cns for dummies

Upload: greenpeans

Post on 03-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 Cns for Dummies

    1/52

    Peter H. Gregory, CISA, CISSP

    A Referencefor the

    Rest of Us!FREE eTips at dummies.com

    ComplimentsofAvaya,

    JuniperNetworks&ExtremeNetw

    orks

    AvayaCustomEdition

    Protect your IPnetwork from

    threats andmisuse

    Converged

    NetworkSecurity

  • 7/28/2019 Cns for Dummies

    2/52

    What is the challenge with converged network security?Finding the right partners to deliver a secure, reliable,converged voice and data network infrastructure without limiting your flexibility to grow your businessand extend the reach of your network is the key.

    Converged network security isnt something to beadded after the fact the need to protect yourmission-critical communications systems and business

    applications should be considered from the very startof your converged network planning. At the same time,its not enough to simply protect your network fromexternal threats. With more and more employees usinglaptops and IP Softphones, converged network securityhas to enable protection of these assets from within thenetwork as well without limiting the ability of theseemployees to work remotely when necessary.

    Avaya has partnered with two of the market leaders forconverged networks, Juniper Networks and ExtremeNetworks, to bring best-in-class security solutionsto converged voice and data networks. Avaya GlobalServices provides expert advice on security design andimplementations for small businesses to world-wideenterprises.

    Explore the possibilities at

    www.avaya.com.

  • 7/28/2019 Cns for Dummies

    3/52

    by Peter H. Gregory, CISA, CISSP

    ConvergedNetwork Security

    FOR

    DUMmIES

    AVAYA CUSTOM EDITION

  • 7/28/2019 Cns for Dummies

    4/52

    Converged Network Security For Dummies, Avaya Custom Edition

    Published byWiley Publishing, Inc.

    111 River StreetHoboken, NJ 07030-5774www.wiley.com

    Copyright 2007 by Wiley Publishing, Inc., Indianapolis, Indiana

    No part of this publication may be reproduced, stored in a retrieval system or transmitted in anyform or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without theprior written permission of the Publisher. Requests to the Publisher for permission should beaddressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.

    Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference forthe Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, andrelated trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or itsaffiliates in the United States and other countries, and may not be used without written permission.All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not asso-ciated with any product or vendor mentioned in this book.

    LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKENO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETE-NESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES,INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE.NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS.THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITU-ATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOTENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PRO-FESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONALPERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLEFOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE ISREFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHERINFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THEINFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS ITMAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED INTHIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRIT-TEN AND WHEN IT IS READ.

    For general information on our other products and services, please contact our Customer CareDepartment within the U.S. at 800-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.

    ISBN: 978-0-470-12098-9

    Manufactured in the United States of America

    10 9 8 7 6 5 4 3 2 1

  • 7/28/2019 Cns for Dummies

    5/52

    Publishers AcknowledgmentsWere proud of this book; please send us your comments through our online registra-

    tion form located at www.dummies.com/register/. For information on a customDummies book for your business or organization, or information about licensing the

    For Dummies brand for products or services, contact BrandedRights&[email protected].

    Some of the people who helped bring this book to market include the following:

    Acquisitions, Editorial, and

    Media Development

    Project Editor: Jan Sims

    Business Development Representative:Jacqueline Smith

    Editorial Manager: Rev Mengle

    Composition Services

    Project Coordinator: Kristie Rees

    Layout and Graphics: Erin Zeltner

    Proofreaders: Laura Albert,Brian H. Walls

    Special Help: Jon Alperin

    Publishing and Editorial for Technology Dummies

    Richard Swadley, Vice President and Executive Group Publisher

    Andy Cummings, Vice President and Publisher

    Mary Bednarek, Executive Acquisitions Director

    Mary C. Corder, Editorial Director

    Publishing for Consumer Dummies

    Diane Graves Steele, Vice President and Publisher

    Joyce Pepple, Acquisitions Director

    Composition Services

    Gerry Fahey, Vice President of Production Services

    Debbie Stailey, Director of Composition Services

    Avaya Acknowledgments

    This book would not have been complete without the assistance and expertise of CraigAdams and Tim Bardzil of Extreme Networks, and Shrikant Latkar of Juniper Networks.

  • 7/28/2019 Cns for Dummies

    6/52

  • 7/28/2019 Cns for Dummies

    7/52

    Contents at a Glance

    Introduction .......................................................1

    Chapter 1: The Importance of SecuringConverged Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

    Arrival of Converged Networks.................................................6

    Protection of Converged Networks and Devices ....................6VoIP-related complexities and challenges .....................7

    Evolving protection techniques

    to answer new threats..................................................8

    Understanding threats in todays

    business environment................................................10

    Partnering for Better Protection.............................................12

    Chapter 2: Jumping Juniper Networks:

    Improving Converged NetworkSecurity for All . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    Juniper Networks Security Solutions ....................................14

    Firewalls and IPSec VPN ................................................14

    Intrusion detection and prevention (IDP) ...................15

    SSL VPN secure remote access.....................................15

    Network Access Control ................................................16

    Unified management.......................................................16

    Security Deployment Scenarios..............................................17Security for office-based users .....................................17

    Security for Road Warriors............................................23

    Security for Teleworkers................................................24

    Deploying Juniper Networks Solutions..................................25

    Chapter 3: Extreme Improvementsfor Network Security. . . . . . . . . . . . . . . . . . . . . . . . . . . 27

    Network Access Control ..........................................................27

    Authenticating users or devices...................................28Discovering your needs automagically........................30

    Host integrity checking..................................................31

    Network Segmentation .............................................................32

    Virtual LANs ....................................................................32

    Wire-speed encryption...................................................33

    Access control lists ........................................................33

  • 7/28/2019 Cns for Dummies

    8/52

    Threat Mitigation ......................................................................33

    IP and MAC security .......................................................34

    Virtualized Security Resources.....................................34Deploying Extreme Networks Solutions................................35

    Chapter 4: Plans, Policies, andAvaya Security Services. . . . . . . . . . . . . . . . . . . . . . . . 37

    Understanding Avaya Security Consulting Services ............37

    Why You Need Avayas Security Consulting Services ..........38

    New services introduce new vulnerabilities ...............38

    Expertise..........................................................................39

    Regulation........................................................................39

    Even old technology is still important.........................40

  • 7/28/2019 Cns for Dummies

    9/52

    Introduction

    Competitive businesses today need competitivesecurity and its a team effort. What is your role inyour organization? Are you responsible for network architec-ture, policy, security, and strategy? Then this book can help

    you understand how to secure your converged network.

    If youre a network practitioner, this book introduces you tothe security technologies and practices you will likely be set-ting up and performing in a converged network environment.If youre in management, you can gain an appreciation forwhat others in the organization need to think about in order toensure the security and success of your converged network.

    Dont forget to check out the Avaya Limited Edition of VoIPSecurity For Dummies for additional insight into how Avaya IPtelephony relies and builds upon the security environment ofthe underlying converged network. You can request a copyfrom Avayas Web site at www.avaya.com.

    Understanding Network

    Security Inside-OutGetting a grip on security in todays converged networkenvironment can seem like a daunting and abstract exercise.But the steps you take are actually similar to those for basichome security: When you think of providing security and pro-tection for your family and possessions, first you typicallycreate a layer of security that surrounds your house and

    family you put locks on doors and windows, set alarms tonotify you of intruders, and perhaps even contract with asecurity firm to respond in case intruders manage to get in.And when your family is traveling outside the home, you mayprovide them with mobile phones so that they can stay intouch with other family members in case of emergencies.

  • 7/28/2019 Cns for Dummies

    10/52

    In many ways, this level of externally oriented security iswhat Avayas partnership with Juniper Networks brings to the

    table Network Access Control, firewalls, intrusion detectionand prevention systems, and Virtual Private Networks (VPNs)all create a level of security that protects the converged net-work of enterprises from external threats.

    But if you have young children, you may also think of child-proofing inside the house putting locks on cabinets to keepchildren away from chemicals and other dangerous items,covering electrical outlets to make sure that they arent stick-

    ing their fingers in them, and so on. And perhaps you lockyour expensive home electronics behind cabinet doors tokeep little ones from storing their grilled cheese sandwichesin the DVD player. You also teach children not to open thedoor to strangers. This is a case of protecting against internalthreats and mishaps.

    This variety of security from within is where Avayas partner-ship with Extreme Networks brings extra security value.

    Virtual LANs (VLANs) help protect network resources bylogically separating different types of traffic from impact byother activities. Extreme Networks also uses industry-standardprotocols such as 802.1x and LLDP-MED, as well as hostintegrity checking, to validate the permissions of devices toconnect to and use the resources of the network. It can alsoprovide powerful switch-based capabilities that can detectanomalous behavior and identify potentially damaging net-work traffic for further evaluation.

    Finally, just as your entire family can often end up with a coldor virus that is sweeping through your childs elementaryschool, so viruses and security threats can bypass the exter-nally facing firewalls of your enterprise. With 60 to 70 percentof virus and security threats coming from inadvertent actionsof remote workers who bring their laptops back and forthbetween work, home, and public access points, the need toprotect the network, communication systems, and other

    mission-critical business applications and systems from withinis as important as protecting them from overt malicious hack-ing. As recently as October 2006, Apple computer admitted thata small number of their iPOD music devices were inadvertentlyshipped with a PC virus that could infect laptops that they areattached to. No matter how good your network firewall is, youare still vulnerable to a wide variety of attacks from within.

    Converged Network Security For Dummies, Avaya Custom Edition2

  • 7/28/2019 Cns for Dummies

    11/52

    Ready to automatically lock doors as people come and go,childproof the cabinets, and get a flu vaccine? Thats what

    converged network security is all about.

    How This Book Is OrganizedThe primary purpose of this book is to highlight the strategicrole that Avayas two strategic partners, Juniper Networks andExtreme Networks, plus Avayas own Global Services profes-sional services, play in the realization of Avayas vision andleadership in converged voice and data networks.

    Chapter 1: The Importance ofSecuring Converged Networks

    Chapter 1 makes the pitch for securing converged networks.Besides securing your VoIP hardware, you need to protect

    all your assets, including mission-critical applications andservers, such as Customer Service, Unified Communicationsand Web conferencing solutions, and so on. This chapter isnot only about what, but how.

    Chapter 2: Jumping JuniperNetworks: ImprovingSecurity for All

    Chapter 2 describes how Juniper Networks, one of Avayasstrategic partners, contributes to the security of convergednetworks through its product offerings.

    Chapter 3: Extreme Improvementsfor Network SecurityChapter 3 shows how Avayas strategic partner, ExtremeNetworks, contributes to converged network security.

    Introduction 3

  • 7/28/2019 Cns for Dummies

    12/52

    Chapter 4: Plans, Policies, and

    Avaya Security ServicesChapter 4 showcases Avaya Global Services and their securityservices as another strategic partner for assessing securityand developing policy, architecture, and design for yourenterprise network.

    Icons Used in This BookIcons are used throughout this book to call attention to mater-ial worth noting in a special way. Here is a list of the iconsalong with a description of each:

    If you see a Tip icon, pay attention youre about to find outhow to save some aggravation and time.

    This icon indicates technical information that is probablymost interesting to IT professionals.

    Some points bear repeating, and others bear remembering.When you see this icon, take special note of what youreabout to read.

    Where to Go from HereRegardless of where you are in your converged network plan,never lose sight of the big picture: Avaya is the convergednetworks expert and has strategic vision and leadership inintelligent communications, converged networks, and secu-rity. Companies that go with Avaya enjoy all the benefits ofAvayas knowledge, experience, and strategic partnershipswith Juniper Networks and Extreme Networks. Discover for

    yourself why Avaya is the undisputed leader in deliveringintelligent communications solutions.

    Converged Network Security For Dummies, Avaya Custom Edition4

  • 7/28/2019 Cns for Dummies

    13/52

    Chapter 1

    The Importance of SecuringConverged Networks

    In This Chapter Understanding security in converged networks

    Protecting networks and devices in converged networks

    Just look around . . . it seems as though everythingthatbusinesses are doing these days involves the Internet. And

    I dont just mean fancy Web sites with online ordering, buteven the lackluster back-office things: the plumbing, the base-ment storage room, and the loading dock the unsexy stuffis online. Ill bet even the coffee pot has an IP address.

    Consider this phenomenon from another angle. Everything(coffee pot included) is about TCP/IP. Its not just in the com-puter center any more its everywhere! The sheer ubiquity ofTCP/IP technology (and from now on Ill just say IP but I meanthe same thing) is making it more important than before.

    Avaya has been on the leading edge of this revolution bydeveloping communications technology especially Voiceover IP (VoIP) that uses beefed-up enterprise data networks,doing away with the large and largely inefficient and costlyvoice networks. But Avaya isnt alone; strategic converged

    network technology partners Juniper Networks and ExtremeNetworks have been right there on the cutting edge develop-ing the enabling and protective technologies that give Avayaproducts and services even more punch.

  • 7/28/2019 Cns for Dummies

    14/52

    Converged Network Security For Dummies, Avaya Custom Edition6

    Arrival of Converged NetworksCircuit-switched networks are soooo 20th century. Theyreexpensive, underutilized, and definitely notcool. When wasthe last time you read about a killer app that ran on a circuit-switchedphone network? Thought so.

    Success in business today is all about IP. Avaya and theirpartners Juniper Networks and Extreme Networks have beenworking their fingers to the bone on a big mission: getting

    voice and other communications technologies offthe voicenetwork and onto the data network. This new network is stilla data network, but it carries more than just your data, itcarries your voice. Or put another way, your voice is data!

    The new voice-plus-data network is called a converged network.The applications are converged, the protocols are converged,and even the wiring is converged. The single, multi-technologyconverged network carries all kinds of communications. A con-

    verged network is an IP network with the same technology atits core that runs the Internet. But converged networks carrynot just computer-to-computer traffic, but also voice and othertime- and delay-sensitive traffic, too, such as telephony, videoand streaming media.

    In addition to laptops and servers, many cool new devices arefound on converged networks, such asIP phones. Although inappearance just like office phones seen everywhere, IP phones

    are data network devices. They plug into Ethernet networksjust like computers and printers do. To the average user, IPphones are just like office phones, but to the IT manager andthe CIO, they are network devices. And to the CFO and CEO,they are saving the organization lots of money by reducingcommunications costs. (Maybe they thought of this becausewe kept plugging laptops into the phone jack and vice-versa.)

    Protection of ConvergedNetworks and Devices

    So if you thought that data networks were important (theyare!), when you put your phone system on your converged

  • 7/28/2019 Cns for Dummies

    15/52

    network, the network becomes more important than ever.The networks reliability and freedom from jitter (you coffee

    drinkers will be happy to note) is not negotiable. Anyone whoremembers the early days of digital cell phones remembersthe clipping and other bizarre effects that digital transmissionhad on voice. That just wont fly on converged networkstoday.

    Not only is performance more vital, but so is security. Threatsdont originate onlyon the Internet, to be repelled by the fire-wall and antivirus software. Thats the old school of security.

    Threats exist within the network as well from sick laptopsto mobile user carelessness. A new approach for security iscalled for scalable, holistic security that protects the veryfabric of the network.

    Theres more at stake if the converged network is compro-mised. In a converged network environment, if you take thenetwork away, you might as well turn off the power. In fact, ifyoure using Power over Ethernet (PoE) devices, turning off

    the network is the same as turning off the power!

    VoIP-related complexitiesand challenges

    Adding voice to the enterprise network has many advantagesfor an enterprise, but it also makes protecting the network

    more complicated:

    All network devices must operate with minimum latencyin order to assure the quality of performance-sensitiveservices such as VoIP and streaming media.

    All security devices must be specifically aware of VoIPand other multimedia technologies so that they can con-tinue to offer robust protection while not getting in theway of these services.

    Existing security issues Denial of Service (DoS), worms,viruses, spam and so on that plague servers that rune-mail, Web sites and other applications, now also plague theVoIP systems.

    Chapter 1: The Importance of Securing Converged Networks 7

  • 7/28/2019 Cns for Dummies

    16/52

    Evolving protection techniques

    to answer new threatsNot so long ago, if you had a firewall, you were pretty well setfor network security. Firewalls were the only means necessaryto protect data networks from fairly simple threats, which wereunsophisticated and easily brushed aside. When there waslittle for troublemakers to do but vandalize the Web site, fire-walls were all you needed. But as the value of business data onthe Internet increases, the threats are growing in sophistication

    as they try to pry into business data for fun and profit.

    Malware (viruses, worms, and Trojan horses) have more atti-tude and impact than they used to, and insider threats aremore potent than before. And by insider threats, we meanboth the malicious kind and the accidental variety: The classicexample is a laptop or other mobile device that becomesinfected with a worm or virus while it is on the Internet in anunprotected location, then brought back into the network

    where it is free to infect other systems.

    To meet these threats, network design techniques and newsecurity capabilities are available to protect business net-works, including:

    Firewalls: Like a moat encircling the castle, the originalnetwork protector remains the mainstay of perimeter net-work protection. They permit data traffic of known types

    to specific servers and devices such as Web servers,e-mail servers, and VoIP gateways, while rejecting allother intrusive traffic.

    The perimeter isnt just between the enterprise and therest of the world. Juniper Networks firewalls can also beused to protect internal assets by creating security zonesfor internal traffic and then applying the same sorts ofpolicies as they would to external traffic, such as between

    brokers and research analyst organizations in a financialinstitution. See Chapter 2 for more discussion on zonearchitectures.

    Intrusion detection and intrusion prevention systems:These devices perform a more careful examination of net-work traffic than firewalls do. As the name suggests, IDSand IPS devices detect intrusions whether its a hackerprobing your network or a virus using your network to

    Converged Network Security For Dummies, Avaya Custom Edition8

  • 7/28/2019 Cns for Dummies

    17/52

    spread by scanning network traffic for specific signaturesor anomalous traffic patterns. Intrusion detection systems

    generate alarms to notify network personnel that some-thing is amiss, whereas intrusionprevention systems canactually stop the progress of an attack by dropping theoffending traffic much like a firewall.

    Unified access control (UAC) and Network access control(NAC): This newest technique helps to ensure that all con-nections to the network conform to the policies set by theorganization. UAC/NAC is used to authenticate and verifydevices that connect to the enterprise network, devicessuch as PCs and IP phones. The two protocols in use are802.1x andLink Layer Discovery Protocol (LLDP). Each isconcerned with verifying both that the devices are author-ized to connect to the network and also that such devicesare healthy and present no threat to the organization.

    A good UAC/NAC solution does four things:

    Makes sure the device or user is who they claimto be.

    Makes sure the device or user is authorized to usethe network.

    Makes sure the device is healthy and presents nothreat to the organization or the network.

    Quickly reacts to threats and disconnects roguesystems from the network in real-time. This respon-siveness to constantly changing business needs is

    a part of Extreme Networks engaged network andJuniper Networks UAC solutions.

    Network partitioning: Enterprise networks can bedivided into zones based upon business needs. This isaccomplished with VLANs and firewalls, used togetheror separately. Network partitioning is an effective way tosafely deliver high-quality services to a variety of devicesand users, such as IP phones and employees. You caneven enable visitors to use your network to reach theInternet and back into their own corporate networks,without giving them access to any of your own businesssystems or applications.

    MAC and IP Security: Sometimes called wire levelcontroland security, IP security protects the traffic and systemsthat control the network, such as Domain Name Service(DNS) servers or Avaya Communication Manager

    Chapter 1: The Importance of Securing Converged Networks 9

  • 7/28/2019 Cns for Dummies

    18/52

    software. This protection minimizes exposure to Denial ofService (DoS) attacks, spoofing, and so-called man in the

    middle attacks, whether they originate outside the net-work or within it.

    One way to think about IP security is that the network has twomajor layers: theRouting/Firewall layer, which connects LANstogether and to the outside world, and theLAN Layer, whichconnects end user devices to corporate resources like DHCPservers, DNS servers, databases, applications and, of course,communications systems and applications. Within this LAN

    layer are edge switches, typically 24 or 48 ports that supportPCs and IP phones, and aggregation switches that connect edgeswitches to the other resources and router/firewalls. Security atthis layer ensures that no one can plug a rogue laptop into thenetwork and try to steal information or services from otherusers.

    All devices in a converged network communicate using theTCP/IP network protocol, and to a great extent they all partici-

    pate in the great realm of threats and vulnerabilities.

    Understanding threats in todaysbusiness environmentIP communications has facilitated capabilities unimaginedin the past, such as employees ability to work from remote

    locations such as homes, WiFi hotspots, hotels, conferencevenues, and even airplanes, buses and trains.

    This is where the big-I Internet comes into play, as anuntrusted network, over which business communicationsand information will be exchanged with a remote worker orbranch office. Its never enough to just send data across thenetwork you need toprotectit somehow, using means thatreflect an intelligent architecture and good use of resources.

    Remote accessRemote access is the mechanism that provides the just like inthe office connectivity to all of the resources that are normallyavailable to you when you are actually in the office. Withremote access you can get to these resources from anywhere inthe world, so its understandably in demand. Understandably,

    Converged Network Security For Dummies, Avaya Custom Edition10

  • 7/28/2019 Cns for Dummies

    19/52

    also, remote access is vulnerable to threats and can placethe entire converged network at risk. Any entry point into a

    network by legitimate users can be targeted by others too,or simply accidentally put sensitive data at risk. (Read anystories in the news lately about a misplaced or stolen laptop?Besides putting whatever files that are on the laptop at risk,such mobile devices may provide easy entry to top-secretconfidential files elsewhere in the network.)

    People accessing VoIP resources by using either a VoIP phoneor softphone need to know their communications are secured.

    VoIP phones use IPSec VPNs to encrypt traffic from the phoneto the PBX (phone switch). The VoIP phone establishes aVPN tunnelto one of the head end firewalls to get connectedto the corporate network without fear of interference oreavesdroppers.

    Softphone users accessing corporate resources need to beauthenticated, and checked to ensure that the PC from whichthey are logging in is not compromised or introducing worms,

    viruses, or Trojans into the network. This is where technologysuch as Juniper Networks SSL VPN (clientless access) becomesreally important, delivering the performance required for VoIPapplications and also ensuring end-point integrity.

    Avayas VPNRemote for 4600 Series software VPN client isbuilt directly into the Avaya IP telephone itself. This enhance-ment enables you to plug in the Avaya IP phone and use itseamlessly with any broadband Internet connection, such as

    your home DSL or cable modem connection. You can thenexperience the same IP telephone features as if you wereusing the phone in the office simply by plugging the phoneinto your home network.

    External accessRemote access is more than just access to the enterprise net-work for employees, but also access to enterprise applicationsby others, including suppliers, partners, and customers. Suchaccess provides competitive advantage by streamlining theorder and fulfillment of goods and services. But when access tokey enterprise applications is provided to users outside of theorganization, the risk of security incidents rises proportionally.That, together with the arrival of IP-based voice communica-tions, makes network security a matter of vital importance.

    Chapter 1: The Importance of Securing Converged Networks 11

  • 7/28/2019 Cns for Dummies

    20/52

    Internal accessMore than half of corporate virus problems originate from

    within the enterprises network, through employees whoinadvertently pass around infected files, USB drives, or byconnecting their laptops to their unsecured home networksto work on that important proposal over the weekend. Withmore mobile employees in a company, the threat of picking upa virus from a laptop that moves back and forth between theoffice, home, hotels and open WiFi hotspots grows, and UAC/NAC becomes very important.

    Protecting the inside of the corporate network is whereExtreme Networks Sentriant Appliance and Juniper NetworksUAC and IPS/IDS (what Juniper Networks calls IDP) solu-tions can watch network traffic patterns and mitigate theeffects of viruses and malicious traffic. Extreme NetworksSentriant AG also helps to ensure that devices on the networkadhere to pre-defined security access policies.

    Partnering for Better ProtectionCompanies on the cutting edge of converged networking needcomprehensive security solutions, not piecemeal approaches.Technologies based on open standards and market-leadingproducts and technologies that can meet the changing net-work demands of todays enterprise environments give thebest value. Avayas strategic relationships with JuniperNetworks and Extreme Networks advances telecommunica-

    tions and converged network capabilities, making Avaya thefront-runner in todays new offerings.

    Juniper Networks and Extreme Networks provide state of theart protection against the increasing array of threats, protect-ing converged networks from internal and external risks.

    Avayas Global Security Consulting Services is your consultingpartner whether you need risk assessment, policy develop-

    ment, or network and security architecture all delivered byseasoned experts, who know Avaya and other brands of net-work hardware and software.

    Chapters 2 and 3 describe Juniper Networks and ExtremeNetworks security approaches and solutions that may justknock your socks off! Chapter 4 aims to wow!you with Avayassecurity consulting services.

    Converged Network Security For Dummies, Avaya Custom Edition12

  • 7/28/2019 Cns for Dummies

    21/52

    Chapter 2

    Jumping JuniperNetworks:

    Improving ConvergedNetwork Security for All

    In This Chapter Security for office-based users

    Security for road warriors

    Security for remote workers

    Access control

    Deployment scenarios

    Juniper Networks is changing the way people look at secur-ing their converged networks.Organizations are coming to rely upon their converged enter-prise networks for both voice anddata based communications.Certainly converged networks reduce costs and introduce amultitude of business opportunities, yet converged networkscan potentially introduce additional security risks, unless

    they are designed and deployed properly.

