Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ingate Firewall & SIParator Product Training

Similar presentations


Presentation on theme: "Ingate Firewall & SIParator Product Training"— Presentation transcript:

1 Ingate Firewall & SIParator Product Training
SIP Trunking Focused

2 Introduction & Today’s Agenda

3 Ingate Product Training Introductions
Scott Beer Director, Product Support Ingate Systems 15 Years in Voice Communications 10 Years in SIP Protocol Audience – Show of Hands  How many of you are familiar with the SIP Protocol? How many of you own an Ingate? Are you planning to buy an Ingate in the near future? Are you concerned about SIP Interop? Are you concerned about SIP Security? PLEASE FEEL FREE TO ASK QUESTIONS (I enjoy playing “Stump the Teacher”)

4 Ingate Product Training Agenda
Morning Session Common Applications of SIP (15 min) Common Deployment Issues (30 min) Deploying SIP Trunks -- Getting it Right the First Time (30 min) Special Guest – Graham Francis – The SIP School Introduction to Ingate Product (40 min) Ingate Startup Tool (40 min) Demonstration LUNCH BREAK (Lunch will be provided (2 doz)) Afternoon Session Web GUI Configuration (120 min) Demonstrations Troubleshooting (15 min) Security - Toll Fraud and DoS Prevention (30 min)

5 Common SIP Applications
SIP Trunking Remote Desktop

6 Ingate Product Training Common SIP Applications
SIP Trunking A SIP Trunk is a concurrent call that is routed over the IP backbone of a carrier (ITSP) using VoIP technology. SIP Trunks are used in conjunction with an IP-PBX and are thought of as replacements for traditional PRI or analog circuits. The popularity of SIP Trunks is due primarily to the cost savings; due to a true convergence of voice and data infrastructure, Increased ROI, the maximizing of bandwidth utilization, open source protocol standards, and more.

7 Ingate Product Training Common SIP Applications

8 Ingate Product Training Common SIP Applications
Remote Desktop Extending SIP communications to Remote & Home Offices. Extension of IP-PBX services using Open Source standardized Protocol Use of off-the-self SIP Phones and Soft SIP Clients.

9 Ingate Product Training Common SIP Applications

10 Common SIP Deployment Issues

11 Ingate Product Training Common Deployment Issues
Problem # “NAT BREAKS SIP” SIP Protocol is an Application Layer Protocol Network Address Translation (NAT) resides at the Transport Layer (TCP/IP) NAT will not change the SIP addressing within the TCP/UDP datagram Firewalls are a NATing device and BLOCK all Incoming SIP Traffic to the LAN Any NAT device, either Far End (remote) or Near End (on prem) can effect the call

12 Ingate Product Training Common Deployment Issues
Before NAT TCP/IP Header is Private Space SIP Headers are Private Space LAN IP Address and Port Information LAN IP Address LAN IP Address An INVITE usually contains the IP address and port to where the caller should direct its media stream. The IP address usually is the client’s own IP. If the client is located on a NAT:ed network, this means that the IP address in the INVITE isn’t reachable outside the NAT:ed network. As part of the SIP signaling, the client sends an IP address and a port number indicating to where the media stream should be sent. There are almost no restrictions to how this port number can be chosen. With both clients on the Internet, or both on a LAN, there is no problem, but if one of the clients is located behind a firewall, problems arise. Usually the ports used for media streams (high ports) are blocked for incoming traffic by the firewall. To open relevant ports statically in the firewall is not an option. The clients can select a port at random, which means that you would have to open every port in the firewall. This would make the firewall quite pointless, and you could just as well remove it. You don’t want to unnecessarily keep ports on the firewall open. When a call is disconnected, the best would be that the firewall immediately blocks the used port. LAN IP Address

13 Ingate Product Training Common Deployment Issues
After NAT TCP/IP Header is Public Space SIP Headers are Private Space WAN IP Address LAN IP Address LAN IP Address An INVITE usually contains the IP address and port to where the caller should direct its media stream. The IP address usually is the client’s own IP. If the client is located on a NAT:ed network, this means that the IP address in the INVITE isn’t reachable outside the NAT:ed network. As part of the SIP signaling, the client sends an IP address and a port number indicating to where the media stream should be sent. There are almost no restrictions to how this port number can be chosen. With both clients on the Internet, or both on a LAN, there is no problem, but if one of the clients is located behind a firewall, problems arise. Usually the ports used for media streams (high ports) are blocked for incoming traffic by the firewall. To open relevant ports statically in the firewall is not an option. The clients can select a port at random, which means that you would have to open every port in the firewall. This would make the firewall quite pointless, and you could just as well remove it. You don’t want to unnecessarily keep ports on the firewall open. When a call is disconnected, the best would be that the firewall immediately blocks the used port. LAN IP Address

14 Ingate Product Training Common Deployment Issues
Resolution # “NAT BREAKS SIP” SIP Protocol requires a SIP Proxy or Application Layer Gateway and NAT SIP Proxy (SIP-Aware Firewall) will correct IP Addresses and Port allocation in SIP Protocol from Private LAN addresses to Public WAN address. SIP Proxy monitors all SIP Traffic IN and OUT and can apply routing rules

