voip security for dummies

68
Peter H. Gregory, CISA, CISSP Security speaker and columnist, author of Blocking Spam & Spyware For Dummies A Reference for the Rest of Us! ® FREE eTips at dummies.com ® Avaya Limited Edition Realize VoIP benefits and stay secure! VoIP Security Compliments of Avaya Leader in IP technology

Upload: avaya-inc

Post on 19-Jan-2015

3.679 views

Category:

Business


3 download

DESCRIPTION

What is the truth about VoIP security? Finding the right partner that delivers secure IP telephony — while leveraging existing security investments — is the key. If you are a manager playing a role in the implementation or operation of your VoIP network, this book is an excellent place to begin. If you are a systems administrator, software engineer, network designer, auditor, or security expert, you’ll find enough details to engage you and get you started thinking about issues in your own environment. If you are an end-user, this book will lift the veil and show you the future of converged voice and data communications and how they are protected. If you’ll be using the new VoIP network, this book gives you an appreciation for the types of issues that converged network personnel face today.

TRANSCRIPT

Page 1: VoIP Security for Dummies

Peter H. Gregory, CISA, CISSPSecurity speaker and columnist, author of Blocking Spam & Spyware For Dummies

A Reference for the Rest of Us!®

FREE eTips at dummies.com®

This Avaya limited edition of VoIP Security For Dummies shows how risks are identified, analyzed, managed, and minimized in your converged voice and data networks. Find out how security best practices — and Avaya products and services — can make your VoIP network as secure as a traditional telephone network. IT managers will appreciate the jargon-free coverage of VoIP and converged network security, and end users will easily understand the benefits of securing VoIP. See how an Avaya solution can help you implement VoIP without sacrificing the security and stability you are accustomed to.

ISBN: 0-470-00987-XPart #: MIS3005 Not for resale

@� Find listings of all our books

� Choose from many different subject categories

� Sign up for eTips at etips.dummies.com

Protect your converged networks from

known and unknown risks!

®

Enjoy all the benefits of VoIP with enterprise-grade security

Understand VoIP security issues and how they are solved

Make decisions about how to better secure your converged network and applications

Improve security in your entire converged environment

Avaya Limited Edition Realize VoIP benefits and stay secure!

VoIP Security

Compliments of Avaya

Leader in IP technology

Explanations in plain English

“Get in, get out” information

Icons and other navigational aids

Top ten lists

A dash of humor and fun

Page 2: VoIP Security for Dummies

What is the truth about VoIP security? Finding the right partner that delivers secure IP telephony — while leveraging existing security investments — is the key.

There is no single “right way” to do VoIP security — it may require “ground-up” design, or it may require only an upgrade here or there. It makes good business sense to apply security holistically across the enterprise for both voice and data. The challenge is finding the right way to make an environment as secure as possible for the least possible cost and effort.

Avaya products utilize best-of-breed security design and implementation that integrate with existing security services in small and large businesses. Avaya Global Services provides expert advice for small business and world-wide enterprises, and brings Avaya’s depth of expertise to bear on any company’s VoIP security needs.

Explore the possibilities at www.avaya.com.

Page 3: VoIP Security for Dummies

by Peter H. Gregory

VoIP Security FOR

DUMmIES‰

AVAYA LIMITED EDITION

01_00987x ffirs.qxp 3/6/06 9:49 PM Page i

Page 4: VoIP Security for Dummies

VoIP Security For Dummies®, Avaya Limited EditionPublished byWiley Publishing, Inc.111 River StreetHoboken, NJ 07030-5774www.wiley.com

Copyright © 2006 by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

No part of this publication may be reproduced, stored in a retrieval system or transmitted in anyform or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, withouteither the prior written permission of the Publisher, or authorization through payment of the appro-priate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923,(978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed tothe Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317)572-3447, fax (317) 572-4355, e-mail: [email protected].

Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Referencefor the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, andrelated trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or itsaffiliates in the United States and other countries, and may not be used without written permission.All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not asso-ciated with any product or vendor mentioned in this book.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKENO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETE-NESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES,INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE.NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS.THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITU-ATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOTENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PRO-FESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONALPERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLEFOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE ISREFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHERINFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THEINFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS ITMAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED INTHIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRIT-TEN AND WHEN IT IS READ. FULFILLMENT OF EACH COUPON OFFER IS THE SOLE RESPONSI-BILITY OF THE OFFEROR.

For general information on our other products and services, please contact our Customer CareDepartment within the U.S. at 800-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.

For technical support, please visit www.wiley.com/techsupport.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in printmay not be available in electronic books.

ISBN-13: 978-0-470-00987-1

ISBN-10: 0-470-00987-X

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

1O/ST/QT/QW/IN

01_00987x ffirs.qxp 3/6/06 9:49 PM Page ii

Page 5: VoIP Security for Dummies

Publisher’s AcknowledgmentsWe’re proud of this book; please send us your comments through our online registra-tion form located at www.dummies.com/register/. For details on how to create aFor Dummies book for your company or organization, please contact dummiesrights&[email protected].

Some of the people who helped bring this book to market include the following:

Acquisitions, Editorial, and MediaDevelopment

Project Editor: Christine Berman

Acquisitions Editor: Melody Layne

Business Development Representative:Jackie Smith

Editorial Manager: Jodi Jensen

Composition Services

Project Coordinator: Kristie Rees

Layout and Graphics: Janet Seib,Michael Sullivan

Proofreaders: Jessica Kramer, Dwight Ramsey

Additional proofreading help:Tom Porter, Jim Mannion, Andy Zmolek, Kevin Johnson, Doug D’Angelo, Horst Kuchelmeister,Juniper Networks, Extreme Networks, Patricia Moran,Lisa Kluberspies

Publishing and Editorial for Technology Dummies

Richard Swadley, Vice President and Executive Group Publisher

Andy Cummings, Vice President and Publisher

Mary Bednarek, Executive Acquisitions Director

Mary C. Corder, Editorial Director

Publishing for Consumer Dummies

Diane Graves Steele, Vice President and Publisher

Joyce Pepple, Acquisitions Director

Composition Services

Gerry Fahey, Vice President of Production Services

Debbie Stailey, Director of Composition Services

01_00987x ffirs.qxp 3/6/06 9:49 PM Page iii

Page 6: VoIP Security for Dummies

Table of ContentsIntroduction .....................................................1

Part I: Making the Business Case for VoIP Security ..............................................9

The Consequences of Not Protecting a VoIP Network ...............10Regulatory Compliance ..................................................................12How VoIP Security Affects Data Security (and Vice Versa)........13Moving to Centralized Security Services .....................................14Building a VoIP Security Plan ........................................................15

Part II: Recognizing and ManagingSecurity Issues ...............................................17

Threats to VoIP ................................................................................17Vulnerabilities in VoIP.....................................................................26How to Protect Your VoIP Network ...............................................28

Part III: Designing and Building Securityinto Your VoIP Network...................................37

Avaya Builds Security into Its Servers and Gateways ................38Avaya Product Solutions ................................................................46Avaya Global Services Solutions ...................................................47Avaya’s Strategic Partners .............................................................51

Part IV: Ten Reasons to Look to Avaya for VoIP Security ...........................................53

Avaya Has the Complete Solution .................................................53Security Consulting .........................................................................54Secure Products...............................................................................54SIP Security and Leadership ..........................................................55Secure Access ..................................................................................55Trusted Communications Framework ..........................................56Partnerships.....................................................................................57Managed Services............................................................................57Application Security........................................................................58Avaya Credentials............................................................................59

02_00987x ftoc.qxp 3/6/06 9:50 PM Page iv

Page 7: VoIP Security for Dummies

Introduction

Traditional enterprise telecommunications networks usedto be viewed as relatively secure because you practically

needed to be within physical reach to gain access to them.Sure, things like toll fraud and war dialing were problematic,but those were easily remedied by longer or more compli-cated passwords and other access controls. The age of con-verged networks has changed that — with voice now travelingover IP networks (VoIP). These converged networks inherit allthe security weaknesses of the IP protocol (spoofing, sniffing,denial of service, integrity attacks, and so on). In addition,voice quality and confidentiality are potentially affected bycommon data network problems such as worms and viruses.Converged networks also offer an array of new vectors for tra-ditional exploits and malware, as each IP endpoint becomes apotential point of network entry.

Not only is VoIP exposed to old attacks introduced by newmethods and vectors, VoIP itself also exposes a few new vul-nerabilities. Hacking is also converging as intrusion tech-niques are becoming more widely available via the Internetand other media. To be sure, VoIP demands a new way ofthinking about security. And converged environments requireconverged security that protects all network information andextends to IP applications.

Data networks, including the Internet, are under constant,deliberate, and ever more harmful attack. People attack datanetworks for many reasons, from thrill to monetary gain; theyattack data networks because they can. IP is an open protocolwith characteristics that make network endpoints such as IPphones and home computers, as well as network devices suchas routers, ripe for exploitation.

Attacks don’t happen just because of weaknesses in the IPprotocol itself. When IP protocols were first designed, cyber-crime was nothing but science fiction and networking soft-ware vulnerabilities were widespread. If, by some miracle, IP

03_00987x intro.qxp 3/6/06 9:48 PM Page 1

Page 8: VoIP Security for Dummies

VoIP Security For Dummies, Avaya Limited Edition 2were fixed overnight and all its direct and indirect weak-nesses were eliminated, hacking would continue because ofweaknesses inherent in the endpoints.

If you’re a telecom manager of IT, pay attention. If you’re con-sidering implementing VoIP, the Internet’s security issues willbecome your concerns. No more whistling past the grave-yard — it’s time for you to become informed. But take heart.New security methods and mechanisms can make VoIP net-works virtually as secure as trusted telephone networks,while letting you reap the benefits provided by convergedvoice and data networks.

Paradigm ShiftIn the 1980s, the Internet’s security paradigm was “connecteveryone and trust everyone.” The Internet was small —mostly accessed by military and educational users — andpublic access was extremely limited. The World Wide Webhad not yet been developed, there were few sites of generalinterest, and moving around the Net was often cumber-some. The fear of malicious intent was minimal. Neighborsknew each other, and no one locked their doors at night.

But security incidents in the late 1980s and early 1990s,many with devastating consequences, precipitated a newparadigm: Trust internal users, authenticate external users,and protect the internal network with a firewall.

By the late 1990s, innovations in Web software, along with adramatic increase in the number of organizations who wereexposing internal information and applications to externalusers, led to today’s paradigm: Trust no one, authenticateeveryone (and everything), know (and control) where yourdata is at all times, and protect data whether it is at rest orin motion.

Many organizations think that firewalls and a bit of internalauthentication are still sufficient to protect their informa-tion assets. This older mindset is vastly insufficient for con-verged networks. You must build your network with thelatest security in mind to make communication reliable.

03_00987x intro.qxp 3/6/06 9:48 PM Page 2

Page 9: VoIP Security for Dummies

Securing networks is not a trivial task, and there is no instantsolution. The following table describes what you need to do tosecure your network and how it may be vulnerable.

What You Must Do What Hackers Can Do

Protect every point of entry Attack the weakest point of entry

Be constantly vigilant, 24/7/365 Attack at a time of their choosing

Close every vulnerability Exploit all vulnerabilities

Close every known vulnerability Search for new vulnerabilities

Converged networks are a win-win for everyone. Convergednetworks, and the IP applications running on them, offertremendous advantages in terms of cost, flexibility, and newapplication capabilities. Your organization will enjoy greaterflexibility, improved responsiveness, and increased productiv-ity. To ensure that your organization realizes these benefits,security must be part of your company’s VoIP recipe startingon day one — not day one of implementation or day one ofoperations, but day one of requirements, architecture, anddesign. By building in security from the start, your VoIP network will be as secure (if not more secure) than your oldtelecom network.

The Avaya AdvantageAs you begin to understand the significance of convergingyour traditional telephony systems onto your data network tocreate an enterprise-level communications network, keep onething in mind: You don’t have to throw out the investmentsyou’ve made in other telephone system hardware. You can doit the Avaya way, avoiding forklift upgrades and reaping thebenefits of the new IP-based features and functionality avail-able right now in the VoIP world.

