CDP LLDP Security
CDP LLDP Security
CDP LLDP Security
Securing the various components in a Cisco Collaboration Solution is necessary for protecting the
integrity and confidentiality of voice and video calls.
This chapter presents security guidelines pertaining specifically to collaboration applications and the
voice and video network. For more information on data network security, refer to the Cisco SAFE
Blueprint documentation available at
http://www.cisco.com/en/US/netsol/ns744/networking_solutions_program_home.html
Following the guidelines in this chapter does not guarantee a secure environment, nor will it prevent all
penetration attacks on a network. You can achieve reasonable security by establishing a good security
policy, following that security policy, staying up-to-date on the latest developments in the hacker and
security communities, and maintaining and monitoring all systems with sound system administration
practices.
This chapter addresses centralized and distributed call processing, including clustering over the WAN
but not local failover mechanisms such as Survivable Remote Site Telephony (SRST). This chapter
assumes that all remote sites have a redundant link to the head-end or local call-processing backup in
case of head-end failure. The interaction between Network Address Translation (NAT) and IP Telephony,
for the most part, is not addressed here. This chapter also assumes that all networks are privately
addressed and do not contain overlapping IP addresses.
Table 4-1 New or Changed Information Since the Previous Release of This Document
General Security
This section covers general security features and practices that can be used to protect the voice data
within a network.
Security Policy
Cisco Systems recommends creating a security policy associated with every network technology
deployed within your enterprise. The security policy defines which data in your network is sensitive so
that it can be protected properly when transported throughout the network. Having this security policy
helps you define the security levels required for the types of data traffic that are on your network. Each
type of data may or may not require its own security policy.
If no security policy exists for data on the company network, you should create one before enabling any
of the security recommendations in this chapter. Without a security policy, it is difficult to ascertain
whether the security that is enabled in a network is doing what it is designed to accomplish. Without a
security policy, there is also no systematic way of enabling security for all the applications and types of
data that run in a network.
Note While it is important to adhere to the security guidelines and recommendations presented in this chapter,
they alone are not sufficient to constitute a security policy for your company. You must define a corporate
security policy before implementing any security technology.
This chapter details the features and functionality of a Cisco Systems network that are available to
protect the Unified Communications data on a network. It is up to the security policy to define which
data to protect, how much protection is needed for that type of data, and which security techniques to
use to provide that protection.
One of the more difficult issues with a security policy that includes voice and video traffic is combining
the security policies that usually exist for both the data network and the traditional voice network. Ensure
that all aspects of the integration of the media onto the network are secured at the correct level for your
security policy or corporate environment.
The basis of a good security policy is defining how important your data is within the network. Once you
have ranked the data according to its importance, you can decide how the security levels should be
established for each type of data. You can then achieve the correct level of security by using both the
network and application features.
In summary, you can use the following process to define a security policy:
• Define the data that is on the network.
• Define the importance of that data.
• Apply security based on the importance of the data.
Security in Layers
This chapter starts with hardening the IP phone endpoints in a Cisco Unified Communications Solution
and works its way through the network from the phone to the access switch, to the distribution layer, into
the core, and then into the data center. (See Figure 4-1.) Cisco recommends building layer upon layer of
security, starting at the access port into the network itself. This design approach gives a network architect
the ability to place the devices where it is both physically and logically easy to deploy Cisco Unified
Communications applications. But with this ease of deployment, the security complexity increases
because the devices can be placed anywhere in a network as long as they have connectivity.
Unified CM Cluster
M
M M
M M
Core
V
Distribution Si Si
Access
IP IP IP IP
148489
Secure Infrastructure
As the IP Telephony data crosses a network, that data is only as safe and secure as the devices that are
transporting the data. Depending on the security level that is defined in your security policy, the security
of the network devices might have to be improved or they might already be secure enough for the
transportation of IP Telephony traffic.
There are many best practices within a data network that, if used, will increase the entire security of your
network. For example, instead of using Telnet (which sends passwords in clear text) to connect to any of
the network devices, use Secure Shell (SSH, the secure form of Telnet) so that an attacker would not be
able to see a password in clear text.
Cisco Routers configured as gateways, Cisco Unified Border Element, and media resources can be
configured with Cisco IOS feature sets that provide the required media functionality but support only
Telnet and not Secure Shell (SSH). Cisco recommends that you use access control lists (ACLs) to control
who is permitted to connect to the routers using Telnet. It is more secure to connect to the gatekeeper
from a host that is in a secure segment of the network, because user names and passwords are sent over
Telnet in clear text.
You should also use firewalls, access control lists, authentication services, and other Cisco security tools
to help protect these devices from unauthorized access.
Physical Security
Just as a traditional PBX is usually locked in a secure environment, the IP network should be treated in
a similar way. Each of the devices that carries media traffic is really part of an IP PBX, and normal
general security practices should be used to control access to those devices. Once a user or attacker has
physical access to one of the devices in a network, all kinds of problems could occur. Even if you have
excellent password security and the user or attacker cannot get into the network device, that does not
mean that they cannot cause havoc in a network by simply unplugging the device and stopping all traffic.
For more information on general security practices, refer to the documentation at the following
locations:
• http://www.cisco.com/en/US/netsol/ns744/networking_solutions_program_home.html
• http://www.cisco.com/en/US/products/svcs/ps2961/ps2952/serv_group_home.html
IP Addressing
IP addressing can be critical for controlling the data that flows in and out of the logically separated IP
Telephony network. The more defined the IP addressing is within a network, the easier it becomes to
control the devices on the network.
