Security and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California
|
|
- Ethan Fletcher
- 6 years ago
- Views:
Transcription
1
2 Security and Lawful Intercept In VoIP Networks Manohar Mahavadi Centillium Communications Inc. Fremont, California
3 Agenda VoIP: Packet switched network VoIP devices VoIP protocols Security and issues in VoIP networks CALEA
4 VoIP: Packet Switched Network Modem Media Gateway Broadband Network Internet PSTN Modem Router DSLAM PC VoIP Phone POTS Phone
5 VoIP Devices Media servers Call controllers Conferencing servers Text-to-speech (TTS) servers Voice or video servers Media gateways Analog (PSTN) IP (VOIP) H.323 ISDN IP ATM, TDM IP
6 VoIP Devices Security devices Firewalls Intrusion detection systems (IDS) Intrusion prevention systems (IPS) VPN gateways Switching and routing devices End points SIP user agents Terminals Soft-phones
7 VoIP Protocols Signaling protocols Call configuration and management Call setup and teardown, call control Capability exchange Codecs, tones, etc. Supplementary services Conferencing, call forwarding, call transfer H.323 protocol suite ITU-T standard Mature, well-deployed but complex Session initiation protocol (SIP) IETF standard Upcoming, gaining popularity and simple
8 VoIP Protocols Data protocols Real-time transport protocols (RTP) RFC 1889 Transport of voice and video over UDP Support for packet loss discovery and ordered delivery Sequence# Support for delay and jitter calculations Timestamp RTP control protocol (RTCP) RFC 1889 Periodic exchange of control information Sender reports, receiver reports, source description Optional encryption prefix for DES
9 VoIP Protocols: H.323 Architecture Terminal Endpoint on a network providing real-time communications with other devices, including gateways, MCUs and gatekeepers Implements one or more codecs Example: Microsoft NetMeeting Multipoint controller unit (MCU) Manages multipoint conferences between three or more end points Multipoint controllers (MC) handle call control Capability set to all participants, join-in/drop-out managing Multipoint processors (MP) (optional) Perform media exchange in a conference Processes the actual media streams
10 VoIP Protocols: H.323 Architecture Gateway Protocol conversion between H.323 networks and other networks such as ISDN or PSTN (packet networks and circuit switched networks) Acts as terminal on packet network side and mode on circuit network side Ability to set up and terminate calls Provides translation Data format Control signal Audio and video codec Gatekeeper Central management and control services Registration of terminals, gateways and MCUs Address translation, access controls, bandwidth management, routing
11 VoIP Protocols: SIP Architecture SIP user agents Endpoint or end-station Client/server architecture User agent client and user agent server SIP servers Proxy server Maintains current locations of registered user agents and helps in-call management Incoming call forking to multiple locations Logs information for billing and information Redirect server Provides name resolution and user location Does not participate in call establishment SIP registrar Provides location information service
12 VoIP Support Protocols DNS Name resolution, address conversion TFTP Software downloads and file transfer SNMP Management and configuration DHCP Dynamic address allocation RSVP QoS allocation SDP Sharing of client session abilities
13 Security Issues in VoIP Scams In June 2006, federal authorities arrested a Miami man for reselling Internet telephone service by hacking into lines of legitimate telephone companies Piggybacking since VoIP is not secured
14 Security: Basic Requirements Privacy Encryption: symmetric and asymmetric keys DES 3DES AES Integrity MD5, HMAC-MD5 SHA-1, HMAC-SHA-1 Authentication RADIUS PKI Digital certificates
15 Security: Network Security Threats DOS attacks CPU resource starvation Service degradation or disruption Random TCP, UDP or ICMP packets on random ports Example: packets with urgent flag Bogus messages Premature termination Control packet flood Securing a packet is not relevant and not a cure
16 Security: Network Security Threats Call interception and hijacking DNS poisoning SIP uses SRV records to locate SIP services Call redirection: SRV record changes pointing to servers rather than actual ones ARP spoofing (cache poisoning) MAC address manipulation Session hijacking due to rerouting Session interception and message tampering Encryption for mitigation
