Www.vocalcom.com Version 1.0 by Simon HarrisonJune 14th 2013 VIRTUAL CONTACT CENTER in the Cloud Vocalcom High Availability Voice Mediant 4000 SBC Configuration.

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
SIP and IMS Enabled Residential Gateway Sergio Romero Telefónica I+D Jan Önnegren Ericsson AB Alex De Smedt Thomson Telecom.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Voice over IP and IP telephony Network convergence – Telephone and IT – PoE (Power over Ethernet) Mobility and Roaming Telco – Switched -> Packet (IP)
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CounterPath Corporation William Khris Kendrick: – Director of Business Development and Channel Marketing – –
Securing Unified Communications Mor Hezi VP Unified Communications AudioCodes.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
September 19, 2006speermint interim1 VoIP Threats and Attacks Alan Johnston.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 20 Fourth Edition by William Stallings.
Data Security in Local Networks using Distributed Firewalls
Vocalcom Cloud Contact Center
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Common Misconceptions Alan D. Percy Director of Market Development The Truth of Enterprise SIP Security.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
OSI Model Routing Connection-oriented/Connectionless Network Services.
SIP Explained Gary Audin Delphi, Inc. Sponsored by
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Version 1.0June 11th 2013 VIRTUAL CONTACT CENTER in the Cloud Cloud Contact Center Global Infrastructure for Aditya Birla Minacs.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
SIP Trunking As a Managed Service Why an E-SBC Matters By: Alon Cohen, CTO Phone.com.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
MWIF Confidential MWIF-Arch Security Task Force Task 5: Security for Signaling July 11, 2001 Baba, Shinichi Ready for MWIF Kansas.
Security fundamentals Topic 10 Securing the network perimeter.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
To Rent or Buy the IP PBX? Maybe it’s Both…. Building a VoIP Solution That Enables Both.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
Analysis of SIP security Ashwini Sanap ( ) Deepti Agashe ( )
K. Salah1 Security Protocols in the Internet IPSec.
© 2011 AudioCodes Ltd. All rights reserved. AudioCodes Confidential Proprietary Avaya DevConnect Certified Enterprise Session Border Controllers April.
Cryptography and Network Security
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Security fundamentals
Chapter 18 IP Security  IP Security (IPSec)
Implementing Network Access Protection
Chapter 11: It’s a Network
* Essential Network Security Book Slides.
Security Protocols in the Internet
Introduction to Network Security
Ingate & Dialogic Technical Presentation
Presentation transcript:

Version 1.0 by Simon HarrisonJune 14th 2013 VIRTUAL CONTACT CENTER in the Cloud Vocalcom High Availability Voice Mediant 4000 SBC Configuration

Audiocodes HA Mechanisms Audiocodes SBC High Availability provide :  A 1+1 redundancy scheme  A keep-alive mechanism to automatically switchover SBC in case of failure  A call context synchronization in order to preserve active calls during a switchover  A method to upgrade SBC firmware without disturbing current calls (Hitless Software Upgrade)  A single configuration and auxiliary files repository for the M4K cluster

Vocalcom Deployment

Version 1.0 by Simon HarrisonJune 14th 2013 CONTACT CENTER in the Salesforce CloudVIRTUAL CONTACT CENTER Mediant 4000 HA

Mediant 4000 HA – Mode 1 – Local Deployment

Mediant 4000 HA – Mode 2 – Geographical Redundancy

Mediant 4000 HA – Firewalls Config  The following table provide rules to setup SBC firewall in case of security activation or, in case of geographical HA, for filtering nodes on the SBC’s MAINTENANCE vlan Source Host Dest Host Dest PortProtocolComment M4K-1M4K-2669UDPKeep-Alive packets M4K-2M4K-1669UDPKeep-Alive packets M4K-1M4K-22442TCPHA Control and Data packets M4K-2M4K-12442TCPHA Control and Data packets M4K-1M4K-280TCPFile Transfert M4K-2M4K-180TCPFile Transfert

Mediant 4000 HA: Pre Requisites  High Availability Feature key (licensing)  Two Mediant 4000 SBC  Two Gigabit Ethernet ports per switch  Power Consumption M4K HA : 230VAC, 75W

Version 1.0 by Simon HarrisonJune 14th 2013 CONTACT CENTER in the Salesforce CloudVIRTUAL CONTACT CENTER SBC Security

