The leader in session border control. for trusted, first class interactive communications
|
|
- Rodney Robbins
- 5 years ago
- Views:
Transcription
1 The leader in session border control for trusted, first class interactive communications
2 VoIP security at the carrier network edge Kevin Mitchell Director, Solutions Marketing
3 SIP Trunking Seminar - September in IP we don t trust anyone!
4 4 VoIP threats impacts & probabilities Security threat DoS & DDoS attacks Impact Overloads 9 Viruses & malware Probability Internet - free, anonymous IMS /managed network Comments Service fraud 5 N/A 5 Requires technical sophistication Impact depends on business model Identity theft Requires slightly more technical sophistication than SPIT Man-in-the-middle requires same degree of technical capabilities Information used for other attacks with various impacts Eavesdropping Requires sophisticated attack capable of covering tracks Catastrophic - all subscribers are impacted Power outage prone areas susceptible Catastrophic - all subscribers impacted Impact varies based on service provider infrastructure, enterprise IP PBX or residential PC Requires technical sophistication and access to wiring closets SPIT Requires little sophistication Annoying more than harmful
5 VoIP security concerns 5 SIP Trunking Seminar - September 2007 Accurate. Objective. Proven. User/device authentication and authorization 88% Security Concerns DoS attacks and overloads of next gen voice service infrastructure User privacy and confidentiality Performance impacted when defending against attack Identity theft Service topology exposure 67% 58% 50% 50% 50% Based on interviews with 24 service providers completed in Q Service fraud 46% Illegal wiretapping/ eavesdropping 33% SPIT 17% 0% 20% 40% 60% 80% 100% Percent of Respondents Rating 6 or 7 Source: Infonetics Research, Service Provider Plans for VoIP & IMS: North America, Europe, Asia Pacific, Latin America-Caribbean
6 IMS: Is Missing Security Security feature requirement IMS feature Security threat DoS attacks Traffic overloads Viruses/ malware Service fraud ID theft Eavesdropping SPIT ACL static Core IMS functions ACL dynamic Not addressed!!!!!! Topology hiding (NAPT at L3 & L5) I-BCF only, THIG!!! Authentication - subscriber & CSCF IPSec, SIP digest!!!!!! Authorization - subscriber HSS function!!! Signaling encryption IPSec!!!!!! Media encryption Not addressed!!! CAC - I/S-CSCF constraints CAC - network bandwidth constraints Not addressed PDF/RACS function CAC - user limits: sessions (#) Not addressed!!!!!! CAC - user limits: bandwidth Not addressed!!! SIP message & MIME attachment filtering/inspection Not addressed!!! Signaling rate monitoring & policing Not addressed!!!!!! Bandwidth monitoring & policing Not addressed!!! Call gapping - destination number Not addressed!!! Call gapping - source/dest. CSCF or UE Not addressed!!! QoS marking/mapping control Not addressed!!! Satisfied Not addressed Partially addressed SIP Trunking Seminar - September
7 SIP Trunking Seminar - September How do I secure my network? 3. Protect the service Service Provider Peer Enterprise Access 2. Protect the service infrastructure 1. Protect the border IMS core Residential Access
8 SIP Trunking Seminar - September Border security framework SBC DoS/DDoS protection Protect against SBC DoS/DDOS attacks & overloads Access control Session-aware access control for signaling & media Topology hiding, privacy and VPN separation Complete service infrastructure hiding & user privacy support Support for L2 and L3 VPN services and security Viruses, malware & SPIT mitigation Deep packet inspection enables protection against malicious or annoying attachments/traffic Infrastructure DoS/DDoS prevention Prevent DoS/DDOS attacks on service infrastructure & subscribers Fraud prevention Prevent misuse & fraud Protect against service theft Monitoring and reporting Record attacks & attackers Provide audit trails Fraud prevention Infrastructure DoS prevention SBC DoS protection Viruses malware & SPIT mitigation Access control Topology hiding & privacy & VPN separation
