, SIP B2BUA and NAT working together Ingate SIParator can bring enhance the SIP capabilities and SIP security of an existing Firewall Ingate can provide “Far End NAT Traversal” functionality What Other IP-PBXs Vendors Do Most all IP-PBX vendors recommend the use of some sort of “SIP-Aware Firewall” for deployment Other recommend the use of Port Forwarding, to forward Port 5060 and a thousand other Ports to the IP-PBX – HUGE SECURITY RISK!!

Ingate Product Training Common Deployment Issues Problem #2 – SIP Interoperability Not all SIP is the same One vendors implementation may not be the same as another There are many SIP components and extensions that may be supported on one vendors equipment and not on another SIP Protocol is an open standard and can be left to interpretation by each vendor Examples Use of REFER Method is not typically supported by ITSP Use of INVITE with Replaces Header is not typically supported by ITSP Some ITSPs don’t like SDP with “a=Inactive” attribute ENUM SIP URI Delivery is supported by some and not by others Various TO and FROM Header conformances Alternate SIP Domain routing requirements

Ingate Product Training Common Deployment Issues Resolution #2 – SIP Interoperability Testing and Development for each Vendor Extensive Testing and Development time devoted to each vendor integration to ensure complete interoperability – a huge undertaking Customization and Flexibility development for each Vendor integration SIP Connect Compliance Adherence to SIP Forum – SIP Connect Compliance, governing body of SIP Trunking deployments an standards

Ingate Product Training Common Deployment Issues Ingate Benefits – SIP Interoperability In General, Can rewrite headers commonly needing changed between vendors Provide SIP Protocol error checking and fixes Protocol non-conformances Routing Rules and Policies to direct traffic Contains extensive list of features devoted to SIP non-conformances customization Ingate contains a B2BUA Separates the call between the two parties, helping separate two different implementations of SIP Provides Client or Server User Accounts for Registration and Authentication Separate SIP Method Handling between two parties

Ingate Product Training Common Deployment Issues Problem #3 – SIP Security SIP is written in clear text within the datagram of a UDP or TCP Transport. Confidential User/SIP URI Information A SIP URI is like an Email Address, once someone has it, they who you are and where you are located. The malicious person or software can send SIP Request after SIP Request to your SIP URI. Some malicious uses like DoS Attacks, SPIT Attacks, Intrusion of Services, Toll Fraud, Tele-markers and more. Called and Calling Party Number Information Private LAN Network Address Scheme Giving away the confidential Private IP Address scheme of the internal LAN network, gives malicious attackers knowledge of the internal configuration of the Enterprise. The Port being used on the device, gives malicious attackers where to direct traffic Media Attributes Easy to see what Media is being negotiated and where its going

Ingate Product Training Common Deployment Issues Why is SIP Insecure? Written in clear text within the datagram of a UDP or TCP Transport. Confidential User Information Confidential SIP URI of the User Confidential Equipment MIME Content LAN IP Address and Port Information Media Attributes

Ingate Product Training Common Deployment Issues Common SIP Attacks Intrusion of Services Devices attempting Register with a IP-PBX in an attempt to look like an IP-PBX extension and gain IP-PBX services SPIT (SPAM over Internet Telephony) Toll Fraud A form of an Intrusion of Service, where malicious attempts to send INVITEs to an IP-PBX to gain access to PSTN Gateways and SIP Trunking to call the PSTN Denial of Service INVITE (or any SIP Request) Flood in an attempt to slow services or disrupt services Or any UDP or TCP traffic directed at a SIP Service on SIP Ports Indirect Security Breaches Private LAN IP Address and infrastructure are now made public, and can be used in attacks to other non-SIP areas

Ingate Product Training Common Deployment Issues Resolution #3 – SIP Security Dynamic Encryption of SIP URI Using the SIP Specification, enforce an Encrypted SIP URI where possible Dynamic Port Allocation Dynamically change ports on every call. Hide LAN IP Address Scheme Apply LAN to WAN Network Address Translation within the SIP Signaling TLS and SRTP TLS Transport provides complete encryption of SIP Signaling SRTP provides encryption of RTP Media IDS/IPS for SIP Protocol SIP Protocol specific Intrusion Detection Systems and Intrusion Prevention Systems allow for monitoring and statics of all SIP Traffic, and apply rules and policies based on the traffic Traffic Routing Rules and Policies IP Address Authentication, SIP URI Validation, and Routing Rules