You need reliability, security, and availability, and Avaya deliv-ers all three. If you’re considering a converged voice and datanetwork, you’re seeking a lower-cost, business-driven archi-tecture that gives you an edge over your competitors. Avayacan help you accomplish that goal. Avaya is helping morethan a million companies around the world today, includingmore than 90 percent of the Fortune 500 companies.

Introduction 3

03_00987x intro.qxp 3/6/06 9:48 PM Page 3

Page 10: VoIP Security for Dummies

To protect your organization’s communications, Avaya offersits Trusted Communication Framework. The Framework, builton open standards and architecture and based on best prac-tices, is a multilayer approach for distributing security fea-tures and services throughout your communicationsenvironment. By using a distributed architecture, security isdesigned into each solution instead of being added after thefact. (See Part IV for more details about Avaya’s TrustedCommunications Framework.)

Avaya has forged strategic alliances with many top networkcompanies, including Juniper Networks and ExtremeNetworks, to address all the layers of the TrustedCommunication Framework. By leveraging Extreme’s strengthin LAN switching and Juniper’s strength in secure routing, acomplete standards-based solution can be deployed thatdelivers secure communications.

About This BookRegardless of your role in your organization, VoIP securitymatters. Your role determines the part you play in incorporat-ing security into your VoIP environment.

If you are a manager playing a role in the implementation oroperation of your VoIP network, this book is an excellentplace to begin. If you are a systems administrator, softwareengineer, network designer, auditor, or security expert, you’llfind enough details to engage you and get you started thinkingabout issues in your own environment. If you are an end-user,this book will lift the veil and show you the future of con-verged voice and data communications and how they are pro-tected. If you’ll be using the new VoIP network, this book givesyou an appreciation for the types of issues that convergednetwork personnel face today.

You’ll see three different perspectives on VoIP security in thisbook: the business perspective (why security is important),the technical perspective (what the threats are and howthey’re solved), and the products and services perspective(what Avaya offers organizations that want to leverage asecure VoIP network).

VoIP Security For Dummies, Avaya Limited Edition 4

03_00987x intro.qxp 3/6/06 9:48 PM Page 4

Page 11: VoIP Security for Dummies

For a more thorough understanding of VoIP security, youmight want to read this book cover to cover. But if you’re in ahurry, jump to the part of the book that answers the ques-tions you have right now.

How This Book Is OrganizedEach part of this book considers a different aspect of securinga VoIP environment. The following sections explain whatyou’ll find in each of the four parts.

Part I: Making the BusinessCase for VoIP SecurityPart I explains why security is needed for VoIP. It starts bydefining some basic security terms you need to know.

In case you aren’t sure that your VoIP environment needssecurity, Part I describes some of the things that couldhappen if security features are not present in your communi-cations network and applications and also discusses currentsecurity regulations. Part I continues by explaining securityissues you should consider if you’re planning to add VoIP toyour existing network, or if you are designing an entirely new converged infrastructure to support all your voice anddata needs.

Part I ends with a discussion of security planning best prac-tices that you should consider, particularly if you are goingit alone.

Part II: Recognizing andManaging Security IssuesPart II explains the security issues related to VoIP and con-verged networks, including technological and people-relatedsecurity threats and vulnerabilities. Threats and vulnerabili-ties can be resolved, and Part II describes these solutions.

Introduction 5

03_00987x intro.qxp 3/6/06 9:48 PM Page 5

Page 12: VoIP Security for Dummies

Part III: Designing and BuildingSecurity into Your VoIP NetworkWhether you’re in the planning stages of your network or arealready operating a VoIP network, security needs to be anintegral part of your environment.

Part III highlights Avaya’s products and services to supportVoIP security and continuity in the converged network envi-ronment. Avaya’s products include media servers and gate-ways that can help enhance security for your environment,with functionality such as encryption techniques that protectcritical data links and voice streams. In this part, you also findout how Avaya Global Services can provide you with VoIPsecurity consulting and planning services, system security,secure remote maintenance, and ongoing network and appli-cation monitoring services.

Part IV: Ten Reasons to Look toAvaya for VoIP SecurityThere are lots more than ten good reasons to partner withAvaya. We can name fifteen reasons — just like that (insertsound of snapping fingers here). And fifteen is nowhere nearthe limit.

Part IV describes the best reasons to use Avaya security solutions. Do it right the first time and make Avaya’s securitysolutions a part of your VoIP security strategy.

Icons Used in This BookIcons are used throughout this book to call attention to mate-rial worth noting in a special way. Here is a list of the iconsalong with a description of each:

If you see a Tip icon, pay attention — you’re about to find outhow to save some aggravation and time.

VoIP Security For Dummies, Avaya Limited Edition 6

03_00987x intro.qxp 3/6/06 9:48 PM Page 6

Page 13: VoIP Security for Dummies

This icon indicates technical information that is probablymost interesting to IT professionals.

Some points bear repeating, and others bear remembering.When you see this icon, take special note of what you’reabout to read.

Where to Go from HereIf you already have a VoIP network, be sure to read Part II tounderstand the threats and potential weaknesses in your VoIPenvironment. And you may want to enlist assistance fromAvaya Global Services to identify these and any additionalthreats and weaknesses and get your organization on a plan toreduce risks to an acceptable level.

If you’re considering migrating to a VoIP network, read Part Ito understand why security needs to be a part of your strat-egy from the very beginning — not something to be spray-painted on at the end.

If you’re already beyond the conception stage and have begunthe high-level work of designing or building your convergedvoice and data environment, read Part III to understand whereand how Avaya’s products and services can assure your success.

No matter where you are in your VoIP project, never lose sightof the big picture: Avaya is the voice and converged networksexpert and has strategic vision and leadership in VoIP andVoIP security. Companies that go with Avaya to realize theirown VoIP network reap all of the benefits of Avaya’s knowl-edge, experience, and strategic partnerships with Juniper andExtreme Networks. Turn the page and discover for yourselfwhy Avaya is the undisputed leader in converged voice anddata environments.

Introduction 7

03_00987x intro.qxp 3/6/06 9:48 PM Page 7

Page 14: VoIP Security for Dummies

VoIP Security For Dummies, Avaya Limited Edition 8

03_00987x intro.qxp 3/6/06 9:48 PM Page 8

Page 15: VoIP Security for Dummies

Part I

Making the Business Casefor VoIP Security

In This Part� Understanding consequences of inadequate protection

� Considering security regulations

� Looking at how VoIP security affects infrastructure and applicationsecurity

� Moving to centralized security services

� Building a VoIP security plan

Fear, uncertainty, and doubt, known as FUD in the informa-tion security industry, is a popular tactic used to scare

customers into purchasing security mechanisms they may ormay not need. You’ll see no FUD in this book — just the facts.

Few people would argue with the idea that a data networkneeds to be secure. You need the same security for voice asyou do for data in converged environments, and new securitychallenges arise in converged networks. The attacks aren’tnew, but the telecommunications environment is exposed tothe same worms, viruses, and hackers as data networks.Converged networks also offer an array of new vectors for traditional exploits, and you must secure these as well.

In security-speak, you need to understand three key securityconcepts: vulnerabilities, threats, and incidents.

� Vulnerabilities are weaknesses present in a program, network, device, or system.

� Threats are the possible actions or attacks that may takeplace, particularly in a vulnerable system.

04_00987x ch01.qxp 3/6/06 9:48 PM Page 9

Page 16: VoIP Security for Dummies

VoIP Security For Dummies, Avaya Limited Edition 10� Incidents are the events that can take place if someone or

something successfully damages, disrupts, or stealsinformation from an information system.

This part helps you understand the importance of a securityplan and some of the incidents you may risk if you don’t pro-tect your VoIP network. To find out more about vulnerabilitiesand threats, and to see how you can mitigate these risks bychoosing the right vendor, check out Part II.

The Consequences of NotProtecting a VoIP Network

The question isn’t if, but when. Left unprotected, anythingconnected to the Internet eventually is open to attack. Themore popular the device or system, the sooner the attack islikely to happen.

As VoIP becomes more widely deployed, hackers will deviseattacks that directly target IP media servers, gateways, andeven phones! Already, worms and other malicious code attacksmart cellular phones and instant messaging (IM) programs.

Twenty minutes . . .. . . is how long it takes for an unpro-tected PC to be compromised whenconnected to the Internet. That’sdown from forty minutes a year ago.Thousands (if not tens of thousands)of systems scan the Internet, seekingto identify devices of every type ofsystem that can be exploited. Thesenumbers come from a study con-ducted by the Internet Storm Center,a part of the SANS Institute. TheSANS Institute is a highly respectedorganization dedicated to securityeducation for IT and IS professionals.

Remnants of virulent worms such asBlaster, Sasser, Slammer, Nimda,Nachi, Code Red, and others continueto scan the Internet, seeking newvictims. Like biological viruses, itis unlikely that many of these cyber-infections can be completelyeradicated. As computing powerincreases, it becomes increasinglyeasier to execute attacks with far-reaching effects from a simple PC.

04_00987x ch01.qxp 3/6/06 9:48 PM Page 10

Page 17: VoIP Security for Dummies

When any IP-connected product appears in sufficient num-bers, the attacks are more likely to begin.

The Internet isn’t the only means of attacking a system or net-work. Several ways exist to attack an information system — ageneric term meaning just about any system or networkdevice connected to a network.

Here are the types of incidents that may occur in a convergednetwork that doesn’t have adequate security measures inplace:

� Eavesdropping. An improperly protected VoIP networkmay permit an intruder to listen in on VoIP conversationsor access voice-mail messages.

� Access to sensitive information. An intruder may be ableto access information on servers, gateways, phones, andother network devices such as switches, firewalls, orrouters. Available information could range from deviceconfiguration information (which may permit a hacker tomore easily attack other devices or systems) to businesssecrets. A VoIP network breech can also be used to gainaccess to the entire data network.

� Vandalism. An attacker may want to damage a com-pany’s network by erasing or altering information or bychanging the way a device or system operates. The typeof damage a vandal can inflict is limited only by his orher imagination. The type of damage may be immediatelyapparent or it may take days, months, or even years todiscover the destruction.

� Quality of service. An attack may have more subtleeffects upon a VoIP network that are manifested inreduced call quality: jitters, voice-quality, prematurelyterminated calls, and so forth.

Aside from these types of incidents, keep in mind that you stillmust address traditional telephony attacks to a VoIP network,such as toll fraud and voice-mail breech.

Detecting security incidents can be difficult. And, as men-tioned earlier, these incidents may be easily detected or maygo undetected for a long period of time.

Part I: Making the Business Case for VoIP Security 11

04_00987x ch01.qxp 3/6/06 9:48 PM Page 11

Page 18: VoIP Security for Dummies

Designing and building with the principles of least privilegeand least need go a long way toward protecting informationsystems. Least privilege is the concept of providing only theaccess required to fulfill any given function. Least need is theconcept of including only the functions required for an appli-cation or system to function.

From a high-level point of view, all devices that participate innetwork communications should follow the principle of least.This is particularly important for critical infrastructure,including servers, routers, firewalls, and so on. You shoulddisable anything not required or in use, turn off all unneededservices, and remove all unnecessary applications. Followingthe least philosophy reduces the number of possible attackson the system.

Regulatory ComplianceAs a VoIP user, what do you need to know about U.S. privacyregulations? Neither the Gramm-Leach-Bliley Act (GLBA)passed in 1999 to protect the personal financial information ofconsumers, nor the Health Insurance Portability andAccountability Act of 1996 (HIPAA), which protects consumerhealthcare information, specifically addresses security withinthe communications infrastructure. However, these acts alsodo not specifically exclude communications — so you can’tsimply ignore them.

Under HIPAA, the test for what information is covered iswhether “protected healthcare information” is stored elec-tronically in a system. For a VoIP call, that test is met only ifthe call is recorded and stored. So voice-mail and call record-ing systems may need to document HIPAA conformance ifhealthcare information is likely to be discussed. Any callcenter systems that access healthcare records will similarlyrequire documentation.

As with HIPAA, GLBA has a safeguarding component distinctfrom the privacy component you may be familiar withbecause of the disclosure statements you routinely receive inthe mail. A couple of years ago, the Federal FinancialInstitutions Examination Council (FFIEC) finally came out withdetailed guidance for bank regulators; but again, you won’t

VoIP Security For Dummies, Avaya Limited Edition 12 VoIP Security For Dummies, Avaya Limited Edition

04_00987x ch01.qxp 3/6/06 9:48 PM Page 12

Page 19: VoIP Security for Dummies

see VoIP systems specifically mentioned. But it’s a good ideato treat VoIP systems just like any other application on thedata network and periodically check FFIEC guidance in theevent they add VoIP security standards. And it’s prudent to ensure that VoIP conversations and related information are secured from the prying eyes of eavesdroppers and hackers — regardless of the status of regulation.