    I emphasize designed properly you need to line up strategicpartners such as Avaya and Juniper Networks at the start ofyour converged network project, not after the ribbon-cuttingceremony when someone asks, Oh, by the way, wheres thesecurity?

  • 7/28/2019 Cns for Dummies

    22/52

    Converged Network Security For Dummies, Avaya Custom Edition14

    Juniper Networks provides an impressive array of convergednetwork infrastructure products, including top-quality

    leading-edge routing platforms, firewalls, intrusion preven-tion, application acceleration, and access control solutions.When youre designing the architecture and security of yournew or existing converged network, you can look to JuniperNetworks products to help build as well as secure the network.This chapter describes Juniper Networks security solutionsthat protect converged networks and their services.

    Juniper Networks SecuritySolutions

    Juniper Networks has the full spectrum of best-in-class secu-rity technology for converged networks. This section takesyou through each part of the Juniper Networks portfolio,starting with firewalls, IPSec and SSL VPN, intrusion detection

    and prevention (IDP), and access control. Your tour beginshere; follow me please.

    Firewalls and IPSec VPNJuniper Networks has a nice range of appliances that providefirewall and IPSec VPN capabilities for use in enterprise,branch office, or teleworker setups.

    Secure Services Gateway (SSG) Family.

    NetScreen Firewall/VPN appliances and systems.

    Integrated Security Gateways (ISGs).

    Every Juniper Networks firewall and IPSec VPN applianceincludes an application layer gateway (ALG). JuniperNetworks ALG improves the security of IP telephony byproviding deep-packet inspection of H.323, SIP, SCCP, andMGCP traffic. The ALG dynamically opens pinholes to permitapproved IP phone calls through the firewall. All these sys-tems are high-performance devices and provide highlyavailable, low-latency transport for VoIP traffic.

  • 7/28/2019 Cns for Dummies

    23/52

    Intrusion detection and

    prevention (IDP)Juniper Networks state-of-the-art IDP protects networks atboth the application and network layers. Juniper NetworksIDP does a lot more in one appliance than several other ven-dors do separately. Some of the features found in JuniperNetworks IDP include:

    Day Zero attack prevention: Juniper Networks IDP

    stops worms, Trojans, spyware, key loggers, and othermalware dead in their tracks.

    DoS attack mitigation: Juniper Networks IDP productsunderstand over 60 application-level protocols, includingSIP and H.323, thereby preventing unauthorized incomingor outgoing phone calls and toll fraud.

    Rogue server detection: Juniper Networks IDP candetect rogue servers on the network, giving network

    administrators visibility into rogue servers and how theyare being used.

    SSL VPN secure remote accessSSL VPNs provide secure remote access without the need forseparate client-side VPN software. Juniper Networks offersSSL-based VPN on a wide variety of remote access appliances

    for every size of organization.

    These devices are high-performance devices that ensure thatlatency and jitter-sensitive applications like VoIP are able tofunction as expected in this environment. Juniper Networksuses dual mode transport to ensure that the user gets thebest connection possible in any environment. This includestrying different types of tunnels (IPSec, SSL) for the bestperformance and security. Best of all, its transparent to

    the user.

    Juniper Networks SSL VPNs are certified to work with AvayaIP telephony products such as IP soft phone and IP agents.

    Chapter 2: Jumping Juniper Networks 15

  • 7/28/2019 Cns for Dummies

    24/52

    Network Access ControlJuniper Networks supports several network-based authentica-tion protocols and standards to ensure that only authorizeddevices and users may connect to the enterprise network.Enterprises have long recognized that unauthorized devicescan introduce malware into the organization, therebythreatening the availability of network-based services.Also, unauthorized devices may be an intruders effort toeavesdrop on network traffic or attempt to access protectedinformation, in either case an attempt to steal informationfrom the organization from the inside.

    Juniper Networks has the following means in place to enforcenetwork-level access control:

    Juniper Networks UAC (Unified Access Control) solutionsupports TNC (Trusted Network Connect), a suite of openstandards for network access control developed by theTrusted Computing Group. The TNC specifications aredesigned to help network administrators solve the diffi-cult task of enforcing security policies for network accessin heterogeneous networks with an increasingly diversemix of devices and software.

    802.1X authentication, coupled with Juniper NetworksSteel Belted RADIUS (SBR) for placing IP phones andother devices on appropriate VLANs.

    Coupled with the Extreme Networks switch that supportsLLDP (Link Layer Discovery Protocol), Juniper Networks isable to provide a very comprehensive solution.

    Unified managementA lot of good it would do to implement all of these greatsecurity capabilities if there were no consolidated view of it.

    Consequently, Juniper Networks offers best-in-class central-ized management of its security appliances and productsthat provide comprehensive views of security events,configurations, and performance.

    Converged Network Security For Dummies, Avaya Custom Edition16

  • 7/28/2019 Cns for Dummies

    25/52

    Security Deployment ScenariosAn easy way to understand how Juniper Networks protectsconverged networks is to take a deep dive into three commonscenarios: office-based users, road warriors, and teleworkers.

    Youll see that Juniper Networks can provide firewalls and VPNin all three of these portrayals, and in office-based environ-ments we discuss several additional methods for protectingvital assets.

    Security for office-based usersJuniper Networks product offerings protect all workers work-ing out of any location headquarters or campus, branchoffices, home offices, or on the road. Most importantly, theseproducts protect all converged network components such asIP PBXs, related converged application servers, and other

    applications such as e-mail, databases, and so on.

    Availability of communications services such as telephone,voice-mail, and contact center apps is typically a 24/7 must-have for businesses. Converting these to IP-based technologyexposes them to potential data network threats that must benipped in the bud to ensure availability and integrity of thesecritical services.

    Firewalls/VPNThe leader in protecting converged networks, Juniper NetworksNetscreen Firewalls are essential for defining and defendingnetwork boundaries between and within organizations.

    Firewalls work by enforcing network access policy at the deviceand network service level. Policies specifically permit, or deny,IP communications using specific port numbers to and fromendpoint networks or individual devices. Put another way,

    firewalls block or permit IP packets based only on the sourceaddress, destination address, and port number.

    Juniper Networks firewalls have application level gateways(ALGs) in them that dynamically openpinholes (really littleholes, the packets have to squeeze through sideways) that arepresent only during specific voice calls. This provides network

    Chapter 2: Jumping Juniper Networks 17

  • 7/28/2019 Cns for Dummies

    26/52

    protection that is head-and-shoulders above what the otherfirewall companies can do.

    With Juniper Networks firewalls you can also combine multiplefirewalls into a single hardware device. This facilitates internalfirewalling or partitioning that better protects networks frominternal threats, kind of like bulkhead hatches in a submarine.

    Juniper Networks firewalls have IPSec VPN capabilitiesbuilt in, eliminating the need for separate VPN appliances.The fewer power cords, the better.

    Finally, Juniper Networks firewalls are right at home in high-availability environments where you have multiple networkentrances, front-end routers, and so on you know, the full-mesh full-meal deal for ultra-high-demand environments. All ofthese features are critical for todays VoIP environments.

    Intrusion Detection and PreventionWhen you plan and design your converged network, you needintrusion detection and prevention systems. Juniper Networksoffers Intrusion Detection and Prevention (IDP) products thatdetect and block network-based security threats. JuniperNetworks IDP capabilities are available in dedicated hardwareproducts, and can also be integrated into security gatewaysas well. Which way to implement IDP depends upon thenetworks architecture, performance, and security policies.You can put em anywhere and everywhere: at the edge,between zones, or wherever. And because theyre integratedinto Juniper Networks other products, you need no additionalpower cords to trip over.

    Juniper Networks IDP solutions protect SIP, H.323, and H.225services, as well as legacy and traditional network servicessuch as Web and e-mail. It supports multiple methods of attackdetection and prevention including stateful signatures, protocolanomalies, backdoor detection, traffic signatures, networkhoneypot, DoS detection, and so on. It can drop the number ofattacks because it can be deployed inline or in sniffer mode.High-performance devices ensure minimal delays in VoIP traffic.

    Unified Access ControlUnified Access Control (UAC) represents an assortment ofservices that protect an enterprise network by permitting

    Converged Network Security For Dummies, Avaya Custom Edition18

  • 7/28/2019 Cns for Dummies

    27/52

    only known, healthy devices to connect and communicate.UAC prevents unsafe devices such as unpatched typhoid

    Mary laptops from threatening the enterprise with viruses,worms, Trojans, and other digital crud.