Ingate Product Training Common Deployment Issues How to make SIP Secure TLS to Encrypt all SIP Signaling Hidden IP in User Information Hidden Internal Vendor Encrypted SIP URI Firewall Filters on MIME Content Hidden LAN IP Information SRTP to Encrypt all RTP Media Dynamic Port Allocation

Ingate Product Training Common Deployment Issues Ingate Benefits – SIP Security Dynamic Encryption of SIP URI Dynamic Port Allocation Hide LAN IP Address Scheme TLS and SRTP IDS/IPS for SIP Protocol Traffic Routing Rules and Policies Ingate products are ICSA Certified VoIP Firewall Ingate is focused on providing SIP Security

The SIP School Graham Francis

Introduction to Ingate Products

Ingate products SIParator™ Firewalls SIP-capable firewalls for computer security and communication SIParator™ - Add-on to existing firewalls to enable SIP communication Complete SIP proxy Built-in SIP registrar (no extra location server required, even for NAT) QoS (can prioritize VoIP) Remote SIP Connectivity (VoIP for remote users) TLS (Transport Layer Security, encryption of SIP messages) SRTP (Secure RTP, encryption of media) IDS/IPS for SIP SIP user authentication using Digest authentication VPN user and admin user authentication using RADIUS RSA SecureID Ready certification Encryption Configuration traffic over HTTPS or IPsec VPN using IPsec or PPTP SIP signaling over TLS SRTP SIParator A new, unique device bringing SIP capability to existing firewalls Preserves customer’s firewall investments Flexibly connected to the legacy firewall (next slide) Works with all firewalls New and replacement installations Preserve firewall investment and keep established security policies

Extensive SIP Feature Set Security Far-End NAT Traversal and STUN SIP Trunking Tool Set Sol. for Remote Workers Encryption Authentication SIP Filtering Flexible Control Diagnostic Tools Extensive Call Qualiity Statistics SIP-ALG-only Firewalls can only do this much SIP Proxy, ALG, B2BUA, Registrar Near-End Traversal Firewall & NAT SIP Proxy, ALG, B2BUA, Registrar QoS, Taffic Mgmt ENUM Support IP-PBX Compatibility Service Provider Compatibility SIP Trunking

The Ingate Product Family Firewall® 1950 or SIParator® 95 SW upgradable Firewall® 1650 or SIParator® 65 2000 Calls* SW upgradable 650 Calls* Firewall® 1550 or SIParator®55 Firewall® 1500 or SIParator®50 350 Calls* 150 Calls* Firewall® 1190 or SIParator® 19 Licenses Functional SIP Trunking Remote SIP Connectivity Quality of Service Advanced SIP Routing VoIP Survival Enhanced Security Capacity Additional SIP Traversals 50 Calls* * Calls = Maximum Concurrent RTP Sessions = SIP Trunks

Connecting the Firewall Ingate Firewall Handles All Data Traffic Provides NAT Protocol Service Rules Data Traffic Relays VPN (IPsec) Tunnels PPTP Tunnels DMZ Networks (multiple networks) Default Gateway of the LAN DHCP Server SIP Session Border Controller

Connecting the Firewall

Connecting the Firewall

Connecting the Firewall

Connecting the Firewall

Connecting the SIParator® DMZ and DMZ/LAN have knowledge of the WAN IP of the Existing Firewall UDP Ports 5060 and a range of Media Ports are forwarded to the SIParator Standalone has it’s own WAN IP The SIParator Dynamically open and closes ports Existing Firewall Port Forward 5060 Port Forward Media Port range

Connecting the SIParator® NAT FW needs to Port FWD from Internet to DMZ and again from DMZ to LAN Increases number of Network hops Very Secure Ingate needs to know WAN IP address DMZ and DMZ/LAN have knowledge of the WAN IP of the Existing Firewall UDP Ports 5060 and a range of Media Ports are forwarded to the SIParator Standalone has it’s own WAN IP The SIParator Dynamically open and closes ports

Connecting the SIParator® NAT FW needs to Port FWD from Internet to DMZ Decreases Network hops Very Secure Ingate needs to know WAN IP address DMZ and DMZ/LAN have knowledge of the WAN IP of the Existing Firewall UDP Ports 5060 and a range of Media Ports are forwarded to the SIParator Standalone has it’s own WAN IP The SIParator Dynamically open and closes ports

Connecting the SIParator® NAT FW needs to Port FWD from Internet to LAN Decreases Network hops Least Secure Ingate needs to know WAN IP address DMZ and DMZ/LAN have knowledge of the WAN IP of the Existing Firewall UDP Ports 5060 and a range of Media Ports are forwarded to the SIParator Standalone has it’s own WAN IP The SIParator Dynamically open and closes ports