SecurityConnectivityQoE AudioCodes Session Border Controller AudioCodes Session Border Controller Main Tasks

Perimeter Defense Firewall and Access Control Encryption Topology Hiding Denial of Service protection Call Theft and Fraud protection Interoperability SIP Normalization DTMF Conversion Fax Conversion Protocol/Coder Policing Voice Transcoding NAT Traversal SLA and QoS Assurance Call Admission Control QoS Monitoring and Troubleshooting Voice Service Assurance Survivability AudioCodes Session Border Controller (SBC) - Key Roles

Accept messages based on SIP header properties. For exp, request URI etc SIP Digest Authentication SIP Access List & Classification Brute force DoS Protocol Vulnerabilities SIP dialog Attacks UnClassified SIP Traffic TCP attacks, Identity Spoofing Context Identification SIP Message Policy TCP/TLS Integrity and Authentication Layer 3-4 Firewall and Rate Limiting Legitimate Traffic Filter oversized SIP messages, unwanted SIP bodies, SIP syntax policing Filter out SIP messages which do not belong to an open dialog Call Admission Control Overcome TCP vulnerabilities, perform TLS authentication Look at the IP addresses and ports to filter unwanted packets and throttles the incoming packet rate Unauthorized Access Calls over Limit How Does AudioCodes SBC Secure SIP Traffic 12

Security : Topology Hiding  Topology hiding is important for hiding network internals and for privacy  Achieved through use of SIP B2BUA: –VIA stripping – each B2BUA leg will have its own VIA rules independent of the other leg –Independent Route/Record Route in each leg –Host name modification (e.g. To/From) –Inserting the SBC Contact in each leg –Different Call ID for each leg –NAT/Layer 3 Topology Hiding – modification of Src. IP address in IP Header –Restrict caller ID for un trusted legs AudioCodes Proprietary and Confidential Information

Security : DoS/DDoS  Protection against DOS/SIP attacks –Access list within layer 3 and layer 5 –Layer 3 Rate limiting according to local and remote IP port and transport type –SIP Dialog rate and concurrent calls limiting –Rich message filtering rules: message size, number of headers, message body types, request type and more  Protection against SIP vulnerabilities  OS/IP stack vulnerabilities handling  Passed DoD tests and got FIPS140 certificate

Security : Call Admission Control  Limit number of concurrent calls per Subnet/SIP trunk  Limit number of registered users per subnet  Limit call setup rate per Subnet/SIP trunk/user (average and burst)  VoIP codec policing and prioritizing  Self overload protection  Registration flood protection and throttling  Protocol Validation

Security : Encryption  TLS –SSL 2.0, SSL 3.0, TLS 1.0 –Re handshake –Mutual authentication –Certificate Revocation Checking –Verify Subject Alt Name against the provisioned proxy name  SRTP-RFC 4568 sdes (voice, video) –SRTP enforcement –Best effort SRTP using two media lines  IPSEC – Control & management only  VPN (MSBG)

Mediant 4000 SBC Highlights  Med to high-density SBC platform –250 to 4000 SBC sessions and more…  Based on field proven AudioCodes SBC family  High availability with 2-box redundancy  State-of-the art AMC (MicroTCA) based platform  Cost effective compact footprint (1U)

Mediant 4000 SBC Highlights  Strong DOS/DDOS and VoIP firewall protection  Easy SBC session capacity upgrades via software key  SIP TLS security and Media Encryption  Media handling including transcoding capabilities –Wide range of vocoders including Low Bit Rate (LBR), wireline, cellular and wideband vocoders –Decoupling of DSPs (Transcoding) from CPU (SBC sessions)

Version 1.0 by Simon HarrisonJune 14th 2013 CONTACT CENTER in the Salesforce CloudVIRTUAL CONTACT CENTER TeleHouse 2 Deployment of first SBC in production

TeleHouse 2 Deployment : Rack Utilization & Power Consumption 6U used in cabinet Total power consumption : 8 power connectors are needed to plug each power supply HardwareUsed Power QtyTotal Mediant W6450 W Total450 W

TeleHouse 2 Deployment : Network Connections  Mediant 4000’s Red Ethernet connection carries SIP signaling and media using a single IP address Orange Ethernet connection is used for OAMP purpose (remote access, supervision…) 2 ports per switch and per Mediant 4000 are needed