As stated in other sections of this document (see Campus Access Layer, page 3-5), you should use IP
addressing based on RFC 1918. This method of addressing allows deployment of an IP Telephony
system into a network without redoing the IP addressing of the network. Using RFC 1918 also allows
for better control in the network because the IP addresses of the voice endpoints are well defined and
easy to understand. If the voice and video endpoints are all addressed within a 10.x.x.x. network, access
control lists (ACLs) and tracking of data to and from those devices are simplified.
If you have a well defined IP addressing plan for your voice deployments, it becomes easier to write
ACLs for controlling the IP Telephony traffic and it also helps with firewall deployments.
Using RFC 1918 enables you easily to deploy one VLAN per switch, which is a best practice for campus
design, and also enables you to keep the Voice VLAN free of any Spanning Tree Protocol (STP) loops.
If deployed correctly, route summarization could help to keep the routing table about the same as before
the voice and video deployment, or just slightly larger.
IPv6 Addressing
The introduction of IPv6 addressing has extended the network address space and increased the options
for privacy and security of endpoints. Though both IPv4 and IPv6 have similar security concerns, IPv6
provides some advantages. For example, one of the major benefits with IPv6 is the enormous size of the
subnets, which discourages automated scanning and reconnaissance attacks.
For a comparison of IPv6 and IPv4 in terms of security, refer to the IPv6 and IPv4 Threat Comparison
and Best-Practice Evaluation, available at:
http://www.cisco.com/web/about/security/security_services/ciag/documents/v6-v4-threats.pdf
When considering IPv6 as your IP addressing method, adhere to the best practices documented in the
following campus and branch office design guides:
• Deploying IPv6 in Campus Networks
http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/CampIPv6.html
• Deploying IPv6 in Branch Networks
http://www.cisco.com/en/US/docs/solutions/Enterprise/Branch/BrchIPv6.html
Access Security
This section covers security features at the Access level that can be used to protect the voice and data
within a network.
There is a possibility that information could be gathered from the CDP messaging that would normally
go to the phone, and that information could be used to discover some of the network. Not all devices that
can be used for voice or video with Unified CM are able to use CDP to assist in discovering the voice
VLAN.
Third-party endpoints do not support Cisco Discovery Protocol (CDP) or 802.1Q VLAN ID tagging. To
allow device discovery when third-party devices are involved, use the Link Layer Discovery Protocol
(LLDP). LLDP for Media Endpoint Devices (LLDP-MED) is an extension to LLDP that enhances
support for voice endpoints. LLDP-MED defines how a switch port transitions from LLDP to
LLDP-MED if it detects an LLDP-MED-capable endpoint. Support for both LLDP and LLDP-MED on
IP phones and LAN switches depends on the firmware and device models. To determine if LLDP-MED
is supported on particular phone or switch models, check the specific product release notes or bulletins
available at:
• http://www.cisco.com/en/US/products/hw/phones/ps379/prod_release_notes_list.html
• http://www.cisco.com/en/US/products/sw/iosswrel/ps5012/prod_bulletins_list.html
Note If an IP phone with LLDP-MED capability is connected to a Cisco Catalyst switch running an earlier
Cisco IOS release that does not support LLDP, the switch might indicate that an extra device has been
connected to the switch port. This can happen if the Cisco Catalyst switch is using Port Security to count
the number of devices connected. The appearance of an LLDP packet might cause the port count to
increase and cause the switch to disable the port. Verify that your Cisco Catalyst switch supports LLDP,
or increase the port count to a minimum of three, before deploying Cisco IP Phones with firmware that
supports LLDP-MED Link Layer protocol.
H.323 clients, Multipoint Control Units (MCUs), and gateways communicate with Unified CM using the
H.323 protocol. Unified CM H.323 trunks (such as H.225 and intercluster trunk variants as well as the
RASAggregator trunk type) use a random port range rather than the well-known TCP port 1720.
Therefore, you must permit a wide range of TCP ports between these devices and the Unified CM
servers. For port usage details, refer to the latest version of the Cisco Unified Communications Manager
TCP and UDP Port Usage guide, available at:
http://www.cisco.com/en/US/products/sw/voicesw/ps556/prod_maintenance_guides_list.html
MCUs and gateways are considered infrastructure devices, and they typically reside within the
datacenter adjacent to the Unified CM servers. H.323 clients, on the other hand, typically reside in the
data VLAN.
Cisco TelePresence MCUs configured to run in SCCP mode communicate with the TFTP server(s) to
download their configuration, with the Unified CM servers for signaling, and with other endpoints for
RTP media traffic. Therefore, TFTP must be permitted between the MCU and the TFTP server(s), TCP
port 2000 must be permitted between the MCUs and the Unified CM server(s), and UDP ports for RTP
media must be permitted between the MCUs and the voice, data, and gateway VLANs.
