Slides:



Advertisements
Similar presentations
SIP, Presence and Instant Messaging
Advertisements

SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Fall IM 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Session Initiation Protocol (SIP) Panel Larry Amiot (Northwestern University), Chair Ben Teitelbaum (Internet2) Todd Needham (Microsoft) Orit Levin (Radvision)
Hypertext Transfer PROTOCOL ----HTTP Sen Wang CSE5232 Network Programming.
Unified communications platform Enterprise-ready.
Unified. Simplified. Unified Communications Launch 2007.
1 What’s Next For SIP Trunking? Carriers Enabling and Bringing WebRTC Features With Their Trunks © 2015 Ingate Systems AB Prepared for:Ingate SIP Trunking,
Lync /11/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
SECURE SITES. A SECURE CONNECTION TERMS Secure Sockets Layer (SSL) An older Internet protocol that allows for data transmission between server and client.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
externalinternal SIP Proxy a w.
Enabling SIP to the Enterprise Steve Johnson, Ingate Systems Security: How SIP Improves Telephony.
Voice over IP and IP telephony Network convergence – Telephone and IT – PoE (Power over Ethernet) Mobility and Roaming Telco – Switched -> Packet (IP)
Waterfall Traditional method Allows for large projects Extended timelines Multiyear solutions Continuous work force Incremental project flow Scrum Breaks.
High Availability and Web Publishing for UC Deployments Load Balancing & Reverse Proxy October 24, 2013 Bhargav Shukla Director – Product Research and.
Microsoft Lync 2010: Planning for Conferencing Deployments Paul Brombley Senior Consultant Microsoft Corporation EXL315.
OFC217. Browser Tablet Smartphone Mac PC 5.1 (July 2013) 5.2 (Sept 2013) 5.3 (Jan 2014) 5.4 (April 2014) Ad-hoc conferences Rejoin and continued.
© 2006 Solegy LLC Internal Use Only Getting Connected with SIP Encryption _______________________________ By Eric Hernaez Solegy LLC May 16, 2007.
Sessions about to start – Get your rig on!. Addressing Lync 2013 Security aspects Vakhtang Assatrian Asia Time Zone Communications TSP Lead Microsoft.
LYNC SERVER 2013 Lync Online and Office365 Omar Kudović ProCredit Bank d.d. Sarajevo BLOG: MAIL:
IETF Session Initiation Protocol Henning Schulzrinne Columbia University New York, NY.
Video gallery HD video or high resolution photos of attendees H.264 SVC support Personalized collaboration experiences Intuitive controls Consistent.
DNS SRVLYNCDISCOVER Multiple SRV Records Possible – varying costs One A Record for inside and outside Results return a Pool Name & PortResults return.
Secure Remote Access & Lync Ilse Van Criekinge
1 Enabling Secure Internet Access with ISA Server.
Microsoft ® Lync Ignite Microsoft Lync 2013.
What features are required? FeatureLync ServerLync Online Rich presence Peer-to-Peer Audio/Video Calling Click to Communicate—Office integration.
Johan Delimon MCM Lync Server / MVP Lync Server Ordina Belgium Tommy Clarke MCSM Lync Server / MVP Lync Server.
Microsoft ® Lync™ Server 2010 Edge Server/Remote Access Module 16 Microsoft Corporation.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Karl Stahl CEO/CTO Ingate Systems Ingate’s SBCs do more than POTSoIP SIP. They were developed.
On-Premises Cloud On-PremisesHybridCloud.
SIP Explained Gary Audin Delphi, Inc. Sponsored by
Mobility And Anywhere Access Clancy Priest Technology Services Director City of Hayward.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Access Gateway Operation
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Skype P2P Kedar Kulkarni 04/02/09.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
EXL321. Lync 2010 Planning tool+ Planning guides+ * new in LS significant enhancements in LS 2010.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Lync Phase 3 April Background Lync Phase 1 – April 2014 – LCS replacement; presence, IM, P2P video Lync Phase 2 – July 2014 – Web conferencing –
H.323 An International Telecommunications Union (ITU) standard. Architecture consisting of several protocols oG.711: Encoding and decoding of speech (other.
Presented By Team Netgeeks SIP Session Initiation Protocol.
Simon Millard Professional Services Manager Aculab – booth 402 The State of SIP.
Johann Kruse National Technology Specialist Microsoft Australia UNC310.
Unified communications platform Enterprise-ready.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
DNS SRVLYNCDISCOVER Multiple SRV Records Possible – varying costs One A Record for inside and outside Results return a Pool Name & PortResults return.
Call Leg Session Success Rate P2P SessionNumber of SessionsCurrent WeekPrevious WeekWeekly Change Application Sharing214.
Session Recording (SIPREC) Protocol (draft-ietf-siprec-protocol-09) Leon Portman Henry Lum
Integrated System Registration, presence (SIP) persistent chat (XCCOS) Registration, presence (SIP) persistent chat (XCCOS) Lync persistent chat pool.
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
SHAREPOINTEXCHANGELYNCOFFICE WEB APPS Server to Server Authentication Site Mailboxes High Resolution Photos Task Synchronization Unified Contact.
Agenda Pattern Authenticate a user against UCWA Operations happen using the user’s identity Interact with the UCWA service endpoint Make HTTP requests.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
The Session Initiation Protocol - SIP
Add Global Connectivity to your Live Communication Server Ingate Systems
Analysis of SIP security Ashwini Sanap ( ) Deepti Agashe ( )
LO2 Understand the key components used in networking.
Integrated System Enterprise voice Audio, video & web conferencing Mobile Persistent chat Reduced maintenance Single system Scalable Flexible Small.
INTRODUCING SKYPE FOR BUSINESS Omar Kudović Senior Unified Communications Specialist Quipu GmbH, Frankfurt, Germany.
UCM305 Embedding Communications with UCMA SDK 1.0 Chris D. Mayo Technical Evangelist
Johan Delimon 26/04/2016 BE-COM E-COMMUNICATIONS EVENT THE INNER WORKINGS OF SKYPE FOR BUSINESS: NETWORKING.
Presentation transcript:

1. After DNS resolution, client contacts the Lync Edge Access Server. 5. Client authenticates 4. Edge presents certificate to Client 2. Edge Access Server connects to Director Server (Next Hop) 3. Server presents the certificate to Edge Server 7. Trusted and encrypted connection is established 6. Authentication is processed

1. IM sent in SIP connection secured with TLS 4. IM is send to client (SIP/ TLS) 5. IM replies in the opposite direction 2. Edge forwards IM to Director Pool Server (SIP/MTLS) 3. Director Pool forwards IM to Frontend Pool (SIP/MTLS)

1. Initiate IM Session via Home Pool (SIP/ TLS) 2.IM Session is forward to second Pool (SIP/MTLS) 3. IM Session is send to Client (SIP/ TLS) Bidirectional Channel 4. Client add A/V to the IM Session (Signaling) via SIP/TLS/MTLS) 5. Signaling is forwarded to second Pool (SIP/ MTLS) 6. Signaling is send to Client (SIP/ TLS) 7. A/V session is established via P2P connection, secured with SRTP protocol Other P2P connections are: Desktop Sharing and File Transfer, both secured with SRTP protocol

Meeting (establ.+ files), ABS, Mobility, Dial-In, to Reverse Proxy HTTPS (443) Meeting (establ.+ files), ABS, Mobility, Dial-In, to Reverse Proxy HTTPS (4443) ext WS Sign-In, contacts, presence, IM Session Setup, … to Edge Server SIP/ TLS Sign-In, contacts, presence, IM Session Setup, … to Edge Server SIP/ MTLS Media (audio, video, appsharing, file transfer) to Edge Server SRTP Media (audio, video, appsharing, file transfer) to Edge Server SRTP

web traffic (TCP 443) Incoming web traffic redirect (TCP 4443)

Meeting (establ.+ files), ABS, Mobility, Dial-In, to Reverse Proxy HTTPS (4443) ext WS Meeting (establ.+ files), ABS, Mobility, Dial-In, to Reverse Proxy HTTPS (443) ext WS Uni-directional Meeting (establ.+ files), ABS, Mobility, Dial-In, to Reverse Proxy HTTPS (4443) ext WS Sign-In, contacts, presence, IM Session Setup, Call Setup to Frontend Server SIP/ TLS Sign-In, contacts, presence, IM Session Setup, Call Setup to Edge Server SIP/ MTLS Sign-In, contacts, presence, IM Session Setup, Call Setup … Edge Edge in Federation SIP/ MTLS Sign-In, contacts, presence, IM Session Setup, Call Setup … Edge Frontend Server SIP/ MTLS Sign-In, contacts, presence, IM Session Setup, Call Setup, … to Frontend Server SIP/ TLS Media (audio, video, appsharing, file transfer) all clients incl. Mobile Client Edge Server SRTP Media (audio, video, appsharing, file transfer) Edge Server Edge Server SRTP NO Client-to-Client communication Media (audio, video, appsharing, file transfer) all clients incl. Mobile Client Edge Server SRTP

Planning for security in Lync Server us/library/dn aspx TLS and MTLS for Lync Server us/library/dn aspx