17 Security: Enforcement Firewalls Network layer: Source address, destination address Application layer: FTP, HTTP, , etc. Stateful firewalls: Inbound responses to outbound requests permitted Network address translation (NAT): Internal IP address shielding Intrusion detection and reporting Counter-based Traffic-anomaly-based Logging and reporting False alarms Intrusion prevention Detect and drop Detect and throttle Dynamic reconfiguration
18 Security: Enforcement Systems Virus scanning s with attachments File downloads and piggybacking Scan, detect and quarantine Logging and reporting VPN gateways Secure tunnels between gateways Bulk encryption Road warriors remote access
19 Security: Network-based Soft-phone Media Gateway LAN Internet PSTN IDS/IPS Firewall Firewall IDS/IPS VoIP Phone POTS Phone
20 Security: Host-based MS Firewall MS Anti-virus Modem Media Gateway Broadband Network Internet PSTN PC Modem VoIP Phone DSLAM Router w/firewall Firewall IDS/IPS POTS Phone
21 Security: Software Techniques Application Layer FTP NFS MS Word User name Password S/MIME Presentation Layer Session Layer Transport Layer TCP UDP SSL TSL Network Layer IPSEC Data Link Layer Physical Layer
22 S/MIME Protocol Secure multipurpose Internet mail extensions Enables secure transmission, storage and authentication of data Applications Electronic Data Interchange over Internet (EDI-INT) Storage and transfer of bank statements, financial forms, etc. Electronic billing and payments, online sales, etc. Secure patient records and record management
23 SSL/TLS Protocols Secure sockets layer (SSL) developed by Netscape Transport layer security (TLS) IETF standard (RFC2246) based on SSL 3.0 SSL and TLS used for point-to-point application security Not interoperable: TLS or SSL negotiated in the beginning Applications Remote access for management and control Secure account management Travel reservations
24 IPSEC Protocol Secures data through insecure channels Policy-based enforcement (hosts, applications, etc.) Tunnel mode of operation Between gateways, creating tunnel connecting two or more networks Encrypts payload and header of IP packets Transport mode of operation Between end points or between an end point and gateway Encrypts payload of IP packet only Applications VPNs connecting geographically separate networks Bulk data transfers Mobile users/road warriors
25 IPSEC: Protocols Authentication Header (AH) IP Header Data New IP Header AH IP Header Data Tunnel Mode Authenticated IP Header Data Transport Mode IP Header AH Authenticated Data
26 IPSEC: Protocols Encapsulating Security Payload (ESP) IP Header Data New IP Header ESP Header IP Header Data ESP Trailer ICV Tunnel Mode ESP and AH Encrypted Authenticated IP Header Data IP Header ESP Header Data ESP Trailer ICV Transport Mode ESP and AH Encrypted Authenticated
27 Understanding LI/CALEA Surveillance Model
28 Understanding LI/CALEA The intercept function is viewed as five broad categories Access function One or more intercept access points (IAPs) Delivery function Call content channels (CCCs) and call data channels (CDCs) Collection function Collecting and analyzing intercepted communications Service provider administration function Controlling the TSP access and delivery functions Law enforcement administration function Controlling the LEA collection function
29 Understanding LI/CALEA Circuit IAP for a Two-way Communication
30 Understanding LI/CALEA Packet IAP for a Two-way Communication
31 LI/CALEA Model for TDM_PKT_CHNL Law Interception (LI) on Circuit (TDM) or Packet (PKT) Channel for TDM_PKT_CHANNEL TDM_PKT _CHANNEL TAP TRAFFIC COMING TO PKT NP Packetizer LI TDM Legacy Phone A DSP EC Encoder D Decoder D NP Packetizer UnPacketizer NP IP Phone B NP Packetizer TAP TRAFFIC COMING FROM PKT) LI PKT
32 LI/CALEA Model for PKT_PKT_CHNL Law Interception (LI) on Packet (PKT) Channel for PKT_PKT_CHANNEL (e.g., wireless hands-off) DSP TDM_PKT_CHNL Encoder Packetizer Decoder UnPacketizer NP A IP Phone DSP TDM_PKT_CHNL Encoder Packetizer Decoder UnPacketizer NP B IP Phone DSP Encoder Packetizer PKT_PKT_CHNL NP LI_B DSP Encoder Packetizer PKT_PKT_CHNL NP LI_A
33 LI/CALEA Model For TDM_PKT_CONF_CHNL CALEA Model with Conferencing
Chapter 11: Understanding the H.323 Standard
Página 1 de 7 Chapter 11: Understanding the H.323 Standard This chapter contains information about the H.323 standard and its architecture, and discusses how Microsoft Windows NetMeeting supports H.323
More informationTSIN02 - Internetworking
Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand
More informationVoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.
VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like
More informationDistributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive
More informationVoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint
More informationTODAY AGENDA. VOIP Mobile IP
VOIP & MOBILE IP PREVIOUS LECTURE Why Networks? And types of Networks Network Topologies Protocols, Elements and Applications of Protocols TCP/IP and OSI Model Packet and Circuit Switching 2 TODAY AGENDA
More informationCSC 6575: Internet Security Fall 2017
CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture
More informationIntroduction. H.323 Basics CHAPTER
CHAPTER 1 Last revised on: October 30, 2009 This chapter provides an overview of the standard and the video infrastructure components used to build an videoconferencing network. It describes the basics
More informationLecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005
Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks
More informationOverview of the Session Initiation Protocol
CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction
More informationMedia Communications Internet Telephony and Teleconference
Lesson 13 Media Communications Internet Telephony and Teleconference Scenario and Issue of IP Telephony Scenario and Issue of IP Teleconference ITU and IETF Standards for IP Telephony/conf. H.323 Standard
More informationH.323. Definition. Overview. Topics
H.323 Definition H.323 is a standard that specifies the components, protocols and procedures that provide multimedia communication services real-time audio, video, and data communications over packet networks,
More informationMultimedia! 23/03/18. Part 3: Lecture 3! Content and multimedia! Internet traffic!
Part 3: Lecture 3 Content and multimedia Internet traffic Multimedia How can multimedia be transmitted? Interactive/real-time Streaming 1 Voice over IP Interactive multimedia Voice and multimedia sessions
More informationPart 3: Lecture 3! Content and multimedia!
Part 3: Lecture 3! Content and multimedia! Internet traffic! Multimedia! How can multimedia be transmitted?! Interactive/real-time! Streaming! Interactive multimedia! Voice over IP! Voice and multimedia
More informationCSC 4900 Computer Networks: Security Protocols (2)
CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication
More informationMultimedia Applications. Classification of Applications. Transport and Network Layer
Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management
More informationIP Security. Have a range of application specific security mechanisms
IP Security IP Security Have a range of application specific security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS However there are security concerns that cut across protocol layers Would like security
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationIPSec. Overview. Overview. Levente Buttyán
IPSec - brief overview - security associations (SAs) - Authentication Header (AH) protocol - Encapsulated Security Payload () protocol - combining SAs (examples) Overview Overview IPSec is an Internet
More informationOutline Overview Multimedia Applications Signaling Protocols (SIP/SDP, SAP, H.323, MGCP) Streaming Protocols (RTP, RTSP, HTTP, etc.) QoS (RSVP, Diff-S
Internet Multimedia Architecture Outline Overview Multimedia Applications Signaling Protocols (SIP/SDP, SAP, H.323, MGCP) Streaming Protocols (RTP, RTSP, HTTP, etc.) QoS (RSVP, Diff-Serv, IntServ) Conclusions
More informationAP500 4-Port FXS VoIP Gateway
AP500 4-Port FXS VoIP Gateway High Performance VoIP Gateway Solution Product Overview www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification APOS Technology
More informationAP-SAV100 Analog Voice Intercom
AP-SAV100 Analog Voice Intercom IP Gateway High Performance IP Extension Solution for Legacy Analog Door Phone www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification
More informationInt ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28
Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The
More informationSecure Telephony Enabled Middle-box (STEM)
Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components
More informationIPSec. Slides by Vitaly Shmatikov UT Austin. slide 1
IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service
More informationInternet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho
Internet Security - IPSec, SSL/TLS, SRTP - 29th. Oct. 2007 Lee, Choongho chlee@mmlab.snu.ac.kr Contents Introduction IPSec SSL / TLS SRTP Conclusion 2/27 Introduction (1/2) Security Goals Confidentiality
More informationFirewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
More informationCisco ATA 191 Analog Telephone Adapter Overview
Cisco ATA 191 Analog Telephone Adapter Overview Your Analog Telephone Adapter, page 1 Your Analog Telephone Adapter The ATA 191 analog telephone adapter is a telephony-device-to-ethernet adapter that allows
More information13. Internet Applications 최양희서울대학교컴퓨터공학부
13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network
More informationDepartment of Computer Science. Burapha University 6 SIP (I)
Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important
More informationAccessEnforcer Version 4.0 Features List
AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect
More informationNetwork Security. Thierry Sans
Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability
More informationGigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
More informationSample Business Ready Branch Configuration Listings
APPENDIX A Sample Business Ready Branch Configuration Listings The following is a sample configuration of a Business Ready Branch. There are many permutations of feature combinations when setting up the
More informationIngate Firewall & SIParator Product Training. SIP Trunking Focused
Ingate Firewall & SIParator Product Training SIP Trunking Focused Common SIP Applications SIP Trunking Remote Desktop Ingate Product Training Common SIP Applications SIP Trunking A SIP Trunk is a concurrent
More informationNetwork Encryption 3 4/20/17
The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server
More informationAP800 TM PSTN Backup 4-Port FXS VoIP Gateway High Performance VoIP Gateway Solution
AP800 TM PSTN Backup 4-Port FXS VoIP Gateway High Performance VoIP Gateway Solution Product Overview www.addpac.com AddPac Technology 2007, Sales and Marketing Contents Product Overview Hardware Specification
More informationVoice over IP. What You Don t Know Can Hurt You. by Darren Bilby
Voice over IP What You Don t Know Can Hurt You by Darren Bilby What is VoIP? Voice over Internet Protocol A method for taking analog audio signals, like the kind you hear when you talk on the phone, and
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]
More informationKommunikationssysteme [KS]
Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/
More informationAP Port Analog VoIP Gateway High Performance VoIP Gateway Solution
AP2390 72-Port Analog VoIP Gateway High Performance VoIP Gateway Solution Optional DC Power Supply (Model : AP2390D) www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware
More informationTroubleshooting Voice Over IP with WireShark
Hands-On Troubleshooting Voice Over IP with WireShark Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services
More informationPilsung Taegyun A Fathur Afif A Hari A Gary A Dhika April Mulya Yusuf Anin A Rizka B Dion Siska Mirel Hani Airita Voice over Internet Protocol Course Number : TTH2A3 CLO : 2 Week : 7 ext Circuit Switch
More informationAP1100FA 4-Port FXS 4-Port FXO VoIP Gateway High Performance VoIP Gateway Solution
AP1100FA 4-Port FXS 4-Port FXO VoIP Gateway High Performance VoIP Gateway Solution Product Overview www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification
More informationThe IPsec protocols. Overview
The IPsec protocols -- components and services -- modes of operation -- Security Associations -- Authenticated Header (AH) -- Encapsulated Security Payload () (c) Levente Buttyán (buttyan@crysys.hu) Overview
More informationSmart IAD. User s Guide
Smart IAD User s Guide I Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has been tested and found to comply
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationIP Security. Cunsheng Ding HKUST, Kong Kong, China
IP Security Cunsheng Ding HKUST, Kong Kong, China Agenda Some attacks against the IP Brief introduction to IPSec Building Block: Security Association Building Block: Security Association Database Building
More informationComputer Security. 12. Firewalls & VPNs. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 12. Firewalls & VPNs Paul Krzyzanowski Rutgers University Spring 2018 April 15, 2018 CS 419 2018 Paul Krzyzanowski 1 Conversation Isolation: Network Layer Virtual Private Networks (VPNs)
More informationChapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,
Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure
More informationTransporting Voice by Using IP
Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone
More informationVendor: Convergence Technologies Profession. Exam Code: TT Exam Name: Convergence Technologies Professional 2007.
