SlideShare a Scribd company logo
1 of 2
Download to read offline
Systems and Network Analysis Center
                               Information Assurance Directorate

                                          Video Teleconferencing
           What is Video Teleconferencing?                        and data streams and interfaces to the users. The
                                                                  Multipoint Conference Unit and the Gateways will be
   Video Teleconferencing (VTC) is a communication
                                                                  discussed in later sections.
   technology that permits users at two or more different
   locations to interact by creating a face-to-face meeting
   environment. VTC systems transmit bi-directional
                                                                     VTC Network Protocols and Architectures
   audio, video and data streams during the session.
   Usage of VTC has expanded beyond corporation                   Standard voice and video protocols used on VTC
   boardroom meetings. The demands for collaboration              systems today are the Session Initiation Protocol
   tools and converged infrastructure have boosted VTC            (SIP), H.320, and H.323.
   usage in recent years. VTC has been gaining                    Hardware or software components that execute the
   popularity in all government sectors including tactical        compression of signals are called Coder/Decoders or
   and non-tactical environments.                                 CODECs. A CODEC is also used to convert between
                                                                  analog and digital formats.
                                                                  Point-to-Point is the most basic architecture
                  Type of VTC Systems                             configuration for a VTC network. This configuration
   The two basic types of VTC systems are the                     does not require a Call Server and does not allow
   dedicated systems and the desktop systems. The                 conferencing of more than two endpoints, but it does
   desktop systems are add-ons to existing PCs. They              allow for direct video and audio calls between
   generally consist of a microphone, speakers, and               endpoints within a cluster. Figure 1 below depicts a
   camera, but may also include a PC add-in card.                 point-to-point network.
   Dedicated systems have all the necessary components
   to process the VTC sessions within a single console.
   This document will focus on these dedicated systems.
   The categories of dedicated VTC systems cover
   different operational environments. A large group
   system supports large meeting rooms or auditoriums,
   is fixed to the room, and is non-portable. The second
   category is the small group system. A small group
   VTC is designed to support small meeting rooms, is
   fixed to the room, is non- portable, and is normally
   more economical to deploy. The third category of
   dedicated VTC system is the individual system. These
   individual systems are designed to be portable single            Figure 1: Point-to-Point Conferencing Network
   user solutions with integrated camera, speakers, and
   microphone in a compact unit.                                  In a Multi-party VTC network architecture, a
   Common components in a standard VTC network are                Multipoint Conferencing Unit is required. The MCU
   Call Server, Video Endpoint, Multipoint Conference             makes conferencing possible by acting as a bridge
   Unit (MCU), Gateways, and an Ethernet switch. A                that interconnects calls from three or more Video
   Call Server performs the registration and call control         Endpoints. It can be a standalone hardware device,
   processing functions. Video Endpoints are devices              but some dedicated VTCs have embedded MCU
   from which users make and receive video calls. The             functions. Figure 2 illustrates how the MCU
   endpoint processes the bi-directional audio, video,            facilitates video teleconferencing sessions by


SNAC   DoD, 9800 Savage Rd.    Ft. Meade, MD 20755-6704   410-854-6632   DSN 244-6632   FAX: 410-854-6604   www.nsa.gov/snac
processing call control signals and the audio, voice,
          and data streams to connect the multiple endpoints. It
          also allows endpoints using different CODECs to
          participate in the same VTC session.