Connecting the SIParator® Ingate has its own Public IP address One Network hop Very Secure Reduces impact to NAT FW No NAT FW setup required DMZ and DMZ/LAN have knowledge of the WAN IP of the Existing Firewall UDP Ports 5060 and a range of Media Ports are forwarded to the SIParator Standalone has it’s own WAN IP The SIParator Dynamically open and closes ports

Connecting the SIParator® Ingate has its own Public IP address NAT FW has it own IP address Ingate adds QoS and Traffic Shaping Very Secure No NAT FW setup required DMZ and DMZ/LAN have knowledge of the WAN IP of the Existing Firewall UDP Ports 5060 and a range of Media Ports are forwarded to the SIParator Standalone has it’s own WAN IP The SIParator Dynamically open and closes ports

How Does It Work? SIP Proxy Stateful Proxy redirects calls NAT/PAT for UDP/TCP/TLS and SIP SIP B2BUA Rewrites Request URIs, Domains, and other Headers SIP Registrar / Client Can Register to ISTP, and provide a Registrar for SIP Clients SIP Media Relay Can ensure media is directed in/out Dynamically open and close ports for security For each incoming SIP request, sipfw first has to determine to where it should be sent. If the SIP request should be sent through the firewall in a way which requires rewriting (e.g. caused by NAT), sipfw must do this. If the SIP request regards a request to send one or more media streams, sipfw must notify the NAT and firewall functions about the ports and IP addresses in question. This will create preliminary firewall rules to allow this traffic. Not until the first packet of the media stream itself reaches the firewall, it will know the sender (this is not negotiated in the SIP signaling). When this is known, the firewall rules are rewritten to only allow media from the proper sender. The sipfw SIP proxy has three modes: Deny all SIP requests (except local registrations). Process all SIP requests regardless of destination. Process only SIP requests addressed to local users. “Local users” are users in a SIP domain which the firewall manages. The processing of SIP requests can also be restricted with regard to the sender (based on IP address). The SIP proxy can require that a user must authenticate himself before his SIP requests are processed. An incoming SIP request addressed to the firewall will reach sipfw without any problem. If a client is located on one side of the firewall, and a SIP server on the other side, and the client is unaware of the existence of the firewall, things become more complicated. The firewall will capture all traffic to port 5060 addressed to or through the firewall, and pass it on to sipfw. This way, SIP traffic can be processed even when the clients are not aware of the existence of the firewall. For this to work, the SIP traffic must use port 5060.

Ingate SIParator® For each incoming SIP request, sipfw first has to determine to where it should be sent. If the SIP request should be sent through the firewall in a way which requires rewriting (e.g. caused by NAT), sipfw must do this. If the SIP request regards a request to send one or more media streams, sipfw must notify the NAT and firewall functions about the ports and IP addresses in question. This will create preliminary firewall rules to allow this traffic. Not until the first packet of the media stream itself reaches the firewall, it will know the sender (this is not negotiated in the SIP signaling). When this is known, the firewall rules are rewritten to only allow media from the proper sender. The sipfw SIP proxy has three modes: Deny all SIP requests (except local registrations). Process all SIP requests regardless of destination. Process only SIP requests addressed to local users. “Local users” are users in a SIP domain which the firewall manages. The processing of SIP requests can also be restricted with regard to the sender (based on IP address). The SIP proxy can require that a user must authenticate himself before his SIP requests are processed. An incoming SIP request addressed to the firewall will reach sipfw without any problem. If a client is located on one side of the firewall, and a SIP server on the other side, and the client is unaware of the existence of the firewall, things become more complicated. The firewall will capture all traffic to port 5060 addressed to or through the firewall, and pass it on to sipfw. This way, SIP traffic can be processed even when the clients are not aware of the existence of the firewall. For this to work, the SIP traffic must use port 5060.

Optional Modules Remote SIP Connectivity SIP Trunking The SIP functionality in Ingate Firewalls and SIParators has several software extension modules. Remote SIP Connectivity SIP Trunking Advanced SIP Routing VoIP Survival Extended SIP Security Quality of Service

Optional Modules Remote SIP Connectivity Manages SIP clients behind NAT boxes which are not SIP-aware Solves far-end NAT traversal Includes a STUN server

Optional Modules

Optional Modules SIP Trunking Lets the administrator rewrite the entire or part of a SIP URI before the request is passed on Redirects requests based on From header, Request-URI and originating network Adds features to make the firewall register on behalf on clients Local Registrar, B2BUA, Proxy, extensive Dial Plan & Routing features.

