SlideShare a Scribd company logo
Common Misconceptions
Alan D. Percy
Director of Market Development
Alan.percy@audiocodes.com
The Truth of
Enterprise SIP
Security
3
Threat is widely recognized
“Security Is IP Networking's Downside”
Gartner Report, 2006
“SIP is not an easy protocol to secure.”
RFC 3261
“T.J. Max theft is believed largest hack ever”
AP Newswire, March 30, 2007
“…SIP is vulnerable to certain attacks.”
RFC 3329
4
Known Threats
• Known SIP Security Threats:
– Theft of services (unauthorized use of your network)
– Recording and eavesdropping
– Call Detail Capturing (tracking who you call and for
how long)
– Spoofing and Man-in-the-middle (Phone Phishing)
– Denial of Service Attacks
– Registration Flooding
– Malformed Messages
– Unsolicited incoming calling (SPIT)
– Trojan horse devices
– Viruses and Worms
– and more.
5
Three Misconceptions about
Security
6
Misconception #1
Eavesdropping VoIP
is easy
7
IP-PBX SIP Architecture
Media Gateway
LAN Switch
PST
N
PST
N SIP
SIP Phones
SIP
T1/E1
Secure Facility
Secured
with
SIP/TLS
SRTP
IP-PBX
8
Points of Risk
Signaling
Media
IP
Management
SIP/
TLS
SRTP
HTTPS
9
Misconception #2
SIP Trunking is easy
to secure with a
SIP Firewall
10
SIP Trunking is at Risk
• SIP Trunking
without correct
protection is open
to DoS attack, theft
of service and
other threats too!
11
Protecting Against DoS
Attacks
One of two approaches:
1. Use PSTN Trunking
• Cannot execute a DoS attack over a PSTN circuit
• Media gateway insulates enterprise from outside world
• Enterprise uses PSTN as a “moat” around SIP Island
1. Secure SIP Trunks with SBC
• Firewalls do not fully protect against DoS
• Many SIP Security devices don’t support SIP/TLS or
SRTP
• Protect with an Enterprise-class Session Border
Controller
12
SBC – Includes DoS Filtering and
Rate Limiting
ICMP
ARP Request
ARP Response
DTMF
SIP - Invite
SIP - Register
SIP- Response
SIP - Unknown
SIP - Other
SIP - Register
SIP - Other
DoS Filters
Un-Solicited SIP
Traffic
Established SIP
Signaling “Pinholes”
nRT - HI
nRT - LO
Best Effort
Port
SIP App Server
Traffic
Management/Shaping
maintain per queue
rate, size and discard
policy
RADIUS
VRRP
Dispatcher
Rate Limiting &
Prioritization
Application
Intelligence
13
Misconception #3
Security is very expensive
14
AudioCodes Solutions with
Security
Mediant 2000
Scalable Digital Media GatewayMediant 1000
Modular Media Gateway
MediaPack MP-11x
Analog Media Gateway
All support HTTPS, SIP/TLS, and SRTP
Mediant 1000 MSBG
with Integrated SBC
15
Good Security Practices for
Enterprises
 Deploy encryption security (SIP/TLS and SRTP)
 Secure the front door (trunk lines)
 PSTN Trunking or Enterprise SBC
 Secure the back door (set and manage the passwords)
 Control access
 Manage software on
all the devices in the
system
 Eliminate WiFi access
 Keep an audit trail
16
Q/A and More Information
www.audiocodes.com
or
Alan.percy@audiocodes.com

More Related Content

What's hot

Securing network devices
Securing network devicesSecuring network devices
Securing network devices
beko-badr
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol review
Fabio Pietrosanti
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
Fabio Pietrosanti
 
Astricon 2016
Astricon 2016Astricon 2016
Astricon 2016
Jöran Vinzens
 
ESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--editionESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--edition
ESET Belgique & Luxembourg
 
Attack presentation
Attack presentationAttack presentation
Attack presentation
Frikha Nour
 