Vendor: Convergence Technologies Profession Exam Code: TT0-201 Exam Name: Convergence Technologies Professional 2007 Version: Demo QUESTION NO: 1 Receiving a fax as an e-mail attachment is an example of
More informationJunos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services
Junos Security Chapter 8: IPsec VPNs 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will
More informationPacketizer. Overview of H.323. Paul E. Jones. Rapporteur, ITU-T Q2/SG16 April 2007
Overview of H.323 Paul E. Jones Rapporteur, ITU-T Q2/SG16 paulej@packetizer.com April 2007 Copyright 2007 Executive Summary H.323 was first approved in February 1996, the same month that the first SIP
More informationAP2650PMG PTT Media Gateway High Performance PTT Media Gateway Solution
AP2650PMG PTT Media Gateway High Performance PTT Media Gateway Solution Product Overview www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview APOS Technology Hardware Specification
More informationCTS2134 Introduction to Networking. Module 08: Network Security
CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting
More informationSS7 VoIP Gateway Solution
SS7 VoIP Gateway Solution AddPac Technology 2013, Sales and Marketing www.addpac.com Contents SS7 VoIP Gateway Service Diagram SS7 VoIP Gateway Comparison Table Digital VoIP Gateways(1~1616 E1/T1) VoIP
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationVirtual Private Networks
EN-2000 Reference Manual Document 8 Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission security,
More informationGLOSSARY. Advanced Encryption Standard. Cisco Adaptive Security Appliance. Business-to-business. Binary Floor Control Protocol.
GLOSSARY Revised: March 30, 2012, A AES ASA Advanced Encryption Standard Cisco Adaptive Security Appliance B B2B BFCP bps Business-to-business Binary Floor Control Protocol Bits per second C CA CAPF CBWFQ
More informationSample excerpt. Virtual Private Networks. Contents
Contents Overview...................................................... 7-3.................................................... 7-5 Overview of...................................... 7-5 IPsec Headers...........................................
More informationsee the Cisco SPA100 Series Administration Guide for details. The configuration profile is uploaded to the Cisco SPA122 at the time of provisioning.
* Note: Many specifications are programmable within a defined range or list of options. Please see the Cisco SPA100 Series Administration Guide for details. The configuration profile is uploaded to the
More informationVPN-1 Power/UTM. Administration guide Version NGX R
VPN-1 Power/UTM Administration guide Version NGX R65.2.100 January 15, 2009 2003-2009 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
More informationOverview. Slide. Special Module on Media Processing and Communication
Overview Review of last class Protocol stack for multimedia services Real-time transport protocol (RTP) RTP control protocol (RTCP) Real-time streaming protocol (RTSP) SIP Special Module on Media Processing
More informationConfiguring Hosted NAT Traversal for Session Border Controller
Configuring Hosted NAT Traversal for Session Border Controller The Cisco IOS Hosted NAT Traversal for Session Border Controller Phase-1 feature enables a Cisco IOS Network Address Translation (NAT) Session
More informationFireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.
Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which
More informationSummary of last time " " "
Summary of last time " " " Part 1: Lecture 3 Beyond TCP TCP congestion control Slow start Congestion avoidance. TCP options Window scale SACKS Colloquia: Multipath TCP Further improvements on congestion
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationReal Time Protocols. Overview. Introduction. Tarik Cicic University of Oslo December IETF-suite of real-time protocols data transport:
Real Time Protocols Tarik Cicic University of Oslo December 2001 Overview IETF-suite of real-time protocols data transport: Real-time Transport Protocol (RTP) connection establishment and control: Real
More informationOverview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).