Switch Port
There are many security features within a Cisco switch infrastructure that can be used to secure a data
network. This section describes some of the features that can be used in Cisco Access Switches to protect
the IP Telephony data within a network. (See Figure 4-2.) This section does not cover all of the security
features available for all of the current Cisco switches, but it does list the most common security features
used across many of the switches that Cisco manufactures. For additional information on the security
features available on the particular Cisco gear deployed within your network, refer to the appropriate
product documentation available at
http://www.cisco.com
Figure 4-2 A Typical Access Layer Design to Which the Phones Attach
Access
IP IP IP IP
148493
Port Security: MAC CAM Flooding
A classic attack on a switched network is a MAC content-addressable memory (CAM) flooding attack.
This type of attack floods the switch with so many MAC addresses that the switch does not know which
port an end station or device is attached to. When the switch does not know which port a device is
attached to, it broadcasts the traffic destined for that device to the entire VLAN. In this way, the attacker
is able to see all traffic that is coming to all the users in a VLAN.
To disallow malicious MAC flooding attacks from hacker tools such as macof, limit the number of MAC
addresses allowed to access individual ports based on the connectivity requirements for those ports.
Malicious end-user stations can use macof to originate MAC flooding from random-source to
random-destination MAC addresses, both directly connected to the switch port or through the IP phone.
The macof tool is very aggressive and typically can fill a Cisco Catalyst switch content-addressable
memory (CAM) table in less than ten seconds. The flooding of subsequent packets that remain unlearned
because the CAM table is filled, is as disruptive and unsecure as packets on a shared Ethernet hub for
the VLAN that is being attacked.
Either port security or dynamic port security can be used to inhibit a MAC flooding attack. A customer
with no requirement to use port security as an authorization mechanism would want to use dynamic port
security with the number of MAC addresses appropriate to the function attached to a particular port. For
example, a port with only a workstation attached to it would want to limit the number of learned MAC
addresses to one. A port with a Cisco Unified IP Phone and a workstation behind it would want to set
the number of learned MAC addresses to two (one for the IP phone itself and one for the workstation
behind the phone) if a workstation is going to plug into the PC port on the phone. This setting in the past
has been three MAC addresses, used with the older way of configuring the port in trunk mode. If you
use the multi-VLAN access mode of configuration for the phone port, this setting will be two MAC
addresses, one for the phone and one for the PC plugged into the phone. If there will be no workstation
on the PC port, then the number of MAC addresses on that port should be set to one. These configurations
are for a multi-VLAN access port on a switch. The configuration could be different if the port is set to
trunk mode (not the recommended deployment of an access port with a phone and PC).
Note The Gratuitous ARP feature does not apply to devices configured using IPv6 addressing. IPv6 uses
neighbor discovery (ND) and not ARP.
The downstream signaling and RTP voice streams coming from another phone or coming across the
network are not protected by this feature in the phone. Only the data coming from the phone that has this
feature enabled is protected. (See Figure 4-3.)
If the default gateway is running Hot Standby Router Protocol (HSRP), if the HSRP configuration uses
the burned-in MAC address rather than the virtual MAC address for the default gateway, and if the
primary router fails-over to a secondary router that has a new MAC address, the phones could maintain
the old MAC address of the default gateway. This scenario could cause an outage for up to 40 minutes.
Always use the virtual MAC address in an HSRP environment to avoid this potential problem.
Figure 4-3 Gratuitous ARP Protects the Phone that Has It but Not Other Traffic
IP
As shown in Figure 4-3, the traffic from the phone that has Gratuitous ARP is protected, but the attacker
could still see the traffic coming from another endpoint because that endpoint might not have the ability
to protect the data flow.
Figure 4-4 Limited Number of MAC Addresses Prevents Rogue Network Extensions
If the number of MAC addresses is not defined correctly, there is a possibility of denying access to the
network or error-disabling the port and removing all devices from the network.
IP
However, an attacker can request not just a single IP address but all of the IP addresses that are available
within a VLAN. (See Figure 4-6.) This means that there would be no addresses for a legitimate device
trying to get on the network, and without an IP address the phone cannot connect to Unified CM.
Figure 4-6 An Attacker Can Take All Available IP Addresses on the VLAN
DHCP
Client Server
Denial of Service
Gobbler
148895
DHCP Ack (Unicast) x (Size of Scope)
Untrusted Trusted
OK DHCP
Untrusted responses:
Rogue server offer, ack, nak
Bad DHCP
148495
responses:
offer, ack, nak
DHCP Snooping prevents any single device from capturing all the IP addresses in any given scope, but
incorrect configurations of this feature can deny IP addresses to approved users.
Dynamic ARP Inspection (DAI) is used to inspect all ARP requests and replies (gratuitous or
non-gratuitous) coming from untrusted (or user-facing) ports to ensure that they belong to the ARP
owner. The ARP owner is the port that has a DHCP binding which matches the IP address contained in
the ARP reply. ARP packets from a DAI trusted port are not inspected and are bridged to their respective
VLANs.
Using DAI
Dynamic ARP Inspection (DAI) requires that a DHCP binding be present to legitimize ARP responses
or Gratuitous ARP messages. If a host does not use DHCP to obtain its address, it must either be trusted
or an ARP inspection access control list (ACL) must be created to map the host's IP and MAC address.
(See Figure 4-8.) Like DHCP Snooping, DAI is enabled per VLAN, with all ports defined as untrusted
by default. To leverage the binding information from DHCP Snooping, DAI requires that DHCP
Snooping be enabled on the VLAN prior to enabling DAI. If DHCP Snooping is not enabled before you
enable DAI, none of the devices in that VLAN will be able to use ARP to connect to any other device in
their VLAN, including the default gateway. The result will be a self-imposed denial of service to any
device in that VLAN.