15 Ingate Product Training Common Deployment Issues
After NAT & Ingate TCP/IP Header is Public Space SIP Headers are Private Space WAN IP Address WAN IP Address WAN IP Address An INVITE usually contains the IP address and port to where the caller should direct its media stream. The IP address usually is the client’s own IP. If the client is located on a NAT:ed network, this means that the IP address in the INVITE isn’t reachable outside the NAT:ed network. As part of the SIP signaling, the client sends an IP address and a port number indicating to where the media stream should be sent. There are almost no restrictions to how this port number can be chosen. With both clients on the Internet, or both on a LAN, there is no problem, but if one of the clients is located behind a firewall, problems arise. Usually the ports used for media streams (high ports) are blocked for incoming traffic by the firewall. To open relevant ports statically in the firewall is not an option. The clients can select a port at random, which means that you would have to open every port in the firewall. This would make the firewall quite pointless, and you could just as well remove it. You don’t want to unnecessarily keep ports on the firewall open. When a call is disconnected, the best would be that the firewall immediately blocks the used port. WAN IP Address

16 Ingate Product Training Common Deployment Issues
Ingate Benefits - “NAT BREAKS SIP” Ingate products are ICSA Certified VoIP Firewalls Ingate have a SIP Proxy, SIP B2BUA and NAT working together Ingate SIParator can bring enhance the SIP capabilities and SIP security of an existing Firewall Ingate can provide “Far End NAT Traversal” functionality What Other IP-PBXs Vendors Do Most all IP-PBX vendors recommend the use of some sort of “SIP-Aware Firewall” for deployment Other recommend the use of Port Forwarding, to forward Port 5060 and a thousand other Ports to the IP-PBX – HUGE SECURITY RISK!!

17 Ingate Product Training Common Deployment Issues
Problem #2 – SIP Interoperability Not all SIP is the same One vendors implementation may not be the same as another There are many SIP components and extensions that may be supported on one vendors equipment and not on another SIP Protocol is an open standard and can be left to interpretation by each vendor Examples Use of REFER Method is not typically supported by ITSP Use of INVITE with Replaces Header is not typically supported by ITSP Some ITSPs don’t like SDP with “a=Inactive” attribute ENUM SIP URI Delivery is supported by some and not by others Various TO and FROM Header conformances Alternate SIP Domain routing requirements

18 Ingate Product Training Common Deployment Issues
Resolution #2 – SIP Interoperability Testing and Development for each Vendor Extensive Testing and Development time devoted to each vendor integration to ensure complete interoperability – a huge undertaking Customization and Flexibility development for each Vendor integration SIP Connect Compliance Adherence to SIP Forum – SIP Connect Compliance, governing body of SIP Trunking deployments an standards

19 Ingate Product Training Common Deployment Issues
Ingate Benefits – SIP Interoperability In General, Can rewrite headers commonly needing changed between vendors Provide SIP Protocol error checking and fixes Protocol non-conformances Routing Rules and Policies to direct traffic Contains extensive list of features devoted to SIP non-conformances customization Ingate contains a B2BUA Separates the call between the two parties, helping separate two different implementations of SIP Provides Client or Server User Accounts for Registration and Authentication Separate SIP Method Handling between two parties

20 Ingate Product Training Common Deployment Issues
Problem #3 – SIP Security SIP is written in clear text within the datagram of a UDP or TCP Transport. Confidential User/SIP URI Information A SIP URI is like an Address, once someone has it, they who you are and where you are located. The malicious person or software can send SIP Request after SIP Request to your SIP URI. Some malicious uses like DoS Attacks, SPIT Attacks, Intrusion of Services, Toll Fraud, Tele-markers and more. Called and Calling Party Number Information Private LAN Network Address Scheme Giving away the confidential Private IP Address scheme of the internal LAN network, gives malicious attackers knowledge of the internal configuration of the Enterprise. The Port being used on the device, gives malicious attackers where to direct traffic Media Attributes Easy to see what Media is being negotiated and where its going

21 Ingate Product Training Common Deployment Issues
Why is SIP Insecure? Written in clear text within the datagram of a UDP or TCP Transport. Confidential User Information Confidential SIP URI of the User Confidential Equipment MIME Content LAN IP Address and Port Information Media Attributes

22 Ingate Product Training Common Deployment Issues
Common SIP Attacks Intrusion of Services Devices attempting Register with a IP-PBX in an attempt to look like an IP-PBX extension and gain IP-PBX services SPIT (SPAM over Internet Telephony) Toll Fraud A form of an Intrusion of Service, where malicious attempts to send INVITEs to an IP-PBX to gain access to PSTN Gateways and SIP Trunking to call the PSTN Denial of Service INVITE (or any SIP Request) Flood in an attempt to slow services or disrupt services Or any UDP or TCP traffic directed at a SIP Service on SIP Ports Indirect Security Breaches Private LAN IP Address and infrastructure are now made public, and can be used in attacks to other non-SIP areas

23 Ingate Product Training Common Deployment Issues
Resolution #3 – SIP Security Dynamic Encryption of SIP URI Using the SIP Specification, enforce an Encrypted SIP URI where possible Dynamic Port Allocation Dynamically change ports on every call. Hide LAN IP Address Scheme Apply LAN to WAN Network Address Translation within the SIP Signaling TLS and SRTP TLS Transport provides complete encryption of SIP Signaling SRTP provides encryption of RTP Media IDS/IPS for SIP Protocol SIP Protocol specific Intrusion Detection Systems and Intrusion Prevention Systems allow for monitoring and statics of all SIP Traffic, and apply rules and policies based on the traffic Traffic Routing Rules and Policies IP Address Authentication, SIP URI Validation, and Routing Rules