A great deal of regulatory uncertainty still surrounds the con-cept of lawful call interception. A recently released summary ofthe new FCC Communications Assistance Law EnforcementAct (CALEA) appears to suggest that “facilities-based broad-band Internet access service providers” (which seems tocover any organization offering any type of cable modem, DSL,satellite, or wireless service) must be prepared to accommo-date law enforcement wiretaps within the next 18 months orface fines.

Less clear still is the responsibility of an organization in pro-viding E911 services. In July 2005, the FDA mandated thatwithin 120 days VoIP providers must offer this enhanced 911service, which delivers a caller’s name, telephone number,and physical address directly to the console of the localPublic Safety Answering Point (PSAP) in an emergency. It’sclear that few organizations will be able to accomplish this;most are waiting for an extension to the deadline.

How VoIP Security Affects DataSecurity (and Vice Versa)

If you have an existing data network and you plan to add VoIPto it, you need to assess your current data network, payingparticular attention to the security devices, features, andmechanisms already in place. Some mechanisms may need tobe reconfigured, updated, or replaced to accommodate VoIP’sneeds. For example, as more remote users leverage VoIP, theVirtual Private Network (VPN) gateway may need to beupgraded to accommodate the significant increase in IP trafficdue to the VoIP streams. You will also need a VPN productthat doesn’t add even a moderate amount of latency to theconversation, which may result in poor audio performance.

Part I: Making the Business Case for VoIP Security 13

04_00987x ch01.qxp 3/6/06 9:48 PM Page 13

Page 20: VoIP Security for Dummies

If you decide to start with a clean slate and design an all newconverged network that supports both data and voice, youneed to keep both voice and data security requirements andfeatures in mind and design for the security of both.

You may need to move your current systems from your exist-ing data-only network to a new converged network. In thatcase, you need to do migration planning. But rather than viewthe migration planning as a hindrance, consider it an opportu-nity to discover ways to streamline and protect your new con-verged network.

Either way, unless you have seasoned VoIP/converged net-work experts in-house, you should plan to engage AvayaGlobal Services to assist with architecture and planning sothat your new converged network can support your voice anddata needs. AGS can put the security features in place toensure the integrity, availability, and confidentiality of yourvoice and data applications.

Moving to CentralizedSecurity Services

Building a converged network is a great opportunity to intro-duce centralized security services into your environment.Here are a few examples of these security services:

� Authentication. Consider centralizing authenticationusing RADIUS- or LDAP-based services. RADIUS and LDAPare open standards embraced by virtually all systemsand network vendors for central authentication andaccess control.

� Event logging. Think about building a central log server;design new applications and features to utilize it andmigrate existing systems to it. Be sure to use intelligentsoftware to correlate and analyze the log data.

� Network management. Consider acquiring a NetworkManagement System (NMS). If you are adding a signifi-cant number of infrastructure devices to your network tosupport VoIP, you may be better off in the long run with

VoIP Security For Dummies, Avaya Limited Edition 14 VoIP Security For Dummies, Avaya Limited Edition

04_00987x ch01.qxp 3/6/06 9:48 PM Page 14

Page 21: VoIP Security for Dummies

centralized network management that will assist withfault detection and mitigation, as well as performancemonitoring and tuning.

� VPN Technology. VPNs enable remote workers at virtualoffice locations to receive the same functionality as ifthey were sitting at the central office location. Whether itis a VPN/firewall gateway at the virtual office or a VPNremote for an IP phone client, remote workers areincreasingly using VoIP as a core means for communica-tions at virtual office locations. For branch offices scat-tered throughout the world, consider deploying a VPNdevice at those locations that enables connectivity backto the central location.

� Implement core network security. You can do this viathe vendor that provides the IP network infrastructure aswell as additional security appliances.

Security can be an enabler instead of a hidden tax. For exam-ple, centralized authentication with LDAP, centralized log fileand event correlation, and network management are security-related services that can save money and better protect infor-mation through economy of scale. Without these centralservices, these capabilities need to be built into each applica-tion, often at greater expense.

Building a VoIP Security Plan Although there is no silver bullet for securing an enterprisecommunications environment, Avaya has established a list ofbest practices based on years of experience and documentedresearch by various security experts. Avaya also teams withJuniper Networks and Extreme Networks for WAN and LANsecurity, providing you with a complete solution. But even ifyou have a Cisco network, Avaya has voice and data securitycompetency that can help you. Avaya suggests the followingbest practices to its customers:

� Plan effectively for multilayered security (in-depth plan-ning for defense, for example) to meet business and regu-latory requirements.

� Implement, communicate, and enforce security policies.

Part I: Making the Business Case for VoIP Security 15

04_00987x ch01.qxp 3/6/06 9:48 PM Page 15

Page 22: VoIP Security for Dummies

� Deploy a robust security architecture and “best-of-breed”solution components.

� Harden operating systems and encrypt when and wherepossible.

� Secure implementation processes and maintain opera-tional security practices.

� Manage security through proactive monitoring, eventmanagement, remediation, and follow-up actions.

The next part of the book, “Recognizing and ManagingSecurity Issues,” explains how to protect your VoIP network ineven greater detail.

VoIP Security For Dummies, Avaya Limited Edition 16 VoIP Security For Dummies, Avaya Limited Edition

04_00987x ch01.qxp 3/6/06 9:48 PM Page 16

Page 23: VoIP Security for Dummies

Part II

Recognizing and ManagingSecurity Issues

In This Part� Examining the threats to VoIP

� Understanding VoIP vulnerabilities

� Protecting your VoIP network

The Internet is under attack. Hackers can exploit every-thing that’s connected to TCP/IP networks — and that’s

everything — and attacks are becoming increasingly moresophisticated. You can bet that as more organizations migrateto VoIP networks and become more widely deployed, they’llbe popular targets as well.

If you outsource your VoIP network security, you still need tounderstand these security issues in some detail. Each issuehas potential business impact by affecting costs, processes,or technical architecture (usually all three!).

Threats to VoIPIn this chapter, the words threats and vulnerabilities are tossed about pretty freely. People often use these terms interchangeably, but they’re actually quite different. Here’swhat they mean:

� Threats include hackers, viruses, worms, Trojan horses,phishing scams, spam, spyware, malware, and more.

05_00987x ch02.qxp 3/6/06 9:49 PM Page 17

Page 24: VoIP Security for Dummies

VoIP Security For Dummies, Avaya Limited Edition 18� Vulnerabilities are weaknesses (whether by design or

by configuration) which, left unattended, increase therisk of a system attack or failure. Hackers often attack aVoIP network by exploiting vulnerability.

Just as a coach knows the strengths and weaknesses (vul-nerabilities) of his team, you need to be aware of securitythreats and what you’re doing about them. That’s whyyou’re reading this chapter — so buckle up and hang on!

This chapter discusses two kinds of threats: technology-based threats and human-based threats. Although classify-ing types of threats can be difficult, most securityprofessionals think of threats in this way.

Although related, threats and vulnerabilities are different. Athreat is the intention or indication of impending harm,whereas a vulnerability is a weakness. Threats usually targetand exploit vulnerabilities.

Technology-based threatsWhat kinds of technology-based threats do you need to beconcerned about in the context of VoIP networks? Here arethe most important threats:

� Infrastructure-based attacks

� Application-based attacks

� Call interception

� Denial of Service attacks

� Session hijacking/impersonation

� Pharming

� Caller ID spoofing

� Toll fraud

� Protocol-specific threats (H.323, SIP, and MGCP)

� Worm storms

� Day Zero attacks

I talk about each of these threats in more detail in the fol-lowing sections.

05_00987x ch02.qxp 3/6/06 9:49 PM Page 18

Page 25: VoIP Security for Dummies

Infrastructure-based attacksAt the device level, VoIP networks are traditional data net-works engineered to run voice applications. They containrouters, switches, servers, and gateways. These devices aremass-produced by well-known companies, and are often ubiq-uitous. Hackers know how to exploit vulnerabilities in thesedevices. Their attacks on networks can compromise systemintegrity, expose information, and disrupt service.

Viruses and worms are designed to exploit weaknesses in soft-ware. Viruses need user action to propagate, whereas wormsdo not. Some can replicate on their own, and others need anudge from unknowing people to propagate through net-works. Some of these worms and viruses are designed tomerely disrupt normal services, whereas others are designedto inflict harm by changing configurations or retrieving sensitive data.

Application-based attacksRelatively unheard of ten years ago, tools and methods forattacking applications are readily available. Many attack toolsare highly automated and spend their time searching fornewly implemented applications to exploit.

Call interceptionMake no assumptions about privacy when you send informa-tion over a data network. E-mail, instant messaging, and (yes)VoIP traffic are all subject to eavesdropping. Think of informa-tion traversing in the same way as post cards traveling bymail — anyone along the way can read the contents of a message.

A conversation on a VoIP network passes from handset tohandset through many devices and networks. Someone who isable to access any of the devices or networks through whichVoIP traffic passes may be able to intercept VoIP data packetsand intercept a conversation.

In a data network, intercepting data packets is trivial. Manysophisticated tools such as Ethereal are free and easy to use to collect packets associated with one or more VoIP conversations.

Part II: Recognizing and Managing Security Issues 19

05_00987x ch02.qxp 3/6/06 9:49 PM Page 19

Page 26: VoIP Security for Dummies

Denial of Service attacksA Denial of Service (DoS) attack occurs when someone delib-erately floods a particular network (or device on a network)with so much illegitimate network traffic that legitimate use isimpossible.

You may be able to understand a DoS attack more easilythrough this real-world example: In 2000, French farmers,ambulance drivers, truckers, and taxi drivers protested thehigh price of gasoline by blocking freeways and fuel depotswith their vehicles. In two days, the entire country had virtuallyshut down because fuel couldn’t be distributed to gas stations.The French truckers had mounted a DoS attack on France’stransportation system by blocking all its legitimate uses.

Internet DoS attacks are not unlike the truckers’ protests inFrance. Flood the networks (or the freeways) with enoughtraffic and all legitimate uses are virtually unavailable.

DoS attacks are becoming more potent than before. Hackergangs and organized crime organizations are creating bot netsand bot armies consisting of thousands of ordinary home (andwork) computers that they can control remotely to launchattacks on companies and governments.

Stopping a Denial of Service attack is very difficult, althoughwith proper architecture, critical assets can be spared from adirect attack. Hardware products are available that canabsorb the blow from a DoS attack; another solution is tohave more bandwidth than the attacker can muster.

Session hijacking/impersonationSession hijacking is a type of attack in which an attacker isable to use special hacking tools to place his identity into anactive data connection, with the intention of altering the flowof data or the data itself.

Data or voice communication sessions are more vulnerable tosession hijacking if the data or voice is not encrypted.Hijacking encrypted sessions is nearly impossible because theattacker cannot decrypt the data to alter it.

VoIP Security For Dummies, Avaya Limited Edition 20

05_00987x ch02.qxp 3/6/06 9:49 PM Page 20

Page 27: VoIP Security for Dummies

PharmingPharming exploits vulnerabilities in the part of a networkdevice that is responsible for translating e-mail and Webaddresses, computer names, and network device names intoIP addresses. Without their knowledge, VoIP users’ calls canbe redirected to IP addresses completely different from theones the users dialed. In telephony language, this would belike hacking a telecom switch or PBX so that dialed phonenumbers would route calls to a rogue location instead of tothe intended destination.

Caller ID spoofingIn spoofing, a perpetrator hijacks the identity and phonenumber of a trusted party, such as a bank or a governmentoffice. The identity appears on the caller ID box of an unsus-pecting victim, with the caller hoping to acquire sensitive andvaluable information such as account numbers, or otherwiseengage in malicious mischief. Caller ID spoofing is a particu-larly vicious ploy because it exploits a socially accepted formof authentication provided by caller ID.

Toll fraudFor years, hackers have perpetrated toll fraud by gainingaccess to PBX and telco switch maintenance ports to controltheir operation and permit toll fraud activity.