Figure 4-8 Using DHCP Snooping and DAI to Block ARP Attacks
10.1.1.1
MAC A
None matching
ARP 10.1.1.1 ARPs in the
bit bucket DHCP snooping enabled;
saying Dynamic ARP Inspection
10.1.1.2 is MAC C enabled
10.1.1.2
10.1.1.3
MAC B
MAC C ARP 10.1.1.2
saying
10.1.1.1 is MAC C
148496
Because of the importance of the DHCP Snooping binding table to the use of DAI, it is important to back
up the binding table. The DHCP Snooping binding table can be backed up to bootflash, File Transfer
Protocol (FTP), Remote Copy Protocol (RCP), slot0, and Trivial File Transfer Protocol (TFTP). If the
DHCP Snooping binding table is not backed up, the Cisco Unified IP Phones could lose contact with the
default gateway during a switch reboot. For example, assume that the DHCP Snooping binding table is
not backed up and that you are using Cisco Unified IP Phones with a power adapter instead of line
power. When the switch comes back up after a reboot, there will be no DHCP Snooping binding table
entry for the phone, and the phone will not be able to communicate with the default gateway unless the
DHCP Snooping binding table is backed up and loads the old information before traffic starts to flow
from the phone.
Incorrect configurations of this feature can deny network access to approved users. If a device has no
entry in the DHCP Snooping binding table, then that device will not be able to use ARP to connect to
the default gateway and therefore will not be able to send traffic. If you use static IP addresses, those
addresses will have to be entered manually into the DHCP Snooping binding table. If you have devices
that do not use DHCP again to obtain their IP addresses when a link goes down (some UNIX or Linux
machines behave this way), then you must back up the DHCP Snooping binding table.
Note Cisco recommends authenticating the IP phone before the attached data device is authenticated.
The multiple-authentication mode assigns authenticated devices to either a data or voice VLAN,
depending on the attributes received from the authentication server when access is approved. The 802.1X
port is divided into a data domain and a voice domain.
In multiple-authentication mode, a guest VLAN can be enabled on the 802.1x port. The switch assigns
end clients to a guest VLAN when the authentication server does not receive a response to its EAPOL
identity frame or when EAPOL packets are not sent by the client. This allows data devices attached to a
Cisco IP Phone, that do not support 802.1X, to be connected to the network.
A voice VLAN must be configured for the IP phone when the switch port is in a multiple-host mode.
The RADIUS server must be configured to send a Cisco Attribute-Value (AV) pair attribute with a value
of device-traffic-class=voice. Without this value, the switch treats the IP phone as a data device.
Dynamic VLAN assignment from a RADIUS server is supported only for data devices.
When a data or a voice device is detected on a port, its MAC address is blocked until authorization
succeeds. If the authorization fails, the MAC address remains blocked for 5 minutes.
When the 802.1x authentication is enabled on an access port on which a voice VLAN is configured and
to which a Cisco IP Phone is already connected, the phone loses connectivity to the switch for up to
30 seconds.
Most Cisco IP Phones support authentication by means of X.509 certificates using the EAP-Transport
Layer Security (EAP-TLS) or EAP-Flexible Authentication with Secure Tunneling (EAP-FAST)
methods of authentication. Some of the older models that do not support either method can be
authenticated using MAC Authentication Bypass (MAB), which enables a Cisco Catalyst Switch to
check the MAC address of the connecting device as the method of authentication.
To determine support for the 802.1X feature configuration, refer to the product guides for the Cisco
Unified IP Phones and the Cisco Catalyst Switches, available at http://www.cisco.com.
For configuration information, refer to the IP Telephony for 802.1x Design Guide, available at
http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/TrustSec_1.99/IP_Tele/IP_Teleph
ony_DIG.html
Endpoint Security
Cisco Unified IP Phones contain built-in features to increase security on an IP Telephony network.
These features can be enabled or disabled on a phone-by-phone basis to increase the security of an IP
Telephony deployment. Depending on the placement of the phones, a security policy will help determine
if these features need to be enabled and where they should be enabled. (See Figure 4-9.)
Access
IP IP IP IP
148490
The following security considerations apply to IP phones:
• PC Port on the Phone, page 4-16
• PC Voice VLAN Access, page 4-17
• Web Access Through the Phone, page 4-18
• Settings Access, page 4-18
• Authentication and Encryption, page 4-19
• VPN Client for IP Phones, page 4-21
Before attempting to configure the security features on a phone, check the documentation at the
following link to make sure the features are available on that particular phone model:
http://www.cisco.com/en/US/products/sw/voicesw/index.html
Unified Communications Manager (Unified CM) can disable the PC port on the back of the phone.
Before attempting to enable this feature, check the documentation at the following link to verify that this
features is supported on your particular model of Cisco Unified IP Phone:
http://www.cisco.com/en/US/products/hw/phones/ps379/tsd_products_support_series_home.html
Figure 4-10 Blocking Traffic to the Voice VLAN from the Phone PC Port
PC sends data
tagged with 802.1q
as Voice VLAN 20 or
the PC sends any data
tagged with 802.1q,
and it is dropped.
