VoIP – Security Considerations An Examination Ricardo Estevez CS 522 / Computer Communication Fall 2003.

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

Enabling Secure Internet Access with ISA Server
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—1 Implementing Cisco Unified Communications IP Telephony Part 1.
A Presentation on H.323 Deepak Bote. , IM, blog…
VoIP – Gateway/Gatekeeper Design Requirements An Examination Ricardo Estevez CS 522 / Computer Communication Fall 2003.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
VoIP - Implementing Trunk for PSTN Switch and VoIP Gateway An Examination Ricardo Estevez CS 522 / Computer Communication Fall 2003.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
802.1x Port Authentication via RADIUS By Oswaldo Perdomo cs580 Network Security.
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
1 CCM Deployment Models Wael K. Valencia Community College.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Course 201 – Administration, Content Inspection and SSL VPN
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Cisco Networking Academy Prepared by: Ismael Al-Shiab.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
Intranet, Extranet, Firewall. Intranet and Extranet.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005.
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 3 PPP.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Defense Techniques Sepehr Sadra Tehran Co. Ltd. Ali Shayan November 2008.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Part V: Monitoring Campus Networks.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Call signaling/Media control
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY VOICE OVER INTERNET PROTOCOL SHREETAM MOHANTY [1] VOICE OVER INTERNET PROTOCOL SHREETAM MOHANTY ROLL # EC
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Firewall Configurations Responses from the ETF (the names have been changed to protect the innocent..)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Assumptions of Secure Operation University of Sunderland CIT304 Harry R. Erwin, PhD.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 3 PPP.
Network Access Control
Assumptions of Secure Operation University of Sunderland CSEM02 Harry R. Erwin, PhD.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Port Based Network Access Control
Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Working at a Small-to-Medium Business or ISP – Chapter 8
Computer Data Security & Privacy
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Message Digest Cryptographic checksum One-way function Relevance
Presentation transcript:

VoIP – Security Considerations An Examination Ricardo Estevez CS 522 / Computer Communication Fall 2003

Security Considerations Prevent outside (inside) attackers 3 security measures that MUST be implemented H.323 Registration, Admission, Status (RAS) Authentication Network Access Security Device Security Other measures include physical site security, security management, audit trails, logs

H.323 Registration, Admission, Status (RAS) Authentication H.235 Security defines the protocol of exchanging digital certificates between gateway and gatekeeper Cisco uses Challenge Handshake Authentication Protocol (CHAP)-like security procedure

H.323 Registration, Admission, Status (RAS) Authentication

Network Access Security Protect VoIP network from malicious IP or PSTN interfaces Some security mechanisms Virtual local-area networks (VLANs) can separate voice traffic, voice signaling, and data traffic RADIUS Server grants authentication to trusted devices

Device Security Protect the physical devices from improper configurations Use passwords Set permissions

References Durkin, James F. Voice-Enabling the Data Network. Cisco Press: Indianapolis, IN, 2003 ISBN: