voip security and mitel ip telephony solutions - ash … · voip security and mitel ip telephony...

42
VoIP Security and Mitel IP Telephony Solutions Dan York Chair, Mitel Product Security Team February 2006

Upload: vanhuong

Post on 03-Apr-2018

226 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

VoIP Security and Mitel IP Telephony Solutions

Dan YorkChair, Mitel Product Security TeamFebruary 2006

Page 2: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 2

The Challenge of Security

Understanding VoIP Security Threats

Mitel Security Solutions

Tools, Contacts, Help

Summary

Questions / Answers

Agenda

Page 3: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

The Challenge of Security

Page 4: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 4

The Implications are Clear

Ensure privacy and appropriate access to information

Maximize service availability

Cost avoidance

Confidence to extend services to broadest group of users:

– Local, remote, mobile

Legal ramifications in some regions

Security is strategic

Page 5: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 5

The Noise is Deafening

Everyone is issuing security advisories!

– Manufacturers of software and hardware

– Security research firms

– Vendors of security products / training / services

– Government (or quasi-government) entities

– Computer Emergency Response Team (CERT)

– CERT Coordination Center – http://www.cert.org/

– U.S. Computer Emergency Readiness Team – http://www.us-cert.gov/

– U.K.’s National Infrastructure Security Coordination Center (NISCC) http://www.niscc.gov.uk

– AUS-CERT – http://www.auscert.org.au/

Each day brings more to your inbox and news!

Page 6: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 6

Web

Servers

The Problem is Complex

Multiple vendors and applications

Competing vendor and internal priorities

Responsibilities spread among internal groups

Comprehensive defense involves many layers

Operating

Systems

Firewalls

Desktop

PCs

Voice over

IP

Network

Switches

Wireless

Devices

PDAs

PSTN

GatewaysInstant

Messaging

E-mail

Systems

Standards

Internet

Page 7: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 7

What is Mitel Doing Specifically?

Extensive portfolio of secure solutions available for you today

Member of VoIP Security Alliance

Connected to industry security groups including:

– CERT and US-CERT

– NISCC (National Infrastructure Security Co-ordination Center)

Security portal:

– Public - http://www.mitel.com/security

– Mitel Online – Technical Support -> “Security at Work”

Ongoing security vigilance

Page 8: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 8

What is the Industry Doing to Help?

“VOIPSA’s mission is to promote the current state of VoIP security research, VoIP security education and awareness, and free VoIP testing methodologies and tools.”

Membership includes:

– Mitel, Avaya, Nortel, Siemens, Alcatel, Extreme Networks, etc.

– Now over 100 members on the Technical Board of Advisors

Committees: Security Requirements, Security Research, Best Practices, Testing

Public “VOIPSEC” mailing list for discussion of VoIP security issues

– http://www.voipsa.org/VOIPSEC/ (and yes, it’s all CAPS)

“VoIP Security Threat Taxonomy” released in late 2005

Next project - industry-wide “Best Practices”

http://www.voipsa.org/

So what are the actual threats to IP Telephony?

Page 9: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Understanding IP Telephony Security Threats

Page 10: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 10

Before We Begin …

Nobody is 100 percent secure and never has been!

Employ “best practices” from an organization perspective …

Be sensitive to operation and cost

Security concerns are not new: Mitel offersextensive TDM defenses

Page 11: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 11

Security Challenges … CIA

Confidentiality

– Protect the voice and data stream including call control signaling

– Prevent eavesdropping on conversations, toll fraud, impersonation

Integrity

– Ensure that information is protected from unauthorized modification

– Prevent discovery of a user, system or application password

Availability

– Ensure that communication services are available to users

– Avoid any adverse effects resulting from a denial of service (DoS) attack or computer worm

Confidentiality

Integrity

Availability

Page 12: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 12

Security Aspects of IP Telephony

Media / Voice

PSTN

Call

Control

TCP/IP

Network

Manage

ment

Policy

Page 13: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 13

The Media Path

Threats:

– Eavesdropping – particularly if over wireless or open Internet (sniffing)

– Degraded voice quality through Denial of Service (DoS) attack

Defense Strategies:

– Encryption of voice path

– WPA, WPA2 for wireless

– VLANs

– Packet filtering

PSTN

Private EnterpriseIP Network

Internet

IP phones

ApplicationServers

SOHO

IP phones Softphone

Call Controller

Real-Time Protocol (RTP) Packets

802.11 wireless

TDM IP

PSTN

Policy

Call

Control

TCP/IP

NetworkManage

ment

Media /

Voice

Page 14: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 14

The Signalling Path

Threats:

– Denial of Service

– Impersonation

– Snooping account codes

– Toll fraud

Defense Strategies:

– Signalling path encryption

– Encrypted desktop load on 3300 ICP

– Proper system programming

PSTN

Internet

IP phones

ApplicationServers

SOHO

IP phones Softphone

Call Controller

SIP, H.323, MiNet

802.11 wireless

Private EnterpriseIP Network

PSTN

Policy

Media /

Voice

TCP/IP

NetworkManage

ment

Call

Control

Page 15: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 15

The Management Path

Threats:

– Snooping passwords

– Denial of service

– Application Impersonation

– Monitoring call patterns

– Malicious system modifications

Defense Strategies:

– DoS defenses in network infrastructure

– Changing default passwords

– Ensure physical security

– Authentication – secure port access!

– Secure Socket Layer (SSL)

PSTN

Internet

Remote Service

Call Controller

Examples – Telnet, HTTP, FTP, SNMP, XML, TAPI

Application Server System Admin

NMS System

Remote Service

EnterpriseIP Network

PSTN

Policy

Media /

Voice

Call

Control

TCP/IP

NetworkManage

ment

Page 16: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 16

PSTN and Legacy Devices

Threats:

– Toll fraud via public network attack

– Impersonation

– Feature access

Defense Strategies:

– Class of Restriction (COR)

– Class of Service (COS)

– Account Codes

– Trunk Restrictions

– Interconnect Restrictions

PSTN

Internet

IP phones ApplicationServers

SOHO

Softphone

Analog LS, ISDN, Q.SIG, DPNSS

802.11 wireless

Analog Gateway

Analog to IP media and signaling conversion

Existing PBX

Call Controller

Private EnterpriseIP Network

Policy

Media /

Voice

Call

Control

TCP/IP

NetworkManage

ment

PSTN

Page 17: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel Security Solutions

Page 18: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 18

Mitel Security Today

Secure Voice / Media

Secure Call Control / Signalling

Secure Management Interfaces

Secure against legacy PSTN threats

Secure against common network attacks

PSTN

TCP/IP

NetworkManage

ment

Policy

Media /

Voice

Call

Control

Page 19: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 19

Mitel 3300 ICP Encryption

Encryption across full Mitel desktop portfolio

– Voice Stream: Secure RTP using 128 bit Advanced Encryption Standard (AES)

– Call control encrypted using Mitel’s Secure MiNet (AES)

– Full support for all current and recent sets

– Mitel 5201, 5207, 5010, 5020, 5212, 5215, 5220, 5224, 5230, 5235, 5240, Navigator IP Phones

– Mitel Your Assistant Softphone

Encryption of signaling and media path between multiple ICPs (clusters)

PSTN

TCP/IP

NetworkManage

ment

Policy

Media /

Voice

Call

Control

Page 20: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 20

Secure Management Interfaces

Web management interfaces for systems and applicationsimplement SSL

Authenticated access to provisioning, administrative user interfaces

– Different levels of access with different passwords

Mitel 7100 Management Access Point:

– Secure remote admin for VPN or Dial-up access

XML APIs

– All traffic encrypted using standard SSL

– Strong certificate-based authentication required

Live Business Gateway

– Uses SSL/TLS-encrypted SIP for communicationto Microsoft Live Communication Server

PSTN

Policy

Media /

Voice

Call

Control

TCP/IP

NetworkManage

ment

Page 21: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 21

Secure against legacy/PSTN threats

Extensive Class of Restriction avoids misuse of communications resources

Well-proven toll fraud restrictions:

– Traditional TDM COS/COR

– Account codes

– Restrictions on trunk-to-trunk connections

– SMDR records

Ability to flag calls as malicious

Feature access restrictions

Policy

Media /

Voice

Call

Control

TCP/IP

NetworkManage

ment

PSTN

PSTN

Page 22: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 22

Secure against common network attacks

Denial of Service protection within 3300 ICP and desktops

– Performance may be reduced but system doesn’t shut down

Sets include micro-firewall and rate throttling to fend off DoS attacks

Support for VLANs to segregate voice and data traffic

Core Platform OS, VxWorks, is not susceptible to Windows OS viruses / attacks

Application operating systems hardened against attack

Mitel is IP infrastructure agnostic giving our customers choice

– HP, Foundry, Cisco, or others

Set authentication requires unique association of MAC address, IP and user entered PIN registration number