IP
148893
Data VLAN 10
Voice VLAN 20
Settings Access
Each Cisco Unified IP Phone has a network settings page that lists many of the network elements and
detailed information that is needed for the phone to operate. This information could be used by an
attacker to start a reconnaissance on the network with some of the information that is displayed on the
phone's web page. For example, an attacker could look at the settings page to determine the default
gateway, the TFTP server, and the Unified CM IP address. Each of these pieces of information could be
used to gain access to the voice network or to attack a device in the voice network.
This access can be disabled on individual phones or by using bulk management to prevent end users or
attackers from obtaining the additional information such as Unified CM IP address and TFTP server
information. With access to the phone settings page disabled, end users lose the ability to change many
of the settings on the phone that they would normally be able to control, such as speaker volume,
contrast, and ring type. It might not be practical to use this security feature because of the limitations it
places on end users with respect to the phone interface. The settings access can also be set as restricted,
which prevents access to network configuration information but allows users to configure volume, ring
tones, and so forth.
For more information on the phone settings page, refer to the latest version of the Cisco Unified
Communications Manager Administration Guide, available at
http://www.cisco.com/en/US/products/sw/voicesw/ps556/prod_maintenance_guides_list.html
SRTP uses Advanced Encryption Standards (AES) with a 128-bit encryption key as the encryption
cipher. It also uses Hash-based Message Authentication Code Secure Hash Algorithm-1 (HMAC-SHA1)
as the authentication method.
Application layer protocol inspection and Application Layer Gateways (ALGs) that allow IP Telephony
traffic to traverse firewalls and Network Address Translation (NAT) also do not work with signaling
encryption. Not all gateways, phones, or conference are supported with encrypted media.
Encrypting media makes recording and monitoring of calls more difficult and expensive. It also makes
troubleshooting VoIP problems more challenging.
Quality of Service
Quality of Service (QoS) is a vital part of any security policy for an enterprise network. Even though
most people think of QoS as setting the priority of traffic in a network, it also controls the amount of
data that is allowed into the network. In the case of Cisco switches, that control point is at the port level
when the data comes from the phone to the Ethernet switch. The more control applied at the edge of the
network at the access port, the fewer problems will be encountered as the data aggregates in the network.
QoS can be used to control not only the priority of the traffic in the network but also the amount of traffic
that can travel through any specific interface. Cisco Smartports templates have been created to assist in
deploying voice QoS in a network at the access port level.
A rigorous QoS policy can control and prevent denial-of-service attacks in the network by throttling
traffic rates.
As mentioned previously in the lobby phone example, Cisco recommends that you provide enough flow
control of the traffic at the access port level to prevent any attacker from launching a denial-of-service
(DoS) attack from that port in the lobby. The configuration for that example was not as aggressive as it
could be because the QoS configuration allowed traffic sent to the port to exceed the maximum rate, but
the traffic was remarked to the level of scavenger class. Given a more aggressive QoS policy, any amount
of traffic that exceeded that maximum limit of the policy could just be dropped at the port, and that
"unknown" traffic would never make it into the network. QoS should be enabled across the entire
network to give the IP Telephony data high priority from end to end.
For more information on QoS, refer to the chapter on Network Infrastructure, page 3-1, and the
Enterprise QoS Solution Reference Network Design (SRND) Guide available at
http://www.cisco.com/go/designzone
Distribution Si Si M M
M M
Unified CM Cluster
Access
IP IP IP IP
148498
There are many types of ACLs that can be deployed at Layer 3. For descriptions and examples of the
most common types, refer to Configuring Commonly Used IP ACLs, available (with Cisco partner login
required) at
http://cisco.com/en/US/partner/tech/tk648/tk361/technologies_configuration_example09186a0080
100548.shtml
Depending on your security policy, the Layer 3 ACLs can be as simple as not allowing IP traffic from
the non-voice VLANS to access the voice gateway in the network, or the ACLs can be detailed enough
to control the individual ports and the time of the day that are used by other devices to communicate to
IP Telephony devices. As the ACLs become more granular and detailed, any changes in port usage in a
network could break not only voice but also other applications in the network.
If there are software phones in the network, if web access to the phone is allowed, or if you use the
Attendant Console or other applications that need access to the voice VLAN subnets, the ACLs are much
more difficult to deploy and control.
For IP phones restricted to specific subnets and limited to a voice VLAN, ACLs can be written to block
all traffic (by IP address or IP range) to Unified CMs, voice gateways, phones, and any other voice
application that is being used for voice-only services. This method simplifies the ACLs at Layer 3
compared to the ACLs at Layer 2 or VLAN ACLs.
Firewalls
Firewalls can be used in conjunction with ACLs to protect the voice servers and the voice gateways from
devices that are not allowed to communicate with IP Telephony devices. Because of the dynamic nature
of the ports used by IP Telephony, having a firewall does help to control opening up a large range of ports
needed for IP Telephony communications. Given the complexities that firewalls introduce into a network
design, you must take care in placing and configuring the firewalls and the devices around the firewalls
to allow the traffic that is considered correct to pass while blocking the traffic that needs to be blocked.
IP Telephony networks have unique data flows. The phones use a client/server model for signaling for
call setup, and Unified CM controls the phones through that signaling. The data flows for the IP
Telephony RTP streams are more like a peer-to-peer network, and the phones or gateways talk directly
to each other via the RTP streams. If the signaling flows do not go through the firewall so that the firewall
can inspect the signaling traffic, the RTP streams could be blocked because the firewall will not know
which ports need to be opened to allow the RTP streams for a conversation.