Optional Modules

Optional Modules Acts as registrar for the monitored SIP domain VoIP Survival Monitors one or more remote SIP servers Useful for branch offices which uses a SIP server at the main office When the remote SIP server is down, the firewall: Acts as registrar for the monitored SIP domain Manages local calls Redirects PSTN calls to a local PSTN gateway Manages outgoing calls to other SIP domains

Optional Modules IDS/IPS TLS and SRTP Contains features such as: Extended SIP Security Contains features such as: IDS/IPS Makes it possible to block SIP traffic due to various conditions Traffic exceeds a given rate limit Packets match specified criteria TLS and SRTP Advanced SIP Routing Create hunt groups, aliases and other user-based features

Break Time Coffee and Refreshments

Ingate Startup Tool

Ingate Startup Tool Startup Tool “Out of the Box” setup and commissioning of the Firewall and SIParator products Update current configuration Product Registration and unit Upgrades, including Software and Licenses. Automatic selection of ITSP and IP-PBX Backup of Startup Tool database Located at www.ingate.com FREE!

Ingate Startup Tool Select the Ingate Model Startup Tool - Product Type Select the Ingate Model

Ingate Startup Tool Configure the unit for the first time Startup Tool Title Reference Configure the unit for the first time Change or update configuration Register the unit Backup the config IP/MAC Address Password

Ingate Startup Tool Firewall or SIParator deployment type Startup Tool - Network Topology Firewall or SIParator deployment type Inside (Eth0) - Private Outside (Eth1) - Public Default Gateway DNS Server

Ingate Startup Tool Select IP-PBX Provide IP Address Startup Tool – IP-PBX Select IP-PBX Provide IP Address

Ingate Startup Tool Select Trunking Provider Account Information Startup Tool – ITSP_1 Select Trunking Provider Account Information

Ingate Startup Tool Login to web GUI and apply settings Upload Startup Tool – Upload Config Login to web GUI and apply settings Upload

Ingate Startup Tool Startup Tool – Apply the Config The Startup Tool will launch a browser to have the installer Apply the Configuration.

Ingate Startup Tool Enter Ingate Web Account Create Ingate Web Account Startup Tool – Register & Upgrade Enter Ingate Web Account Create Ingate Web Account Connect to www.ingate.com Install Modules & Licenses by entering 12- digit Purchase Key Upgrade the software of the unit

Demonstration #1 Startup Tool

LUNCH Yum! 2 Dozen Lunches at the back

Recap Ingate Firewall and Ingate SIParator Ingate Products Ingate Firewall and Ingate SIParator Scale by appliance giving more traversals Number of purchasable Options Modules Deployments Ingate Firewall and Ingate SIParator Startup Tool “Out of the Box” setup and commissioning Select IP-PBX and ITSP

Web GUI Configuration

Programming GUI Web into the Ingate Major Categories and separate Tabs Web Configuration Web into the Ingate Major Categories and separate Tabs

Programming: Network

Programming: Network Networks & Computers Provides a view of the Network connected on each interface as a Routing Table.

Programming: Network Default Gateway The Default Gateway to the Internet, provided by the ISP.

Programming: Network The IP Address/Mask of the NIC on the LAN. Eth0 Network Interface The IP Address/Mask of the NIC on the LAN. Static Routing – defines Router address for other network address on the LAN.

Programming: Network The IP Address/Mask of the NIC on the WAN. Eth1 Network Interface The IP Address/Mask of the NIC on the WAN. PPPoE or DHCP IP address assignment are possible.

Programming: Basic Configuration

Programming: Basic Configuration Provides DNS Server addresses.

Programming: Basic Configuration Access Control Provides configuration for HTTP and HTTPS access.

Programming: NAT & Rules and Relays Firewall Only

Programming: NAT NAT Define when to apply NAT rules. Typically, From LAN network to WAN network, NAT as WAN address

Programming: Rules & Relays Define specific Service from Client to Server networks.

Programming: Rules & Relays Direct specific Traffic to specific locations

Programming: Quality of Service Firewall Only

Programming: QoS Quality of Service – Call Admission Control You can make the firewall reject SIP calls when there is not bandwidth enough left to get media streams through satisfactorily. Bandwidth for SIP Media - define BW Reservations Codec Bandwidth – define Codec BW

Programming: QoS Quality of Service – QoS Classes Using Priority queues, you assign different priority to different types of traffic. Using Bandwidth allocation, you assign guaranteed bandwidth and bandwidth limits for different types of traffic.