Without the proper controls, VoIP networks are also vulnera-ble to toll fraud because gateways and switches can beaccessed over data networks. Configuration weaknesses anddefault administrative passwords would permit easy accessby fraudsters.

Protocol-specific threatsSome hackers attempt to break into networks (or just disrupttheir operation) by concentrating their attack on the details ofthe communications protocols that they use.

As VoIP becomes widely used, some hackers will study andlook for weaknesses in the protocols that VoIP uses for com-munication and control. Here are some of the potentialthreats:

Part II: Recognizing and Managing Security Issues 21

05_00987x ch02.qxp 3/6/06 9:49 PM Page 21

Page 28: VoIP Security for Dummies

� H.323-specific threats. In 2004, The University of OuluSecure Programming Group (OUSPG) tested the effects ofsending modified call setup packets to a number of differ-ing VoIP vendor implementations. They found that manyVoIP systems that implement H.323 are vulnerable to oneor more of these malformed packets. These failuresresult from insufficient validation of messages as they areparsed and processed by affected systems. Dependingupon the affected system and implementation, theseattacks result in system crash and reload, or in the caseof systems that filter these data (such as Microsoft ISAserver), execution of arbitrary computer software code.

� SIP-specific threats. When it comes to Session InitiativeProtocol (SIP), more intelligence is moved from theguarded center to the edge of the network — andincreased network points of access equal increased net-work complexity. In addition, SIP may become particu-larly attractive as a hacking target due to its HTTP-basedunderpinnings and the ease with which ASCII-encodedpackets can be manipulated. Some specific threatsagainst SIP include

Registration hijacking. Occurs when an attacker imper-sonates a valid User Agent (UA) to a registrar andreplaces the registration with his own address. Thisattack causes all incoming calls to be sent to the attacker.

Proxy impersonation. Occurs when an attacker tricks aSIP UA or proxy into communicating with a rogue proxy.If an attacker successfully impersonates a proxy, she hasaccess to all SIP messages and is in complete control ofthe call.

Message tampering. Occurs when an attacker interceptsand modifies packets exchanged between SIP compo-nents. Message tampering can occur through registrationhijacking, proxy impersonation, or an attack on any com-ponent trusted to process SIP messages, such as theproxy, media gateway, or firewall.

Session tear down. Occurs when an attacker observes thesignaling for a call and then sends spoofed SIP “bye” mes-sages to the participating UAs. Unfortunately, most SIPUAs don’t require strong authentication, which allows anattacker to send properly crafted “bye” messages to thetwo UAs, tearing down the call.

VoIP Security For Dummies, Avaya Limited Edition 22

05_00987x ch02.qxp 3/6/06 9:49 PM Page 22

Page 29: VoIP Security for Dummies

Denial of Service. Can occur through any of the meansdescribed above or through additional DoS-specificattacks. Because strong authentication is rarely used, SIPprocessing components must trust and process SIP mes-sages from possible attackers.

� MGCP-specific threats. Like SIP, with MGCP intelligenceis moved from the center to the edge of the network.Threats against MGCP include impersonation, sessiontear-down, and Denial of Service.

Worm stormsA worm storm can occur when an Internet worm is spreadingso rapidly that legitimate Internet traffic is disrupted. Wormstorms race around the globe and may last only a few hours,or several days, causing data connections that use theInternet to become congested and unreliable.

Day Zero attacksA Day Zero attack is a worm or virus that immediately pre-cedes or follows announcements of vulnerabilities in hard-ware or software products.

Human-based threatsSome threats are considered human-based as they involveacts of commission or omission. The human-based threatsyou need to be familiar with are

� Hackers

� Social engineering

� Insiders

� Former employees and contractors

� Errors, assumptions, and omissions

HackersThe term hacker encompasses attacks in a range from thoseperpetrated by script kiddies (young adults who use prepack-aged hacking software) all the way to extortionists and organ-ized crime. Generally, these are people who use software and

Part II: Recognizing and Managing Security Issues 23

05_00987x ch02.qxp 3/6/06 9:49 PM Page 23

Page 30: VoIP Security for Dummies

hardware tools to deliberately attack an organization’s net-work or information assets. Here are some of the reasons forhacker attacks:

� Joyriding. Some hackers hack just for the thrill of it, notunlike kids of earlier times who threw bricks throughplate glass windows and stole automobiles for, well,joyriding. Hackers may perpetrate Denial of Serviceattacks or outright defacements, where a hacker hasbeen able to exploit a weakness in a company’s Webserver and replace the contents of the company’s Website with contents of their own. This type of attack is socommon that there are many Web sites whose sole pur-pose is to catalog defacements.

� Status. Hackers earn prestige by competing in the hack-ing community for the top spots — those who havehacked the most computers and the biggest companies.

� Revenge

� Anger

� Information theft

� Extortion

� Industrial or political espionage

A great way to better understand your vulnerability to hack-ers is to try to think like one.

Social engineeringSocial engineering is the practice of acquiring confidentialinformation by manipulating legitimate users. A social engi-neer commonly uses the telephone, face-to-face meetings, orthe Internet to trick people into revealing sensitive informa-tion or get them to do something against typical policies.

Social engineers exploit people’s natural tendencies to trustand help someone in need. A typical social engineer can makeseveral phone calls to different people in an organization toobtain information. For example, a social engineer might callone person to get a VPN IP address, and another to get auserid, and still another to get a password reset.

VoIP Security For Dummies, Avaya Limited Edition 24

05_00987x ch02.qxp 3/6/06 9:49 PM Page 24

Page 31: VoIP Security for Dummies

InsidersTechnology workers in the organization have considerablymore knowledge than outsiders. Insiders know the architec-ture, components, IP addresses, server locations, protocols,and have ready access to much of this from inside the officeas well as from any other location through VPN remoteaccess.

Employees with a poorly formed conscience or a less-than-stellar work ethic may exploit opportunities to improve jobstability, make other employees look bad, or build privateback doors for themselves if they find themselves out of a job.

Don’t forget insiders — yes, the people you trust to operateand manage your information. Most security incidents areperpetrated by insiders, former insiders, and others withextra knowledge about a targeted company’s systems and networks.

Former employees and contractorsTechnology workers who have been fired, laid off, or who quitbecause they felt they were treated unfairly are seriousthreats to an organization because they possess not onlydetailed information about the architecture and operationsbut also access codes that may not have been deactivated.Technology workers often know where weaknesses are andhow to exploit them.

Paranoid employees build back doors for themselves toaccess internal networks and systems in the event they losetheir jobs or are transferred to another part of the organiza-tion. These back doors enable them to monitor the workplace,steal information, or disrupt operations.

Errors, assumptions, and omissionsSystems and network infrastructures are highly complex andever changing environments. Even in a highly organized andmature organization with a formal Change Control environ-ment that includes design and peer reviews, testing, and veri-fication, mistakes are bound to occur. Many times thesemistakes may create a vulnerability that can later beexploited.

Part II: Recognizing and Managing Security Issues 25

05_00987x ch02.qxp 3/6/06 9:49 PM Page 25

Page 32: VoIP Security for Dummies

Human-based threats include both malicious acts by insidersand outsiders, as well as innocent mistakes made by peoplewho handle information.

The future of attacksBad behavior is part of the human condition: Build somethingfor good and someone else will either attack it or use it tocommit malevolent acts. Often, system designers don’t antici-pate how attacks can happen and resort to quick fixes orretrofits when security issues arise. Those efforts can lead tomore complication and opportunities for vulnerabilities.

As with all earlier technologies that have been developed inthe networking age, attacks will occur in this sequence:

1. Operating Systems. Hackers first exploit features in devices and servers to gain access or disrupt operations.

2. Protocols. Hackers exploit weaknesses in network pro-tocols that will lead to malfunctions on devices andservers.

3. Applications. Hackers exploit application functionalityin order to cause malfunctions at the application level.Hackers have a great imagination here.

Vulnerabilities in VoIPAs with threats, vulnerabilities can be either technologybased or human based. Several examples of these two typesof vulnerabilities are described in the sections that follow.

Technical vulnerabilitiesIf you were hoping to find specific vulnerabilities in VoIP citedhere, you may find something even better than a completelist. This section describes the categories of vulnerabilitiesand shows you where to find current information. First, hereare the types of technical vulnerabilities that you need to befamiliar with:

VoIP Security For Dummies, Avaya Limited Edition 26

05_00987x ch02.qxp 3/6/06 9:49 PM Page 26

Page 33: VoIP Security for Dummies

� Software bugs. From BIOS to firmware to operating sys-tems to applications, bugs happen. Many go undetectedfor years; some affect functionality and some create asecurity weakness that could be exploited to gain unau-thorized access, make unauthorized changes (to data orconfigurations), or disrupt operations.

� Incorrect configurations. Configuring devices, operatingsystems, and applications can be complicated. Gettingthings to work often requires cooperation between dis-parate systems. Many configurations are security-related,having to do with authentication, access control, or auditlogging, for example. Because of a lack of training, anincomplete understanding of related configurations orarchitectures, or distractions, employees can configuresystems incorrectly. This may result in security weak-nesses ready to be exploited.

� Flawed architectures. The architecture of a completeinformation system (a VoIP network, for example),because of flawed design or engineering, can sometimeslead to security vulnerabilities that can be exploited for avariety of reasons.

Human vulnerabilitiesWe remain imperfect creatures who make more mistakes than we can keep track of. Here are a few of our more obviousmistakes:

� Lack of experience. Many times in the high-tech indus-try, people are hired into positions that are a few sizesbigger than they are. This is typical in high-tech —people don’t want a job they’ve done before, but some-thing challenging that they have not done before.Employees with less experience than most of us wouldbe comfortable with can end up designing, building, oroperating information systems.

� Lack of training. Experienced workers frequently knowwhat it is that they want a device or system to do, butthey may not know how to do it. Often, employees areasked to build or deploy hardware- or software-basedsystems they haven’t used. They may understand theconcepts, but not the specific methods. Inexperience canlead to security weaknesses.

Part II: Recognizing and Managing Security Issues 27

05_00987x ch02.qxp 3/6/06 9:49 PM Page 27

Page 34: VoIP Security for Dummies

� Distractions. IT departments are squeezed to producemore with less. This is often the case with overworkedprogrammers, network engineers, and system adminis-trators. Coworkers can pull them in many directions atonce to complete important projects on time, but still,they must fight the everyday fires.

� Weak processes and procedures. Organizations that lackgood processes and procedures, especially ChangeControl, Configuration Management, and IT Architectureand Standards, are more likely to leave weaknesses intheir environments that can be exploited by worms,viruses, or hacker attacks.

The key to reducing errors lies in attention to quality as wellas formal processes such as change control and configurationmanagement.

How to Protect Your VoIP Network

If you think a lot of system holes remain to be filled, you’reright. As you read this section, you’ll find that making environ-ments secure isn’t just about technology. It’s also about busi-ness processes, procedures, and people. Without these, noamount of technology will adequately secure an environment.

Implementing protectionIP networks and applications are not naturally safe all on their own, and you need to take several measures to protectthem. The following list is not strictly sequential, but it doesrepresent the most important principles for securing VoIP networks:

� Develop and enforce security policies and processes

� Enforce physical security

� Lock down servers, systems, and networks

� Unify network management

VoIP Security For Dummies, Avaya Limited Edition 28

05_00987x ch02.qxp 3/6/06 9:49 PM Page 28

Page 35: VoIP Security for Dummies

� Confirm user identity and enforce security policies at adevice level

� Maintain active security monitoring

� Ensure logical segregation

� Use encryption

I describe these protection measures in more detail in the sec-tions that follow.

Develop and enforce security policies and processesPolicy formulation is an important step toward standardiza-tion of enterprise security activities. The organization’s secu-rity policy is management’s vehicle for emphasizing thecommitment to IT security and making clear the expectationsfor workers’ involvement and accountability.

Policy implementation is a journey. Policy can’t merely be dic-tated by upper management in a one-time statement or direc-tive with high expectations of its being readily accepted andacted upon. Rather, just as formulating and drafting policyinvolves a process, implementation similarly involves aprocess, which begins with the formal issuance of policy.

Security policy should address the following areas:

� Empowerment and enforcement. Which person orgroup is responsible for implementing and enforcingsecurity policy.

� Roles and responsibilities. Which people or depart-ments are responsible for various security functions.