A firewall placed in a correctly designed network can force all the data through that device, so capacities
and performance need to be taken into account. Performance includes the amount of latency, which can
be increased by a firewall if the firewall is under high load or even under attack. The general rule in an
IP Telephony deployment is to keep the CPU usage of the firewalls to less than 60% for normal usage.
If the CPU runs over 60%, it increases the chance of impacting IP phones, call setup, and registration.
If the CPU usage stays at a sustained level above 60%, the registered IP phones will be affected, quality
of calls in progress will degrade, and call setup for new calls will suffer. In the worst case, if the sustained
CPU usage stays above 60%, phones will start to unregister. When this happens, they will attempt to
re-register with Unified CM, thus increasing the load on the firewalls even more. If this were to happen,
the effect would be a rolling blackout of phones unregistering and attempting to re-register with
Unified CM. Until the CPU usage of the firewall decreases to under 60% sustained load, this rolling
blackout would continue and most (if not all) of the phones would be affected. If you are currently using
a Cisco firewall in your network, you should monitor the CPU usage carefully when adding IP Telephony
traffic to your network so that you do not adversely affect that traffic.
There are many ways to deploy firewalls. This section concentrates on the Cisco Adaptive Security
Appliance (ASA) in the active/standby mode in both routed and transparent scenarios. Each of the
configurations in this section is in single-context mode within the voice sections of the firewall
configurations.
All of the Cisco firewalls can run in either multiple-context or single-context mode. In single-context
mode, the firewall is a single firewall that controls all traffic flowing through it. In multiple-context
mode, the firewalls can be turned into many virtual firewalls. Each of these contexts or virtual firewalls
have their own configurations and can be controlled by different groups or administrators. Each time a
new context is added to a firewall, it will increase the load and memory requirements on that firewall.
When you deploy a new context, make sure that the CPU requirements are met so that voice RTP streams
are not adversely affected.
Adaptive Security Appliances have limited support for application inspection of IPv6 traffic for Unified
Communications application servers and endpoints. Cisco recommends not using IPv6 for Unified
Communications if ASAs are deployed in your network.
Note An ASA with No Payload Encryption model disables Unified Communications features.
A firewall provides a security control point in the network for applications that run over the network. A
firewall also provides dynamic opening of ports for IP Telephony conversations if that traffic is running
through the firewall.
Using its application inspection capability, the firewall can inspect the traffic that runs though it to
determine if that traffic is really the type of traffic that the firewall is expecting. For example, does the
HTTP traffic really look like HTTP traffic, or is it an attack? If it is an attack, then the firewall drops that
packet and does not allow it to get to the HTTP server behind the firewall.
Not all IP Telephony application servers or applications are supported with firewall application layer
protocol inspection. Some of these applications include Cisco Unity voicemail servers, Cisco Unified
Attendant Console, Cisco Unified Contact Center Enterprise, and Cisco Unified Contact Center Express.
ACLs can be written for these applications to allow traffic to flow through a firewall.
Note The timers for failover on the firewalls are set quite high by default. To keep from affecting voice RTP
streams as they go through the firewall if there is a failover, Cisco recommends reducing those timer
settings to less than one second. If this is done, and if there is a failover, the amount of time that the RTP
streams could be affected will be less because the firewalls will fail-over quicker and there will be less
impact on the RTP streams during the failover time.
When firewalls are placed between different Unified Communications components, the application
inspection must be enabled for all protocols used for communications between the components.
Application inspection can fail in call flow scenarios used by features such as Silent Monitoring by
Unified Communications Manager, when the firewall is between the remote agent phones and the
supervisor phones.
Unified Communications devices using TCP, such as Cisco Unified Communications Manager, support
the TCP SACK option to speed up data transfer in case of packet loss. But not all firewalls support the
TCP SACK option. In that case, TCP sessions established between Unified Communications devices
through such a firewall will encounter problems if they attempt to use the TCP SACK option, and the
TCP session might fail. Therefore, the firewalls should provide full support for the TCP SACK option.
If support is not available, then the firewalls should be able to modify the TCP packets during the
three-way handshake and to disable TCP SACK option support so that the endpoints will not attempt to
use this option.
To determine if the applications running on your network are supported with the version of firewall in
the network or if ACLs have to be written, refer to the appropriate application documentation available at
http://www.cisco.com
Routed ASA
The ASA firewall in routed mode acts as a router between connected networks, and each interface
requires an IP address on a different subnet. In single-context mode, the routed firewall supports Open
Shortest Path First (OSPF) and Routing Information Protocol (RIP) in passive mode. Multiple-context
mode supports static routes only. ASA version 8.x also supports Enhanced Interior Gateway Routing
Protocol (EIGRP). Cisco recommends using the advanced routing capabilities of the upstream and
downstream routers instead of relying on the security appliance for extensive routing needs. For more
information on the routed mode, refer to the Cisco Security Appliance Command Line Configuration
Guide, available at
http://www.cisco.com/en/US/products/ps6120/products_installation_and_configuration_guides_lis
t.html
The routed ASA firewall supports QoS, NAT, and VPN termination to the box, which are not supported
in the transparent mode (see Transparent ASA, page 4-26). With the routed configuration, each interface
on the ASA would have an IP address. In the transparent mode, there would be no IP address on the
interfaces other then the IP address to manage the ASA remotely.