Programming: QoS Quality of Service – Most Restricted Interface You specify how packets belonging to different classes should be handled by the interface The Priority field specifies in which priority queue to put the packets. Higher priority traffic will always be let through before lower priority traffic is allowed (but see also the Loose Priority setting).

Programming: QoS Quality of Service – ToS Modification Modify the TOS octet of packets leaving the firewall. You can either specify a value for the (3 bit) TOS field (RFC 791), or you can specify a value for the (6 bit) Differentiated Services field (RFC 2474).

Programming: SIP Services

Programming: SIP Services Basic Turn On SIP Module. Define Media Port Range. The SIP Module setting determines if sipfw should be active or not. If it is ”Off” (default), no other SIP settings will have effect. The Additional SIP Signaling Ports setting allows you to make the firewall listen for SIP signaling on other ports than 5060 (TCP and UDP) and 5061 (TLS). In the SIP Media Port Range, you configure what ports the firewall should use for media streams. This can be useful to know if other devices should be made to let through the traffic. Under Logging, you configure how SIP events should be logged. SIP errors SIP signaling SIP packets SIP debug messages SIP signaling (default: ”Local”) Logs the first line of each SIP packet received by or sent by sipfw. SIP errors (default: ”Local”) Something went wrong when a SIP request was processed. Failed DNS lookup Bad syntax in SIP packet … SIP packets (default: ”Local”) Logs in extenso all SIP packets received by and sent by sipfw. All SIP headers and the entire body is shown. Each log entry of SIP packets can be a few kB. The log is quickly populated when this logging is turned on. SIP debug messages (default: ”-”) Large amounts of debug information about how each SIP request is processed. Some information may be useful for a user. Other parts require extensive knowledge about sipfw to be correctly interpreted. Each SIP request can generate tenths of log entries.

Programming: SIP Services Interoperability Common deviations from the standard The SIP standard is still quite young, and some variations in the interpretation are known. For common deviations from the standard, there are interoperability settings in the firewall.

Programming: SIP Services Remote SIP Connectivity Allows SIP client behind NAT boxes to use SIP. The Remote SIP Connectivity extension module allows SIP client behind NAT boxes to use SIP. The STUN server is used for STUN aware clients. The STUN server needs two public IP addresses to work properly. The Remote NAT Traversal is used for SIP client which cannot use STUN. The Remote NAT Traversal forces the SIP client to re-REGISTER rather often. If this is unacceptable, you can select to send OPTIONS requests to the client instead.

Programming: SIP Traffic

Programming: SIP Traffic SIP Methods Select which SIP methods the firewall should allow & authenticate On the SIP Methods page, you select which SIP methods the firewall should allow. You also select which methods should require authentication before processing in the firewall.

Programming: SIP Traffic Filtering The Proxy Rules and Default Policy For SIP Requests settings control if sipfw should process requests, based on the sender IP address of the request The Content Type table controls if sipfw should process requests, based on the content type of the request body */* - Allows All The Proxy Rules and Default Policy For SIP Requests settings control if sipfw should process requests, based on the sender IP address of the request. There are three options: Process all Local only Reject all All SIP requests will be processed regardless of destination. Only SIP requests addressed to local SIP domains are processed. No SIP requests except local REGISTERs are processed. Usually, SIP requests from different sources should be treated differently. A user on the inside of the firewall can usually be allowed to send requests anywhere. A user on the outside should not be allowed to call users who are not registered on a local domain. If this were allowed, an outside user could use the firewall to send requests anywhere. The Content Type table controls if sipfw should process requests, based on the content type of the request body. Requests without a body are not blocked by this setting. As default, all content types except “application/sdp”, “text/x-msmsgsinvite”, and “application/xpidf+xml” are blocked.. You can allow the content type “*/*” to let all content types through the firewall.

Programming: SIP Traffic Local Registrar Define SIP Users that register to the Ingate (server registrar) Enter the SIP domains for which the firewall should act as registrar. You can use domain names and IP addresses. As default, the firewall considers all its own IP addresses as its SIP domains. Enter the users allowed to register in the Local SIP User Database table. Instead of a local database, a RADIUS server can be used to list SIP users. Username Enter usernames. “*” can be used as a wildcard. Domain Enter the SIP domain for this user. Here too, “*” can be used. Authentication name If the user should provide another name for authentication purposes, enter that name here. Password When authentication is inactive, no password is required here. Account Type When the Advanced SIP Routing module has been installed, there are different account types to select from. Most of them makes the firewall register on behalf of clients, or act as a back-to-back user agent. Register from Select a network containing the IP addresses from which registration is allowed. Define the network on the Network and Computers page.

