RedMax EXtreme EX-LRT Guía para resolver problemas Pagina 22

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 142
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 21
Oracle SBC Security Guide
Part 3: Security Features
This section outlines specific SBC security mechanisms.
The Security Model
The Oracle Communications SBC is a purpose built device providing customers both centralized and
distributed control of the management and security of UC networks. The SBC is a critical network
security element for VoIP services designed to effectively manage sessions and protect core network
elements from various types of DDoS attacks, including malicious and non-malicious signaling overload
attacks. The SBC is the sole ingress and egress point for all signaling messages (SIP/H.323/MGCP) and
media streams to/from the core network and is therefore generally the demarcation point between trusted
and untrusted network boundaries. Hence it is vital that the SBC be as secure and available as possible.
Oracle provides a number of industry leading techniques through SBC configuration to secure the
network border. Some of these features are enabled “out of the box” and some require further analysis of
the network architecture to determine the most optimal configuration for security.
For example, the SBC performs access control based on layer 5 signaling messages as one of its primary
functions. The SBC is designed to allow authorized VoIP communications into the core network by
opening/closing firewall ports and by performing NAPT (network address and port translations) on all
signaling and media IP packets as one of its core functions. Signaling messages, going to and from the
SIP core servers and residential gateways and/or peering affiliate infrastructure is therefore inspected and
rewritten as necessary by the SBC.
The SBC follows a “closed” philosophy where ports and interfaces are closed by default and opened on
an as-needed basis. Therefore the system will generally have ports, services and processes disabled unless
configured.
Net-SAFE Architecture: SBC & Core Infrastructure Protection
The SBC provides several techniques for protecting the SBC, and therefore the service, from DDoS
attacks.
First, traditional static ACLs should be configured to only permit signaling traffic from trusted devices.
Permit ACLs are applicable for both unsecured networks (peering partner’s SBCs, proxies, gateways) and
secure network devices (core network softswitches, media servers, application servers, gateways). All
other devices should be denied access to the SBC through the use of deny ACLs.
This solution does not scale for hosted NAT traversal (or hosted access) based applications where
thousands of remote endpoint devices with dynamic IP addresses communicate directly to the SBC
signaling interfaces.
The SBC provides the following tools for DDoS protection in Access networks:
Protect the SBC core CPU via configurable sized queues and separation of signaling packets
(trusted, untrusted)
Configurable trust-level (none, low, medium, high)
Wire speed hardware classification of every remote device trust-level
Provide fair access for new/untrusted devices to signaling queue
Vista de pagina 21
1 2 ... 17 18 19 20 21 22 23 24 25 26 27 ... 141 142

Comentarios a estos manuales

Sin comentarios