Set software downloads are encrypted and tamper-proof to ensure sets cannot be spoofed

Sets in MiNet mode do not include a web browser or other services that can be attacked

PSTN

Manage

ment

Policy

Media /

Voice

Call

Control

TCP/IP

Network

Page 23: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 23

Support for 802.1x

How do you know who is plugging into your network jacks?

Network device must be authenticated before switch port is opened

802.1x Authentication for Desktops

– Support for Extensible Authentication Protocol (EAP) EAP-MD5 challenge

– Support for authentication via EAP to aRADIUS (or other similar) server

– Username and password entered through the phone interface

– Supported on dual mode 5212, 5215, 5220, 5224, 5235 and Navigator IP Phones

PSTN

Manage

ment

Policy

Media /

Voice

Call

Control

TCP/IP

Network

Page 24: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 24

Wireless Security

Encryption and enhanced authentication for SpectraLink Telephones using Wi-Fi Protected Access (WPA) and WPA2

WLAN Stand supports WPA, WPA2

IP-DECT sets (EMEA & AP) include native DECT encryption

PSTN

Manage

ment

Policy

Media /

Voice

Call

Control

TCP/IP

Network

Page 25: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 25

TO LEGACY SYSTEMS

VIA Q.SIG, DPNSS, PRI

Secure traversal of firewalls

Teleworker Solution allows secure use of remote extensionanywhere there is an IP address

Works with standard Mitel IP sets – no special sets to purchase

HOME/

REMOTE

OFFICE

Internet

Home

router/

NAT/

firewall

3300 ICPYour

CorporateNetwork

Teleworker Solution

Integrating with

existing corporate

firewall

PSTN

Manage

ment

Policy

Media /

Voice

Call

Control

TCP/IP

Network

Page 26: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 26

SIP Security

Mitel SIP desktops support Secure RTP

– Today: dual mode 5212, 5215, 5220, 5224, 5235, Navigator IP Phone

SIP sets satisfy challenging PROTOS test suite for CERT advisory CA-2003-06

– (http://www.cert.org/advisories/CA-2003-06.html)

Support for traversal of firewalls including STUN

SSL/TLS-encrypted SIP planned for calendar Q2, 2006

– Also will support HTTPS and SSL-encrypted telnet

SIP sets support 802.1x

SIP trunking in 3300 Rel 7.0 will supportSSL/TLS for signaling

Mitel continually monitors evolving SIP security standards

PSTN

TCP/IP

NetworkManage

ment

Policy

Media /

Voice

Call

Control

Page 27: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 27

Protection Beyond Product to Process

Mitel focus on security

Broad based internal security team encompassing R&D, test, product management, product support, product verification

Internal process to ensure compliance with vendor security bulletins (such as Microsoft)

Escalation process for reported security vulnerabilities

– Email sent to [email protected]

– Triage by product security team

– Escalation to appropriate product groups as necessary

– As needed security advisories posted to www.mitel.com/security

Ongoing vigilance throughout customer / product lifecycle

Media /

Voice

Call

Control

TCP/IP

NetworkManage

ment

PSTN

Policy

Page 28: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel Tools, Contacts, Help

Page 29: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 29

Where to Go for More Information

http://www.mitel.com/security

– Advisories, Security white papers, FAQ

Mitel OnLine

– “Security at Work” portal

– Webinar and customer presentations

– Security Technology Brief

– 3300 ICP Security White Paper

– 3300 ICP Security FAQ

– 3300 Engineering Guidelines

– More documents coming soon…

If you have more questions:

– Engage your SE

– To report a suspected security vulnerability email [email protected]

Page 30: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 30

Security Links

VoIP Security Alliance http://www.voipsa.org

Computer Emergency Response Team (CERT) http://www.cert.org/

U.S. Computer Emergency Readiness Team – http://www.us-cert.gov/

U.K.’s National Infrastructure Security Coordination Center (NISCC) http://www.niscc.gov.uk