This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,
More informationBCRAN. Section 9. Cable and DSL Technologies
BCRAN Section 9 Cable and DSL Technologies Cable and DSL technologies have changed the remote access world dramatically. Without them, remote and Internet access would be limited to the 56 kbps typical
More informationVoIP Security Threat Analysis
2005/8/2 VoIP Security Threat Analysis Saverio Niccolini, Jürgen Quittek, Marcus Brunner, Martin Stiemerling (NEC, Network Laboratories, Heidelberg) Introduction Security attacks taxonomy Denial of Service
More informationAn Overview of the Cisco Unified IP Phone
CHAPTER 1 The Cisco Unified IP Phone 7965G and 7945G are full-featured telephones that provide voice communication over an Internet Protocol (IP) network. These phones function much like digital business
More informationAn Overview of the Cisco Unified IP Phone
CHAPTER 1 The Cisco Unified IP Phone 7975G is a full-featured telephones that provides voice communication over an Internet Protocol (IP) network. These phones function much like digital business phones,
More informationIP Possibilities Conference & Expo. Minneapolis, MN April 11, 2007
IP Possibilities Conference & Expo Minneapolis, MN April 11, 2007 Rural VoIP Protocol, Standards and Technologies Presented by: Steven P. Senne, P.E Chief Technology Officer Finley Engineering Company,
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:
More informationVirtual Private Networks (VPN)
CYBR 230 Jeff Shafer University of the Pacific Virtual Private Networks (VPN) 2 Schedule This Week Mon September 4 Labor Day No class! Wed September 6 VPN Project 1 Work Fri September 8 IPv6? Project 1
More informationAP-GS808S 8-Port GSM VoIP Gateway High Performance GSM VoIP Gateway Solution
AP-GS808S 8-Port VoIP Gateway High Performance VoIP Gateway Solution www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification Module Specification APOS Technology
More informationOneXS will provide users with a reference server (IP, FQDN, or other means to connect to the service). This must be obtained before setup can begin.
1 SIP Carriers 1.1 OneXS 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found
More informationLecture 14: Multimedia Communications
Lecture 14: Multimedia Communications Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 14-1 Multimedia Characteristics Bandwidth Media has natural bitrate, not very flexible. Packet
More informationVirtual Private Network
VPN and IPsec Virtual Private Network Creates a secure tunnel over a public network Client to firewall Router to router Firewall to firewall Uses the Internet as the public backbone to access a secure
More informationApproaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches
Approaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches Dr. Elmabruk M Laias * Department of Computer, Omar Al-mukhtar
More informationSeminar report IP Telephony
A Seminar report On IP Telephony Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY:
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More informationChapter 8 roadmap. Network Security
Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing
More informationBasic Architecture of H.323 C. Schlatter,
Basic Architecture of H.323 C. Schlatter, schlatter@switch.ch 2003 SWITCH Agenda Background to H.323 Components of H.323 H.323 Protocols Overview H.323 Call Establishment 2003 SWITCH 2 Background to H.323
More informationAP1100FN 4-Port FXS 4-Port FXO VoIP Gateway High Performance VoIP Gateway Solution
AP1100FN 4-Port FXS 4-Port FXO VoIP Gateway High Performance VoIP Gateway Solution VoIP Gateway Service + Light SIP Proxy Service www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview
More informationSecurity Engineering. Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings)
Security Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings) Lecture Outline Network Attacks Attive Attacks Passive Attacks TCP Attacks Contermeasures IPSec SSL/TLS Firewalls
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationSecurity Assessment Checklist
Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment
More informationInterworking Signaling Enhancements for H.323 and SIP VoIP
Interworking Signaling Enhancements for H.323 and SIP VoIP This feature module describes enhancements to H.323 and Session Initiation Protocol (SIP) signaling when interworking with ISDN, T1 channel associated
More informationPROTOCOLS FOR THE CONVERGED NETWORK
Volume 2 PROTOCOLS FOR THE CONVERGED NETWORK Mark A. Miller, P.E. President DigiNet Corporation A technical briefing from: March 2002 Table of Contents Executive Summary i 1. Converging Legacy Networks
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationNetwork Interconnection
Network Interconnection Covers different approaches for ensuring border or perimeter security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Lecture
More informationDPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0
DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More information1 SIP Carriers. 1.1 LightBound Warnings Vendor Contact Vendor Web Site:
1 SIP Carriers 1.1 LightBound 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found
More informationAP2620IVR IVR VoIP Gateway High Performance IVR VoIP Gateway Solution
AP2620IVR IVR VoIP Gateway High Performance IVR VoIP Gateway Solution Preliminary Product Overview www.addpac.com AddPac Technology 2006, Sales and Marketing Table of Contents Product Overview Hardware
More informationRTP. Prof. C. Noronha RTP. Real-Time Transport Protocol RFC 1889
RTP Real-Time Transport Protocol RFC 1889 1 What is RTP? Primary objective: stream continuous media over a best-effort packet-switched network in an interoperable way. Protocol requirements: Payload Type
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More information