             Figure 2: Multi-party Conferencing Network

          A Gateway is required in order for VTC endpoints to
          communicate with the Public Switched Telephone                    Figure 3: Interoperability with Legacy Network
          Network (PSTN) or a legacy network. A Gateway is a
          standalone hardware device that provides access to
          other larger IP networks and/or circuit switched
                                                                                         What Can Be Done?
          telephone networks like the PSTN. Figure 3 shows an
          IP based VTC network communicating with                       To mitigate those vulnerabilities, the following
          endpoints on a legacy network. Type 1 external                actions can be taken:
          encryption devices like the KIV might be
                                                                        •     Change all default passwords
          implemented for network link encryption are also
          shown in Figure 3.                                            •     Apply best password security practices
                                                                        •     Enable encryption for the VTC sessions
                                                                        •     Disable broadcast streaming
                    What are the Vulnerabilities?                       •     Disable the far-end camera control feature
                                                                        •     Disable insecure IP services (e.g., Telnet, HTTP)
          Due to the valuable benefits and user-friendly set up
                                                                        •     Perform initial VTC settings locally using the
          procedures of VTC systems, many locations have
                                                                              craft port or the menu on the system
          implemented VTCs without applying security best
                                                                        •     Regularly update firmware and apply patches
          practices. When default settings remain unaltered,
          unauthorized users can exploit the VTC through the            •     Practice good physical security (i.e., restrict
          Web interface or other IP management services such                  access, turn off the device, and cover the camera
          as Telnet and File Transfer Protocol (FTP).                         lens when not in use)
          Unauthorized users can exploit the following security         •     Disable any auto answering feature
          vulnerabilities: participate in VTC sessions, upload          •     Disable wireless capabilities
          malicious code to initiate Denial of Service (DoS)            •     Separate VTCs logically from the rest of the IP
          attacks, take control of the far-end camera, record                 network using Virtual Local Area Networks
          audio and video streams, take snapshots of                    •     When remote access is absolutely required,
          participants during the session, establish a new                    institute strict access controls (e.g., router access
          session for eavesdropping, use the system as a                      control lists, firewalls rules) to limit privileged
          jumping off point and a hiding place to exploit other               access to administrators only
          systems, and edit configurations to enable additional
          features (e.g., Microphone, Remote Streaming).


  SNAC       DoD, 9800 Savage Rd.   Ft. Meade, MD 20755-6704   410-854-6632    DSN 244-6632     FAX: 410-854-6604   www.nsa.gov/snac
i038393

More Related Content

What's hot

Raritan Dominion KSX II Customer Presentation
Raritan Dominion KSX II Customer PresentationRaritan Dominion KSX II Customer Presentation
Raritan Dominion KSX II Customer Presentationsantiagotiprigan
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramIxia
 
GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.Student
 
Radio Interoperability Presentation Generic Gsa Academy
Radio Interoperability Presentation Generic Gsa AcademyRadio Interoperability Presentation Generic Gsa Academy
Radio Interoperability Presentation Generic Gsa AcademyRandyHagar
 
AUST_Permaconn Catalogue_v3_Email
AUST_Permaconn Catalogue_v3_EmailAUST_Permaconn Catalogue_v3_Email
AUST_Permaconn Catalogue_v3_EmailAndrew Lee
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....pptbalu008
 

What's hot (18)

Raritan Dominion KSX II Customer Presentation
Raritan Dominion KSX II Customer PresentationRaritan Dominion KSX II Customer Presentation
Raritan Dominion KSX II Customer Presentation
 
GSM & CDMA TECHNOL
GSM & CDMA TECHNOLGSM & CDMA TECHNOL
GSM & CDMA TECHNOL
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor
 
Vcx 7.1.16c-readme
Vcx 7.1.16c-readmeVcx 7.1.16c-readme
Vcx 7.1.16c-readme
 
Nx9500 spec-sheet-1211
Nx9500 spec-sheet-1211Nx9500 spec-sheet-1211
Nx9500 spec-sheet-1211
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) Program
 
Gsm network
Gsm networkGsm network
Gsm network
 
GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.
 
Radio Interoperability Presentation Generic Gsa Academy
Radio Interoperability Presentation Generic Gsa AcademyRadio Interoperability Presentation Generic Gsa Academy
Radio Interoperability Presentation Generic Gsa Academy
 
NMS-500 Universal Network Management Controller
NMS-500 Universal Network Management ControllerNMS-500 Universal Network Management Controller
NMS-500 Universal Network Management Controller
 
AUST_Permaconn Catalogue_v3_Email
AUST_Permaconn Catalogue_v3_EmailAUST_Permaconn Catalogue_v3_Email
AUST_Permaconn Catalogue_v3_Email
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
The GSM Technology
The GSM TechnologyThe GSM Technology
The GSM Technology
 
Mobile Station
Mobile StationMobile Station
Mobile Station
 
Dect
DectDect
Dect
 
Wimax connection
Wimax connectionWimax connection
Wimax connection
 
GSM
GSMGSM
GSM
 
GSM Introduction
GSM IntroductionGSM Introduction
GSM Introduction
 

Similar to Systems and Network Analysis Center Information Assurance ...

STATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology GuidelineSTATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology GuidelineVideoguy
 
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Videoguy
 
Protocols for multimedia multiparty conferencing
Protocols for multimedia multiparty conferencingProtocols for multimedia multiparty conferencing
Protocols for multimedia multiparty conferencingVideoguy
 
LTE Testing
LTE TestingLTE Testing
LTE TestingIxia
 
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...Journal For Research
 
Presentation file
Presentation filePresentation file
Presentation fileVideoguy
 
Consideration of fixed mobile convergence in 5G
Consideration of fixed mobile convergence in 5GConsideration of fixed mobile convergence in 5G
Consideration of fixed mobile convergence in 5GITU
 
EPL011-Ioannou
EPL011-IoannouEPL011-Ioannou
EPL011-IoannouVideoguy
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answersccna4discovery
 
LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleIxia
 
What is WebRTC and How does it work?
What is WebRTC and How does it work?What is WebRTC and How does it work?
What is WebRTC and How does it work?SandipPatel533958
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boostHowest_ENM
 
Optimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualizationOptimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualizationMadan Golla
 
Voip
VoipVoip
VoipPTCL
 
(Download)
(Download)(Download)
(Download)Videoguy
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot Aymeric Weinbach
 
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit kimw001
 
VIDEO CONFERENCING SYSTEM USING WEBRTC
VIDEO CONFERENCING SYSTEM USING WEBRTCVIDEO CONFERENCING SYSTEM USING WEBRTC
VIDEO CONFERENCING SYSTEM USING WEBRTCIRJET Journal
 

Similar to Systems and Network Analysis Center Information Assurance ... (20)

STATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology GuidelineSTATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology Guideline
 
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...
 
Protocols for multimedia multiparty conferencing
Protocols for multimedia multiparty conferencingProtocols for multimedia multiparty conferencing
Protocols for multimedia multiparty conferencing
 
LTE Testing
LTE TestingLTE Testing
LTE Testing
 
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
 
Presentation file
Presentation filePresentation file
Presentation file
 
Consideration of fixed mobile convergence in 5G
Consideration of fixed mobile convergence in 5GConsideration of fixed mobile convergence in 5G
Consideration of fixed mobile convergence in 5G
 
EPL011-Ioannou
EPL011-IoannouEPL011-Ioannou
EPL011-Ioannou
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
 
LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive Scale
 
Case study
Case studyCase study
Case study
 
What is WebRTC and How does it work?
What is WebRTC and How does it work?What is WebRTC and How does it work?
What is WebRTC and How does it work?
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boost
 
Optimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualizationOptimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualization
 
Voip
VoipVoip
Voip
 
(Download)
(Download)(Download)
(Download)
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
 
Intro to WebRTC
Intro to WebRTCIntro to WebRTC
Intro to WebRTC
 
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
 
VIDEO CONFERENCING SYSTEM USING WEBRTC
VIDEO CONFERENCING SYSTEM USING WEBRTCVIDEO CONFERENCING SYSTEM USING WEBRTC
VIDEO CONFERENCING SYSTEM USING WEBRTC
 

More from Videoguy

Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingVideoguy
 
Microsoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresMicrosoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresVideoguy
 
Proxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video StreamingProxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video StreamingVideoguy
 
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksFree-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksVideoguy
 
Instant video streaming
Instant video streamingInstant video streaming
Instant video streamingVideoguy
 
Video Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A SurveyVideo Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A SurveyVideoguy
 
