Veraz Networks Proprietary and Confidential

Slides:



Advertisements
Similar presentations
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID The spoken words remain IP and Video Telephony Recording from TC & C Anthony.
Advertisements

Computer Networks TCP/IP Protocol Suite.
Chapter 1 The Study of Body Function Image PowerPoint
IMS and Security Sri Ramachandran NexTone. 2 CONFIDENTIAL © 2006, NexTone Communications. All rights Traditional approaches to Security - The CIA principle.
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Encrypting Wireless Data with VPN Techniques
International Telecommunication Union Plenary Session on ITU-T Standards 15th Biennial TDI International Conference – Las Vegas, Nevada, USA Total Conversation.
Thema: Menü Ansicht, Master, Folien-Master 1 ITU - IP Telephony Workshop June Standards for IP-telephony P.A.Probst, External Relations Swisscom.
Pune, India, 13 – 15 December 2010 ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services Ivan Gaboli, Virgilio Puglia.
Communicating over the Network
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Network Security.
1 IP Telephony (VoIP) CSI4118 Fall Introduction (1) A recent application of Internet technology – Voice over IP (VoIP): Transmission of voice.
Figure 7-1 Softswitch Components Signaling Gateway Feature Server Softswitch Universal Media Gateway SGCP SIP MGCP MGCP (Media Gateway Control Protocol)
SIP Trunking A VASP Perspective Thomas Roel Convergence Sales Engineer
Chapter 1: Introduction to Scaling Networks
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
Application Server Based on SoftSwitch
Johan Garcia Karlstads Universitet Datavetenskap 1 Datakommunikation II Signaling/Voice over IP / SIP Based on material from Henning Schulzrinne, Columbia.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
Aeonix & Ingate Role in Enterprise
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
CANTO – 2006 Information Security and Voice over IP (VoIP) Robert Potvin, CISSP VP - Strategic Consulting June 21st, 2006.
Building Applications Using SIP Scott Hoffpauir Vice President, Engineering Fall 1999 VON, Atlanta.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
IP Communications Services Redefining Communications Teresa Hastings Director WorldCom SIP Services Conference – April 18-20, 2001.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
IS Network and Telecommunications Risks
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Building Applications Using SIP Scott Hoffpauir Vice President, Engineering Fall 1999 VON, Atlanta.
Voice over Internet Protocol (VoIP) Training and Development.
Chapter 20: Network Security Business Data Communications, 4e.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
The Voice Security Company Kirk Vaughan Product Director –VoIP SIP Application Security.
1 Leveraging SS7 to Deliver IP Services Carl Bergstrom Director – IN & IP Services VeriSign Telecommunication Services Internet Telephony Conference, February.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder,
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
VoIP Technology Briefing
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Softswitch SIP Proxy Server Call Manager IP Telephony Router Tablet PC IP PBX Class 5 Switch Class 4 Switch PBX Access Gateway Broadband Router Voice Gateway.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security fundamentals Topic 10 Securing the network perimeter.
Voice Over IP (VoIP): Internet Telephony Dr. Najla Al-nabhan 1.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Understand Internet Security LESSON Security Fundamentals.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
Security fundamentals
Lecture 5: Voice Over IP (VoIP): Internet Telephony
VoIP—Voice over Internet Protocol
Ingate & Dialogic Technical Presentation
Presentation transcript:

Veraz Networks Proprietary and Confidential * Veraz proprietary information notice: This document and the contents therein are the property of Veraz Networks Inc. Any duplication, reproduction, or transmission to unauthorized parties without prior written permission of Veraz Networks Inc. is prohibited. The recipient of this document, by its retention and use, agrees to protect the information contained herein from loss, theft, or transfer to third parties. Veraz Networks Proprietary and Confidential

Security - The Big Challenge of IP Telephony Yaron Oppenheim Director – Product Marketing February 2003

Agenda The Problem Why is it critical ? It should be protected & it can be protected Vulnerability points Security strategy and measures MG Control Switch Control protocol - MGCP Inter Control Switch communication The voice itself Management activity Veraz Networks Proprietary and Confidential

