04 - CS1000 - Security
04 - CS1000 - Security
04 - CS1000 - Security
Module #16
Configure Enforce
Verify
High
Cost of threat Cost of protection
Cost
Appropriate security
spend
4 ROLE-BASED ACCESS
VLAN Assignment, Class-of-Service/Class-of-Restriction, Access
?
? ?
Solution components
• Endpoint security • Component security
• Management security • Secure communications
Real-time Interface
Programming via Command Line Overlays
Serial Port
ELAN
Telephony
Manager System Access via Serial or Ethernet
Off-line Interface
Programming via Graphical User Interface
Meridian Option Access to all system programming
51C/61C/81C Allows scheduling of changes
Billing
Graphical Reports
TM
CC
• The system provides a customizable banner that appears when a user logs on
to the system.
• The customizable banner is intended for use by customers with security
policies that require network equipment to display a specific message to users
when they log on.
• You can use this feature to display up to 20 lines of custom text, with up to 80
characters on each line.
Encryption SSL
Authentication
(i.e. AD)
UCM UCM
Backup Security Server Primary Security Server
UCM
SSL / TLS
Services Public Private
SIP Line GW
ISSS / IPsec
Call Server Key
(SFTP)
System
Management
A Linux Nodal
SIP TLS
(DTLS)
IPsec Services
Password &
Role Based
Media Gateway Management
Call Server
SRTP
Centralized
Security and OAM
Port Access
Restrictions
Logs
SRTP
SRTP
SRTP
IP Unistim SIP Client
SIP Client
IP Unistim Client
Client SRTP
SRTP SRTP
IP Unistim IP Unistim SIP Client SIP Client
27 Client Client Nortel Proprietary Nortel CS1000 R6.0 Channel Partner SE Workshop
CS1000 Media Security Reporting
• Industry standard DTLS protocol is used to encrypt UNIStim signaling from an IP Client
to the Line Terminal Proxy server (LTPS)
• Both DTLS-capable and DTLS-incapable systems/phones are supported on the same
network
• Each Line Terminal Proxy Server ( LTPS) may have its own certificate
• No need to install additional hardware
Certificate
SIP GW Distribution SIP GW
SIPL GW SIPL GW
Example:
Microsoft
OCS2007
• SIP TLS can function within a single or multiple Security Domain configuration
• Single Domain Discussed on Previous Slide
• Single Security Server
• Multiple Domain
• Shown Below
Managed
Via
CallPilot
UCM
MC32S
CPPM CS
MG1000B Site
MGC
IPSec
CPPM CoRes
Call Server
MC32S
Linux Applications
Digital LC IPSec
CPPM CoRes
ANALC
CPPM CS MGC
MGC
CallPilot
MC32S
CPPM CS MGC
MGC
CallPilot
MC32S
Linux
CPPM CS
MFC MG1000B Site
MGC
MC32S
Digital LC CPPM CoRes
Port CPPM CoRes Call Server
ANALC
Access Linux Applications
CPPM CS Restrictions MGC
MGC
• Supplicant
• IP Client or Device requiring
Access to the Network
• Authenticator
• Entry point where
Supplicant connects
(typically Layer 2/3 Device)
• Proxy between Supplicant
and Authentication Server
• Authentication Server
• Performs Authentication of
the Supplicant
Local Local
Application Security and OAM
Logs Logs
• Benefits of Enhancement
• Increase our chance of being authenticated by others by sending
the full certificate chain.
• Tighten up our security by improving the process to validate
certificates:
• Verifying that the certificate has not been revoked by checking of
Certificate Revocation List (CRL)
• Verifying that the FQDN and IP of the connection are consistent
• Three areas of sRTP implementation are changed by this feature:
• Method of best-effort sRTP negotiation
• Crypto keying materials used in SIP re-invites for call holding-and-
resuming
• Use of Master Key Identifier (MKI)
• Centralized Log for all Web-based admin activity - Initial phase is intended to
cover all CS1000 Linux WEB based management interfaces
• Consolidation of OAM Admin and Security Logs - New logs one for Admin
activity one for just security events. Consolidated at the system and network
levels
• Log forwarding mechanism – At the system and network level, a secure data
forwarding mechanism is planned to be introduced as part of log consolidation
• Secure log access control infrastructure – Both of the new logs will have
access restrictions tied to them, with the security event log having tighter
access controls.
• Common logging format and structure -
• Log content parsing utilities – The common logging will allow us to introduce
some utilities for searching and sorting through the OAM and Security data in
the log files.
• Improved 3rd party interoperation – The forwarding mechanism is intended to
introduce functionality that does not exist in the CS1000 today
• Nortel recommends that you use SSH whenever possible, and disable
insecure shells (rlogin, and telnet) on the Communication Server 1000
system, except as needed. Both Secure Shell and insecure shells are
enabled by default.
• If you must enable insecure shells, Nortel recommends using them
only when required, and using SSH whenever possible.
The following combinations of EAP methods and Authentication Servers are supported
EAP Method FreeRADIUS Funk Steel-Belted Microsoft IAS Cisco Secure ACS
Radius
EAP-MD5 X X X X
EAP-TLS X X X X
EAP-PEAPv0/MD5 X X
• Note that not all combinations of CA servers and Authentication Servers will work. For example, to
use Microsoft IAS with EAP-TLS, you must use the Microsoft CA Server for certificate
management.