Hacking
HackingHacking
Signature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 FullSignature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 Fullnoelheng
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securitymysoria
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
Kingfin Enterprises Limited
 
IoT Device Security Tips
IoT Device Security TipsIoT Device Security Tips
IoT Device Security Tips
Centextech
 
Vpn presnt
Vpn presntVpn presnt
Vpn presnt
Frikha Nour
 
Небезопасность сотовых сетей вчера, сегодня, завтра
Небезопасность сотовых сетей вчера, сегодня, завтраНебезопасность сотовых сетей вчера, сегодня, завтра
Небезопасность сотовых сетей вчера, сегодня, завтра
Positive Hack Days
 
IntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseIntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseItai Bass
 
Network security
Network securityNetwork security
Network security
-jyothish kumar sirigidi
 
Взлом в прямом эфире: как хакеры проникают в ваши системы
Взлом в прямом эфире: как хакеры проникают в ваши системыВзлом в прямом эфире: как хакеры проникают в ваши системы
Взлом в прямом эфире: как хакеры проникают в ваши системы
Positive Hack Days
 
IoT security
IoT securityIoT security
IoT security
Abhishek Dwivedi
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
samis
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based SecurityRob Levey
 

What's hot (20)

Securing network devices
Securing network devicesSecuring network devices
Securing network devices
 
Ga13
Ga13Ga13
Ga13
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol review
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
Astricon 2016
Astricon 2016Astricon 2016
Astricon 2016
 
ESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--editionESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--edition
 
Attack presentation
Attack presentationAttack presentation
Attack presentation
 
Hacking
HackingHacking
Hacking
 
Signature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 FullSignature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 Full
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
IoT Device Security Tips
IoT Device Security TipsIoT Device Security Tips
IoT Device Security Tips
 
Vpn presnt
Vpn presntVpn presnt
Vpn presnt
 
Небезопасность сотовых сетей вчера, сегодня, завтра
Небезопасность сотовых сетей вчера, сегодня, завтраНебезопасность сотовых сетей вчера, сегодня, завтра
Небезопасность сотовых сетей вчера, сегодня, завтра
 
IntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseIntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile Enterprise
 
Network security
Network securityNetwork security
Network security
 
Взлом в прямом эфире: как хакеры проникают в ваши системы
Взлом в прямом эфире: как хакеры проникают в ваши системыВзлом в прямом эфире: как хакеры проникают в ваши системы
Взлом в прямом эфире: как хакеры проникают в ваши системы
 
IoT security
IoT securityIoT security
IoT security
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based Security
 

Viewers also liked

Audio codes technical_advantage_for_microsoft_uc_1_
Audio codes technical_advantage_for_microsoft_uc_1_Audio codes technical_advantage_for_microsoft_uc_1_
Audio codes technical_advantage_for_microsoft_uc_1_
Tran Thanh
 
Giai phap dien thoai ip (1)
Giai phap dien thoai ip (1)Giai phap dien thoai ip (1)
Giai phap dien thoai ip (1)
Tran Thanh
 
8 wa academy 061106 share by voip.com.vn
8 wa academy 061106 share by voip.com.vn8 wa academy 061106 share by voip.com.vn
8 wa academy 061106 share by voip.com.vn
Tran Thanh
 
Lync-Audiocodes Don't rip it lync it madrid april 29
Lync-Audiocodes Don't rip it lync it   madrid april 29Lync-Audiocodes Don't rip it lync it   madrid april 29
Lync-Audiocodes Don't rip it lync it madrid april 29Peter Diaz
 
#Skype4B #CloudPbx
#Skype4B #CloudPbx#Skype4B #CloudPbx
#Skype4B #CloudPbx
Peter Diaz
 
Terminal block
Terminal blockTerminal block
Terminal blockEF Society
 
Switchvoxadvantage
SwitchvoxadvantageSwitchvoxadvantage
Switchvoxadvantage
Tran Thanh
 