Veraz – An introduction Veraz is a privately held company formed by the merger of ECI-NGTS and Nexverse Networks Global provider of end-to-end, carrier-grade Packet Telephony solutions Best-in-Class Integrated Solution Open, Best-of-Breed Softswitch & Media Gateway platforms Driving some of the largest softswitch-based VoIP deployments in the market Market leader for carrier-class Digital Compression Multiplexing Equipment (DCME) Over $2B installed base Over 700 carrier customers in 140 countries Current & on-going revenue stream Global Presence and Track Record 20 years of experience in delivering solutions to carriers worldwide 100% ownership of advanced DSP technology Global sales & support infrastructure Veraz Networks Proprietary and Confidential

The Problem Attacks on the Internet Fraud on the Internet 38% of the organization’s Web sites suffered unauthorized access or misuse within the last 12 months Government Web site – thousands of attacks per day Fraud on the Internet The main obstacle to e-commerce Money that is lost Money that is invested in securing IT installations Growing segment in a recessionary period Is IP Telephony much different ? Veraz Networks Proprietary and Confidential

ANSI/ETSI/ITU/UK/Japan SS7 ISUP/TCAP IP Telephony network Feature Server Feature Server SIP/H.323/ XML/JCC SIP/H.323/ XML/JCC ControlSwitch SS7/ SCP/STP/ HLR SS7 ISUP/TCAP ANSI/ETSI/ITU/UK/Japan SS7 ISUP/TCAP SS7/ SCP/STP IS-41 I-Gate 4000 MGCP MGCP I-Gate 4000 MGCP MGCP SIP SIP Wireless PSTN (MSCs) SIP H.323 PSTN IP/ATM Network Enterprise PBX IAD H.323 Gateway Gatekeeper Broadband Local services enable providers to offer existing Class 5 voice services in addition to the new, integrated communications services we can only imagine today. A simple graphical user interface delivers the customized management and control of existing and new services that today's digitally empowered users demand. These Broadband Local services will be delivered to users that are always connected. 3G Mobile PDA IAD SIP SIP Proxy/ Feature Server SIP Devices Enterprise Residence/ Branch/SMB Veraz Networks Proprietary and Confidential

Potential Threats to Network Security Intranet and Internet Most of the intruders – from within the organization Internal threats Disgruntled employees Social engineering Former employees External threats Hackers Hacking by mistake Veraz Networks Proprietary and Confidential

Typical Security Attacks Unauthorized access Denial of Service - DOS Eavesdropping Masquerade Modification of information Content modification Sending the information at another time Information theft Veraz Networks Proprietary and Confidential

Why is it critical ? Because : A lot of money can be lost The image of the company is a high priority Veraz Networks Proprietary and Confidential

It should be protected & it can be protected IP Telephony will not be widely deployed without a reasonable security solution ! Veraz Networks Proprietary and Confidential

Security – you have to protect 360o The hacker needs only one vulnerability point. Feature Server Feature Server SIP/H.323/ XML/JCC SIP/H.323/ XML/JCC ControlSwitch SS7/ SCP/STP/ HLR SS7 ISUP/TCAP ANSI/ETSI/ITU/UK/Japan SS7 ISUP/TCAP SS7/ SCP/STP IS-41 I-Gate 4000 MGCP MGCP I-Gate 4000 MGCP MGCP SIP SIP Wireless PSTN (MSCs) SIP H.323 PSTN IP/ATM Network Enterprise PBX IAD H.323 Gateway Gatekeeper 3G Mobile PDA IAD SIP SIP Proxy/ Feature Server SIP Devices Enterprise Residence/ Branch/SMB Veraz Networks Proprietary and Confidential

Vulnerability points HTTP SNMP CMI CMI IP Network MGCP RTP VerazView Internet/ Internet/ Intranet Intranet CDR HTTP SNMP CMI EC CMI RE CCP/SG IP Network MGCP I-Gate 4000 Pro RTP I-Gate 4000 I-Gate 4000 Veraz Networks Proprietary and Confidential

You have to protect them all Call Control Element (CCE) Signaling Gateway (SG) Routing engine (RE) Event Collector (EC) CDR Manager Management Media Gateway (I-Gare 4000/PRO) Management System (VerazView) Links between elements Veraz Networks Proprietary and Confidential

Defense strategy Access to the IP Telephony Network Element is allowed by using the MANAGEMENT SYSTEM only The Management System should be highly secured ALL the information traveling from NE to NE (and from the MS to NE) should be encrypted and authenticated. Veraz Networks Proprietary and Confidential