Video Streaming
Video StreamingVideo Streaming
Video StreamingVideoguy
 
Reaching a Broader Audience
Reaching a Broader AudienceReaching a Broader Audience
Reaching a Broader AudienceVideoguy
 
Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...Videoguy
 
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGVideoguy
 
Impact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video StreamingImpact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video StreamingVideoguy
 
Application Brief
Application BriefApplication Brief
Application BriefVideoguy
 
Video Streaming Services – Stage 1
Video Streaming Services – Stage 1Video Streaming Services – Stage 1
Video Streaming Services – Stage 1Videoguy
 
Streaming Video into Second Life
Streaming Video into Second LifeStreaming Video into Second Life
Streaming Video into Second LifeVideoguy
 
Flash Live Video Streaming Software
Flash Live Video Streaming SoftwareFlash Live Video Streaming Software
Flash Live Video Streaming SoftwareVideoguy
 
Videoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions CookbookVideoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions CookbookVideoguy
 
Streaming Video Formaten
Streaming Video FormatenStreaming Video Formaten
Streaming Video FormatenVideoguy
 
iPhone Live Video Streaming Software
iPhone Live Video Streaming SoftwareiPhone Live Video Streaming Software
iPhone Live Video Streaming SoftwareVideoguy
 
Glow: Video streaming training guide - Firefox
Glow: Video streaming training guide - FirefoxGlow: Video streaming training guide - Firefox
Glow: Video streaming training guide - FirefoxVideoguy
 

More from Videoguy (20)

Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video Streaming
 
Microsoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresMicrosoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_Pres
 
Proxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video StreamingProxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video Streaming
 
Adobe
AdobeAdobe
Adobe
 
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksFree-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
 
Instant video streaming
Instant video streamingInstant video streaming
Instant video streaming
 
Video Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A SurveyVideo Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A Survey
 
Video Streaming
Video StreamingVideo Streaming
Video Streaming
 
Reaching a Broader Audience
Reaching a Broader AudienceReaching a Broader Audience
Reaching a Broader Audience
 
Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...
 
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
 
Impact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video StreamingImpact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video Streaming
 
Application Brief
Application BriefApplication Brief
Application Brief
 
Video Streaming Services – Stage 1
Video Streaming Services – Stage 1Video Streaming Services – Stage 1
Video Streaming Services – Stage 1
 
Streaming Video into Second Life
Streaming Video into Second LifeStreaming Video into Second Life
Streaming Video into Second Life
 
Flash Live Video Streaming Software
Flash Live Video Streaming SoftwareFlash Live Video Streaming Software
Flash Live Video Streaming Software
 
Videoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions CookbookVideoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions Cookbook
 
Streaming Video Formaten
Streaming Video FormatenStreaming Video Formaten
Streaming Video Formaten
 
iPhone Live Video Streaming Software
iPhone Live Video Streaming SoftwareiPhone Live Video Streaming Software
iPhone Live Video Streaming Software
 
Glow: Video streaming training guide - Firefox
Glow: Video streaming training guide - FirefoxGlow: Video streaming training guide - Firefox
Glow: Video streaming training guide - Firefox
 

Systems and Network Analysis Center Information Assurance ...