Advanced topologies for microsoft e learning shared by voip.com.vn
Advanced topologies for microsoft e learning shared by voip.com.vnAdvanced topologies for microsoft e learning shared by voip.com.vn
Advanced topologies for microsoft e learning shared by voip.com.vn
Tran Thanh
 
Audio codes webinar___ms_uc__2_
Audio codes webinar___ms_uc__2_Audio codes webinar___ms_uc__2_
Audio codes webinar___ms_uc__2_
Tran Thanh
 
CEUS by Iberian SharePoint Conference 2015 - Migra tu Lync a Skype for Business
CEUS by Iberian SharePoint Conference 2015 - Migra tu Lync a Skype for BusinessCEUS by Iberian SharePoint Conference 2015 - Migra tu Lync a Skype for Business
CEUS by Iberian SharePoint Conference 2015 - Migra tu Lync a Skype for BusinessPeter Diaz
 
Microtel shared by voip.com.vn
Microtel shared by voip.com.vnMicrotel shared by voip.com.vn
Microtel shared by voip.com.vn
Tran Thanh
 
Kynangdienthoai
KynangdienthoaiKynangdienthoai
Kynangdienthoai
Tran Thanh
 
7. bao cao kqkd 2012 va khkd 2013
7. bao cao kqkd 2012 va khkd 20137. bao cao kqkd 2012 va khkd 2013
7. bao cao kqkd 2012 va khkd 2013
Tran Thanh
 
At640 p user_manual_r_v1.0_d110728_en
At640 p user_manual_r_v1.0_d110728_enAt640 p user_manual_r_v1.0_d110728_en
At640 p user_manual_r_v1.0_d110728_en
Tran Thanh
 
Giai phap dien thoai ip
Giai phap dien thoai ipGiai phap dien thoai ip
Giai phap dien thoai ip
Tran Thanh
 
Restoring a Sag Harbor Eyesore-behance
Restoring a Sag Harbor Eyesore-behanceRestoring a Sag Harbor Eyesore-behance
Restoring a Sag Harbor Eyesore-behance
kimmendeni
 
3.kx ns1000 ip extension final
3.kx ns1000 ip extension final3.kx ns1000 ip extension final
3.kx ns1000 ip extension final
Tran Thanh
 
Profoss 20071010-to ip shared by voip.com.vn
Profoss 20071010-to ip shared by voip.com.vnProfoss 20071010-to ip shared by voip.com.vn
Profoss 20071010-to ip shared by voip.com.vn
Tran Thanh
 
05 asterisk-in-the-enterprise-presentation shared by voip.com.vn
05 asterisk-in-the-enterprise-presentation shared by voip.com.vn05 asterisk-in-the-enterprise-presentation shared by voip.com.vn
05 asterisk-in-the-enterprise-presentation shared by voip.com.vn
Tran Thanh
 
Simocode pro presentation for simodode dp customers share by voip.com.vn
Simocode pro presentation for simodode dp customers share by voip.com.vnSimocode pro presentation for simodode dp customers share by voip.com.vn
Simocode pro presentation for simodode dp customers share by voip.com.vn
Tran Thanh
 

Viewers also liked (20)

Audio codes technical_advantage_for_microsoft_uc_1_
Audio codes technical_advantage_for_microsoft_uc_1_Audio codes technical_advantage_for_microsoft_uc_1_
Audio codes technical_advantage_for_microsoft_uc_1_
 
Giai phap dien thoai ip (1)
Giai phap dien thoai ip (1)Giai phap dien thoai ip (1)
Giai phap dien thoai ip (1)
 
8 wa academy 061106 share by voip.com.vn
8 wa academy 061106 share by voip.com.vn8 wa academy 061106 share by voip.com.vn
8 wa academy 061106 share by voip.com.vn
 
Lync-Audiocodes Don't rip it lync it madrid april 29
Lync-Audiocodes Don't rip it lync it   madrid april 29Lync-Audiocodes Don't rip it lync it   madrid april 29
Lync-Audiocodes Don't rip it lync it madrid april 29
 