24 Ingate Product Training Common Deployment Issues
How to make SIP Secure TLS to Encrypt all SIP Signaling Hidden IP in User Information Hidden Internal Vendor Encrypted SIP URI Firewall Filters on MIME Content Hidden LAN IP Information SRTP to Encrypt all RTP Media Dynamic Port Allocation

25 Ingate Product Training Common Deployment Issues
Ingate Benefits – SIP Security Dynamic Encryption of SIP URI Dynamic Port Allocation Hide LAN IP Address Scheme TLS and SRTP IDS/IPS for SIP Protocol Traffic Routing Rules and Policies Ingate products are ICSA Certified VoIP Firewall Ingate is focused on providing SIP Security

26 The SIP School Graham Francis

27 Introduction to Ingate Products

28 Ingate products SIParator™ Firewalls
SIP-capable firewalls for computer security and communication SIParator™ - Add-on to existing firewalls to enable SIP communication Complete SIP proxy Built-in SIP registrar (no extra location server required, even for NAT) QoS (can prioritize VoIP) Remote SIP Connectivity (VoIP for remote users) TLS (Transport Layer Security, encryption of SIP messages) SRTP (Secure RTP, encryption of media) IDS/IPS for SIP SIP user authentication using Digest authentication VPN user and admin user authentication using RADIUS RSA SecureID Ready certification Encryption Configuration traffic over HTTPS or IPsec VPN using IPsec or PPTP SIP signaling over TLS SRTP SIParator A new, unique device bringing SIP capability to existing firewalls Preserves customer’s firewall investments Flexibly connected to the legacy firewall (next slide) Works with all firewalls New and replacement installations Preserve firewall investment and keep established security policies

29 Extensive SIP Feature Set
Security Far-End NAT Traversal and STUN SIP Trunking Tool Set Sol. for Remote Workers Encryption Authentication SIP Filtering Flexible Control Diagnostic Tools Extensive Call Qualiity Statistics SIP-ALG-only Firewalls can only do this much SIP Proxy, ALG, B2BUA, Registrar Near-End Traversal Firewall & NAT SIP Proxy, ALG, B2BUA, Registrar QoS, Taffic Mgmt ENUM Support IP-PBX Compatibility Service Provider Compatibility SIP Trunking

30 The Ingate Product Family
Firewall® 1950 or SIParator® 95 SW upgradable Firewall® 1650 or SIParator® 65 2000 Calls* SW upgradable 650 Calls* Firewall® 1550 or SIParator®55 Firewall® 1500 or SIParator®50 350 Calls* 150 Calls* Firewall® 1190 or SIParator® 19 Licenses Functional SIP Trunking Remote SIP Connectivity Quality of Service Advanced SIP Routing VoIP Survival Enhanced Security Capacity Additional SIP Traversals 50 Calls* * Calls = Maximum Concurrent RTP Sessions = SIP Trunks

31 Connecting the Firewall
Ingate Firewall Handles All Data Traffic Provides NAT Protocol Service Rules Data Traffic Relays VPN (IPsec) Tunnels PPTP Tunnels DMZ Networks (multiple networks) Default Gateway of the LAN DHCP Server SIP Session Border Controller

32 Connecting the Firewall

33 Connecting the Firewall

34 Connecting the Firewall

35 Connecting the Firewall

36 Connecting the SIParator®
DMZ and DMZ/LAN have knowledge of the WAN IP of the Existing Firewall UDP Ports 5060 and a range of Media Ports are forwarded to the SIParator Standalone has it’s own WAN IP The SIParator Dynamically open and closes ports Existing Firewall Port Forward 5060 Port Forward Media Port range

37 Connecting the SIParator®
NAT FW needs to Port FWD from Internet to DMZ and again from DMZ to LAN Increases number of Network hops Very Secure Ingate needs to know WAN IP address DMZ and DMZ/LAN have knowledge of the WAN IP of the Existing Firewall UDP Ports 5060 and a range of Media Ports are forwarded to the SIParator Standalone has it’s own WAN IP The SIParator Dynamically open and closes ports

38 Connecting the SIParator®
NAT FW needs to Port FWD from Internet to DMZ Decreases Network hops Very Secure Ingate needs to know WAN IP address DMZ and DMZ/LAN have knowledge of the WAN IP of the Existing Firewall UDP Ports 5060 and a range of Media Ports are forwarded to the SIParator Standalone has it’s own WAN IP The SIParator Dynamically open and closes ports

39 Connecting the SIParator®
NAT FW needs to Port FWD from Internet to LAN Decreases Network hops Least Secure Ingate needs to know WAN IP address DMZ and DMZ/LAN have knowledge of the WAN IP of the Existing Firewall UDP Ports 5060 and a range of Media Ports are forwarded to the SIParator Standalone has it’s own WAN IP The SIParator Dynamically open and closes ports

40 Connecting the SIParator®
Ingate has its own Public IP address One Network hop Very Secure Reduces impact to NAT FW No NAT FW setup required DMZ and DMZ/LAN have knowledge of the WAN IP of the Existing Firewall UDP Ports 5060 and a range of Media Ports are forwarded to the SIParator Standalone has it’s own WAN IP The SIParator Dynamically open and closes ports