  • 1. Systems and Network Analysis Center Information Assurance Directorate Video Teleconferencing What is Video Teleconferencing? and data streams and interfaces to the users. The Multipoint Conference Unit and the Gateways will be Video Teleconferencing (VTC) is a communication discussed in later sections. technology that permits users at two or more different locations to interact by creating a face-to-face meeting environment. VTC systems transmit bi-directional VTC Network Protocols and Architectures audio, video and data streams during the session. Usage of VTC has expanded beyond corporation Standard voice and video protocols used on VTC boardroom meetings. The demands for collaboration systems today are the Session Initiation Protocol tools and converged infrastructure have boosted VTC (SIP), H.320, and H.323. usage in recent years. VTC has been gaining Hardware or software components that execute the popularity in all government sectors including tactical compression of signals are called Coder/Decoders or and non-tactical environments. CODECs. A CODEC is also used to convert between analog and digital formats. Point-to-Point is the most basic architecture Type of VTC Systems configuration for a VTC network. This configuration The two basic types of VTC systems are the does not require a Call Server and does not allow dedicated systems and the desktop systems. The conferencing of more than two endpoints, but it does desktop systems are add-ons to existing PCs. They allow for direct video and audio calls between generally consist of a microphone, speakers, and endpoints within a cluster. Figure 1 below depicts a camera, but may also include a PC add-in card. point-to-point network. Dedicated systems have all the necessary components to process the VTC sessions within a single console. This document will focus on these dedicated systems. The categories of dedicated VTC systems cover different operational environments. A large group system supports large meeting rooms or auditoriums, is fixed to the room, and is non-portable. The second category is the small group system. A small group VTC is designed to support small meeting rooms, is fixed to the room, is non- portable, and is normally more economical to deploy. The third category of dedicated VTC system is the individual system. These individual systems are designed to be portable single Figure 1: Point-to-Point Conferencing Network user solutions with integrated camera, speakers, and microphone in a compact unit. In a Multi-party VTC network architecture, a Common components in a standard VTC network are Multipoint Conferencing Unit is required. The MCU Call Server, Video Endpoint, Multipoint Conference makes conferencing possible by acting as a bridge Unit (MCU), Gateways, and an Ethernet switch. A that interconnects calls from three or more Video Call Server performs the registration and call control Endpoints. It can be a standalone hardware device, processing functions. Video Endpoints are devices but some dedicated VTCs have embedded MCU from which users make and receive video calls. The functions. Figure 2 illustrates how the MCU endpoint processes the bi-directional audio, video, facilitates video teleconferencing sessions by SNAC DoD, 9800 Savage Rd. Ft. Meade, MD 20755-6704 410-854-6632 DSN 244-6632 FAX: 410-854-6604 www.nsa.gov/snac
  • 2. processing call control signals and the audio, voice, and data streams to connect the multiple endpoints. It also allows endpoints using different CODECs to participate in the same VTC session. Figure 2: Multi-party Conferencing Network A Gateway is required in order for VTC endpoints to communicate with the Public Switched Telephone Figure 3: Interoperability with Legacy Network Network (PSTN) or a legacy network. A Gateway is a standalone hardware device that provides access to other larger IP networks and/or circuit switched What Can Be Done? telephone networks like the PSTN. Figure 3 shows an IP based VTC network communicating with To mitigate those vulnerabilities, the following endpoints on a legacy network. Type 1 external actions can be taken: encryption devices like the KIV might be • Change all default passwords implemented for network link encryption are also shown in Figure 3. • Apply best password security practices • Enable encryption for the VTC sessions • Disable broadcast streaming What are the Vulnerabilities? • Disable the far-end camera control feature • Disable insecure IP services (e.g., Telnet, HTTP) Due to the valuable benefits and user-friendly set up • Perform initial VTC settings locally using the procedures of VTC systems, many locations have craft port or the menu on the system implemented VTCs without applying security best • Regularly update firmware and apply patches practices. When default settings remain unaltered, unauthorized users can exploit the VTC through the • Practice good physical security (i.e., restrict Web interface or other IP management services such access, turn off the device, and cover the camera as Telnet and File Transfer Protocol (FTP). lens when not in use) Unauthorized users can exploit the following security • Disable any auto answering feature vulnerabilities: participate in VTC sessions, upload • Disable wireless capabilities malicious code to initiate Denial of Service (DoS) • Separate VTCs logically from the rest of the IP attacks, take control of the far-end camera, record network using Virtual Local Area Networks audio and video streams, take snapshots of • When remote access is absolutely required, participants during the session, establish a new institute strict access controls (e.g., router access session for eavesdropping, use the system as a control lists, firewalls rules) to limit privileged jumping off point and a hiding place to exploit other access to administrators only systems, and edit configurations to enable additional features (e.g., Microphone, Remote Streaming). SNAC DoD, 9800 Savage Rd. Ft. Meade, MD 20755-6704 410-854-6632 DSN 244-6632 FAX: 410-854-6604 www.nsa.gov/snac i038393