#Skype4B #CloudPbx
#Skype4B #CloudPbx#Skype4B #CloudPbx
#Skype4B #CloudPbx
 
Terminal block
Terminal blockTerminal block
Terminal block
 
Switchvoxadvantage
SwitchvoxadvantageSwitchvoxadvantage
Switchvoxadvantage
 
Advanced topologies for microsoft e learning shared by voip.com.vn
Advanced topologies for microsoft e learning shared by voip.com.vnAdvanced topologies for microsoft e learning shared by voip.com.vn
Advanced topologies for microsoft e learning shared by voip.com.vn
 
Audio codes webinar___ms_uc__2_
Audio codes webinar___ms_uc__2_Audio codes webinar___ms_uc__2_
Audio codes webinar___ms_uc__2_
 
CEUS by Iberian SharePoint Conference 2015 - Migra tu Lync a Skype for Business
CEUS by Iberian SharePoint Conference 2015 - Migra tu Lync a Skype for BusinessCEUS by Iberian SharePoint Conference 2015 - Migra tu Lync a Skype for Business
CEUS by Iberian SharePoint Conference 2015 - Migra tu Lync a Skype for Business
 
Microtel shared by voip.com.vn
Microtel shared by voip.com.vnMicrotel shared by voip.com.vn
Microtel shared by voip.com.vn
 
Kynangdienthoai
KynangdienthoaiKynangdienthoai
Kynangdienthoai
 
7. bao cao kqkd 2012 va khkd 2013
7. bao cao kqkd 2012 va khkd 20137. bao cao kqkd 2012 va khkd 2013
7. bao cao kqkd 2012 va khkd 2013
 
At640 p user_manual_r_v1.0_d110728_en
At640 p user_manual_r_v1.0_d110728_enAt640 p user_manual_r_v1.0_d110728_en
At640 p user_manual_r_v1.0_d110728_en
 
Giai phap dien thoai ip
Giai phap dien thoai ipGiai phap dien thoai ip
Giai phap dien thoai ip
 
Restoring a Sag Harbor Eyesore-behance
Restoring a Sag Harbor Eyesore-behanceRestoring a Sag Harbor Eyesore-behance
Restoring a Sag Harbor Eyesore-behance
 
3.kx ns1000 ip extension final
3.kx ns1000 ip extension final3.kx ns1000 ip extension final
3.kx ns1000 ip extension final
 
Profoss 20071010-to ip shared by voip.com.vn
Profoss 20071010-to ip shared by voip.com.vnProfoss 20071010-to ip shared by voip.com.vn
Profoss 20071010-to ip shared by voip.com.vn
 
05 asterisk-in-the-enterprise-presentation shared by voip.com.vn
05 asterisk-in-the-enterprise-presentation shared by voip.com.vn05 asterisk-in-the-enterprise-presentation shared by voip.com.vn
05 asterisk-in-the-enterprise-presentation shared by voip.com.vn
 
Simocode pro presentation for simodode dp customers share by voip.com.vn
Simocode pro presentation for simodode dp customers share by voip.com.vnSimocode pro presentation for simodode dp customers share by voip.com.vn
Simocode pro presentation for simodode dp customers share by voip.com.vn
 

Similar to Cd213 percy-audiocodes

Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
Christopher Duffy
 
Meletis Belsis - IMS Security
Meletis Belsis - IMS SecurityMeletis Belsis - IMS Security
Meletis Belsis - IMS Security
Meletis Belsis MPhil/MRes/BSc
 
VoIP security
VoIP securityVoIP security
VoIP security
Mile Blenton
 
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraudNumber one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
Flavio Eduardo de Andrade Goncalves
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
Dayanand Prabhakar
 
Securing UC Borders with Acme Packet
Securing UC Borders with Acme PacketSecuring UC Borders with Acme Packet
Securing UC Borders with Acme Packet
AcmePacket
 
SBC: Do I really need it?
SBC: Do I really need it?SBC: Do I really need it?
SBC: Do I really need it?
Bangladesh Network Operators Group
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
TomParker
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_securitySerious_SamSoul
 
Product Overview: April 2015 (Si3D)
Product Overview: April 2015 (Si3D)Product Overview: April 2015 (Si3D)
Product Overview: April 2015 (Si3D)
SI3D systems
 
Askozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, English
Askozia
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
ijsrd.com
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
imran6994
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishPrivateWave Italia SpA
 
Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
TelcoBridges Inc.
 
Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
Alan Percy
 
Protecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsProtecting application delivery without network security blind spots
Protecting application delivery without network security blind spots
Thales e-Security
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
Andris Soroka
 

Similar to Cd213 percy-audiocodes (20)

Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 
Meletis Belsis - IMS Security
Meletis Belsis - IMS SecurityMeletis Belsis - IMS Security
Meletis Belsis - IMS Security
 
VoIP security
VoIP securityVoIP security
VoIP security
 
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraudNumber one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
Securing UC Borders with Acme Packet
Securing UC Borders with Acme PacketSecuring UC Borders with Acme Packet
Securing UC Borders with Acme Packet
 
SBC: Do I really need it?
SBC: Do I really need it?SBC: Do I really need it?
SBC: Do I really need it?
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
 
Product Overview: April 2015 (Si3D)
Product Overview: April 2015 (Si3D)Product Overview: April 2015 (Si3D)
Product Overview: April 2015 (Si3D)
 
Askozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, English
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - english
 
Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
 
Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
 
Protecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsProtecting application delivery without network security blind spots
Protecting application delivery without network security blind spots
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 

More from Tran Thanh

Ga lichsukhinhanvagoidienthoai
Ga lichsukhinhanvagoidienthoaiGa lichsukhinhanvagoidienthoai
Ga lichsukhinhanvagoidienthoai
Tran Thanh
 
Yealink business ip video phone vp530
Yealink business ip video phone vp530Yealink business ip video phone vp530
Yealink business ip video phone vp530
Tran Thanh
 
Slide album 1
Slide album 1Slide album 1
Slide album 1
Tran Thanh
 
Hlvcs2
Hlvcs2Hlvcs2
Hlvcs2
Tran Thanh
 
Sp twinstar 2009 shared by voip.com.vn
Sp twinstar 2009 shared by voip.com.vnSp twinstar 2009 shared by voip.com.vn
Sp twinstar 2009 shared by voip.com.vn
Tran Thanh
 
Rss sales presentation_v4_final_sales shared by voip.com.vn
Rss sales presentation_v4_final_sales shared by voip.com.vnRss sales presentation_v4_final_sales shared by voip.com.vn
Rss sales presentation_v4_final_sales shared by voip.com.vn
Tran Thanh
 
Microsoft lync 2010_cx600_device_training_rtm shared by voip.com.vn
Microsoft lync 2010_cx600_device_training_rtm shared by voip.com.vnMicrosoft lync 2010_cx600_device_training_rtm shared by voip.com.vn
Microsoft lync 2010_cx600_device_training_rtm shared by voip.com.vn
Tran Thanh
 
Headset shared by voip.com.vn
Headset shared by voip.com.vnHeadset shared by voip.com.vn
Headset shared by voip.com.vn
Tran Thanh
 
2908 1 mic_tel shared by voip.com.vn
2908 1 mic_tel shared by voip.com.vn2908 1 mic_tel shared by voip.com.vn
2908 1 mic_tel shared by voip.com.vn
Tran Thanh
 
Ast installation (edited version) shared by voip.com.vn
Ast installation (edited version) shared by voip.com.vnAst installation (edited version) shared by voip.com.vn
Ast installation (edited version) shared by voip.com.vn
Tran Thanh
 
Ei02 garrison-fonality
Ei02 garrison-fonalityEi02 garrison-fonality
Ei02 garrison-fonality
Tran Thanh
 