AUS-CERT – http://www.auscert.org.au/

Internet Storm Center – http://isc.sans.org/

Page 31: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel Security Solutions Summary

Page 32: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 32

Mitel Security Today

Secure Voice / Media

Secure Call Control / Signalling

Secure Management Interfaces

Secure against legacy PSTN threats

Secure against common network threats

More information at http://www.mitel.com/security

PSTN

TCP/IP

NetworkManage

ment

Policy

Media /

Voice

Call

Control

Page 33: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 33

Thank you

Dan York

Chair, Mitel Product Security Team

[email protected]

Report security issues to [email protected]

Page 34: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Backup Slides

Page 35: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 35

Addressing Security Threats

Attack Points

1) Denial Of Service

2) Password Sniffing

3) Eavesdropping

4) Spoofing, Assuming Identity

5) Spoofing, APIs

Apps

Server

3300 ICP

Admin

2

1

3, 4

5

3, 4

Security Implementations

1) Hardening of Call Control and OS

2) Implement Secure Socket Layer

3) Employ Encryption of Media Streams

4) Implement SSL on Signaling Streams

5) Authentication with Policy Based Access

WAN/Internet

LAN

Page 36: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 36

Security Threats … Confidentiality

Voice

– Threat – Eavesdropping, man-in-the-middle attacks

– Consequences – confidentiality breach between called and calling parties which can be used for personal or company gain

Call Control

– Threat – fraudulent use of telephony resources – toll fraud, impersonation

– Consequences – increased costs and / or malicious usage

Defense Strategies

– Physical protection (wiring closets, equipment rooms)

– Use of Ethernet switching instead of shared media

– Use VLANs, VPNs where applicable (just like your data network!)

– Encrypt conversations and call control, secure the media stream – SRTP

– Ensure routing tables, instructions, account codes are well maintained and password protected

Confidentiality

Integrity

Availability

Page 37: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 37

Security Threats … Integrity

Passwords

– Threat – discovery of a user, system or application password

– Consequences – unlimited, depending on the role and function of the discovered password

Defense Strategies:

– Change default password, minimum length, enforce periodic change

– Never exchange passwords in clear text

– Password maintenance, delete ex-employees, security codes

– Use SSL for secure communications

Confidentiality

Integrity

Availability

Page 38: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 38

Security Threats … Availability

Denial of Service:

– Threat – Teardrop, SMURF or Ping of Death

– Consequences – partial or total loss of telephony or related services

Defense Strategies:

– Rigorous virus updates and OS patches

– Intrusion detection systems

– Protect access from external sources (firewall)

– Limit access from internal sources (firewall)

– Use of 802.1 p/q (VLAN) to isolate and protect voice domain bandwidth from data domain Denial of Service (DoS) floods

Confidentiality

Integrity

Availability

Page 39: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 39

802.1X handshake

LAN Switch RADIUS Server

Exact format unique to each Extensible Autentication Protoal (EAP) method

EAP-MD5, EAP-TLS,EAP-TTLS, PEAP,EAP-FAST, others

Set, PC, endpoint

Page 40: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 40

How Can VLANs Solve My Security Problems?

Green VLAN – data VLAN

Black VLAN aka Voice VLAN

Virus permeates network

*

Switch Switch

Page 41: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 41

A Few Security Terms

Denial of Service (DoS)

– Repetitive attacks that limit normal access to services

Spam for Internet Telephony (SPIT)

Worm

– Move through a network quickly from device to device

– Both intranet and Internet

Virus

– Attached to a program and propagates when that program is executed

– Replication and activation

Trojan horse

– Viruses and worms hide in other programs –hence the name

Spoofing

– Changing your MAC or IP address to impersonate another device

Phishing

Page 42: VoIP Security and Mitel IP Telephony Solutions - Ash … · VoIP Security and Mitel IP Telephony Solutions Dan York ... –Mitel, Avaya, Nortel, ... –Protect the voice and data

Mitel | Confidential 8/24/2009 slide 42

Security Considerations of CX vs CXi Platforms

CXi provides internal switch and firewall

– Integrated package

– VLAN support upon initial release Mitel 3300 CXi Controller

– (SX-200 ICP VLAN support will follow)

– Can use either internal firewall or firewall of choice

– Position for smaller organizations or standalone sites

CX Controller package requires external switch

– Add switch and firewall to suit architecture requirements

– Position for organizations with strong security focus