    UAC works by authenticating and permitting known devicessuch as laptops, hardphones, and softphones that connect tothe network. UAC can also assert and enforce policies in con-junction with the Juniper Networks Netscreen firewall and SSGappliances, to ensure that devices get access to only pre-authorized network resources. No free rides! Further, UAC

    ensures that such devices have the right settings and charac-teristics such as anti-virus and device configuration. Think of itis as the automatic equivalent of You must be this tallto usethe network.

    UAC prevents inside threats from disrupting network servicesinside the network. A common scenario that has played outin many enterprises is the employees laptop computer thatbecomes infected with a worm or Trojan while connected to

    an unprotected network such as public WiFi access point.Then the employee brings the laptop into the enterprise,often bombarding the network with high-speed disruptiveattacks that threaten the availability of critical services.

    DoS protectionDenial of Service (DoS) attacks have the potential for render-ing any IP-based application or service unavailable for use.Increasingly, such attacks originate from hundreds or thou-sands of locations, making simple router or firewall filteringimpractical and ineffective.

    Juniper Networks high-performance firewalls and IDP appli-ances ensure protection against DoS attacks by effectivelyabsorbing even the highest volumes of attacks.

    Integrated Security Gateways

    Juniper Networks Integrated Security Gateways (ISGs) canbe deployed in-line to protect key voice infrastructure fromexternal attacks. These attacks include Denial of Service(DoS), worms, and Trojans. In addition to firewall capabilities,this product line integrates IDP functionality into the samedevice. These are data-centerclass products designed forrugged enterprise-class service and reliability.

    Chapter 2: Jumping Juniper Networks 19

  • 7/28/2019 Cns for Dummies

    28/52

    Because ISGs can be installed in-line, often this installationdoesnt require an expensive change in the architecture of the

    enterprise network. Also, installation of the ISG is minimallydisruptive because it requires only a couple of patch cordchanges in the infrastructure. Theyre a network engineersdream!

    You can also integrate Juniper Networks ISG with intrusiondetection and prevention. You can plug an IDP blade into theJuniper Networks ISG 2000 and ISG 1000 to get the IDP func-tionality available in standalone appliances. The Juniper

    Networks ISG 2000 and ISG 1000 with integrated, best-in-class IDP stops worms, Trojans, spyware, malware, andother emerging attacks from penetrating and proliferatingthrough the network.

    Application Layer GatewaysJuniper Networks Application Layer Gateways (ALGs) providespecific protection for SIP and H.323 gateways. SIP and H.323,the centerpiece protocols for VoIP and other new-media appli-cations, perform a lot of dynamic port activities, which pose achallenge for traditional firewalls. An ALG is needed to ensuremaximum protection by permitting only active connectionswithout holding open unused ports as firewalls do. JuniperNetworks ALGs run on all Juniper Networks firewall, VPN, andISG devices.

    Heres how they work: The H.323 and SIP ALGs negotiate layer3 and 4 information, which means they listen to the controlconnection and dynamically open and close H.323 and SIPports (also known as pinholes) through the firewall only forthe duration of the call. This ability enables a higher level ofsecurity within the network because the ports that are neededremain open only for the duration of the call. When the call hasended, or is unexpectedly disconnected, the ports (pinholes)are closed. This system keeps the rest of the ports in deny(block) state, providing significantly tighter access controlprotection than a traditional firewall. Talk about smart!

    For even greater access control protection, administratorscan set a policy that blocks calls from certain parties or net-works, or that allows calls only from specific partners atspecific times. You might call that call blocking on steroids!

    Converged Network Security For Dummies, Avaya Custom Edition20

  • 7/28/2019 Cns for Dummies

    29/52

    Zone-based architectureAnother approach to protecting enterprise networks is toimplement zone-based architecture. In a zone-based environ-ment, the network is segregated into physical and logicalzones based upon access needs, both within the enterpriseand among branch offices, and also external entities such aspartners and suppliers.

    The security challenge is to segment the network, enablingcommunications with specific partners and customers, with-out permitting their access to the rest of the network.

    Chapter 2: Jumping Juniper Networks 21

    Establishing network security zonesRather than running an old-schooltwo-zone (internal, external/Internet)network, you can divide your entireorganization into zones based uponbusiness function. You can do thismany ways, but here are just a fewsimple ideas that may help you tofigure out what sort of a zone archi-tecture is right for you:

    Separate office networks fromdata centers. From the perspec-tive of the data center, you can

    treat the office network as anexternal network with lesstrust. This option aligns withmany organizations that permittheir users to install software ontheir own.

    Separate product developmentand test networks from the restof the organization. This optionallows for an added measure ofcontrol in both directions: Youcan keep the test environmentpristine and free from interference,and you can contain development

    networks in case the program-mers get a little out-of-control.

    Separate manufacturing or cus-

    tomer contact areas. These poten-tially sensitive areas may requireprotection not only from the out-side world, but may have theirown access control policies thatare easily enforced through net-work zones.

    Separate business units. If yourorganization is large and hassemi-autonomous infrastructuremanagement, you can use zone-based architecture almost likeboundaries separating the king-doms within your federation.

    Use a separate extranet zone. Ifyour organization has a lot ofinteraction with third parties, you

    can cordon them off in their ownzone, where their activities areless prone to disrupt the rest ofthe enterprise.

  • 7/28/2019 Cns for Dummies

    30/52

    There are almost as many ways to design a zone-based archi-tecture as there are ways to arrange the furniture in your

    living room.

    Juniper Networks firewall and Integrated Security Gateway(ISG) solutions enable inter-zone and intra-zone access, whichenables separation of converged network segments to ensurethat access policies are applied.

    Eavesdropping prevention with VPNUsers of telephone networks have the expectation that theircalls are private and not subject to eavesdropping (except, ofcourse, for legal law enforcement wiretaps). Analog circuit-switched telephone networks are physically separate fromdata networks and are, for the most part, impervious from thesame sorts of threats that are dogging the Internet.

    So, one might assume that IP-based phones are less safe thantheir analog, circuit-switched counterparts because IP phonescommunicate over data networks, including the Internet.

    In reality, IP phones and IP-based communications, evenamong different organizations (and even when using theInternet as the go-between) are every bit as safe. Designedwith security in mind, Avaya phones and soft-phones employencryption that protects conversations from eavesdropping.Organizations that connect their IP voice networks to oneanother can (and should!) use VPN technology to encryptvoice traffic as it traverses the Internet.

    These encryption technologies make VoIP as safe as(and some would argue even saferthan) traditional circuit-switched communications. If someone is able to intercept theactual packets in a VoIP conversation, even with a concertedeffort it would be exceedingly difficult (and time consuming)to decrypt the conversation and learn what it contained.

    Further, road warriors who use SSL VPN are also ensured ofencrypted traffic flow from their laptop to the corporate HQ.I go into more detail on protection for road warriors in the fol-lowing section.

    Converged Network Security For Dummies, Avaya Custom Edition22

  • 7/28/2019 Cns for Dummies

    31/52

    Security for Road WarriorsA growing number of employees today work remotely or whileon the road for business and road warrior employeesrequire the same level of protection as if they were in the

    office. Juniper Networks provides secure remote access withclientless VPN access through VPN appliances. These connec-tivity mechanisms work seamlessly with Avaya IP Softphones.

    The two types of VPNs available are IPSec VPN and SSL VPN.In addition to IPSec and SSL VPNs, Juniper Networks offersadditional encryption using DES, 3DES, and AES encryption,to prevent eavesdropping of data and voice communicationsbetween endpoints.

    Juniper Networks provides clientless SSL VPN for client con-nections to enterprise Web and application servers. SSL VPN isthe preferred technology of choice for remote connectivity; theadvantage here is that Network Managers do not need to worryabout maintaining additional client software on users worksta-tions. SSL VPN technology enables access to applications

    Chapter 2: Jumping Juniper Networks 23

    Juniper Networks supportsAvayas unique solutionsJuniper Networks brings unique andpowerful technical advantages toAvayas capabilities.

    Security features such as firewall,VPN, and other security services

    can be activated in the JUNOSoperating system with a minimallevel of impact to the throughputand processing power of the rout-ing platform. This OS is available onall of Juniper Networks J-seriesand M-series routing platforms.

    The Avaya IG550 Media Gatewaywas jointly developed by Avaya

    and Juniper Networks. This gate-way can be installed in JuniperNetworks J-series J4350 andJ6350 routers. It permits enter-prises to deploy single high-performance platforms that offer

    firewall, VPN, routing, and IPtelephony services all in one box.

    These two examples illustrate howJuniper Networks technical savvyworks with Avayas powerful innova-tions to put capabilities where theycount: into your hands.