� Risk management. How the organization assesses riskand makes risk decisions.

� Asset management. How assets are managed andtracked.

� Classification and handling of information. How infor-mation is classified according to sensitivity, and howclassified information should be handled.

� HR security. Screening, terms and conditions of employ-ment, security training, termination of employment andremoval of access rights.

Part II: Recognizing and Managing Security Issues 29

05_00987x ch02.qxp 3/6/06 9:49 PM Page 29

Page 36: VoIP Security for Dummies

� Physical and environment security. Secure areas, physi-cal access control, equipment security, environmentalcontrols.

� Communications and operations management.Operational processes and procedures, third-party serv-ice delivery, system planning and acceptance, protectionagainst malicious code, backup, security management,media handling, exchange of information, e-commerce,and monitoring.

� Access control. User access management, user responsi-bilities, network and operating system access control,application and information access control, and mobilecomputing.

� Information systems acquisition, development, andmaintenance. Security requirements, integrity in infor-mation processing, cryptographic controls, security inthe software/product development life cycle, and techni-cal vulnerability management.

� Security incident management. Reporting incidents andweaknesses, management of incidents.

� Business continuity and disaster recovery. Informationsecurity, business continuity and disaster recovery planning.

� Compliance. Compliance with legal requirements, security policy, and applicable laws and regulations.

An effective security policy should be drafted by an experi-enced team or individual, vetted by several subject-matterexperts, ratified by the organization’s executive management,and implemented through proper deployment of technology.

A widely recognized source for IT best practices is theISO17799:2005 standard, which you can find at www.iso.org.

Enforce physical securityPhysical security is essential, and it forms the basis for manyother security efforts. Physical security refers to the protec-tion of building sites and equipment (and all other informa-tion and software contained within them) from theft,

VoIP Security For Dummies, Avaya Limited Edition 30

05_00987x ch02.qxp 3/6/06 9:49 PM Page 30

Page 37: VoIP Security for Dummies

vandalism, natural disaster, man-made catastrophes, and acci-dental damage (for example, electrical surges, extreme tem-peratures, and spilled coffee). It requires suitable emergencypreparedness, reliable power supplies, adequate climate con-trol, and appropriate protection from intruders.

Lock down servers, systems, and networksEvery server, gateway, switch, network device, and servershould be locked down — a concept that includes the following:

� Disabling or removing all unnecessary services and com-ponents in a system.

� Limiting accessibility to all necessary services and components in a system to only people who need it tofunction.

� Using the most recent versions of software/firmware onthe system.

� Installing security patches in a timely manner.

� Authenticating administrative access and encrypting allremote management using SSH or IPsec.

Avaya S8700 and S8300 servers support Secure Shellaccess (SSH) and Secure Copy (SCP), and Secure Webaccess using Secure Sockets Layer (SSL). All Web accessto Avaya S8700 and S8300 servers is through a secureconnection. Unencrypted Web access is not supported.Media Servers also support the use of one-timepasswords for logins through these mechanisms, thusproviding another layer of secure access.

� Refraining from using default passwords. Guest accountsshould be turned off. All users should be required to use strong passwords and change their passwords periodically.

� Implementing VPN access for employees who requireaccess to centrally-located network resources from off-premises locations. Consider a VPN that supports two-factor authentication such as smart-cards, hardwaretokens, or biometrics.

Part II: Recognizing and Managing Security Issues 31

05_00987x ch02.qxp 3/6/06 9:49 PM Page 31

Page 38: VoIP Security for Dummies

Unify network managementNetwork management tools that are used on the data networkshould be used to monitor the entire converged infrastruc-ture. This is one of the advantages of a converged network.Existing network management tools may need to be updatedto reflect the enhanced requirements of a VoIP network. If pos-sible, segregate management traffic to an out-of-band, dedi-cated management network.

Confirm user identityConfirming user identity is a key part of implementing asecure environment. Some methods available include

� Using handsets that implement user authentication.Avaya handsets support this feature.

� Implementing device authentication with ARP (AddressResolution Protocol) and 802.1X.

� Centralizing user management. Consider using MicrosoftActive Directory or LDAP for enterprise-wide authentica-tion into applications, e-mail, VoIP, and other facilities.

� Employing DHCP authentication procedures. Why?Because DHCP is what assigns IP addresses to IP phones.

� Deploying Juniper Networks’ Infranet Controller toensure host checks and security policy conformance.

Maintain active security monitoringBecause you can’t anticipate every type and manner of attackin advance, keeping a watchful eye on everything — networkcomponents, gateways, and servers — is important. Some ofthe ways to enhance monitoring include

� Host-based intrusion detection systems (HIDS). Softwaremechanisms on hosts, gateways, and servers watch foranomalous behavior that could be indicative of a securityissue. HIDS typically log these events to a central loggingserver.

� Network-based intrusion detection systems (NIDS).Special devices on networks monitor and analyze net-work traffic in real-time and report anomalies to a centrallogging server.

VoIP Security For Dummies, Avaya Limited Edition 32

05_00987x ch02.qxp 3/6/06 9:49 PM Page 32

Page 39: VoIP Security for Dummies

� Centralized logging, correlation, and analysis. HIDS,NIDS, firewalls, switches, routers, and practically every-thing else in a network create event and audit logs thatshould be piped in to a central log server to make iteasier to detect and understand complex events. Thisunderstanding is achieved through correlation, whereintelligence in the log server software can detect thepresence of significant events by considering what logentries are coming in from many devices. For example,the presence of relatively insignificant authenticationattempts on large numbers of devices could signal anorganized attack that may require attention.

� Penetration testing. The purpose of penetration testingis to detect any security vulnerabilities on networkdevices, so that they can be repaired. It is much better tofind them first and fix vulnerabilities before hackers findthem for you.

Ensure logical segregationLogically segregating voice and data networks is recom-mended to prevent data network problems from affectingvoice traffic, and vice versa. Segregating customer traffic(voice or data) from administrative traffic (network manage-ment, command and control, and so on), again is a good idea.Segregation keeps problems in one logical network fromadversely affecting other networks.

� VLANs. VLANs, or Virtual LANS, can be thought of as logi-cally segmented networks mapped onto physical hard-ware. Logically separating voice and data traffic viaVLANs is a good way to segregate networks withoutadding physical infrastructure.

� Traffic shaping. When voice data is introduced into anetwork, it becomes most critical that priority is given tothe voice packets to ensure the expected quality of voicecalls. The mechanisms used to accomplish this are gener-ally called traffic shaping. Traffic shaping is an attempt toorganize network traffic to optimize or guarantee per-formance and/or bandwidth. Traffic shaping relies uponconcepts such as classification, queue disciplines, sched-uling, congestion management, quality of service (QoS),class of service (CoS), and fairness.

Part II: Recognizing and Managing Security Issues 33

05_00987x ch02.qxp 3/6/06 9:49 PM Page 33

Page 40: VoIP Security for Dummies

� Firewalls. Firewalls are points of traffic control betweennetworks. Using a set of site-defined rules, firewalls eitherpass or block network traffic from entering (and leaving)a network based upon its traffic type, source, and desti-nation. If you’re designing a VoIP network, you’ll need toconsider upgrading your firewall to a make and modelthat is VoIP-aware because VoIP network services such asH.323 introduce additional complexities that older fire-walls have a tough time dealing with. Application LayerGateways designed to handle VoIP protocols such asH.323 and SIP can help in addressing security concerns.

� NAT and private IP addressing. NAT, or NetworkAddress Translation, together with the use of private IPaddressing, will provide another layer of control for yournetwork.

Use encryptionAll communication between network elements should beencrypted if possible. Complete handset-to-handset IP voiceencryption is recommended to mitigate the threat of eaves-dropping. Also, administrative access to critical server andnetwork components should use encrypted protocols such asSSL, IPsec, or SSH. All access to remote administrative func-tions should be restricted to connections to the switch itselfor to a designated management PC. Access to Avaya S8700 viathe CLAN interfaces should also be disabled.

Encryption is the most effective means of mitigating the prob-lems of eavesdropping or call interception. Until recently,Avaya’s H.323-based VoIP products were unique in that theyprovided media encryption, thus ensuring that even if a callwas intercepted, an attacker wouldn’t be able to decrypt itscontents.

Media or payload encryption is an important piece of the VoIPsecurity puzzle; but in most cases, the ability of an attacker toaccess the signaling channel will yield information about a callthat is almost as valuable as the data content. This is not new:Forty years ago, phreakers whistled, yelled, or red-boxed

VoIP Security For Dummies, Avaya Limited Edition 34

05_00987x ch02.qxp 3/6/06 9:49 PM Page 34

Page 41: VoIP Security for Dummies

(used devices to produce telco signaling sounds) into tele-phones and compromised the signaling channel in order tomake free phone calls. Today, analyses of a signal channel, forexample, could allow an attacker to gather information regard-ing the duration, endpoints, and other parameters of incom-ing and outgoing calls.

The term phreaker (coined from a combination of the wordsphone and freak) refers to an individual who attempts toexploit telephone systems by committing telephone fraud.Back in the ’70s, the most famous phreaker, John Draper, useda whistle that came in a box of Captain Crunch cereal thatcaused AT&T long-distance trunks to reset and prepare toroute new calls.

In multi-office deployments, using VPN-based encryptionensures that any traffic that goes over the public infrastruc-ture is secure.

No amount of encryption can protect against a single badpassword, naïve system administrators, or poor protocolimplementations.

Issues to considerNote that implementing some security measures such as fire-walls can degrade VoIP quality. These complications rangefrom interruption or prevention of call setup by firewalls toencryption-produced latency and delay variation (jitter). But,not implementing security measures can degrade VoIP qualityby making it vulnerable to attack or failure.

As a market leader, Avaya Global Services has experiencebuilding secure, reliable VoIP networks. In addition, Avaya’ssecurity partners, Juniper Networks and Extreme Networks,offer hardware- and software-based products that providesuperior security while ensuring no impact to VoIP quality orperformance.

Part II: Recognizing and Managing Security Issues 35

05_00987x ch02.qxp 3/6/06 9:49 PM Page 35

Page 42: VoIP Security for Dummies

VoIP Security For Dummies, Avaya Limited Edition 36

Avaya Global Services Security Assessments

When San Francisco InternationalAirport standardized on an Avayavoice infrastructure several yearsago, the airport also engaged AvayaGlobal Services to help with allaspects of network support.

SFO asked Avaya to conduct anassessment that would directlyaddress the operational integrity ofthe airport’s voice communicationsnetwork.

The Avaya System Security Assess-ment zeroed in on SFO’s central voiceserver and voice messaging systemto help ensure that all possible meas-ures had been taken to secure thevoice network from external intru-sion. They wanted to make sure thatno one could get in and compromisethe operation of the voice network,access proprietary system informa-tion, or commit toll fraud.

The security assessment was verymethodical. Avaya looked at everypossible point of entry into the voicenetwork and assessed whether

appropriate controls were in place.They truly left no stone unturned.

The System Security Report wasextremely thorough and highly spe-cific. The assessment had extremelyhigh business value and completelymet all of SFO’s expectations. Avayadefinitely had the right skills andexperience for the job.

According to John Payne, ChiefInformation Officer of San FranciscoInternational Airport, “The AvayaBusiness Continuity and SystemSecurity Assessments gave usexactly what we were looking for —a clear blueprint that would allow usto prioritize our investments whiletaking the airport’s emergency pre-paredness and security to a wholenew level.”

The result? Security was improvedwhen assessments were conductedthat directly addressed the opera-tional integrity and emergency readi-ness of the airport’s voice communi-cations network.

05_00987x ch02.qxp 3/6/06 9:49 PM Page 36

Page 43: VoIP Security for Dummies

Part III

Designing and BuildingSecurity into Your

VoIP NetworkIn This Part� Looking at the security built into Avaya’s server and gateway

products

� Examining Avaya’s product solutions

� Taking a look at Avaya Global Services

� Understanding how Avaya works with its strategic partners

Avaya offers a rich set of products and services that covervirtually every need a small or large customer may

require. Avaya product solutions cover the full range of voice,data, and converged network offerings from one-personbranch offices to enterprises with tens of thousands of sta-tions. To complement this array of products, Avaya offers pro-fessional services, maintenance, and managed services forany size business or project.