9 SIP Trunking Seminar - September Best protection combines hardware and software Network processor (NPU) -based protection Layer 3/4 (TCP, SYN, ICMP, etc.) & signaling attack detection & prevention Dynamic & static ACLs (permit & deny) to SPU Trusted & untrusted paths to SPU with configurable bandwidth allocation & bandwidth policing per session Trusted devices - guaranteed signaling rates & access fairness Untrusted devices can access unused trusted bandwidth Separate queues for ICMP, ARP, telnet, etc. Signaling Reverse Path Forwarding (urpf) detection - signaling & media processor Overload prevention - 10 Gbps NPUs > 8 Gbps network interfaces Security processor Signaling processor (SPU) -based protection Overload protection threshold (% SPU) w/graceful call rejection Per-device dynamic trust-binding promotes/demotes devices Network processor Intelligent traffic manager Network processor
10 Cbeyond s SIP trunking service BeyondVoice with SIPconnect SIP Trunking Acme Seminar Packet confidential - September Direct IP peering between SIP IP PBXs and Cbeyond s VoIP network Reduces equipment cost, provides DID for small customers, enables advanced IP capabilities like HD Voice, network-based call features, etc. SBC improves reliability by handling application server fail-over on behalf of the PBX Acme Packet SBCs protect Cbeyond s network from attack, hide topology and allow secure traversal of enterprise inbound calls using HNT Secure SIP signaling via TLS (soon) PSTN Signaling Media TLS Enterprise
11 SIP Trunking Seminar - September Net-Net VoIP security threats are multi-dimensional and differ from data ones Focus on the threats degrees of risk and impact to network Free services High Internet-connected ITSP Facilities-based hosted services Service provider peering Low Dedicated security element at the border must protect itself and elements behind it
12 The leader in session border control for trusted, first class interactive communications
13 SIP Trunking Seminar - September Acme Packet at a glance Creator of Session Border Controller (SBC) category 56% market share (2006 revenue) and growing Over 420 customers in 81 countries Top tier customers worldwide 23 of top of the top of top 10 North American MSOs Premier distribution partners Alcatel- Lucent, Avaya, Ericsson, Italtel, Motorola, Nokia Siemens Networks, Nortel, Sonus 300+ employees in 22 countries Headquartered in Burlington, MA Public company (NASDAQ: APKT) w/ strong revenue growth, profits & balance sheet Annual/YTD revenue ($M) $3.3 $16.0 $36.1 $84.1 $ H1 2007
Ingate SIParator /Firewall SIP Security for the Enterprise
Ingate SIParator /Firewall SIP Security for the Enterprise Ingate Systems Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?... 3 3
More informationSIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)
security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, 29.03.2006, Atlanta, GA (USA) 2006 SWITCH Content and Firewall and NAT Privacy / Encryption SpIT / Authentication Identity General
More informationSecurity for SIP-based VoIP Communications Solutions
Tomorrow Starts Today Security for SIP-based VoIP Communications Solutions Enterprises and small to medium-sized businesses (SMBs) are exposed to potentially debilitating cyber attacks and exploitation
More informationNETWORK THREATS DEMAN
SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments
More informationNet-Net enterprise session border controller playbook
Net-Net enterprise session border controller playbook The leader in session delivery network solutions Why did we make this guide? To help you solidify your position as a trusted technology advisor to
More informationWHITE PAPER. Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS. Starting Points
WHITE PAPER Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS Starting Points...1 The Four Essentials...2 The Business Case for SIP Trunks...3 To benefit from the latest
More informationVPN-1 Power/UTM. Administration guide Version NGX R
VPN-1 Power/UTM Administration guide Version NGX R65.2.100 January 15, 2009 2003-2009 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
More informationSonus Networks engaged Miercom to evaluate the call handling
Key findings and conclusions: Lab Testing Summary Report September 2010 Report 100914B Product Category: Session Border Controller Vendor Tested: Sonus SBC 5200 successfully registered 256,000 user authenticated
More informationWhat is SIP Trunking? ebook
What is SIP Trunking? ebook A vast resource for information about all things SIP including SIP, security, VoIP, SIP trunking and Unified Communications. Table of Contents 3 4 5 6 7 8 9 10 11 What is the
More informationIngate Firewall & SIParator Product Training. SIP Trunking Focused
Ingate Firewall & SIParator Product Training SIP Trunking Focused Common SIP Applications SIP Trunking Remote Desktop Ingate Product Training Common SIP Applications SIP Trunking A SIP Trunk is a concurrent