Programming: SIP Traffic SIP Accounts Define SIP Users for Service Providers Select behavior of these SIP Users (Ingate as client) Enter the SIP domains for which the firewall should act as registrar. You can use domain names and IP addresses. As default, the firewall considers all its own IP addresses as its SIP domains. Enter the users allowed to register in the Local SIP User Database table. Instead of a local database, a RADIUS server can be used to list SIP users. Username Enter usernames. “*” can be used as a wildcard. Domain Enter the SIP domain for this user. Here too, “*” can be used. Authentication name If the user should provide another name for authentication purposes, enter that name here. Password When authentication is inactive, no password is required here. Account Type When the Advanced SIP Routing module has been installed, there are different account types to select from. Most of them makes the firewall register on behalf of clients, or act as a back-to-back user agent. Register from Select a network containing the IP addresses from which registration is allowed. Define the network on the Network and Computers page.

Programming: SIP Traffic User Database: Account Type Selections Register: With this Account type, the firewall registers the username with the SIP server associated with the domain. You may enter the address to send the request to in the User Routing table. This is useful when you have a SIP client which cannot register properly. XF: With this Account type, the firewall replaces the From header with the username and domain of this user. The request is then forwarded to the SIP server associated with the domain. XF/Register: With this Account type, the firewall replaces the From header as described above, then registers as described under Register above. Enter the SIP domains for which the firewall should act as registrar. You can use domain names and IP addresses. As default, the firewall considers all its own IP addresses as its SIP domains. Enter the users allowed to register in the Local SIP User Database table. Instead of a local database, a RADIUS server can be used to list SIP users. Username Enter usernames. “*” can be used as a wildcard. Domain Enter the SIP domain for this user. Here too, “*” can be used. Authentication name If the user should provide another name for authentication purposes, enter that name here. Password When authentication is inactive, no password is required here. Account Type When the Advanced SIP Routing module has been installed, there are different account types to select from. Most of them makes the firewall register on behalf of clients, or act as a back-to-back user agent. Register from Select a network containing the IP addresses from which registration is allowed. Define the network on the Network and Computers page.

Programming: SIP Traffic User Database: Account Type Selections Domain: This Account type can be used when sending requests to other domains where authentication is required. You must select this account in the Dial Plan when you forward requests to the domain in question. When that server requires authentication for its domain, the firewall sends the username and password configured here. B2BUAWM: With this Account type, the firewall replaces the From header as described under XF. It also changes the SDPs to the effect that media is always sent via the firewall. B2BUAWM/Register: With this Account type, the firewall acts as described under B2BUAWM above. It also registers the user as described under Register above. Enter the SIP domains for which the firewall should act as registrar. You can use domain names and IP addresses. As default, the firewall considers all its own IP addresses as its SIP domains. Enter the users allowed to register in the Local SIP User Database table. Instead of a local database, a RADIUS server can be used to list SIP users. Username Enter usernames. “*” can be used as a wildcard. Domain Enter the SIP domain for this user. Here too, “*” can be used. Authentication name If the user should provide another name for authentication purposes, enter that name here. Password When authentication is inactive, no password is required here. Account Type When the Advanced SIP Routing module has been installed, there are different account types to select from. Most of them makes the firewall register on behalf of clients, or act as a back-to-back user agent. Register from Select a network containing the IP addresses from which registration is allowed. Define the network on the Network and Computers page.

Programming: SIP Traffic Dial Plan On the Dial Plan page, you can perform advanced routing of SIP requests On the Dial Plan page, you can perform advanced routing of SIP requests. The Dial Plan can be used as default or as fallback. When used as fallback, the Dial Plan will only be used if the server, that should have received the request, is not responding. You can enter an emergency number which will always be processed, regardless of licenses and other limitations.

Programming: SIP Traffic Dial Plan “Matching FROM Header” Requests can be matched on From header, sender IP address, transport method and network. Requests can be matched on From header, sender IP address and transport method. With the Advanced SIP Routing module, the From header can be matched to a regular expression instead of just username and SIP domain. Match on sender IP address to process requests from local users differently.

Programming: SIP Traffic Dial Plan “Matching Request URI” Requests can be matched on the Request-URI, which states where the request is bound. Requests can be matched on the Request-URI, which states where the request is bound. The match can be to a certain string or any number. With the Advanced SIP Routing module, the Request-URI can be matched to a regular expression instead of just username and SIP domain. You can also match on a Prefix, which will be stripped from the Request-URI before it is sent on.