02 asterisk - the future of telecommunications
02   asterisk - the future of telecommunications02   asterisk - the future of telecommunications
02 asterisk - the future of telecommunications
Tran Thanh
 
Ax 2 d shared by voip.com.vn
Ax 2 d shared by voip.com.vnAx 2 d shared by voip.com.vn
Ax 2 d shared by voip.com.vn
Tran Thanh
 
Transformation service business share by voip.com.vn
Transformation service business share by voip.com.vnTransformation service business share by voip.com.vn
Transformation service business share by voip.com.vn
Tran Thanh
 
At640 datasheet-d20110704 en
At640 datasheet-d20110704 enAt640 datasheet-d20110704 en
At640 datasheet-d20110704 en
Tran Thanh
 
At640 user manual_r_v1.0_d110728_en
 At640 user manual_r_v1.0_d110728_en At640 user manual_r_v1.0_d110728_en
At640 user manual_r_v1.0_d110728_en
Tran Thanh
 
Step 7 v5_2_e share by voip.com.vn
Step 7 v5_2_e share by voip.com.vnStep 7 v5_2_e share by voip.com.vn
Step 7 v5_2_e share by voip.com.vn
Tran Thanh
 
At 620 customized-ring_tone shared by voip.com.vn
At 620 customized-ring_tone shared by voip.com.vnAt 620 customized-ring_tone shared by voip.com.vn
At 620 customized-ring_tone shared by voip.com.vn
Tran Thanh
 

More from Tran Thanh (18)

Ga lichsukhinhanvagoidienthoai
Ga lichsukhinhanvagoidienthoaiGa lichsukhinhanvagoidienthoai
Ga lichsukhinhanvagoidienthoai
 
Yealink business ip video phone vp530
Yealink business ip video phone vp530Yealink business ip video phone vp530
Yealink business ip video phone vp530
 
Slide album 1
Slide album 1Slide album 1
Slide album 1
 
Hlvcs2
Hlvcs2Hlvcs2
Hlvcs2
 
Sp twinstar 2009 shared by voip.com.vn
Sp twinstar 2009 shared by voip.com.vnSp twinstar 2009 shared by voip.com.vn
Sp twinstar 2009 shared by voip.com.vn
 
Rss sales presentation_v4_final_sales shared by voip.com.vn
Rss sales presentation_v4_final_sales shared by voip.com.vnRss sales presentation_v4_final_sales shared by voip.com.vn
Rss sales presentation_v4_final_sales shared by voip.com.vn
 
Microsoft lync 2010_cx600_device_training_rtm shared by voip.com.vn
Microsoft lync 2010_cx600_device_training_rtm shared by voip.com.vnMicrosoft lync 2010_cx600_device_training_rtm shared by voip.com.vn
Microsoft lync 2010_cx600_device_training_rtm shared by voip.com.vn
 
Headset shared by voip.com.vn
Headset shared by voip.com.vnHeadset shared by voip.com.vn
Headset shared by voip.com.vn
 
2908 1 mic_tel shared by voip.com.vn
2908 1 mic_tel shared by voip.com.vn2908 1 mic_tel shared by voip.com.vn
2908 1 mic_tel shared by voip.com.vn
 
Ast installation (edited version) shared by voip.com.vn
Ast installation (edited version) shared by voip.com.vnAst installation (edited version) shared by voip.com.vn
Ast installation (edited version) shared by voip.com.vn
 
Ei02 garrison-fonality
Ei02 garrison-fonalityEi02 garrison-fonality
Ei02 garrison-fonality
 
02 asterisk - the future of telecommunications
02   asterisk - the future of telecommunications02   asterisk - the future of telecommunications
02 asterisk - the future of telecommunications
 
Ax 2 d shared by voip.com.vn
Ax 2 d shared by voip.com.vnAx 2 d shared by voip.com.vn
Ax 2 d shared by voip.com.vn
 
Transformation service business share by voip.com.vn
Transformation service business share by voip.com.vnTransformation service business share by voip.com.vn
Transformation service business share by voip.com.vn
 