41 Connecting the SIParator®
Ingate has its own Public IP address NAT FW has it own IP address Ingate adds QoS and Traffic Shaping Very Secure No NAT FW setup required DMZ and DMZ/LAN have knowledge of the WAN IP of the Existing Firewall UDP Ports 5060 and a range of Media Ports are forwarded to the SIParator Standalone has it’s own WAN IP The SIParator Dynamically open and closes ports

42 How Does It Work? SIP Proxy Stateful Proxy redirects calls
NAT/PAT for UDP/TCP/TLS and SIP SIP B2BUA Rewrites Request URIs, Domains, and other Headers SIP Registrar / Client Can Register to ISTP, and provide a Registrar for SIP Clients SIP Media Relay Can ensure media is directed in/out Dynamically open and close ports for security For each incoming SIP request, sipfw first has to determine to where it should be sent. If the SIP request should be sent through the firewall in a way which requires rewriting (e.g. caused by NAT), sipfw must do this. If the SIP request regards a request to send one or more media streams, sipfw must notify the NAT and firewall functions about the ports and IP addresses in question. This will create preliminary firewall rules to allow this traffic. Not until the first packet of the media stream itself reaches the firewall, it will know the sender (this is not negotiated in the SIP signaling). When this is known, the firewall rules are rewritten to only allow media from the proper sender. The sipfw SIP proxy has three modes: Deny all SIP requests (except local registrations). Process all SIP requests regardless of destination. Process only SIP requests addressed to local users. “Local users” are users in a SIP domain which the firewall manages. The processing of SIP requests can also be restricted with regard to the sender (based on IP address). The SIP proxy can require that a user must authenticate himself before his SIP requests are processed. An incoming SIP request addressed to the firewall will reach sipfw without any problem. If a client is located on one side of the firewall, and a SIP server on the other side, and the client is unaware of the existence of the firewall, things become more complicated. The firewall will capture all traffic to port 5060 addressed to or through the firewall, and pass it on to sipfw. This way, SIP traffic can be processed even when the clients are not aware of the existence of the firewall. For this to work, the SIP traffic must use port 5060.

43 Ingate SIParator® For each incoming SIP request, sipfw first has to determine to where it should be sent. If the SIP request should be sent through the firewall in a way which requires rewriting (e.g. caused by NAT), sipfw must do this. If the SIP request regards a request to send one or more media streams, sipfw must notify the NAT and firewall functions about the ports and IP addresses in question. This will create preliminary firewall rules to allow this traffic. Not until the first packet of the media stream itself reaches the firewall, it will know the sender (this is not negotiated in the SIP signaling). When this is known, the firewall rules are rewritten to only allow media from the proper sender. The sipfw SIP proxy has three modes: Deny all SIP requests (except local registrations). Process all SIP requests regardless of destination. Process only SIP requests addressed to local users. “Local users” are users in a SIP domain which the firewall manages. The processing of SIP requests can also be restricted with regard to the sender (based on IP address). The SIP proxy can require that a user must authenticate himself before his SIP requests are processed. An incoming SIP request addressed to the firewall will reach sipfw without any problem. If a client is located on one side of the firewall, and a SIP server on the other side, and the client is unaware of the existence of the firewall, things become more complicated. The firewall will capture all traffic to port 5060 addressed to or through the firewall, and pass it on to sipfw. This way, SIP traffic can be processed even when the clients are not aware of the existence of the firewall. For this to work, the SIP traffic must use port 5060.

44 Optional Modules Remote SIP Connectivity SIP Trunking
The SIP functionality in Ingate Firewalls and SIParators has several software extension modules. Remote SIP Connectivity SIP Trunking Advanced SIP Routing VoIP Survival Extended SIP Security Quality of Service

45 Optional Modules Remote SIP Connectivity Manages SIP clients behind NAT boxes which are not SIP-aware Solves far-end NAT traversal Includes a STUN server

46 Optional Modules

47 Optional Modules SIP Trunking
Lets the administrator rewrite the entire or part of a SIP URI before the request is passed on Redirects requests based on From header, Request-URI and originating network Adds features to make the firewall register on behalf on clients Local Registrar, B2BUA, Proxy, extensive Dial Plan & Routing features.

48 Optional Modules

49 Optional Modules Acts as registrar for the monitored SIP domain
VoIP Survival Monitors one or more remote SIP servers Useful for branch offices which uses a SIP server at the main office When the remote SIP server is down, the firewall: Acts as registrar for the monitored SIP domain Manages local calls Redirects PSTN calls to a local PSTN gateway Manages outgoing calls to other SIP domains

50 Optional Modules IDS/IPS TLS and SRTP Contains features such as:
Extended SIP Security Contains features such as: IDS/IPS Makes it possible to block SIP traffic due to various conditions Traffic exceeds a given rate limit Packets match specified criteria TLS and SRTP Advanced SIP Routing Create hunt groups, aliases and other user-based features

51 Break Time Coffee and Refreshments

52 Ingate Startup Tool

53 Ingate Startup Tool Startup Tool “Out of the Box” setup and commissioning of the Firewall and SIParator products Update current configuration Product Registration and unit Upgrades, including Software and Licenses. Automatic selection of ITSP and IP-PBX Backup of Startup Tool database Located at FREE!