More informationHP AllianceONE Services zl Module for Avaya Aura Session Border Controller powered by Acme Packet
HP AllianceONE Services zl Module for Avaya Aura Session Border Controller powered by Acme Packet Data sheet Product overview The HP AllianceONE Services zl Module for Avaya Aura Session Border Controller
More informationAeonix & Ingate. Role in Enterprise
Aeonix & Ingate Role in Enterprise 1 What is Aeonix? A Unified Communications Solution delivering. Telephony Voice Mail Contact Center UM Video Handsets Collaboration Audio 2 Aeonix UC&C Solution Unified
More informationDigital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model
Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model 1. Description of Services. 1.1 SIP SBC with Field Trial Endpoint Deployment Verizon will assist
More informationCisco Self Defending Network
Cisco Self Defending Network Integrated Network Security George Chopin Security Business Development Manager, CISSP 2003, Cisco Systems, Inc. All rights reserved. 1 The Network as a Strategic Asset Corporate
More informationWhite Paper. SIP Trunking: Deployment Considerations at the Network Edge
SIP Trunking: Deployment Considerations at the Network Edge at the Network Edge Executive Summary The move to Voice over IP (VoIP) and Fax over IP (FoIP) in the enterprise has, until relatively recently,
More informationBuilding a Global VoIP Network. Michael Burrell, Senior Manager Orange Business Services. August 22, 2006
Building a Global VoIP Network Michael Burrell, Senior Manager Orange Business Services August 22, 2006 Service Provider relationships > what service provider relationships and types of carrier services
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationUnified Communications Threat Management (UCTM) Secure Communications and Collaborations
Secure Cloud Communication and Collaboration. Overview The emergence of IP Voice, Video, Unified Communication and Collaborations (UC&C) technology and applications are causing a fundamental shift in the
More informationMulti-Layer Security Protection for Signaling Networks
Multi-Layer Security Protection for Signaling Networks All-IP Invites Innovation, but also More Vulnerabilities O R A C L E W H I T E P A P E R J A N U A R Y 2 0 1 6 Table of Contents Introduction 2 Access
More informationFirewalls for Secure Unified Communications
Firewalls for Secure Unified Communications Positioning Guide 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 12 Firewall protection for call control
More informationCisco Webex Cloud Connected Audio
White Paper Cisco Webex Cloud Connected Audio Take full advantage of your existing IP telephony infrastructure to help enable a Webex integrated conferencing experience Introduction Cisco Webex Cloud Connected
More informationOptimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO,
Optimizing the Internet Quality of Service and Economics for the Digital Generation Dr. Lawrence Roberts President and CEO, lroberts@anagran.com Original Internet Design File Transfer and Remote Computing
More informationBrochure. Dialogic BorderNet Session Border Controller Solutions
Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Solutions Supercharge Connections between Networks, Services and Subscribers with Ease and Scale The BorderNet family of session
More informationInternetwork Expert s CCNA Security Bootcamp. Common Security Threats
Internetwork Expert s CCNA Security Bootcamp Common Security Threats http:// Today s s Network Security Challenge The goal of the network is to provide high availability and easy access to data to meet
More informationFirewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
More informationSteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)
Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized
More informationModern IP Communication bears risks
Modern IP Communication bears risks How to protect your business telephony from cyber attacks Voice-over-IP (VoIP) provides many new features over PSTN. However, the interconnection with your IT infrastructure
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationConfiguring Access Rules
Configuring Access Rules Rules > Access Rules About Access Rules Displaying Access Rules Specifying Maximum Zone-to-Zone Access Rules Changing Priority of a Rule Adding Access Rules Editing an Access Rule
More informationChapter 5. Security Components and Considerations.