Programming: SIP Traffic Dial Plan “Forward To” Define destinations for the SIP requests Can use Reg Exp for dynamic use of B2BUA with “ ;b2bua ” Define destinations for the SIP requests in the Forward To table. Enter a new Request-URI (the domain part). With the Advanced SIP Routing module, the Request-URI can be rewritten with a regular expression using parts of the old Request-URI. You can also pass on the request to an account defined in the Local SIP User Database table.

Programming: SIP Traffic Dial Plan “Dial Plan” Combine the From Header, Request-URI and Forward To tables in the Dial Plan table. Combine the From Header, Request-URI and Forward To tables in the Dial Plan table. Select if the request should be denied or forwarded, and if authentication should be performed. With the Advanced SIP Routing module, you can also perform ENUM lookups for requests. You can also add a prefix to the username before sending the request on.

Programming: SIP Traffic How Does It Work? Outgoing Call SIP Phone sends INVITE to 6135552000@IP_IP-PBX IP-PBX sends INVITE to 6135552000@IP_Ingate Ingate sends INVITE to 6135552000@IP_ITSP Incoming Call ITSP sends INVITE to 6135554455@IP_Ingate Ingate sends INVITE to 6135554455@IP_IP-PBX IP-PBX sends INVITE to ExtNumber@IP_Phone Combine the From Header, Request-URI and Forward To tables in the Dial Plan table. Select if the request should be denied or forwarded, and if authentication should be performed. With the Advanced SIP Routing module, you can also perform ENUM lookups for requests. You can also add a prefix to the username before sending the request on.

Programming: SIP Traffic Dial Plan “Method in the Dial Plan” Select which methods should be processed by the Dial Plan. Select which methods should be processed by the Dial Plan. REGISTER requests can be processed here.

Programming: SIP Traffic Routing “DNS Override for SIP Requests” Enter SIP domains to which traffic should be sent, but which for some reason cannot be looked up using DNS. In the DNS Override For SIP Requests table you can enter SIP domains to which traffic should be sent, but which for some reason cannot be looked up using DNS. This can be useful when the SIP server is behind the firewall, which means that DNS lookups must point to the firewall itself.

Programming: SIP Traffic Routing “Class 3XX Processing & SIP Routing Order” Class 3xx Messages Processing concerns how to process redirect requests SIP Routing Order priorities which function to process first The Class 3xx Messages Processing concerns how to process redirect requests. Forward all: Forward all class 3 messages to the client for further processing. Follow redirects: A SIP request resulting in a 3xx reply will cause sipfw to send a new request to the redirected address. This is useful for clients which do not support redirecting.

Programming: SIP Traffic Routing “User Routing” Forward the SIP Accounts to another destination. Can use sip:$(to.user)@domain.com for To Header based routing In the Static Registrations table, you can enter registrations for devices which cannot register themselves. Register hasse@ingate.com statically and forward the requests to 0733583107@ingate.com. You can also make registrations for virtual addresses. Register support@company.com and forward the requests to all members of the company support team. Requests to one address can concurrently be forwarded to multiple addresses.

Programming: SIP Traffic Routing “Local REFER Handling” SIP Trunking Service Providers can not handle a REFER Method. Many IP-PBX require to send REFERs for Transferring calls. This ensure the Ingate handles the REFER locally.

Programming: SIP Traffic SIP Status Shows current SIP activity On the SIP Status page, you find information about the current sipfw status. Current registered users. Current calls. Monitored SIP servers.

Demonstration #2 Dial Plan

Demonstration #3 SIP Security – Lock to Source IP

Troubleshooting

Troubleshooting SIP Events will ensure SIP calls are logged. Logging Configuration SIP Events will ensure SIP calls are logged.

Troubleshooting Display # Rows/Page Show Newest on Top Logging & Tools Display # Rows/Page Show Newest on Top Select SIP Log Attributes Select “Show internal SIP Signaling”

Troubleshooting Creates a Wireshark PCAP network trace. Packet Capture Creates a Wireshark PCAP network trace. Network Interface Selection – All Interfaces Start – Stop - Download

Demonstration #4 Packet Capture

Toll Fraud Prevention

Toll Fraud What is Toll Fraud? A Third Party attempting to defraud either the Enterprise or the Carrier Penetrate to the PBX and hairpin calls out to the Carrier Direct defraud to Carrier, mimicking Enterprise credentials