Security is at the forefront of Avaya solutions. Not merely pro-viding functionality, every product delivers its servicessecurely, and every service engagement considers securitynon-negotiable. You demand it, and Avaya delivers it.

A simple litmus test determines whether a specific securitysolution is used:

� Does it provide the most effective protection?

� Is it transparent to end users?

06_00987x ch03.qxp 3/6/06 9:50 PM Page 37

Page 44: VoIP Security for Dummies

VoIP Security For Dummies, Avaya Limited Edition 38� Does it require extensive management?

� Does it degrade network performance?

� Does it include security functionality compatible withtoday’s and possibly tomorrow’s standards?

Avaya doesn’t simply drop the latest and greatest securitymechanisms into its products because they’re cool; instead,the company performs an extensive risk analysis.

Avaya Builds Security into ItsServers and Gateways

Security is not added on but is designed into Avaya prod-ucts. The methods that Avaya uses to secure its productsare described in the sections that follow.

Secure operating systemAvaya’s newest servers and gateways are built on the openLinux operating system. Linux has an advantage over otheroperating systems because its source code can be (and is)reviewed by thousands of security experts and researchersthroughout the world.

Avaya made the move to Linux because of a security para-dox: To make an operating system secure, you must revealits innermost secrets. When the operating system softwareis publicly available and used in varying environments andfor a wide range of applications, there are many more eyes,both friend and foe, looking for security holes. The expert-ise of the entire technical community is brought to bear onthe problem. The surety that flaws can and will be fixedquickly outweighs the weakness created by exposing them.

Media and signaling encryptionThe modern communications system employs many physi-cal and logical links to exchange data between system com-ponents as well as from user to user. These links include

06_00987x ch03.qxp 3/6/06 9:50 PM Page 38

Page 45: VoIP Security for Dummies

media gateway control links; registration, admission, andstatus (RAS) links; call signaling links; media (voice or data)links; and administration access links. Each of these linksmust be protected, both from information loss to persons whoshouldn’t have it and from interference/disruption or theft ofservices. You can achieve protection by encrypting the entirelink, encrypting critical data, and/or by secure challenge/response mechanisms. Voice streams can be protected(administratively selectable) by encryption with theAdvanced Encryption Standard (AES) algorithm or by an algo-rithm known as the Avaya Encryption Algorithm (AEA).Server/gateway signaling links are protected with AES bydefault. Administration links can use SSH or TLS/HTTPS.

Hardened operating systemAvaya servers and gateways built on Linux have built-in pro-tection against certain types of Denial of Service (DoS) attackssuch as SYN floods, ping floods, malformed packets, oversizedpackets, sequence number spoofing, ping/finger of death, andso on. Attacks are recognized at the lower levels of the soft-ware and their effect blunted.

The Linux kernel is compiled with a set of options to preciselytailor its operation to maximize security consistent withrequired operation of the system. These include a number ofbuilt-in firewall and filtering options.

All file and directory permissions are set to minimize accessas much as possible, consistent with proper system opera-tion. Multiple partitions exist on an Avaya Media Server diskdrive. Each partition is restricted according to the type ofdata that it may contain. Some partitions contain only soft-ware executables; these partitions are mounted to allow pro-gram execution. Other partitions contain only data; executionof software from these partitions is disabled.

Avaya Media Servers use a hardened Linux operating systemcustomized for real-time applications and based on the RedHat Linux distribution. The entire Red Hat Linux distributionis not loaded. The operating system is specifically configuredfor these servers. This means that only those componentsthat are needed are loaded, and modules that are not used arenot loaded. Additionally, components that are used only in

Part III: Building Security into Your VoIP Network 39

06_00987x ch03.qxp 3/6/06 9:50 PM Page 39

Page 46: VoIP Security for Dummies

certain configurations are disabled when not used. Examplesof modules affected by these policies include NFS, SMB, XWindows, rcp, rsh, rlogin, and rexec.

All IP ports that are not used are closed. By closing unusedports, worms that attempt to exploit weaknesses associatedwith those ports are blocked.

Secure accessTypical mechanisms of server access include telnet, Webbrowser (HTTP), and FTP for file transfer. Each of these mech-anisms can support login authentication, but suffer a commonweakness. During the login sequence, the password being sup-plied by the user is sent in clear text. This allows a personwith a network monitor/sniffer to capture the password andgain access. In addition, these mechanisms transmit all thesession information in clear text. Some of this informationmight contain data such as account codes, authorizationcodes, or other data useful to an attacker. To overcome theseproblems, Avaya Media Servers also support Secure Shellaccess (SSH), Secure Copy (SCP/SFTP), and secure Webaccess using the Secure Sockets Layer (SSL) with HTTPS.

SSH and SCP/SFTP provide an access mechanism for terminalaccess and file copy that encrypts the entire session, includ-ing the login sequence as well as subsequent data transfer.SSL/HTTPS provides a similar mechanism for Web access.HTTP administrative access is automatically redirected toHTTPS.

In addition, the Avaya Media Servers support one-time pass-words for logins through these mechanisms, even though theexchange is already encrypted.

On an Avaya Media Server, the FTP service is disabled bydefault. Each time a file is to be transferred to the server, anadministrator must log in and enable the FTP server. The fileis then transferred using anonymous FTP, and the FTP servercan then be disabled. Using anonymous FTP like this avoidsthe problem of sending passwords in clear text. However, SCPis the preferred method of transferring files.

VoIP Security For Dummies, Avaya Limited Edition 40

06_00987x ch03.qxp 3/6/06 9:50 PM Page 40

Page 47: VoIP Security for Dummies

One-time passwordsAvaya Media Server software provides an option to use one-time passwords for all logins. A regular password accountuses a fixed user name (ID) and a password, which can beused multiple times to log into the system. A person who canmonitor (network sniffer) the login messages can capture thispassword and use it to gain access. A one-time password usesa fixed user name, but not a fixed password. Instead, everytime a user attempts to log in, they must supply a passwordthat is unique to that session and which will be incorrect ifused again. Even if the password is compromised, it cannot bere-used immediately or at a later time, even by the sameperson from the same terminal. One-time passwords can beenabled for each login on an Avaya Media Server.

Shell accessAccess to a shell from which arbitrary commands may be exe-cuted is not granted by default to a login on an Avaya MediaServer. When a login is created, the system administrator canspecify whether the account is permitted to have shell access.Accounts that are denied shell access receive either an AvayaCommunication Manager software administration screen or aWeb page upon successful login. In both cases, the operationsthat may be performed are restricted. In general, only individ-uals that perform hardware or software maintenance of theserver need shell access.

Root accessOn a Linux system the highest level of administrative accessis known as root. Direct login to a root level account is notpermitted on an Avaya Media Server. Administrative access,which requires root level permissions, is handled via proxyprograms that grant limited access to specific accounts andcreate auditable logs. The ability to obtain full root levelaccess is granted only in very special circumstances, and thenonly to a user who is already authenticated with a lower privi-leged account.

Part III: Building Security into Your VoIP Network 41

06_00987x ch03.qxp 3/6/06 9:50 PM Page 41

Page 48: VoIP Security for Dummies

Remote accessYou can access Avaya Media Servers remotely in one of twoways, either via a modem connection or via a network connec-tion. Either method, and remote access in general, can causesecurity problems. Security professionals generally frownon (and some corporate security policies forbid) modems,because modems form a point of entry that bypasses thecorporate firewall. Remote network access can also presenta challenge in that such access has to be carefully firewalledand constrained to specific devices. Support for any sort ofremote access is part of the trade-off in providing cost-effective security.

Remote access is used by Avaya services for delivery of main-tenance alarms to Avaya and for access by maintenance tech-nicians. Both modem-based remote access and Virtual PrivateNetwork (VPN) based access are supported. Avaya considersVPN a more secure remote-access mechanism; however,modem access is often a necessary alternative in the event ofa network failure that prevents VPN access from functioning.

Understanding the issues with modem access, Avaya has con-figured this feature with maximum flexibility for the systemuser. The server logins that are used to establish a remotemodem connection are separate from those that allow admin-istrative functions. One account is used to establish a connec-tion; after the link is established, a second login is requiredusing a separate administrative account. Modem configura-tion could also be disabled or configured for one-time-onlyuse where the modem will be disabled automatically after it isused. This assures that the administrator doesn’t forget toturn it off.

Monitoring and alarmingAvaya Media Servers support a variety of security monitoringfeatures. Accounts are automatically locked out for a period oftime as a consequence of consecutive failed login attempts.Critical files and directories are monitored and audited by trip-wire. All login sessions, whether successful or not, are logged.All interactive shell command activity is logged. Securityevents are alarmable events that can be reported as an SNMPtrap to one or more destinations.

VoIP Security For Dummies, Avaya Limited Edition 42

06_00987x ch03.qxp 3/6/06 9:50 PM Page 42

Page 49: VoIP Security for Dummies

Data protectionAttacks against a system are not limited to attempts to findholes in the access structure. There are also techniquesknown as data mining, dumpster diving, or phishing that canbe used even more effectively if the system owner is not careful.

Avaya Media Servers have the capability to store backupcopies of critical configuration information including authenti-cation and account information on external systems. If thisinformation is stored in clear text and the file server on whichit is stored is compromised, the Avaya Media Server couldbe compromised. To make this more difficult, Avaya MediaServers have the ability to encrypt all backup data. Thisoption should always be used when using the backup feature.

From time to time, new software features are created thatrequire the software or firmware to be updated. This processinvolves the transfer of executable files to the Avaya MediaServers or other system components from a variety ofsources. It is important that these files arrive exactly as theywere created at Avaya. To prevent malicious modification intransit, all distributions are cryptographically signed so thatmodifications can be detected and installation prevented.

LAN isolationThe enterprise LAN, control LANs, and adjunct LANs can allbe connected together to form one network, or they can bekept physically or logically separate for either bandwidth con-trol or security reasons. Separation can be physical or accom-plished logically through VLANs.

In order to provide the most secure environment possible forthe system, network access can be divided into separatezones of control.

VLANs can be configured to isolate traffic and access accord-ing to function. One VLAN can be configured for administra-tive traffic, one for call signaling, another for voice bearertraffic, and so on. Layer 3 boundary devices (routers, layer 3switches, and firewalls) can be administered to enforce the

Part III: Building Security into Your VoIP Network 43

06_00987x ch03.qxp 3/6/06 9:50 PM Page 43

Page 50: VoIP Security for Dummies

corporate security policy on traffic destined for the AvayaMedia Servers, Media Gateways, or adjuncts. Firewalls can beput in place to permit administrative access only from anadministrator’s PC and to deny access from the Avaya MediaServers or their gateways to the corporate LAN, while allow-ing appropriate access for call signaling and bearer trafficfrom all IP telephones.

The Avaya Media Server software can itself be configuredto allow only certain types of access to specific LAN inter-faces on its gateways. So, for example, even if one were toconnect an administration terminal to one of the other (non-administrative) LANs, administration access would be denied.

Disaster recoverySecurity isn’t just about hackers and software attacks.Security involves protecting the entire enterprise from allevents that might disrupt its normal functioning. These eventsinclude normal LAN disruptions as well as large-scale acts ofnature, vandalism, or even terrorism. Avaya’s communica-tions systems can be configured for maximum survivabilityshould the network become fragmented or parts of thesystem become inoperable, including the main servers.

There are two types of survivable servers: EnterpriseSurvivable Servers (ESS) and Local Survivable Processors(LSP). These servers can be located in multiple physical loca-tions and can take over control of portions of the system orthe entire system depending on the type of disruption.Hundreds of these servers can be added to the system asneeded.

Protection against malwareThe viruses and worms that have made the headlines havemostly targeted Microsoft Windows operating systems andMicrosoft application software such as IIS, Exchange, Outlook,or Word. Because the Avaya Media Server is Linux-based anddoes not employ any of this software, it has some level of nat-ural immunity. In addition, viruses and worms are most com-monly delivered via e-mail, by visiting infected Web sites, or

VoIP Security For Dummies, Avaya Limited Edition 44

06_00987x ch03.qxp 3/6/06 9:50 PM Page 44

Page 51: VoIP Security for Dummies

by sharing disk drives. The Avaya Media Server does not sup-port incoming e-mail, forwarding of e-mail, user Web brows-ing, or NFS or SMB (that is, does not share drives).

