Oracle SBC Security Guide
Part 1: Overview
Product Overview
The Oracle Session Border Controller (SBC) family of products are designed to increase security when
deploying Voice over IP (VoIP) or Unified Communications (UC) solutions. Properly configured,
Oracle’s SBC family helps protect IT assets, safeguard confidential information, and mitigate risks—all
while ensuring the high service levels which users expect from the corporate phone system and the public
telephone network.
Installed at the network perimeter, the SBC family of products provides a demarcation and enforcement
point for the UC network. Its primary security functions include:
Overload protection to prevent DoS attacks and registration floods
Access control to inhibit toll fraud and service theft
Topology hiding to counter topology discovery through reconnaissance scans
Encryption and authentication to ensure privacy and prevent loss of confidential information
Protocol validation to combat fuzzing and other types of malicious attacks
Net-SAFE Security Framework
The Oracle Net-SAFE™ security framework addresses the unique security challenges of delivering SIP-
based interactive IP communications over the Internet. The Net-SAFE framework includes advanced
security features, a highly-scalable architecture, and comprehensive monitoring and reporting capabilities.
The framework reduces risk in UC services and applications by ensuring confidentiality, integrity and
availability.
Net-SAFE goals
Protect the SBC: The first line of defense at the border is the SBC, so it needs to be secure and
resistant to attacks and overload.
Protect the infrastructure: The infrastructure includes the customer’s network of multimedia
equipment (soft switches, application servers, SIP proxies, MGCP call agents, H.323 gatekeepers,
gateways, etc.).
Protect the service: Preventing attacks is not enough. UC services that generate revenue need to
remain in service.
Net-SAFE Requirements
The Net-SAFE framework identifies the requirements that an SBC must satisfy to meet the goals of the
framework and provide confidentiality integrity, and availability.
Comentarios a estos manuales