  • 7/28/2019 Cns for Dummies

    32/52

    including Avaya IP Softphone. This technology also ensuresthat users get access to network resources from any PC or

    kiosk (a public Web-connected terminal).

    Security for TeleworkersTeleworkers work in and on enterprise applications as thoughthey were physically on the premises, but they work at homeor other locations. They require high-bandwidth access tonetwork-intensive applications, and they need voice commu-

    nication that is so highly integrated with the enterprise phonesystem that their location is all but irrelevant. Ten years agothis was a pipe dream, but its routine for Avaya customerswho want such service today.

    Because teleworkers communications often traverse theInternet, their endpoints must be protected from externalattack, and their voice and data traffic must be protected fromeavesdropping.

    Juniper Networks SSG appliances offer simple, integratedsolutions that provide firewall, VPN, and other capabilitiesincluding anti-virus, anti-spam, anti-spyware, anti-adware,anti-phishing, Web filtering, and IPS functionality.

    VPNA VPN connection is needed to protect the communicationsbetween the teleworkers workstation(s) and the enterprise,

    preventing eavesdropping and alteration of transmitted dataand voice.

    Depending upon what equipment and services are required, ateleworker may have a network-to-network IPSec VPN, wherean appliance at the teleworkers location encrypts all trafficbetween it and a VPN server in the enterprise network, or theteleworker may use an SSL VPN. In either case, all communi-cations between the teleworkers location and headquarters

    can be automatically and transparently encrypted.

    Another common means for encrypting communications is toemploy VPN capabilities on the teleworkers workstation andIP phone. A company can use either SSL or IPSec tunnelingtechnologies.

    Converged Network Security For Dummies, Avaya Custom Edition24

  • 7/28/2019 Cns for Dummies

    33/52

    Juniper Networks branch office SSG (Secure Service Gateway)products offer full firewall and VPN along with UTM and IDP

    capabilities for teleworkers, including wireless routing capabil-ities. Avaya IP phones work with all of these VPN capabilities,often seamlessly.

    FirewallA teleworkers environment needs to be protected againstnetwork-based threats that originate in the Internet and aredirected towards the teleworkers systems and devices.Because the teleworker is not physically located in the enter-prise, their equipment is not protected by the enterprisesfirewall(s) and other protective means including IDP.

    A Juniper Networks SSG (Secure Service Gateway) firewallappliance can protect all equipment including workstationsand IP phones from all external threats aimed at the network,providing the same level of protection enjoyed in centralenterprise networks.

    Deploying Juniper NetworksSolutions

    Companies have a lot of ways of putting together convergednetworks and can choose from a number of ways and meansfor securing them with solution from Juniper Networks.

    Working with Avaya, Juniper Networks can make implementa-tion of your chosen path to converged network security asmooth one.

    If your organization uses VoIP entirely within the enterprise,then you need to protect its VoIP and converged networkinfrastructure from common threats:

    Zone-based security: Protect the organizations hybrid

    or IP PBX from non-related traffic and general networkthreats such as worms and Trojans.

    DoS protection: The PBX needs protection from high-volume attacks that can occur internally or reach thePBX from internal and external sources.

    Unified Access Control: Protect critical resources andprovide end point authentication.

    Chapter 2: Jumping Juniper Networks 25

  • 7/28/2019 Cns for Dummies

    34/52

    If the enterprise has connected its VoIP capabilities withexternal entities, then you need additional protection, such asthe following:

    VPN tunnels: Employees who require remote access fortheir IP phones will require IPSec or SSL VPNs so thattheir IP phones can communicate with the PBX.

    Application layer gateways: ALGs provide logical con-nectivity for VoIP networks residing in branch offices,remote locations, and other places.

    In more complex architectures, a variety of choices and solu-tions are available to solve these same security issues.

    Converged Network Security For Dummies, Avaya Custom Edition26

    Corporate Profile: Juniper NetworksJuniper Networks has a cracker-jackdevelopment organization that buildspurpose-built, high-performance IPplatforms that enable customersto support a wide variety of servicesand applications at scale. Serviceproviders, enterprises, governments

    and research and education institutions

    rely on Juniper Networks to delivera portfolio of proven networking, secu-rity and application acceleration solu-tions that solve highly complex,fast-changing problems in the worldsmost demanding networks. Additionalinformation can be found at www.

    juniper.net.

  • 7/28/2019 Cns for Dummies

    35/52

    Chapter 3

    Extreme Improvementsfor Network Security

    In This Chapter Network access control

    Segmentation

    Threat mitigation

    Extreme Networks has what it takes to protect an enter-prise network from the inside-out. Extreme Networksbuilds advanced security features into its switches androuters, and offers some impressive security appliances thatprotect networks from disrupting security events.

    As I explain in Chapter 1, security in a converged network is notjust a perimeter challenge, solved with firewalls and IPS its

    also vital to protect the network from within. Security threatsdont originate only outside the network, but within it as well.This is why Avaya chose Extreme Networks to be a strategicpartner.

    Extreme Networks has a rich portfolio of network infrastructureand security devices, ranging from 1U appliances to giganticenterprise switches (read: lots of blinking lights). ExtremeNetworks principal means for protecting networks are network

    access control, network segmentation, and threat mitigation.

    Network Access ControlIn its product families, Extreme Networks includes powerfulaccess control capabilities that protect your converged net-work from security and performance problems. By integrating

  • 7/28/2019 Cns for Dummies

    36/52

    Converged Network Security For Dummies, Avaya Custom Edition28

    access control into the network, organizations can breathe abit easier knowing every port is under their complete control.

    Extreme Networks offers many access control options to meeta variety of needs for voice, data, and casual network access.In order to understand the available options, this section pro-vides a brief introduction to access control concepts.

    Network access control typically consists of two or three keyphases, or steps:

    1. The user or device needs to be identified or authen-ticated. This step might involve a user password,validation of a unique hardware address, or theexchange of other credentials.

    2. The system can test the health and configuration ofthe device to determine whether it meets minimumsecurity policies.

    3. After the connection is approved, you may want to

    limit where the traffic can go and you may need to pro-vide certain services (such as voice priority) to ensuresecurity and performance. I cover that last step in thesection Network Segmentation, later in this chapter.

    Extreme Networks uses the termphysical access to mean theability for end user devices to connect with and utilize systemsand resources that are also connected to the enterprise net-work. These products dont necessarily prevent someone from

    physically and literally touching the network equipment andcabling.

    Authenticating users or devicesAuthentication is the process of validating the identity of adevice or user. This essential first step is necessary before auser or device is permitted to connect to and communicate

    on the network. Just plugging into the Ethernet wall jackdoesnt mean youre connected automatically. If you cant getpast Extreme Networks authentication, youre out in the cold orplaced into a guest access VLAN (sometimes called a quarantineor ajail). In a guest VLAN you can have access to mitigationresources or access to specified resources (and hopefully youcan call for help). Network administrators have many optionswhen using Extreme Networks solutions.

  • 7/28/2019 Cns for Dummies

    37/52

  • 7/28/2019 Cns for Dummies

    38/52

  • 7/28/2019 Cns for Dummies

    39/52

    The authentication phase is the best time to gather moreinformation about the device or user after all, you may

    want to limit or enhance the connection based on what youfind out. For example, if the device is a phone, you may wantto place that traffic into a virtual network that has a higherpriority than other virtual networks. Or you may want to quar-antine a laptop if its virus software isnt up to snuff.

    Extreme Networks offers some powerful tools to detect moreabout a user or device, such as theLink Layer Discovery

    Protocol (LLDP), a vendor-neutral protocol that gives a net-

    work device a standardized way to proclaim its identity andcapabilities to the network. Extreme Networks has adoptedand implemented LLDP specifically for Avaya IP handsets,enabling the handsets to be identified, configured, andpermitted to access the network, automagically, that is,automatically without end-user awareness or involvement.

    LLDP is now a formal standard, IEEE 802.1AB-2005. The MultipleEndpoint Discovery (MED) extensions to LLDP have been

    adopted by the Telecommunications Industry Association asANSI/TIA-1057. The MED extensions allow security policies toauthenticate and treat a combined connection for an IP Phoneand PC as separate devices, as though they had completelyseparate physical switch connections. This extra authentica-tion keeps visitors or intruders from being able to accessnetwork resources by plugging unknown laptops or mobiledevices into Ethernet connections on the back of IP Phones(or even trying to unplug the phone and using its existing net-

    work connection for new devices). Extreme Networks findsthese stowaways and throws them overboard!