Chapter 5. Security Components and Considerations. Technology Brief Virtualization and Cloud Security Virtualization concept is taking major portion in current Data Center environments in order to reduce
More informationDDoS: Evolving Threats, Solutions FEATURING: Carlos Morales of Arbor Networks Offers New Strategies INTERVIEW TRANSCRIPT
INTERVIEW TRANSCRIPT DDoS: Evolving Threats, Solutions Carlos Morales of Arbor Networks Offers New Strategies FEATURING: Characteristics of recent attacks; Gaps in organizations defenses; How to best prepare
More informationChanging the Voice of
Changing the Voice of Telecommunications Level 3 Solutions for Voice Service Providers Competitive: It is a word you know well. As a voice services provider, you face a unique set of challenges that originate
More informationABC SBC: Securing the Enterprise. FRAFOS GmbH. Bismarckstr CHIC offices Berlin. Germany.
ABC SBC: Securing the Enterprise FRAFOS GmbH Bismarckstr 10-12 CHIC offices 10625 Berlin Germany www.frafos.com Introduction A widely reported fraud scenarios is the case of a malicious user detecting
More informationlet your network blossom Orchid One Security Features
let your network blossom Orchid One Security Features Security Security Features Features Orchid Orchid One One 1 2014 2014Cataleya CataleyaPrivate PrivateLimited. Limited.All Allrights rightsreserved.
More informationABC SBC: Secure Peering. FRAFOS GmbH
ABC SBC: Secure Peering FRAFOS GmbH Introduction While an increasing number of operators have already replaced their SS7 based telecommunication core network with a SIP based solution, the interconnection
More informationLeveraging
Leveraging Femto @Home Value-Added Services to Drive Consumer Demand Pradeep Samudra April 2009 AVP, Business Development Mavenir Systems Outline Mobile Operator s Challenges Femtozone Services Femto Services
More informationCisco Unified Border Element (SP Edition) for Cisco ASR 1000 Series
Cisco Unified Border Element (SP Edition) for Cisco ASR 1000 Series Product Overview The Cisco Unified Border Element (SP Edition) is a high-scale, carrier-grade session border controller (SBC) that is
More informationBroadband Internet Access Disclosure
Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided
More informationNext Generation Networks MultiService Network Design. Dr. Ben Tang
Next Generation Networks MultiService Network Design Dr. Ben Tang April 23, 2008 Operators face difficult network planning and design questions Can your current planning methods handle the complexity of
More informationFreeSWITCH as a Kickass SBC. Moises Silva Manager, Software Engineering
FreeSWITCH as a Kickass SBC Moises Silva Manager, Software Engineering FreeSWITCH as a Kickass SBC Moises Silva Manager, Software Engineering Moises Silva
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationMULTICAST SECURITY. Piotr Wojciechowski (CCIE #25543)
MULTICAST SECURITY Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE #25543 (Routing
More informationEnabling FMC: Airvana Universal Access Gateway
Enabling FMC: Airvana Universal Access Gateway 2006 3G CDMA Latin America Regional Conference May 25 th, 2006 Sao Paulo, Brazil Michael McFarland Director, Marketing & Business Development Airvana, Inc
More informationFrequently Asked Questions (Dialogic BorderNet 500 Gateways)
Frequently Asked Questions (Dialogic BorderNet 500 Gateways) Q: What is a Dialogic BorderNet 500 Gateway, and what are its main functions? A: A Dialogic BorderNet 500 Gateway consists of a full featured
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router. It is designed to operate on small, low-power, Linux-based platforms to extend
More informationNetwork Security. Thierry Sans
Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability
More informationConfiguration Guide IP-to-IP Application
Multi-Service Business Gateways Enterprise Session Border Controllers VoIP Media Gateways Configuration Guide IP-to-IP Application Version 6.8 November 2013 Document # LTRT-40004 Configuration Guide Contents
More informationConfigure Basic Firewall Settings on the RV34x Series Router
Configure Basic Firewall Settings on the RV34x Series Router Objective The primary objective of a firewall is to control the incoming and outgoing network traffic by analyzing the data packets and determining