54 Ingate Startup Tool Select the Ingate Model
Startup Tool - Product Type Select the Ingate Model

55 Ingate Startup Tool Configure the unit for the first time
Startup Tool Title Reference Configure the unit for the first time Change or update configuration Register the unit Backup the config IP/MAC Address Password

56 Ingate Startup Tool Firewall or SIParator deployment type
Startup Tool - Network Topology Firewall or SIParator deployment type Inside (Eth0) - Private Outside (Eth1) - Public Default Gateway DNS Server

57 Ingate Startup Tool Select IP-PBX Provide IP Address
Startup Tool – IP-PBX Select IP-PBX Provide IP Address

58 Ingate Startup Tool Select Trunking Provider Account Information
Startup Tool – ITSP_1 Select Trunking Provider Account Information

59 Ingate Startup Tool Login to web GUI and apply settings Upload
Startup Tool – Upload Config Login to web GUI and apply settings Upload

60 Ingate Startup Tool Startup Tool – Apply the Config The Startup Tool will launch a browser to have the installer Apply the Configuration.

61 Ingate Startup Tool Enter Ingate Web Account Create Ingate Web Account
Startup Tool – Register & Upgrade Enter Ingate Web Account Create Ingate Web Account Connect to Install Modules & Licenses by entering 12- digit Purchase Key Upgrade the software of the unit

62 Demonstration #1 Startup Tool

63 LUNCH Yum! 2 Dozen Lunches at the back

64 Recap Ingate Firewall and Ingate SIParator
Ingate Products Ingate Firewall and Ingate SIParator Scale by appliance giving more traversals Number of purchasable Options Modules Deployments Ingate Firewall and Ingate SIParator Startup Tool “Out of the Box” setup and commissioning Select IP-PBX and ITSP

65 Web GUI Configuration

66 Programming GUI Web into the Ingate Major Categories and separate Tabs
Web Configuration Web into the Ingate Major Categories and separate Tabs

67 Programming: Network

68 Programming: Network Networks & Computers Provides a view of the Network connected on each interface as a Routing Table.

69 Programming: Network Default Gateway The Default Gateway to the Internet, provided by the ISP.

70 Programming: Network The IP Address/Mask of the NIC on the LAN.
Eth0 Network Interface The IP Address/Mask of the NIC on the LAN. Static Routing – defines Router address for other network address on the LAN.

71 Programming: Network The IP Address/Mask of the NIC on the WAN.
Eth1 Network Interface The IP Address/Mask of the NIC on the WAN. PPPoE or DHCP IP address assignment are possible.

72 Programming: Basic Configuration

73 Programming: Basic Configuration
Provides DNS Server addresses.

74 Programming: Basic Configuration
Access Control Provides configuration for HTTP and HTTPS access.

75 Programming: NAT & Rules and Relays
Firewall Only

76 Programming: NAT NAT Define when to apply NAT rules. Typically, From LAN network to WAN network, NAT as WAN address

77 Programming: Rules & Relays
Define specific Service from Client to Server networks.

78 Programming: Rules & Relays
Direct specific Traffic to specific locations

79 Programming: Quality of Service
Firewall Only

80 Programming: QoS Quality of Service – Call Admission Control You can make the firewall reject SIP calls when there is not bandwidth enough left to get media streams through satisfactorily. Bandwidth for SIP Media - define BW Reservations Codec Bandwidth – define Codec BW

81 Programming: QoS Quality of Service – QoS Classes Using Priority queues, you assign different priority to different types of traffic. Using Bandwidth allocation, you assign guaranteed bandwidth and bandwidth limits for different types of traffic.

82 Programming: QoS Quality of Service – Most Restricted Interface You specify how packets belonging to different classes should be handled by the interface The Priority field specifies in which priority queue to put the packets. Higher priority traffic will always be let through before lower priority traffic is allowed (but see also the Loose Priority setting).

83 Programming: QoS Quality of Service – ToS Modification Modify the TOS octet of packets leaving the firewall. You can either specify a value for the (3 bit) TOS field (RFC 791), or you can specify a value for the (6 bit) Differentiated Services field (RFC 2474).

84 Programming: SIP Services

85 Programming: SIP Services
Basic Turn On SIP Module. Define Media Port Range. The SIP Module setting determines if sipfw should be active or not. If it is ”Off” (default), no other SIP settings will have effect. The Additional SIP Signaling Ports setting allows you to make the firewall listen for SIP signaling on other ports than 5060 (TCP and UDP) and 5061 (TLS). In the SIP Media Port Range, you configure what ports the firewall should use for media streams. This can be useful to know if other devices should be made to let through the traffic. Under Logging, you configure how SIP events should be logged. SIP errors SIP signaling SIP packets SIP debug messages SIP signaling (default: ”Local”) Logs the first line of each SIP packet received by or sent by sipfw. SIP errors (default: ”Local”) Something went wrong when a SIP request was processed. Failed DNS lookup Bad syntax in SIP packet SIP packets (default: ”Local”) Logs in extenso all SIP packets received by and sent by sipfw. All SIP headers and the entire body is shown. Each log entry of SIP packets can be a few kB. The log is quickly populated when this logging is turned on. SIP debug messages (default: ”-”) Large amounts of debug information about how each SIP request is processed. Some information may be useful for a user. Other parts require extensive knowledge about sipfw to be correctly interpreted. Each SIP request can generate tenths of log entries.

86 Programming: SIP Services
Interoperability Common deviations from the standard The SIP standard is still quite young, and some variations in the interpretation are known. For common deviations from the standard, there are interoperability settings in the firewall.