The limitations of this mode, when compared to the transparent mode, are that the device can be seen in
the network and, because of that, it can be a point of attack. In addition, placing a routed ASA firewall
in a network changes the network routing because some of the routing can be done by the firewall. IP
addresses must also be available for all the interfaces on the firewall that are going to be use, so changing
the IP addresses of the routers in the network might also be required. If a routing protocol or RSVP is to
be allowed through the ASA firewall, then an ACL will have to be put on the inside (or most trusted)
interface to allow that traffic to pass to the outside (or lesser trusted) interfaces. That ACL must also
define all other traffic that will be allowed out of the most trusted interface.
Transparent ASA
The ASA firewall can be configured to be a Layer 2 firewall (also known as "bump in the wire" or
"stealth firewall"). In this configuration, the firewall does not have an IP address (other than for
management purposes), and all of the transactions are done at Layer 2 of the network. Even though the
firewall acts as a bridge, Layer 3 traffic cannot pass through the security appliance unless you explicitly
permit it with an extended access list. The only traffic allowed without an access list is Address
Resolution Protocol (ARP) traffic.
This configuration has the advantage that an attacker cannot see the firewall because it is not doing any
dynamic routing. Static routing is required to make the firewall work even in transparent mode.
This configuration also makes it easier to place the firewall into an existing network because routing does
not have to change for the firewall. It also makes the firewall easier to manage and debug because it is
not doing any routing within the firewall. Because the firewall is not processing routing requests, the
performance of the firewall is usually somewhat higher with inspect commands and overall traffic than
the same firewall model and software that is doing routing.
With transparent mode, if you are going to pass data for routing, you will also have to define the ACLs
both inside and outside the firewall to allow traffic, unlike with the same firewall in routed mode. Cisco
Discovery Protocol (CDP) traffic will not pass through the device even if it is defined. Each directly
connected network must be on the same subnet. You cannot share interfaces between contexts; if you
plan on running multiple-context mode, you will have to use additional interfaces. You must define all
non-IP traffic, such as routing protocols, with an ACL to allow that traffic through the firewall. QoS is
not supported in transparent mode. Multicast traffic can be allowed to go through the firewall with an
extended ACL, but it is not a multicast device. In transparent mode, the firewall does not support VPN
termination other than for the management interface.
If a routing protocol or RSVP is to be allowed through the ASA firewall, then an ACL will have to be
put on the inside (or most trusted) interface to allow that traffic to pass to the outside (or lesser trusted)
interfaces. That ACL must also define all other traffic that will be allowed out of the most trusted
interface.
For more information on the transparent mode, refer to the Cisco Security Appliance Command Line
Configuration Guide, available at
http://www.cisco.com/en/US/products/ps6120/products_installation_and_configuration_guides_lis
t.html
Note Using NAT in transparent mode requires ASA version 8.0(2) or later. For more information, refer to the
Cisco ASA 5500 Series Release Notes at
http://www.cisco.com/en/US/docs/security/asa/asa80/release/notes/asarn80.html.
and apply SIP ALG processing. The ASA will convert the SIP/TLS traffic to TCP going toward
Unified CM if Unified CM is not secure, or it will connect through TLS if Unified CM is secure. The
following deployment models apply to the IME-enabled ASA:
• Basic (Inline)
• Offpath
Basic Deployment
In a basic (inline) deployment, the Internet ASA is configured with the IME feature, and all
Internet-bound traffic from the Unified CM cluster will naturally traverse this IME-enabled ASA. As
shown in Figure 4-12, the IME-enabled ASA resides on the edge of the enterprise and proxies all
IME-related SIP trunk signaling and audio/video RTP media to remote enterprises.
Figure 4-12 Intercompany Media Engine ASA Basic (Inline) Deployment Model
IME-enabled
ASA
IP
SIP Signaling
SIP Signaling over TLS
RTP Traffic
253845
sRTP Traffic
Offpath Deployment
In deployments where there are existing firewalls in the enterprise network, it might not be possible to
replace or upgrade the existing firewall to support the IME feature or to change the existing security
architecture by adding an IME-enabled ASA inline with the Internet firewall. In this scenario, the ASA
can be implemented in an offpath model for IME. Offpath is the recommended deployment method.
In an offpath deployment, inbound and outbound IME calls pass through an IME-enabled ASA that is
located in the DMZ, as illustrated in figure 4-20. Unified CM is configured to direct all SIP signaling to
the IME-enabled ASA. All other Internet-bound traffic does not flow through the IME-enabled ASA.
IME-enabled
ASA
Internal External
IP
Firewall Firewall
SIP Signaling
SIP Signaling over TLS
253846
RTP Traffic
sRTP Traffic
Inbound IME calls from remote enterprises are addressed to the outside interface of the IME-enabled
ASA, which utilizes static NAT or PAT to create a mapping to each Unified CM node on the inside. This
behavior is the same for both deployment options. For outbound IME calls, offpath deployment requires
that Unified CM send calls directly to the offpath IME-enabled ASA. This is accomplished via a
mapping service protocol. Unified CM sends a mapping service request for the IME-enabled ASA to
provide an internal IP address and port number to be used as the destination IP address and port number
of the remote destination in the IME learned route. Unified CM then addresses the SIP Invite for this
IME call to this internal IP address, which will guarantee the packet is forwarded to the IME-enabled
ASA. Once the packet is received by the IME-enabled ASA, it then forwards the calls to the external IP
address of the called party.