    So when you need to add a phone for a visitor from anotherbranch office, no problem: Simply plug in one of theseself-announcing phones and it tells the network, Hello, Imhere! and you have a secure end-point for your guest.

    The network can still require users to authenticate themselves

    on the network prior to being able to use their IP handsets.

    Host integrity checkingHost integrity checkingis an emerging technology that works toensure that each device meets specific configuration require-ments and conforms to local security policies. Like a doorman

    Chapter 3: Extreme Improvements for Network Security 31

  • 7/28/2019 Cns for Dummies

    40/52

    who looks you over to make sure youre properly dressed fora fancy restaurant, host integrity checking looks over your

    computer to make sure it wont spoil the network managersday by infecting the enterprise with some nasty worm orvirus. Come to think of it, this could spoil the day for a lot ofother people in the organization too.

    The Extreme Networks Access Management solution,Sentriant AG, provides much-needed network quarantine capa-bilities, wherein devices such as sick laptops (that potentiallythreaten the integrity of the network) are not permitted to

    connect to corporate services until such devices conform topolicies. If your laptop doesnt play well with others, ExtremeNetworks wont let it play on your network.

    Users whose laptops dont meet site-specified requirementscan be directed to a download page where they are requiredto download and install needed components before being per-mitted access to the network.

    Network SegmentationFor performance and security reasons, companies may need tologically separate voice and data networks from one another.Its not that they dont get along, but rather because their secu-rity and performance needs are different. Extreme Networkshas several techniques available for accomplishing this goal.

    Virtual LANsExtreme Networks VLAN(Virtual LAN) implementation per-mits the separation of voice and data traffic on the network.This enables logically-separate networks to share the samephysical network wiring, while maintaining logical separationneeded to meet performance and security needs. This wouldbe like putting all of your clothes in the same load of laundry,

    white clothes and colored clothes together, but having thewasher and the soap treat each kind of clothes distinctly, sothat everything turned out perfectly.

    VLANs are logically-partitioned networks that exist on a singlephysical network. VLANs permit network architecture changeswithout having to change anything physical such as networkwiring.

    Converged Network Security For Dummies, Avaya Custom Edition32

  • 7/28/2019 Cns for Dummies

    41/52

    IEEE 802.1Q is the dominant standard for the definition andmanagement of VLANs.

    Wire-speed encryptionEncryption is an even stronger technique for segregating trafficon a single physical network. When you want to protect trafficbetween two sites within a network, between two buildingson a campus, or even between two buildings across a WAN,encryption is essential. Yet encryption is often associated withperformance degradation. Not so with Extreme Networks.With wire-speed encryption, sensitive network traffic is routedto an Extreme Networks Sentriant CE150 security appliance forgigabit speed, full-duplex encryption while less sensitive trafficflows directly to the network.

    The Sentriant CE150 supports several forms of encryption,including AES: FIPS 197 (128, 192, 256 bit keys) and 3DES:ANSI X.952 (168 bit keys).

    Access control listsExtreme Networks switches support robust, dynamic accesscontrol lists (ACLs). Extreme Networks products support ACLsat wire speedso that enterprises dont get penalized in perform-ance for implementing numerous access lists. This versatilesecurity measure gives you the power to control traffic basedon application, IP addresses, ports, or pretty much anything

    else you see in the data packets header. An enterprise canuse ACLs to prevent unwanted traffic from being delivered toIP phones and other converged network equipment.

    One interesting application for ACLs is the creation ofwhitelists (lists of permitted devices) that enable you to spec-ify which phones or devices are permitted on a given LAN.

    Threat MitigationRemember, threats dont just originate out there on theInternet, but sometimes in here as in from within theenterprise network. Infections and other trouble can originateinside the network, whether from a visitors wireless PDA oreven on trusted laptops if someone inadvertently opens aninfected application from a USB key or MP3 player. Extreme

    Chapter 3: Extreme Improvements for Network Security 33

  • 7/28/2019 Cns for Dummies

    42/52

    Networks has two remedies for this: IP security andVirtualized Security Resources. Extreme Networks threat

    mitigation capabilities make an essential contribution toExtreme Networks extraordinary performance under duress.

    IP and MAC securityWhen technologies like Ethernet and IP were first designed,the trust and integrity of the infrastructure services was agiven. History has proven that to be a short-sighted assump-

    tion. In response, Extreme Networks has devised severalmethods that prevent an attacker from undermining IP com-mand and control protocols and compromising the network.In each case, Extreme Networks beefs up well-known andopen services that have been around for years:

    Trusted DHCP: Prevents untrusted or rogue DHCPservers from interfering with network operation.

    Gratuitous ARP (Address Resolution Protocol) identifi-

    cation: Prevents ARP cache poisoning that can disruptnetwork communication.

    ARP validation: Prevents ARP-based man-in-the-middleattacks.

    Disabled ARP learning: Also prevents ARP cachepoisoning that disrupts network communications.

    Source IP lockdown: Prevents IP spoofing by rogue net-

    work nodes.MAC limits: Prevent unauthorized access and MACaddress spoofing.

    These methods prevent many types of malicious attacks fromoccurring on the network, including those which can interferewith, or permit eavesdropping on, VoIP services.

    Virtualized Security ResourcesExtreme Networks revolutionary Virtualized SecurityResources (VSR) model mitigates threats across the organiza-tion by engaging the network to project advanced securitycapabilities across the infrastructure. As a result, you avoidexcessive costs by enabling the network to share the securityburden, and you eliminate availability risks by avoiding in-line

    Converged Network Security For Dummies, Avaya Custom Edition34

  • 7/28/2019 Cns for Dummies

    43/52

    security approaches. You also enjoy lightening-fast responsive-ness to emerging threats with a solution that quickly identifies,

    analyzes, and classifies new threats by using advanced tech-niques to confront specific types of attacks.

    Virtualized Security Resources work by allowing specialized,dedicated security solutions to engage the network for detec-tion and enforcement of security events. This approach freesup the security resource to focus on the more challengingtasks of analysis and decision-making.

    Sentriant (see Figure 3-1) is an exciting example of how a VSRcan extend protection across the entire network. Sentriant usesadvanced analysis techniques to accurately identify rapidly-propagating attacks such as Day Zero attacks and rapidlyspreading worms. Sentriant receives anomalies from CLEAR-Flow (Extreme Networks hardware-based, switch-integratedinstrumentation capability), makes on-the-spot decisions,and then tells the switch whether to permit the traffic tocontinue, quarantine it to a specific LAN, or shut down the

    port completely.

    Figure 3-1: Sentriant is the key engine that starts Extreme Networks

    intrusion detection capabilities.

    Deploying Extreme NetworksSolutions

    Because networks can be designed and deployed many ways,Extreme Networks has products that provide connectivity andsecurity for all sorts of enterprises.

    Chapter 3: Extreme Improvements for Network Security 35

  • 7/28/2019 Cns for Dummies

    44/52

    Organizations that use VoIP need to protect their convergednetwork from security threats:

    Network Access Control: Secure authentication fromExtreme Networks ensures that only known, trusted,healthy devices may connect to the enterprise network.LLDP permits Avaya handsets and softphones to authen-ticate to the network automatically.

    Network Segmentation: Extreme Networks VLANs andAccess Control lists ensure that latency-sensitive voiceand video communications function well and unimpeded.

    Wire-speed encryption protects sensitive communica-tions including voice and video.

    Threat Mitigation: IP address security and VirtualizedSecurity Resources combine to deliver a network thatsuniquely capable of mitigating attacks that threatenthe network interior. Enhanced IP security featuresstrengthen conventional services such as DHCP and ARP.As a result, you enjoy unparalleled network uptime andgreat performance under duress (of the network kind; ifyou are under pressure to get that status report done sorry, youre on your own).

    Extreme Networks has the network and security products andfeatures that fit every type and size of organization.

    Converged Network Security For Dummies, Avaya Custom Edition36

    Corporate Profile:Extreme Networks, Inc.

    Extreme Networks designs, builds,and installs Ethernet infrastructuresolutions that help solve the toughestbusiness communications challenges.The companys commitment to open

    networking sets it apart from thealternatives by delivering meaningfulinsight and unprecedented control toapplications and services. Extreme

    Networks believes openness is thebest foundation for growth, freedom,flexibility, and choice. The companyfocuses on enterprises and serviceproviders who demand high per-

    formance, converged networks thatsupport voice, video and data over awired and wireless infrastructure.

  • 7/28/2019 Cns for Dummies

    45/52

    Chapter 4

    Plans, Policies, and AvayaSecurity Services

    In This Chapter Protecting increasingly complex networks

    Dealing with the growing tide of regulation

    Recognizing that no network is an island

    The way-cool advances in network technology are really aboon to businesses that use them. However, down at thenuts-and-bolts level, implementing and protecting these net-works is getting harder. You need more than a man (or woman)with a badge; you need help from Avayas Security ConsultingServices.