The Linux operating system used by the Avaya Media Serversis not the standard distribution of Linux. Many modules arenot loaded on the Avaya server. This means that malware,which depends on specific features being available (such asa compiler), is thwarted.

All software releases and updates transferred to the AvayaMedia Server are cryptographically signed to prevent intro-duction of unwanted software.

In addition to this natural immunity, the Avaya server incorpo-rates additional anti-tampering features. The disk drive isdivided into multiple partitions. Executable code is stored inseparate partitions from data; data is likewise stored in sepa-rate partitions, which do not have execute permissions. Directroot level access is not normally permitted, and when it isgranted, the login is protected by using a one-time password.

This is important because one of the first goals of an attackeris to obtain root level access as this provides the opportunityfor the most destruction. Login accounts on the Avaya systemdo not necessarily receive any type of shell access. This isalso important because shell access allows the user to entercommands at will, whereas the more controlled access limitsthe user to the functionality presented on menus or screens.Critical files and the file system are monitored by Tripwire, asoftware product that maintains a cryptographically encodedsignature of the files on the system and generates alarms inthe event any unexpected changes occur.

TestingDuring development, Avaya subjects systems to a variety ofcommon “attack tools” as additional validation steps aimedat reducing the likelihood of known vulnerabilities being re-introduced. The exact set of tools that are used varies to keepup with the technology. Common tools include nmap andnessus. Security problems found by these efforts are correctedprior to the product or update being released.

Part III: Building Security into Your VoIP Network 45

06_00987x ch03.qxp 3/6/06 9:50 PM Page 45

Page 52: VoIP Security for Dummies

Avaya Product SolutionsAvaya has a wide range of product solutions that support VoIPand converged infrastructure networks: from Media Servers toMedia Gateways to secure gateways to IP infrastructuredevices, including switches and routers.

Media Servers and GatewaysA Media Gateway is a communications system that, whenplaced in a branch office, provides advanced voice and datacommunications features that are logically extended fromother branch locations and from a headquarters facility.

Avaya Media Gateways protect your network by blockingunauthorized communications and by permitting only author-ized personnel to access and administer them.

Switches and WAN access devicesAvaya network switches and access devices deliver advancedsupport for converged infrastructures. Devices in this familyinclude Ethernet stackable switches, ATM switches, work-group switches, gigabit switches, and routers. These devicesprotect your network by withstanding attacks and tampering,and can be tied in to enterprise-wide Avaya network manage-ment systems.

Avaya’s PXXX line of switches provides Layer 2 functionality.Extreme Networks, one of Avaya’s strategic partners, hasLayer 3 switches that are vital to core network operations.

Intelligent system and networkmanagementAvaya offers tool suites to manage VoIP and converged infra-structure networks. These fall into six product groupsdescribed here. These products help to improve enterprisesecurity by providing the tools to maintain the security andintegrity of the entire network, as well as individual devices inthe network:

VoIP Security For Dummies, Avaya Limited Edition 46

06_00987x ch03.qxp 3/6/06 9:50 PM Page 46

Page 53: VoIP Security for Dummies

� Basic Administration Tools. These tools are used toadminister and manage fault and performance for a net-work of voice systems. They enable enterprises tomanage adds, changes, backups, and broadcasts ofrecorded announcements over the LAN to Avaya MediaServers systems with Avaya Voice AnnouncementManager.

� Communication Manager System Management. Theideal complement to the capabilities of both the BasicAdministration Tools and Enterprise IntegratedManagement Offers, this is designed for enterprises thatare implementing IP telephony and require managementof centralized media servers with distributed media gateways.

� Converged Network Analyzer. This amazing tool createsa self-healing and self-optimizing WAN network infrastruc-ture through a comprehensive approach to network mon-itoring, application-based assessment, and networkoptimization.

� Enterprise Network Management. For enterprises withmid- to large-scale branch-office VoIP deployments,Enterprise Management includes the essential toolsneeded to centrally manage provisioning and installation,secure access, software upgrades, and trouble shootingfor branch-office locations.

� Voice over IP Monitoring. With VoIP MonitoringManager, voice quality problems are identified faster,affected users and areas are identified quickly, and keyinformation is available to help troubleshoot and fixproblems.

� VPNmanager Series. These tools centralize deploymentand management of widely distributed networks of remoteaccess VPN users, VPN gateways, and firewalls in two edi-tions: Enterprise Client and Service Provider Client.

Avaya Global Services SolutionsAvaya Global Services provides an array of professional prod-uct support and managed services for organizations that lackadequate resources or expertise to design, implement, or

Part III: Building Security into Your VoIP Network 47

06_00987x ch03.qxp 3/6/06 9:50 PM Page 47

Page 54: VoIP Security for Dummies

maintain security in a VoIP environment. Avaya also providescomplete services support for Juniper and Extreme securitysolutions.

Security consultingAvaya provides several security consulting services. The mostpopular services include the following:

� VoIP Security Assessment. Identifies network and policygaps that can be exploited by an attacker and providesthe expertise needed to close these gaps.

� Security Policy Development. Defines procedures,responsibilities, controls, and security measuresrequired to protect assets in a converged environment.

� Security Architecture & Design. Designs a secure infor-mation infrastructure and ensures that the securitymeasures defined in a policy are designed into the secu-rity framework.

� Business Continuity Consulting. Provides the analysis,planning, and procedures necessary to ensure networkavailability during a disaster. These services include riskevaluation, risk reduction, and ongoing support that helpbusinesses identify vulnerabilities and lower risks.

Communications system security An important step in securing a converged communicationsnetwork is securing, or hardening, of the applications. Avayadelivers the expertise needed to assist customers with theassurance that all possible measures have been taken tosecure their Avaya systems and applications. This helps tominimize the threats that can compromise information andsystem integrity. Avaya can help determine and develop secu-rity controls for internal IT security audits to help achieve leg-islative or industry regulatory requirements. Securityhardening solutions include the following:

� System Access Controls: These include password man-agement, account management, user/group access level,file permissions and administration.

VoIP Security For Dummies, Avaya Limited Edition 48

06_00987x ch03.qxp 3/6/06 9:50 PM Page 48

Page 55: VoIP Security for Dummies

� Application Controls: These are recommended securitycontrols that are available at the application layer.

� Operating System: Avaya helps mitigate vulnerabilitiesand apply appropriate security configuration and/orapply operating system–specific security patches.

� Network Services: Network services that may potentiallypose security risks to a system resource are disabled.

Secure access and controlAnother important consideration for maintaining security in aconverged environment is securing access to the network andnetwork-based applications for maintenance and repair pur-poses. Traditionally, modem connections were used to obtainaccess, but they have increasingly been viewed as potentiallyvulnerable to security breaches.

Avaya has addressed remote modem access vulnerabilitythrough its Secure Access and Control (SAC) solution. SAC is asoftware-based service that connects to your network via asecure VPN, thus eliminating reliance on modems and thepublic switched telephone network (PSTN). This ensures asecure path between Avaya and your site. SAC providesgreater control over access and a more detailed audit trail.This solution delivers real-time management and control overremote access to your network and includes authentication(who gets in), authorization (what they can access), andaccounting (audit trail — who, what, where, when and why).

Secure network monitoring andmanagement servicesAvaya’s IP Support Services provide secure, real-time monitor-ing and management of your converged network infrastruc-ture — supporting Avaya Communication Manager solutionsand multi-vendor data devices. These services are built on theAvaya Enterprise Service Platform (ESP), which leveragesthe Avaya EXPERT Systems Diagnostic Tools — all working toidentify, isolate, and remediate network issues within theshared accountability model.

Part III: Building Security into Your VoIP Network 49

06_00987x ch03.qxp 3/6/06 9:50 PM Page 49

Page 56: VoIP Security for Dummies

Another key component of the Avaya service delivery archi-tecture is the Secure Intelligent Gateway (SIG). The SIG pro-vides visibility into the network components that are beingmonitored and managed in the converged environment. TheSIG is set up between firewalls and transmits only the forensicanalysis data back to the Avaya Network Operations Center —all in an effort to optimize the security of your confidentialdata. The Avaya Enterprise Service Platform, along with

VoIP Security For Dummies, Avaya Limited Edition 50

Securing the Bank of IrelandAs a banking institution, the ability toconduct business is completelydependent on the reliability andsecurity of the bank’s communica-tions technology. The Bank ofIreland’s competitive reputation inthe market is absolutely tied to itsability to safeguard a customer’sfinancial and personal informationassets.

The bank’s Retail Financial Servicesdivision launched Banking 365, whichbroke ground as Ireland’s first tele-phone banking offer. Providingaround–the-clock personal bankingevery day of the year, 365 hasexpanded rapidly since its launch.Given the bank’s focus on ensuringthe integrity of the 365 network, it’snot surprising that security was aprominent consideration in allaspects of the project. Avaya per-formed a major upgrade to Banking365’s voice network. Avaya GlobalServices designed and implementedappropriate measures to ensureBanking 365’s security needs weremet, beginning with a detailed riskanalysis and using the results todevelop a specific set of recommen-dations to fortify Banking 365’s voice

hardware and software. Collabor-ating with Bank of Ireland’s informa-tion security team, voice and dataservices security were coordinatedevery step of the way to ensure consistency and reliability. Avaya’sengineers employed a thoroughmethodology that focused on everyarea of network security, from admin-istrative passwords to TCP protocolsand LDAP functionality. The endresult was a significantly heightenedlevel of voice security when thebank’s security team conducted afollow-up security assessment.

Here are the results:

Improved security through a detailedanalysis of the bank’s security auditand specific recommendations, whichwere implemented to fortify 365’svoice hardware and software.

Enhanced customer trust by provid-ing a highly secure way for Bank ofIreland’s customers to manage theirfinancial transactions.

Realized key business objectivessuch as retention, growth, and profitability.

06_00987x ch03.qxp 3/6/06 9:50 PM Page 50

Page 57: VoIP Security for Dummies

Avaya’s expert engineers, can help to significantly reduce thecritical time associated with fault isolation in order to opti-mize network availability and quality of service.

Avaya’s Strategic PartnersAvaya is building an ecosystem requiring the integration andcollaboration of information and processes from thousands ofdevelopers, system integrators, customers, business partners,and more. In this system, each segment affects, and is affectedby, the others. All the members of the ecosystem determinethe fortune of the ecosystem as a whole.

Avaya has formed an alliance with strategic partners toensure that all facets of the VoIP security spectrum are cov-ered for your business.

Extreme NetworksExtreme Networks is an Avaya global strategic alliance part-ner as well as a DevConnect member. Extreme Networks pro-vides the following cost-effective IP infrastructure productsolutions:

� Ethernet switches: In the IP telephony world, Ethernetswitches provide the switching and routing of VoIP callsas well as other applications on the network.

� Wireless LAN: Including VoIP roaming on wireless.

� Security solutions: Comprehensive LAN security onswitches and the Sentriant security appliance which miti-gates Day Zero attacks and worm storms.

Avaya’s DeveloperConnection (DevConnect) is a community ofcompanies that offers applications, services, and hardwaresolutions that further enhance Avaya’s products and services.

Extreme Networks provides excellent VoIP performance infour key areas:

� High-quality voice connections

� Voice class availability

� Comprehensive security

� Simplified management

Part III: Building Security into Your VoIP Network 51

06_00987x ch03.qxp 3/6/06 9:50 PM Page 51

Page 58: VoIP Security for Dummies

Juniper NetworksJuniper Networks is a global strategic alliance partner as wellas an Avaya DevConnect member. Its portfolio includes indus-try leading security and network infrastructure. Juniper’sproducts enable enterprises to run mission-critical applica-tions such as VoIP and video on a single converged network.

Juniper Networks leads the industry in enabling secure,assured communications over a single IP network.

Juniper Networks provides superior VoIP support through:

� Best-in-class enterprise security products

� Superior performance through purpose-built high-performance platforms

� High availability and reliability of network infrastructure

In particular, Juniper Networks infrastructure products pro-vide seamless interoperability and several unique attributesincluding:

� Custom application-layer gateway (ALG): JuniperNetworks’ support for Avaya H.323 ALG enhances net-work security because it is able to work with the AvayaH.323 protocol to open pinholes for incoming and outgo-ing calls rather than opening a range of static ports tohandle VoIP traffic.