MG security The only way to access the Media Gateway is by using the management system. Blocking unnecessary protocols HTTP, Telnet, etc… Protecting the MG from unauthorized access Firewall functionality Predefined list of IP's Predefined protocols Application (MGCP) aware Location of the Firewall IP Network I-Gate 4000 Pro I-Gate 4000 Veraz Networks Proprietary and Confidential

Control Switch elements Unix-based elements RE EC CDR CCP SG EMS Access to the IP Telephony Network Element is allowed by using the MANAGEMENT SYSTEM only Block unnecessary protocols Access control Firewall Veraz Networks Proprietary and Confidential

MG – Call Control Platform channel MGCP, H.248 IPSEC – the de facto standard – Provides protection (encryption & authentication) to each IP packet Authentication, Integrity, Confidentiality IPSEC – Authentication Header (AH) IPSEC – Encapsulation Security Payload (ESP) IKE – Internet Key Exchange (RFC 2409) Session Key Long-term key VerazView Internet/ Internet/ Intranet Intranet CDR EC CCP /SG IP Network RE I-Gate 4000 MGCP I-Gate 4000 Pro I-Gate 4000 Veraz Networks Proprietary and Confidential

IPsec implementation External Boxes Embedded Implementation Check Point Symantec Cisco Embedded Implementation Pros & cons Vulnerability Cost Management Veraz Networks Proprietary and Confidential

Control Switch elements comm. IPsec CMI communication CCP - EC CCP - SG CCP - RE EC - CDR manager EMS Internet/ Internet/ Intranet Intranet CDR EC CCP /SG RE IP Network I-Gate 4000 Pro I-Gate 4000 Veraz Networks Proprietary and Confidential

Voice - RTP SRTP IPsec IP Network Veraz Networks Proprietary and Confidential

Management System Security The Management System is the gate to the system… Veraz Networks Proprietary and Confidential

MS Architecture Management System Server WBM Client Management server Database server Hi-Availability WBM Client Operating System independent Web browser Graphical User Interface Does not require installation PC with Web Browser (Client) PC with Web Browser (Client) PC with Web Browser (Client) WAN VerazView Server I-Gate 4000 I-Gate 4000 Control Switch elements Veraz Networks Proprietary and Confidential

Vulnerability Points Management System – Network Elements channel Eavesdropping Information Theft MS Server Intrusion D.O.S. Masquerade Modification of Information MS WBM client and connection Internet/ Intranet SG IP Network I-Gate 4000 Control SW Mgmt. System Server - VerazView WBM client - - - Vulnerability at one of the VoIP elements can harm the entire IP Telephony network Veraz Networks Proprietary and Confidential

Access Control Prevent repetitive intrusion attempts User ID and Password – much more than that ! Validity of user IDs Password generation Password validity rules Length Structure Time to Live Password History Forced password change Prevent repetitive intrusion attempts Inform the user of the previous login time User’s access levels Etc. etc… Veraz Networks Proprietary and Confidential

Security Administrator Who are the active users ? Force Logout Suspend What are the users doing ? Veraz Networks Proprietary and Confidential

Web-Based Management All you need is a Web browser Low bandwidth OS independent HW independent Can be shared with other applications Low bandwidth WBM – Openness and Vulnerability Mgmt. System WBM client SG SG Internet/ Internet/ Intranet Intranet IP Network IP Network Control SW Mgmt. System Server - VerazView I-Gate 4000 Veraz Networks Proprietary and Confidential - - -

WBM Encryption SSL – Secured Socket Layer Provides encryption, authentication & integrity of data stream. Encryption of the Management Information SSL is the most popular method to secure Internet transport Used by Web browsers and servers The protocol that incorporates SSL and HTTP is HTTPS Powerful encryption method Internet/ Internet/ Intranet Intranet IP Telephony Internet/ network Intranet SSL Veraz Networks Proprietary and Confidential

Separating Internet Server from MS To secure the IP Network from hackers: Internet Server separated from the MS Server MS Internet Server located in demilitarized zone (DMZ) MG WBM Mgmt Server Internet IP NETWORK Secured Protocol The Media Gateway Protection from hackers: Secured Protocol Firewall Control SW Control SW Veraz Networks Proprietary and Confidential

Disaster Recovery MS Servers at two remote locations RAID Array Disk Web Client MS Servers at two remote locations RAID Array Disk No single point of failure Main Location Alternate Location Main Location Veraz Networks Proprietary and Confidential

Questions?

Yaron Oppenheim – Director Yaron.oppenheim@veraznetworks.com Veraz Networks Proprietary and Confidential