At640 datasheet-d20110704 en
At640 datasheet-d20110704 enAt640 datasheet-d20110704 en
At640 datasheet-d20110704 en
 
At640 user manual_r_v1.0_d110728_en
 At640 user manual_r_v1.0_d110728_en At640 user manual_r_v1.0_d110728_en
At640 user manual_r_v1.0_d110728_en
 
Step 7 v5_2_e share by voip.com.vn
Step 7 v5_2_e share by voip.com.vnStep 7 v5_2_e share by voip.com.vn
Step 7 v5_2_e share by voip.com.vn
 
At 620 customized-ring_tone shared by voip.com.vn
At 620 customized-ring_tone shared by voip.com.vnAt 620 customized-ring_tone shared by voip.com.vn
At 620 customized-ring_tone shared by voip.com.vn
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Cd213 percy-audiocodes

  • 1.
  • 2. Common Misconceptions Alan D. Percy Director of Market Development Alan.percy@audiocodes.com The Truth of Enterprise SIP Security
  • 3. 3 Threat is widely recognized “Security Is IP Networking's Downside” Gartner Report, 2006 “SIP is not an easy protocol to secure.” RFC 3261 “T.J. Max theft is believed largest hack ever” AP Newswire, March 30, 2007 “…SIP is vulnerable to certain attacks.” RFC 3329
  • 4. 4 Known Threats • Known SIP Security Threats: – Theft of services (unauthorized use of your network) – Recording and eavesdropping – Call Detail Capturing (tracking who you call and for how long) – Spoofing and Man-in-the-middle (Phone Phishing) – Denial of Service Attacks – Registration Flooding – Malformed Messages – Unsolicited incoming calling (SPIT) – Trojan horse devices – Viruses and Worms – and more.
  • 7. 7 IP-PBX SIP Architecture Media Gateway LAN Switch PST N PST N SIP SIP Phones SIP T1/E1 Secure Facility Secured with SIP/TLS SRTP IP-PBX
  • 9. 9 Misconception #2 SIP Trunking is easy to secure with a SIP Firewall
  • 10. 10 SIP Trunking is at Risk • SIP Trunking without correct protection is open to DoS attack, theft of service and other threats too!
  • 11. 11 Protecting Against DoS Attacks One of two approaches: 1. Use PSTN Trunking • Cannot execute a DoS attack over a PSTN circuit • Media gateway insulates enterprise from outside world • Enterprise uses PSTN as a “moat” around SIP Island 1. Secure SIP Trunks with SBC • Firewalls do not fully protect against DoS • Many SIP Security devices don’t support SIP/TLS or SRTP • Protect with an Enterprise-class Session Border Controller
  • 12. 12 SBC – Includes DoS Filtering and Rate Limiting ICMP ARP Request ARP Response DTMF SIP - Invite SIP - Register SIP- Response SIP - Unknown SIP - Other SIP - Register SIP - Other DoS Filters Un-Solicited SIP Traffic Established SIP Signaling “Pinholes” nRT - HI nRT - LO Best Effort Port SIP App Server Traffic Management/Shaping maintain per queue rate, size and discard policy RADIUS VRRP Dispatcher Rate Limiting & Prioritization Application Intelligence
  • 14. 14 AudioCodes Solutions with Security Mediant 2000 Scalable Digital Media GatewayMediant 1000 Modular Media Gateway MediaPack MP-11x Analog Media Gateway All support HTTPS, SIP/TLS, and SRTP Mediant 1000 MSBG with Integrated SBC
  • 15. 15 Good Security Practices for Enterprises  Deploy encryption security (SIP/TLS and SRTP)  Secure the front door (trunk lines)  PSTN Trunking or Enterprise SBC  Secure the back door (set and manage the passwords)  Control access  Manage software on all the devices in the system  Eliminate WiFi access  Keep an audit trail
  • 16. 16 Q/A and More Information www.audiocodes.com or Alan.percy@audiocodes.com