� Protection against Session Initiation Protocol (SIP)anomalies: Juniper Networks’ Intrusion Detection andPrevention (IDP) systems protect against known SIPanomalies to provide additional security for Avaya IPtelephony applications.

� Customized WAN Optimization: Juniper Networks’ WANacceleration products work specifically with Avaya IPtelephony applications to provide additional bandwidthwithout incurring additional cost.

� Support for Avaya IP Softphone and IP Agent: JuniperNetworks’ secure sockets layer (SSL) VPN products havebeen tested with Avaya IP Softphone and IP Agent toensure secure and reliable access for authorized remote users.

VoIP Security For Dummies, Avaya Limited Edition 52

06_00987x ch03.qxp 3/6/06 9:50 PM Page 52

Page 59: VoIP Security for Dummies

Part IV

Ten Reasons to Look toAvaya for VoIP Security

In This Part� A complete solution

� Security consulting

� Trusted Communications Framework

� Secure products

� Partnerships

� Application security

� Managed security

� SIP security

� Secure access

� Credentials

Avaya is the leading solutions provider in the enterpriseVoIP industry and has invested heavily in developing

security strategies for its customers. The result is a reliableand secure VoIP solution. Here are the ten best reasons tolook to Avaya for secure VoIP solutions.

Avaya Has the CompleteSolution

Avaya sees the big picture and can deliver the total solutionwhen it comes to VoIP security. What does that mean?

07_00987x ch04.qxp 3/6/06 9:50 PM Page 53

Page 60: VoIP Security for Dummies

VoIP Security For Dummies, Avaya Limited Edition 54To begin with, Avaya considers the entire converged envi-ronment when it comes to VoIP security — this means thenetwork and all applications. VoIP requires not only tradi-tional, reactive data security, it also requires complete secu-rity of every link, user, server, and device. And securitymust be designed in from the beginning. By looking at anentire multi-vendor environment, Avaya creates a compre-hensive plan of action to minimize risk for voice and data,as well as to comply with complex security and privacyregulations.

Another critical point is that Avaya has been a voice com-pany since inception. Why is that important? Because voiceis the most real-time of real-time mediums out there,demanding the highest standards of performance. Whobetter to trust for the security of voice over IP than thevoice and application experts at Avaya?

Security ConsultingEffective security for VoIP starts with proper planning,including the development, implementation, and communi-cation of security policies tailored to specific business pri-orities. Avaya brings the combination of skills and expertiserequired for planning and policy setting in converged com-munications environments — skills that have not coexistedin the past.

Avaya starts with a vulnerability assessment to identify net-work and policy gaps that an attacker can exploit. Avaya thenprovides security policy development consulting that helpsthe IT organization to define the procedures, responsibilities,controls, and security measures required to protect assets ina converged environment. Avaya brings its expertise to thecomplex task of designing a secure information infrastructureand ensures that the security measures defined in a policyare designed into the security framework.

Secure ProductsAvaya products are secure by design and default. Avayastays abreast of security best practices and issues and

07_00987x ch04.qxp 3/6/06 9:50 PM Page 54

Page 61: VoIP Security for Dummies

incorporates best-of-breed protection measures into itsproducts.

Security functionality incorporated into Avaya productsincludes

� SSH for secure administration instead of using oldertelnet and FTP protocols that send password credentialsin the clear

� SNMPv3 for secure monitoring

� AES encryption to ensure voice confidentiality and sig-naling protection

� Standards-based registration via H.235.5 for secureauthentication to avoid impersonation

� Virus protection by minimizing operating and networkservices that can be exploited by harmful worms andviruses

These measures keep your VoIP network secure without sacri-ficing performance or manageability.

SIP Security and LeadershipAvaya is a thought leader with the SIP protocol and its secu-rity; Avaya has long known SIP’s potential and has incorpo-rated it into many of its products already.

In converged networks, particularly in the case of SIP, moreintelligence is moved away from the guarded center to theedge of the network. Avaya provides the fundamental securityservices required for the SIP protocol to address critical areassuch as preserving the confidentiality and integrity of messag-ing, preventing replay attacks or message spoofing, providingfor the authentication and privacy of the participants in a ses-sion, and preventing Denial-of-Service attacks.

Secure AccessSecure access means many things to many people. Avaya hassecure access covered on all fronts:

Part IV: Ten Reasons to Look to Avaya for VoIP Security 55

07_00987x ch04.qxp 3/6/06 9:50 PM Page 55

Page 62: VoIP Security for Dummies

� Avaya Media Servers: Support secure access for usersas well as for administrators, whether personnel arelocated on-site or off-site. Products support Secure Shell(SSH), Secure Copy (SCP/SFTP), and secure Web access(using SSL or HTTPS). Unsecure services, such as telnetand FTP, are disabled.

� Avaya Secure Access and Control Service (SAC):Provides a secure path between Avaya and its customersites and supports remote delivery of services — eitherby Avaya personnel or its patented remote diagnosticstool, Avaya EXPERT Systems.

� Access Security Guard (ASG): Provides protection foradministrative accounts through challenge/responsehandshakes and one-time passwords.

To maintain security in a converged business communicationsenvironment, you must eliminate unauthorized externalaccess to the network and network-based applications. Theseexternal communication connections are designed to facilitatemaintenance and repair operations, but increasingly they areviewed as potential security vulnerability gaps in the enter-prise communications environment. Avaya can help youaddress these potential security concerns.

Trusted CommunicationsFramework

A communication framework is a fancy term for a set of stan-dards that an organization uses for communication.

Avaya has developed a Trusted Communications Frameworkbased on open standards. This approach provides security forcommunication and helps avoid being locked into a singlevendor’s proprietary architecture and solutions.

Avaya’s Trusted Communications Framework is based onsecurity best practices including defense in depth, high avail-ability, and least privilege. Security is always a part of thedesign, from the very beginning of every new product.

VoIP Security For Dummies, Avaya Limited Edition 56

07_00987x ch04.qxp 3/6/06 9:50 PM Page 56

Page 63: VoIP Security for Dummies

PartnershipsAvaya has long known that no single company has the best ofeverything in communications security — or in other tech-nologies, for that matter. Recognizing that, Avaya has formednumerous strategic partnerships in the VoIP market space,including Extreme Networks and Juniper Networks.

Avaya’s partnership with Extreme Networks leverages Avaya’svoice expertise in converged environments with ExtremeNetworks’ expertise in high-performance, resilient Ethernet net-works to collaborate in technology and product development.

Avaya’s partnership with Juniper Networks uses Juniper’srouting and security solutions, resulting in seamless, continu-ous, and secure communications delivered through anydevice to workers in any branch, remote, or mobile location.

Managed ServicesAfter your shiny new converged network is built, who is goingto operate it? Ongoing security management is a serious taskthat is a bigger job than many organizations want to take onalone.

Avaya Support Services provide the experienced resourcesneeded to effectively monitor and manage a complex con-verged network communications platform. These servicesleverage the Avaya exclusive Enterprise Service Platform(ESP) and EXPERT Systems technology to proactively identify,isolate, and resolve potential network issues. Using the ESP,Avaya can help to significantly reduce the critical time andcost of fault isolation and ensure less downtime for communi-cations equipment.

The Secure Intelligent Gateway (SIG), another key componentof the Avaya service-delivery architecture, provides a secureaccess point and visibility for all network components beingmonitored and managed in your converged environment. TheSIG receives events from devices in the network for continu-ous, real-time analysis while also providing other functionality

Part IV: Ten Reasons to Look to Avaya for VoIP Security 57

07_00987x ch04.qxp 3/6/06 9:50 PM Page 57

Page 64: VoIP Security for Dummies

critical to the management of the environment. This level ofintelligent monitoring greatly increases the probability ofdetection before problems affect service, thus increasingnetwork uptime.

Application SecurityAvaya understands that protecting VoIP doesn’t stop with pro-tecting the network. Certainly every device on the networkmust be secure, but don’t forget about securing applicationsas well.

It used to be true to say that protecting the network wasenough to protect the applications within it. But those goodol’ days (or were those bad old days?) are over. The protec-tion of applications in their own right is a vital part of thetotal solution.

Like servers and network devices, applications require theirown hardening. Avaya applications have security features,including hardening, enabled by default. The following aresome noteworthy examples:

� Avaya Communication Manager and Media Servers haveadditional resilience included in the form of protectionagainst Denial of Service (DoS) attacks.

� Avaya S8700/S8300 Media Servers also support manysecurity monitoring and alarming features.

� Avaya S8700 and S8300 servers can store backup copiesof critical configuration information, including authenti-cation and account information, on external systems.

� The S8700 and S8300 servers can encrypt all backupdata, thus making use of the data impossible, even ifaccess to the data is compromised.

� For other PBX systems and adjunct systems (call man-agement, messaging IVR, and so on), Avaya providesthe expertise to assure that all possible measures havebeen taken to secure them, while providing the proofpoints necessary for industry and government regulationcomplaince.

VoIP Security For Dummies, Avaya Limited Edition 58

07_00987x ch04.qxp 3/6/06 9:50 PM Page 58

Page 65: VoIP Security for Dummies

Avaya has the specific system knowledge, security expertise,and industry experience to deliver system security hardeningof Avaya communications systems and other vendor systemsthat address the level of security required by organizations.

Avaya CredentialsFrom its security consultants to the R&D staff at Avaya LabsResearch, Avaya’s level of expertise is unparalleled. Avayasecurity consultants have an average of 10–15 years of secu-rity experience in many industries.

Many Avaya consultants also possess industry-recognizedcertifications including

� Certified Information Systems Security Professional(CISSP)

� National Security Agency INFOSEC AssessmentMethodologies (IAM)

� Checkpoint Certified Security Associate (CCSA)

� Cisco Certified Firewall Specialist (CCFS)

� Cisco Certified Network Associate (CCNA)

� Cisco Certified Network Professional (CCNP)

� Cisco Certified Design Professional (CCDP)

� Cisco Certified Design Associate (CCDA)

� Alteon Certified Expert (ACE)

� Microsoft Certified Systems Engineer (MCSE+I)

Part IV: Ten Reasons to Look to Avaya for VoIP Security 59

07_00987x ch04.qxp 3/6/06 9:50 PM Page 59

Page 66: VoIP Security for Dummies

VoIP Security For Dummies, Avaya Limited Edition 60

07_00987x ch04.qxp 3/6/06 9:50 PM Page 60

Page 67: VoIP Security for Dummies

What is the truth about VoIP security? Finding the right partner that delivers secure IP telephony — while leveraging existing security investments — is the key.

There is no single “right way” to do VoIP security — it may require “ground-up” design, or it may require only an upgrade here or there. It makes good business sense to apply security holistically across the enterprise for both voice and data. The challenge is finding the right way to make an environment as secure as possible for the least possible cost and effort.

Avaya products utilize best-of-breed security design and implementation that integrate with existing security services in small and large businesses. Avaya Global Services provides expert advice for small business and world-wide enterprises, and brings Avaya’s depth of expertise to bear on any company’s VoIP security needs.

Explore the possibilities at www.avaya.com.

Page 68: VoIP Security for Dummies

Peter H. Gregory, CISA, CISSPSecurity speaker and columnist, author of Blocking Spam & Spyware For Dummies

A Reference for the Rest of Us!®

FREE eTips at dummies.com®

This Avaya limited edition of VoIP Security For Dummies shows how risks are identified, analyzed, managed, and minimized in your converged voice and data networks. Find out how security best practices — and Avaya products and services — can make your VoIP network as secure as a traditional telephone network. IT managers will appreciate the jargon-free coverage of VoIP and converged network security, and end users will easily understand the benefits of securing VoIP. See how an Avaya solution can help you implement VoIP without sacrificing the security and stability you are accustomed to.

ISBN: 0-470-00987-XPart #: MIS3005 Not for resale

@� Find listings of all our books

� Choose from many different subject categories

� Sign up for eTips at etips.dummies.com

Protect your converged networks from

known and unknown risks!

®

Enjoy all the benefits of VoIP with enterprise-grade security

Understand VoIP security issues and how they are solved

Make decisions about how to better secure your converged network and applications

Improve security in your entire converged environment

Avaya Limited Edition Realize VoIP benefits and stay secure!

VoIP Security

Compliments of Avaya

Leader in IP technology

Explanations in plain English

“Get in, get out” information

Icons and other navigational aids

Top ten lists

A dash of humor and fun