    Understanding Avayas SecurityConsulting Services

    As you pile more complicated services such as VoIP onto yourdata networks, securing those networks is a lot more scien-tific than it used to be. Avaya Security Consulting Serviceshelps you create and maintain secure network infrastructures

    for converged networks.

    Unauthorized access to sensitive data and resources is anincreasingly serious concern for todays businesses. Today,more information and more sensitive information isshared by greater numbers of people. Network security hasbecome critical, often all the way to the boardroom level.

  • 7/28/2019 Cns for Dummies

    46/52

    Converged Network Security For Dummies, Avaya Custom Edition38

    Avaya Global Services has expertise not just with voiceand data networks, but also in converged technologies in

    multi-vendor network environments. Whether youre usingIP-enabled PBX applications, IP Telephony, VoIP, UnifiedMessaging, or Customer Service applications, Avaya GlobalServices provides a solid platform of services that protectall your enterprise information and network assets.

    Avayas Security Consulting Services performs three primaryservices:

    Security Assessment: Avaya performs a comprehensivereview of your current network security posture. Thisassessment helps identify the security vulnerabilitiesthat exist, where they are, and how to fix them.

    Security Policy Development: Avaya helps develop anetwork security policy that will most effectively protectyour assets and intellectual property with minimal dis-ruption to your business operations.

    Security Architecture & Design: Avaya developsthe blueprint for a successful security infrastructureimplementation.

    Why You Need Avayas SecurityConsulting Services

    Todays semipermeable networks have more complex archi-tectures, involve active and frequent communications withoutside entities such as customers and suppliers, and are bytheir nature more difficult to protect. Many organizationsdont have the expertise to go it alone. Avayas SecurityConsulting Services understands these challenges and isprepared to meet them.

    New services introducenew vulnerabilitiesAs services are added to the enterprise network, the numberof vulnerabilities increases proportionally, if not exponen-tially. The vulnerabilities increase further when these services

  • 7/28/2019 Cns for Dummies

    47/52

    are made available to those who are physically outside of theorganization: remote access, VoIP, web applications, and

    extranets all can make networks more vulnerable, unless theyare properly secured.

    Rather than focus on point solutions for protecting each newservice, Avaya considers the big picture and develops holisticsecurity solutions that protect your converged network andthe vital services that it supports.

    ExpertiseGone are the days when building a network meant plugging allof the workstations and servers into big hubs, and implement-ing a router ACL or simple firewall for the Internet connection.Although the convergence of voice, data, and multimediaservices is making overall business environments simpler,the networks themselves are becoming more complicated.

    Avayas Security Consulting Services engineers and architectshave expertise with not only Avaya equipment but with allvendors products.

    RegulationIn the 1990s in most industries, securing networks meantdoing just enough to stay out of the newspaper headlines

    with news of the latest big security breach. Sure, even then,security was a good idea, but one fundamental change hasoccurred: security is now the law.

    Another key change is that systems such as voice mail, IVRs,and IM applications, as well as recorded conversations in callcenters, can become part of your corporate electronic recordonce recorded, and are therefore governed by many of thesedata security, protection, and retention policies.

    For example, some of the more prominent data security regu-lations that you need to be aware of include:

    GLBA (Gramm-Leach-Bliley Act) requires all financialservices companies to adequately protect their cus-tomers private information from improper disclosure.

    Chapter 4: Plans, Policies, and Avaya Security Services 39

  • 7/28/2019 Cns for Dummies

    48/52

    HIPAA (Health Insurance Portability and AccountabilityAct), in particular its Security Rule, requires all institu-

    tions that store or process medical information providespecific means for protecting that information.

    Sarbanes-Oxley requires a high degree of integrity in anorganizations financial accounting applications and allsupporting infrastructure.

    PDD-63 (Presidential Decision Directive-63) requiresprotection of national critical infrastructures such astelecommunications, utilities, banking and financial

    systems, and transportation.

    I could list more, but you get the idea.

    There are also a number of regulations imposed by organiza-tions and industry groups, most notably the PCI DSS (PaymentCard Industry Data Security Standard), which applies to allonline merchants and other organizations that store or trans-mit credit card numbers, requires specific and comprehensive

    safeguards on credit card numbers and related information.

    Many of these regulations require or imply the use of regularinternal or external auditing, and/or the preparation ofreports of compliance to relevant governing bodies.

    Knowing how to be in compliance with these regulationsrequires considerable expertise. Using guidance from yourorganizations legal department, Avayas. Security Consulting

    Services can help get your systems and networks intocompliance.

    Even old technologyis still importantIf you carefully consider how to secure your network by

    configuring your firewalls, routers, IPS/IDS and network LANswitches, youre off to a good start. But in truth, youve reallyonly scratched the surface when it comes to security planning.

    Converged network security planning means also consideringhow to secure all the devices and applications that are con-nected to that network. You need to determine how to secure

    Converged Network Security For Dummies, Avaya Custom Edition40

  • 7/28/2019 Cns for Dummies

    49/52

    systems at the operating system level, enable security andencryption features on wireless LAN access points, and

    encrypt VoIP traffic moving between IP phones and IP PBXsystems. Then you may wonder: What about all the non-IPstuff still in the system?

    Even though the world is moving towards end-to-end IPnetworks for all sorts of services, you probably still haveconnections to the public switched telephone network (PSTN)for long-distance services, and perhaps even inbound andtoll-free lines that enable outsiders to access many of your

    communications systems, especially voice-mail systems,audio-conferencing bridges, and fax machines.

    Just because youre migrating an old PBX system to a new IPtelephony solution doesnt mean you can stop worrying aboutthings like theft of service from unauthorized use of networkbandwidth, toll fraud, and subscription fraud in addition tothreats of service disruption and privacy issues.

    Avayas consulting and systems integration experts look atyour entire network, not just the data network elements, andcan help you identify places where your communications appli-cations may still be exposed to misuse and fraud, even if youvelocked down the IP network. So, you dont have to worry thatsomeone may use your audio bridge or Web conferencingsystem to plan parties with their friends and on your dime.

    Access to network services is more important than ever, and

    yet the network perimeter is becoming almost impossible todefine. Intranets, extranets, VPNs and other remote accessservices blur the definition of a trusted user, and criticalcorporate data may be located on handhelds, laptops,thumbdrives, phone anywhere.

    Chapter 4: Plans, Policies, and Avaya Security Services 41

  • 7/28/2019 Cns for Dummies

    50/52

    Learn More!

    Available FREE from www.avaya.com

    Peter H. Gregory,CISA, CISSPSecurity speaker and columnist,author ofBlocking Spam &Spyware For Dummies

    A Reference for the

    Restof Us!

    FREE eTips at dummies.com

    AvayaLimitedEdition Realize VoIP

    benefits andstay secure!

    VoIPSecurity

    ComplimentsofAvaya

    LeaderinIPtechnology

  • 7/28/2019 Cns for Dummies

    51/52

  • 7/28/2019 Cns for Dummies

    52/52

    This Avaya custom edition ofConverged Network Security For

    Dummies shows you how to protect the communications and

    business application assets that you rely on to run your business.

    Find out how Avaya Strategic Alliance partners Juniper Networks and

    Extreme Networks provide multi-layered, industry-leading security

    infrastructures and how Avaya Security Services can help you

    assess, deploy, and ultimately protect your networks. As

    an IT manager or decision-maker, youll appreciate the way that

    these converged network security solutions protect your corporateassets and infrastructure not only from external threats but also from

    threats within the ever-more-mobile business environment.

    And once youve secured your converged network, check out Avayas

    limited edition ofVoIP Security For Dummies for more hints on how to

    effectively secure your Avaya IP Telephony solutions. Available from

    www.avaya.com.

    @

    Find listings of all our books

    Choose from many differentsubject categories

    Sign up for eTips atetips.dummies.com

    Is your converged voice, video,

    and data network safefrom threats, both internal and external?

    ExplanationsinplainEnglish

    Getin,getoutinformation

    Iconsandothernavigationalaids

    Toptenlists

    Adashofhumorand fun

    Protect your mission-criticalcommunications systems and

    networks from harm

    Ensure that security

    spans the entire

    enterprise network

    Use Juniper Networks

    and Extreme Networks

    comprehensive security

    solutions for converged

    networks

    Extend remote access

    to employees without

    compromising security

    Develop convergednetwork security

    policies with Avaya

    Security Services