87 Programming: SIP Services
Remote SIP Connectivity Allows SIP client behind NAT boxes to use SIP. The Remote SIP Connectivity extension module allows SIP client behind NAT boxes to use SIP. The STUN server is used for STUN aware clients. The STUN server needs two public IP addresses to work properly. The Remote NAT Traversal is used for SIP client which cannot use STUN. The Remote NAT Traversal forces the SIP client to re-REGISTER rather often. If this is unacceptable, you can select to send OPTIONS requests to the client instead.

88 Programming: SIP Traffic

89 Programming: SIP Traffic
SIP Methods Select which SIP methods the firewall should allow & authenticate On the SIP Methods page, you select which SIP methods the firewall should allow. You also select which methods should require authentication before processing in the firewall.

90 Programming: SIP Traffic
Filtering The Proxy Rules and Default Policy For SIP Requests settings control if sipfw should process requests, based on the sender IP address of the request The Content Type table controls if sipfw should process requests, based on the content type of the request body */* - Allows All The Proxy Rules and Default Policy For SIP Requests settings control if sipfw should process requests, based on the sender IP address of the request. There are three options: Process all Local only Reject all All SIP requests will be processed regardless of destination. Only SIP requests addressed to local SIP domains are processed. No SIP requests except local REGISTERs are processed. Usually, SIP requests from different sources should be treated differently. A user on the inside of the firewall can usually be allowed to send requests anywhere. A user on the outside should not be allowed to call users who are not registered on a local domain. If this were allowed, an outside user could use the firewall to send requests anywhere. The Content Type table controls if sipfw should process requests, based on the content type of the request body. Requests without a body are not blocked by this setting. As default, all content types except “application/sdp”, “text/x-msmsgsinvite”, and “application/xpidf+xml” are blocked.. You can allow the content type “*/*” to let all content types through the firewall.

91 Programming: SIP Traffic
Local Registrar Define SIP Users that register to the Ingate (server registrar) Enter the SIP domains for which the firewall should act as registrar. You can use domain names and IP addresses. As default, the firewall considers all its own IP addresses as its SIP domains. Enter the users allowed to register in the Local SIP User Database table. Instead of a local database, a RADIUS server can be used to list SIP users. Username Enter usernames. “*” can be used as a wildcard. Domain Enter the SIP domain for this user. Here too, “*” can be used. Authentication name If the user should provide another name for authentication purposes, enter that name here. Password When authentication is inactive, no password is required here. Account Type When the Advanced SIP Routing module has been installed, there are different account types to select from. Most of them makes the firewall register on behalf of clients, or act as a back-to-back user agent. Register from Select a network containing the IP addresses from which registration is allowed. Define the network on the Network and Computers page.

92 Programming: SIP Traffic
SIP Accounts Define SIP Users for Service Providers Select behavior of these SIP Users (Ingate as client) Enter the SIP domains for which the firewall should act as registrar. You can use domain names and IP addresses. As default, the firewall considers all its own IP addresses as its SIP domains. Enter the users allowed to register in the Local SIP User Database table. Instead of a local database, a RADIUS server can be used to list SIP users. Username Enter usernames. “*” can be used as a wildcard. Domain Enter the SIP domain for this user. Here too, “*” can be used. Authentication name If the user should provide another name for authentication purposes, enter that name here. Password When authentication is inactive, no password is required here. Account Type When the Advanced SIP Routing module has been installed, there are different account types to select from. Most of them makes the firewall register on behalf of clients, or act as a back-to-back user agent. Register from Select a network containing the IP addresses from which registration is allowed. Define the network on the Network and Computers page.

93 Programming: SIP Traffic
User Database: Account Type Selections Register: With this Account type, the firewall registers the username with the SIP server associated with the domain. You may enter the address to send the request to in the User Routing table. This is useful when you have a SIP client which cannot register properly. XF: With this Account type, the firewall replaces the From header with the username and domain of this user. The request is then forwarded to the SIP server associated with the domain. XF/Register: With this Account type, the firewall replaces the From header as described above, then registers as described under Register above. Enter the SIP domains for which the firewall should act as registrar. You can use domain names and IP addresses. As default, the firewall considers all its own IP addresses as its SIP domains. Enter the users allowed to register in the Local SIP User Database table. Instead of a local database, a RADIUS server can be used to list SIP users. Username Enter usernames. “*” can be used as a wildcard. Domain Enter the SIP domain for this user. Here too, “*” can be used. Authentication name If the user should provide another name for authentication purposes, enter that name here. Password When authentication is inactive, no password is required here. Account Type When the Advanced SIP Routing module has been installed, there are different account types to select from. Most of them makes the firewall register on behalf of clients, or act as a back-to-back user agent. Register from Select a network containing the IP addresses from which registration is allowed. Define the network on the Network and Computers page.

94 Programming: SIP Traffic
User Database: Account Type Selections Domain: This Account type can be used when sending requests to other domains where authentication is required. You must select this account in the Dial Plan when you forward requests to the domain in question. When that server requires authentication for its domain, the firewall sends the username and password configured here. B2BUAWM: With this Account type, the firewall replaces the From header as described under XF. It also changes the SDPs to the effect that media is always sent via the firewall. B2BUAWM/Register: With this Account type, the firewall acts as described under B2BUAWM above. It also registers the user as described under Register above. Enter the SIP domains for which the firewall should act as registrar. You can use domain names and IP addresses. As default, the firewall considers all its own IP addresses as its SIP domains. Enter the users allowed to register in the Local SIP User Database table. Instead of a local database, a RADIUS server can be used to list SIP users. Username Enter usernames. “*” can be used as a wildcard. Domain Enter the SIP domain for this user. Here too, “*” can be used. Authentication name If the user should provide another name for authentication purposes, enter that name here. Password When authentication is inactive, no password is required here. Account Type When the Advanced SIP Routing module has been installed, there are different account types to select from. Most of them makes the firewall register on behalf of clients, or act as a back-to-back user agent. Register from Select a network containing the IP addresses from which registration is allowed. Define the network on the Network and Computers page.