More informationSecurity Assessment Checklist
Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment
More informationCbeyond s BeyondVoice TM with SIPconnect
Cbeyond s BeyondVoice TM with SIPconnect Ingate SIP Trunking Workship 2008 Internet Telephony Conference & EXPO East SIP Trunking The Service Provider Perspective Session January 23, 2008 Greg Rothman
More informationFirewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
More informationNever Drop a Call With TecInfo SIP Proxy White Paper
Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video
More informationNew and Current Approaches for Secure VoIP Service
New and Current Approaches for Secure VoIP Service H. Hakan Kılınç, Uğur Cağal Netas, Cyber Security Department, Istanbul hakank@netas.com.tr, ucagal@netas.com.tr Abstract: The current telecom technology
More informationEXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!
EXAMGOOD QUESTION & ANSWER Exam Good provides update free of charge in one year! Accurate study guides High passing rate! http://www.examgood.com Exam : 070-337 Title : Enterprise Voice & Online Services
More informationPSTN Security. Sougat Ghosh Security Services Leader Asia, Nortel Delhi / September 29, 2008 BUSINESS MADE SIMPLE
PSTN Security Sougat Ghosh Security Services Leader Asia, Nortel Delhi / September 29, 2008 BUSINESS MADE SIMPLE 1 Disclaimer The slides and presentation templates are property of Nortel and must not be
More informationFundamentals of Network Security v1.1 Scope and Sequence
Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document
More informationORACLE ACME PACKET SBC FAMILY. Security Guide
ORACLE ACME PACKET SBC FAMILY Security Guide August 2017 Copyright 2017, 2012, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement
More informationWe will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are:
Introduction to Telecom Fraud This guide will help you learn about the different types of telecom fraud and industry best practices for detection and prevention. Three Major Categories of Telecom Fraud
More informationEnabling Trusted Unified Communications. Steven J. Johnson President, Ingate Systems Inc.
Enabling Trusted Unified Communications Steven J. Johnson President, Ingate Systems Inc. Welcome Ingate s SIP Trunking Workshop 2 Ingate Systems Founded in 2001 SIP aware firewall HW & SW technology Headquarters
More informationSchool of Computer Sciences Universiti Sains Malaysia Pulau Pinang
School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Information Security & Assurance Assignment 2 White Paper Virtual Private Network (VPN) By Lim Teck Boon (107593) Page 1 Table of Content
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 642-618 EXAM QUESTIONS & ANSWERS Number: 642-618 Passing Score: 800 Time Limit: 120 min File Version: 39.6 http://www.gratisexam.com/ CISCO 642-618 EXAM QUESTIONS & ANSWERS Exam Name: Deploying Cisco
More informationAvaya Session Border Controller Enterprise Implementation and Maintenance Exam
1 Avaya - 3107 Avaya Session Border Controller Enterprise Implementation and Maintenance Exam QUESTION: 1 If the Remote Worker cluster is using a Real Server IP and Real Server Port, over which protocols
More informationCoordinated Threat Control
Application Note Coordinated Threat Control Juniper Networks Intrusion Detection and Protection (IDP) and Secure Access SSL VPN Interoperability Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
More informationThe Voice over Mobile Broadband (VoMBB) Market:
Brochure More information from http://www.researchandmarkets.com/reports/2155773/ The Voice over Mobile Broadband (VoMBB) Market: 2012 - Description: A relatively new term, Voice over Mobile Broadband
More informationGrandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
More informationWhat is New in Cisco ACE 4710 Application Control Engine Software Release 3.1
What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches
More informationCompany Introduction. May 2018
Company Introduction May 2018 40 20 7 Vendor partners EMEA countries Practices 1Vision 5000+ reseller partners 400+ employees Advanced Networking Leaders in mobility & cloud networking solutions Software
More informationARBOR DDoS PRODUCTS IN A GDPR COMPLIANT ENVIRONMENT. Guidelines and Frequently Asked Questions