Toll Fraud Layered Security General Prevention to Toll Fraud Layered Security Adding security control at different protocol layers and at different points along the SIP call flow For Example: Don’t put your IP-PBX directly on the Internet (or untrusted) network (i.e. Don’t put all your eggs in one basket) Define the Trust Relationships No Internet (or untrusted network) IP Address is safe Define a list of trusted Source IP Addresses (i.e. the carrier) Apply specific SIP Call Flow Policies and Routing IP-PBX must not allow Hairpin of calls

Toll Fraud Prevention Ingate Configuration

Toll Fraud IP Filter Rules Toll Fraud Prevention – Access Control Lists IP Filter Rules Start with Rejecting All incoming SIP Traffic Define only the Trusted Source IP Address(es), Hostnames, and Domains i.e. - the SIP Trunking Service Provider This provides TCP/IP Layer Control

Toll Fraud Matching From Define From Header SIP URI Toll Fraud Prevention – Source Based SIP Routing Policy Matching From Define From Header SIP URI Source Call ID and Domain Define a specific Transport Define only the Trusted Source IP Address(es), Hostnames, and Domains i.e. the SIP Trunking Service Provider domain

Toll Fraud Matching Request-URI Define the Request URI Toll Fraud Prevention – Limit the Incoming Dialed Numbers Matching Request-URI Define the Request URI Define only the DID’s used for Incoming calls. Prevents other undefined number being dialed

Toll Fraud Forward To Define the IP-PBX Toll Fraud Prevention – Define a Specific Destination Forward To Define the IP-PBX This ensure a direct path

Toll Fraud Toll Fraud Prevention – Create an Unambiguous Routing Dial Plan Putting the Policies together to define a traffic flow Define the Source Based Policy with the Matching From Header Define the DID’s that are allowed with the Matching Request URI Define the destination with the Forward To Be sure to have a “catch all” that rejects everything else

Toll Fraud Toll Fraud Prevention – Create an Unambiguous Routing Dial Plan

Toll Fraud Define Answer Points Toll Fraud Prevention – IP-PBX Answer Points and Hairpin Define Answer Points Every incoming DID must have a valid answer point Leave no ambiguity for IP-PBX call routing Automated Applications Prevent Auto-Attendants, IVRs, Voicemails, ACD and other automated applications from allowing an incoming trunk call to make an outgoing trunk call No Trunk to Trunk connections Follow IP-PBX recommendations for Toll Fraud prevention

Denial of Service Prevention

Denial of Service What is Denial of Service? A Third Party attack to make a communications resource unavailable to its intended users Generally consists of the concerted efforts to prevent SIP communications service from functioning efficiently or at all, temporarily or indefinitely One common method of attack involves saturating the target (victim) IP-PBX with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable

Denial of Service Layered Security General Prevention to Toll Fraud Layered Security Adding security control at different protocol layers and at different points along the SIP call flow For Example: Don’t put your IP-PBX directly on the Internet (or untrusted network) (i.e. Don’t put all your eggs in one basket) How to Recognize a DoS Attack Define the SIP Rate Limits and Blacklisting Policies No Internet (or untrusted network) IP Address is safe Define a SIP Method/Request URI/Response Code Pattern Set a Predetermined Rate Limit and Blacklisting Threshold

Denial of Service Prevention Ingate Configuration

Denial of Service IDS/IPS DoS Prevention – IDS/IPS IDS/IPS Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) specific for SIP Protocol Define the Untrusted Networks. Define the SIP Request URI pattern (ex. DID@domain) Define the SIP Method to apply the matching to Define the Rate Limit # Packets per # Seconds (Optional) If this Rate is exceeded, define the Blacklist Period

Denial of Service DoS Prevention – IDS/IPS IDS/IPS

Denial of Service IDS/IPS - Rule Packs DoS Prevention – IDS/IPS – Rule Packs IDS/IPS - Rule Packs Predefined Rule Packs for filtering known industry Vulnerabilities

Denial of Service SIP Method Filtering DoS Prevention – SIP Method Filtering SIP Method Filtering Denying unused SIP Methods further reduces the overall exposure of variety of SIP Methods that could be sent to through the Ingate to the IP-PBX or Carrier

Denial of Service Content Type Filter Rules DoS Prevention – MIME Content Control Content Type Filter Rules SIP can be used for more than just voice and video. Deny the other uses of the SIP Protocol and whatever content it may be carrying.

Denial of Service Layered Security DoS Prevention – IP-PBX or SIP Server Layered Security An IP-PBX or SIP Server is a “Mission Critical” application, it has direct ties to corporate revenue. Recommend not to subject the “Mission Critical” application to DoS handling Ensure DoS Security is handled separately on a the network edge device, the Ingate SIParator/Firewall.

THE END