95 Programming: SIP Traffic
Dial Plan On the Dial Plan page, you can perform advanced routing of SIP requests On the Dial Plan page, you can perform advanced routing of SIP requests. The Dial Plan can be used as default or as fallback. When used as fallback, the Dial Plan will only be used if the server, that should have received the request, is not responding. You can enter an emergency number which will always be processed, regardless of licenses and other limitations.

96 Programming: SIP Traffic
Dial Plan “Matching FROM Header” Requests can be matched on From header, sender IP address, transport method and network. Requests can be matched on From header, sender IP address and transport method. With the Advanced SIP Routing module, the From header can be matched to a regular expression instead of just username and SIP domain. Match on sender IP address to process requests from local users differently.

97 Programming: SIP Traffic
Dial Plan “Matching Request URI” Requests can be matched on the Request-URI, which states where the request is bound. Requests can be matched on the Request-URI, which states where the request is bound. The match can be to a certain string or any number. With the Advanced SIP Routing module, the Request-URI can be matched to a regular expression instead of just username and SIP domain. You can also match on a Prefix, which will be stripped from the Request-URI before it is sent on.

98 Programming: SIP Traffic
Dial Plan “Forward To” Define destinations for the SIP requests Can use Reg Exp for dynamic use of B2BUA with “ ;b2bua ” Define destinations for the SIP requests in the Forward To table. Enter a new Request-URI (the domain part). With the Advanced SIP Routing module, the Request-URI can be rewritten with a regular expression using parts of the old Request-URI. You can also pass on the request to an account defined in the Local SIP User Database table.

99 Programming: SIP Traffic
Dial Plan “Dial Plan” Combine the From Header, Request-URI and Forward To tables in the Dial Plan table. Combine the From Header, Request-URI and Forward To tables in the Dial Plan table. Select if the request should be denied or forwarded, and if authentication should be performed. With the Advanced SIP Routing module, you can also perform ENUM lookups for requests. You can also add a prefix to the username before sending the request on.

100 Programming: SIP Traffic
How Does It Work? Outgoing Call SIP Phone sends INVITE to IP-PBX sends INVITE to Ingate sends INVITE to Incoming Call ITSP sends INVITE to Ingate sends INVITE to IP-PBX sends INVITE to Combine the From Header, Request-URI and Forward To tables in the Dial Plan table. Select if the request should be denied or forwarded, and if authentication should be performed. With the Advanced SIP Routing module, you can also perform ENUM lookups for requests. You can also add a prefix to the username before sending the request on.

101 Programming: SIP Traffic
Dial Plan “Method in the Dial Plan” Select which methods should be processed by the Dial Plan. Select which methods should be processed by the Dial Plan. REGISTER requests can be processed here.

102 Programming: SIP Traffic
Routing “DNS Override for SIP Requests” Enter SIP domains to which traffic should be sent, but which for some reason cannot be looked up using DNS. In the DNS Override For SIP Requests table you can enter SIP domains to which traffic should be sent, but which for some reason cannot be looked up using DNS. This can be useful when the SIP server is behind the firewall, which means that DNS lookups must point to the firewall itself.

103 Programming: SIP Traffic
Routing “Class 3XX Processing & SIP Routing Order” Class 3xx Messages Processing concerns how to process redirect requests SIP Routing Order priorities which function to process first The Class 3xx Messages Processing concerns how to process redirect requests. Forward all: Forward all class 3 messages to the client for further processing. Follow redirects: A SIP request resulting in a 3xx reply will cause sipfw to send a new request to the redirected address. This is useful for clients which do not support redirecting.

104 Programming: SIP Traffic
Routing “User Routing” Forward the SIP Accounts to another destination. Can use for To Header based routing In the Static Registrations table, you can enter registrations for devices which cannot register themselves. Register statically and forward the requests to You can also make registrations for virtual addresses. Register and forward the requests to all members of the company support team. Requests to one address can concurrently be forwarded to multiple addresses.

105 Programming: SIP Traffic
Routing “Local REFER Handling” SIP Trunking Service Providers can not handle a REFER Method. Many IP-PBX require to send REFERs for Transferring calls. This ensure the Ingate handles the REFER locally.

106 Programming: SIP Traffic
SIP Status Shows current SIP activity On the SIP Status page, you find information about the current sipfw status. Current registered users. Current calls. Monitored SIP servers.

107 Demonstration #2 Dial Plan

108 Demonstration #3 SIP Security – Lock to Source IP

109 Troubleshooting

110 Troubleshooting SIP Events will ensure SIP calls are logged.
Logging Configuration SIP Events will ensure SIP calls are logged.