ARBOR DDoS PRODUCTS IN A GDPR COMPLIANT ENVIRONMENT Guidelines and Frequently Asked Questions About NETSCOUT NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) assures digital business services against disruptions
More informationInvesting in Broadband Communications. Presented by Andrew Kau General Partner
Investing in Broadband Communications Presented by Andrew Kau General Partner December 5, 2002 1 Equipment Vendor Balance Sheet Analysis USD M ALCATEL CISCO ERICSSON LUCENT MOTOROLA NOKIA NORTEL SIEMENS
More informationModular Policy Framework. Class Maps SECTION 4. Advanced Configuration
[ 59 ] Section 4: We have now covered the basic configuration and delved into AAA services on the ASA. In this section, we cover some of the more advanced features of the ASA that break it away from a
More informationCOMPLETE YOUR GO-TO-MARKET PLAN BUSINESS SOLUTIONS BARRY DERRICK PRODUCT MARKETING MANAGER
COMPLETE YOUR GO-TO-MARKET PLAN BUSINESS SOLUTIONS BARRY DERRICK PRODUCT MARKETING MANAGER AGENDA ADTRAN OVERVIEW GO-TO-MARKET WITH WINNING SOLUTIONS! Market Leading Cloud Connectivity Solutions that Outperform
More information10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationLeveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience
Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience Steve Northridge Email: Steve.Northridge@Oracle.com Twitter: @stevenorthridge 3 Photo Source: Boston Public Library
More informationApplication Notes for Configuring CenturyLink SIP Trunking with Avaya IP Office Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring CenturyLink SIP Trunking with Avaya IP Office 6.1 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring
More informationCSC Network Security
CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet
More informationIndicate whether the statement is true or false.
Indicate whether the statement is true or false. 1. Packet-filtering firewalls scan network data packets looking for compliance with the rules of the firewall s database or violations of those rules. 2.
More informationSession Border Controllers: A Primer
Session Border Controllers: A Primer Why SBCs are indispensable for any IP real-time communications network O R A C L E W H I T E P A P E R J U L Y 2 0 1 7 Introduction This white paper provides basic
More informationALCATEL Edge Services Router
ALCATEL 7420 Edge Services Router Alcatel builds next generation networks, delivering integrated end-to-end voice and data networking solutions to established and new carriers, as well as enterprises and
More informationIFB No C032 Cloud Based VOIP System. December 28, 2016
IFB No. 1-17-C032 Cloud Based VOIP System December 28, 2016 Questions and Answers Notice: Questions may have been edited for clarity and relevance. 1. Question: Could you please provide the location(s)
More informationWhite Paper. accelerateinnovation. Security Measures for Converged Networks June 2005 Author: Ramana Mylavarapu. security voice wireless
White Paper accelerateinnovation security voice wireless Security Measures for Converged Networks June 2005 Author: Ramana Mylavarapu Table of Contents I. Introduction...3 II. Converged Services Security
More informationMore companies are turning to technology to help boost their bottom line
Product Brief Routing Switch Applications that need a reliable, secure, intelligent network include: IP Telephony Collaboration tools Enterprise Resource Planning (ERP) and CRM Supply chain management
More informationProduct Brief Nortel Switched Firewall 6000 Series
Product Brief Nortel Switched Firewall 6000 Series Accelerated VPN-Firewall High-performance stateful firewall appliance for perimeter deployment Dual component switch-based appliance for highcapacity,
More informationCTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud
CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud Khalid Raza CTO & Co-Founder Viptela khalid@viptela.com Danny Johnson Director, Product Marketing Verizon daniel.johnson@verizonwireless.com
More informationLevel 1 Technical Firewall Traversal & Security. Level 1 Technical. Firewall Traversal & Security. V2 Page 1 of 16
Level 1 Technical Firewall Traversal & Security V2 Page 1 of 16 Contents 1 - Introduction... 3 Introduction... Error! Bookmark not defined. Available Resources... 8 2 - Overview... 4 Level 1 Recap... Error!
More informationSpending on Service Provider Routers Begins to Grow in EMEA
Research Brief Spending on Service Provider Routers Begins to Grow in EMEA Abstract: 2Q03 brought the first rise in end-user spending on service provider routers in Europe, Middle East and Africa for a
More informationIntrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks
Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks So we are proposing a network intrusion detection system (IDS) which uses a Keywords: DDoS (Distributed Denial
More informationDeploying Cisco ASA Firewall Solutions (FIREWALL v1.0)
Cisco 642-617 Deploying Cisco ASA Firewall Solutions (FIREWALL v1.0) Version: 4.8 QUESTION NO: 1 Which Cisco ASA feature enables the ASA to do these two things? 1) Act as a proxy for the server and generate
More informationAllot Corporate Presentation
Allot Corporate Presentation (NASDAQ, TASE: ALLT) November 2018 Forward Looking Statements This presentation contains forward-looking statements, which express the current beliefs and expectations of Company
More informationYear of the Lync Migration to Microsoft Lync Voice Solutions
AudioCodes and Infonetics Research Webinar Year of the Lync Migration to Microsoft Lync Voice Solutions 22 February 2012 Today s Speakers Dani Kiryati Marketing Manager AudioCodes Diane Myers Directing
More informationH.323-to-H.323 Interworking on CUBE
This chapter describes how to configure and enable features for H.323-to-H.323 connections on CUBE. Configuring H.323-to-H.323 connections on a CUBE opens all ports by default. If CUBE has a public IP
More informationSBCs from Sangoma Flexibility, Ease of Use and an Unmatched ROI Simon Horton Director of Product Management
SBCs from Sangoma Flexibility, Ease of Use and an Unmatched ROI Simon Horton Director of Product Management shorton@sangoma.com June 2013 Inside this Deck About Sangoma SBC Market SBC Intro Sangoma SBC
More informationAcme Packet Net-Net 9200
Acme Packet Overview Acme Packet s platform offers carrier-grade performance, capacity and availability for service provider and large enterprise deployments in a single 7RU chassis-based system. The operates
More informationApplication Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0 Abstract These Application Notes
More informationCommon Components. Cisco Unified Border Element (SP Edition) Configuration Profile Examples 5 OL
The following components of the Cisco Unified Border Element are common to all of the configuration profile examples in this document. Secure Media Adjacencies Call Policies CAC Policies SIP Profiles 5
More informationCisco IPS AIM Deployment, Benefits, and Capabilities
Cisco IPS AIM Abstract The Cisco IPS Advanced Integration Module (AIM) for Cisco modular integrated services routers integrates a high-performance, feature-rich intrusion prevention system (IPS) into the
More informationVoLTE Security in NG PRDs
Background A number of different audits and security analysis of various VoLTE networks have been performed. - See also FSAG WP VoLTE Security Threats and Attacks The observation from the audits were in
More informationReal-time Communications Security and SDN
Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,
More informationDelivering the Full Potential of SIP
Delivering the Full Potential of SIP Todd A. Abbott Sonus, EVP Strategy & Go-to-Market UC Summit April 29, 2013 sonus.net Entering into the Age of the Customer Sources of Dominance AGE OF MANUFACTURING
More informationCisco ASR 1000 Series Aggregation Services Routers: QoS Architecture and Solutions
Cisco ASR 1000 Series Aggregation Services Routers: QoS Architecture and Solutions Introduction Much more bandwidth is available now than during the times of 300-bps modems, but the same business principles
More information