111 Troubleshooting Display # Rows/Page Show Newest on Top
Logging & Tools Display # Rows/Page Show Newest on Top Select SIP Log Attributes Select “Show internal SIP Signaling”

112 Troubleshooting Creates a Wireshark PCAP network trace.
Packet Capture Creates a Wireshark PCAP network trace. Network Interface Selection – All Interfaces Start – Stop - Download

113 Demonstration #4 Packet Capture

114 Toll Fraud Prevention

115 Toll Fraud What is Toll Fraud? A Third Party attempting to defraud either the Enterprise or the Carrier Penetrate to the PBX and hairpin calls out to the Carrier Direct defraud to Carrier, mimicking Enterprise credentials

116 Toll Fraud Layered Security
General Prevention to Toll Fraud Layered Security Adding security control at different protocol layers and at different points along the SIP call flow For Example: Don’t put your IP-PBX directly on the Internet (or untrusted) network (i.e. Don’t put all your eggs in one basket) Define the Trust Relationships No Internet (or untrusted network) IP Address is safe Define a list of trusted Source IP Addresses (i.e. the carrier) Apply specific SIP Call Flow Policies and Routing IP-PBX must not allow Hairpin of calls

117 Toll Fraud Prevention Ingate Configuration

118 Toll Fraud IP Filter Rules
Toll Fraud Prevention – Access Control Lists IP Filter Rules Start with Rejecting All incoming SIP Traffic Define only the Trusted Source IP Address(es), Hostnames, and Domains i.e. - the SIP Trunking Service Provider This provides TCP/IP Layer Control

119 Toll Fraud Matching From Define From Header SIP URI
Toll Fraud Prevention – Source Based SIP Routing Policy Matching From Define From Header SIP URI Source Call ID and Domain Define a specific Transport Define only the Trusted Source IP Address(es), Hostnames, and Domains i.e. the SIP Trunking Service Provider domain

120 Toll Fraud Matching Request-URI Define the Request URI
Toll Fraud Prevention – Limit the Incoming Dialed Numbers Matching Request-URI Define the Request URI Define only the DID’s used for Incoming calls. Prevents other undefined number being dialed

121 Toll Fraud Forward To Define the IP-PBX
Toll Fraud Prevention – Define a Specific Destination Forward To Define the IP-PBX This ensure a direct path

122 Toll Fraud Toll Fraud Prevention – Create an Unambiguous Routing Dial Plan Putting the Policies together to define a traffic flow Define the Source Based Policy with the Matching From Header Define the DID’s that are allowed with the Matching Request URI Define the destination with the Forward To Be sure to have a “catch all” that rejects everything else

123 Toll Fraud Toll Fraud Prevention – Create an Unambiguous Routing Dial Plan

124 Toll Fraud Define Answer Points
Toll Fraud Prevention – IP-PBX Answer Points and Hairpin Define Answer Points Every incoming DID must have a valid answer point Leave no ambiguity for IP-PBX call routing Automated Applications Prevent Auto-Attendants, IVRs, Voic s, ACD and other automated applications from allowing an incoming trunk call to make an outgoing trunk call No Trunk to Trunk connections Follow IP-PBX recommendations for Toll Fraud prevention

125 Denial of Service Prevention

126 Denial of Service What is Denial of Service? A Third Party attack to make a communications resource unavailable to its intended users Generally consists of the concerted efforts to prevent SIP communications service from functioning efficiently or at all, temporarily or indefinitely One common method of attack involves saturating the target (victim) IP-PBX with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable

127 Denial of Service Layered Security
General Prevention to Toll Fraud Layered Security Adding security control at different protocol layers and at different points along the SIP call flow For Example: Don’t put your IP-PBX directly on the Internet (or untrusted network) (i.e. Don’t put all your eggs in one basket) How to Recognize a DoS Attack Define the SIP Rate Limits and Blacklisting Policies No Internet (or untrusted network) IP Address is safe Define a SIP Method/Request URI/Response Code Pattern Set a Predetermined Rate Limit and Blacklisting Threshold

128 Denial of Service Prevention Ingate Configuration

129 Denial of Service IDS/IPS
DoS Prevention – IDS/IPS IDS/IPS Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) specific for SIP Protocol Define the Untrusted Networks. Define the SIP Request URI pattern (ex. Define the SIP Method to apply the matching to Define the Rate Limit # Packets per # Seconds (Optional) If this Rate is exceeded, define the Blacklist Period

130 Denial of Service DoS Prevention – IDS/IPS IDS/IPS

131 Denial of Service IDS/IPS - Rule Packs
DoS Prevention – IDS/IPS – Rule Packs IDS/IPS - Rule Packs Predefined Rule Packs for filtering known industry Vulnerabilities

132 Denial of Service SIP Method Filtering
DoS Prevention – SIP Method Filtering SIP Method Filtering Denying unused SIP Methods further reduces the overall exposure of variety of SIP Methods that could be sent to through the Ingate to the IP-PBX or Carrier

133 Denial of Service Content Type Filter Rules
DoS Prevention – MIME Content Control Content Type Filter Rules SIP can be used for more than just voice and video. Deny the other uses of the SIP Protocol and whatever content it may be carrying.

134 Denial of Service Layered Security
DoS Prevention – IP-PBX or SIP Server Layered Security An IP-PBX or SIP Server is a “Mission Critical” application, it has direct ties to corporate revenue. Recommend not to subject the “Mission Critical” application to DoS handling Ensure DoS Security is handled separately on a the network edge device, the Ingate SIParator/Firewall.

135 THE END


Download ppt "Ingate Firewall & SIParator Product Training"

Similar presentations


Ads by Google