Cisco recommends starting with the default fallback sensitivity level and making revisions after
determining how many calls are in fact falling back to PSTN connectivity. For more details regarding
the IME solution and ASA configuration, refer to the Cisco Intercompany Media Engine Proxy
information in the Cisco ASA 5500 Series Configuration Guide using the CLI, available at
http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/config.html
Design Considerations
The IME-enabled ASA requires at least two external (global) IP addresses, one for SIP signaling and one
for media termination if PAT is used for incoming calls from remote enterprises. If NAT is implemented,
more may be required. The external IP address on the IME-enabled ASA for SIP signaling is what is
advertised in IME learned routes.
The IME-enabled ASA also requires at least two internal IP addresses, one for SIP signaling and one for
media termination. PAT is used for incoming IME calls from Unified CM.
Note Although the IME-enabled ASA interfaces are referred to as external and internal, if the ASA is
deployed in a DMZ, both interfaces may be on subnets that exist within the DMZ. At a minimum, the
external interface subnet needs to be accessible from the Internet, and the internal interface subnet must
be accessible from the intranet.
For any non-IME firewalls in the network that separate two components of the solution, it is imperative
to open the proper pinholes to allow IME communications between the following components:
• IME server and Unified CM
• IME server and GoDaddy Enrollment Server
• IME server and the peer-to-peer IME server network (Distributed Cache Ring)
• IME-enabled ASA (internal) and Unified CM
• IME-enabled ASA (internal) and IME internal endpoints (media)
• IME-enabled ASA (external) and remote enterprise IME-enabled ASA
For a complete list of ports for the IME solution components, refer to the Cisco Intercompany Media
Engine Installation and Configuration Guide, available at
http://cisco.com/en/US/products/sw/voicesw/ps556/prod_maintenance_guides_list.html
If there is an intranet firewall between the IME-enabled ASA and the Unified CM that is performing
NAT, the following conditions must be met:
• This intranet firewall must be a Cisco ASA capable of SIP ALG functionality to allow the proper
fixup of incoming and outgoing SIP messaging.
• There must be a static NAT entry to translate Unified CM's real IP address to an address reachable
by the IME-enabled ASA.
The Cisco IME-enabled ASA typically has a default route for reaching Internet subnets. It also requires
IP routes to all potential subnets containing internal endpoints. This includes data subnets that may
include Cisco Unified Video Advantage cameras.
The IME solution requires its own Certificate Authority for validating ASA certificates used for
establishing SIP/TLS connections. The IME-enabled ASA must verify SIP SSL certificates against this
Certificate Authority (CA).
Note GoDaddy.com is the only authorized certificate provider for establishing secure SIP TLS connections
with remote enterprises.
High Availability
IME-enabled ASAs can be deployed in an active/standby failover mode to provide stateless failover of
IME communications. If an outage occurs, all calls being established, as well as existing calls, will be
lost. Stateful failover is not supported.
With the offpath deployment method, Unified CM is capable of configuring multiple IME Services (sets
of enrolled and excluded DIDs), each with its own IME firewall. This can add further resiliency to the
solution.
With the offpath model, each IME Service (set of enrolled and excluded DIDs) configured in
Unified CM is associated with an IME-enabled ASA. Multiple IME Services can exist in Unified CM,
allowing an administrator to spread the load across multiple IME-enabled ASAs, thus increasing overall
capacity.
Note The ASA Phone Proxy and TLS Proxy features are not compatible with Cisco Unified CM 9.x.
A NAT ALG is similar to a firewall ALG, but a NAT ALG actually changes (maps) the addresses and
ports in the signaling messages. The NAT ALG cannot inspect the contents of encrypted signaling
messages.
Data Center
Within the data center, the security policy should define what security is needed for the IP Telephony
applications servers. Because the Cisco Unified Communications servers are based on IP, the security
that you would put on any other time-sensitive data within a data center could be applied to those servers
as well.
If clustering over the WAN is being used between data centers, any additional security that is applied
both within and between those data centers has to fit within the maximum round-trip time that is allowed
between nodes in a cluster. In a multisite or redundant data center implementation that uses clustering
over the WAN, if your current security policy for application servers requires securing the traffic
between servers across data center firewalls, then Cisco recommends using IPSec tunnels for this traffic
between the infrastructure security systems already deployed.
To design appropriate data center security for your data applications, Cisco recommends following the
guidelines presented in the Data Center Networking: Server Farm Security SRND (Server Farm Security
in the Business Ready Data Center Architecture), available at
http://www.cisco.com/go/designzone
Figure 4-14 Securing Gateways and Media Resources with IPSec, ACLs, and QoS
ACLs
Core
V
Distribution Si Si
Access
IP IP IP IP
148499
Some gateways and media resources support Secure RTP (SRTP) to the gateways and media resources
from the phones, if the phone is enabled for SRTP. To determine if a gateway or media resource supports
SRTP, refer to the appropriate product documentation at:
http://www.cisco.com
For more information on IPSec tunnels, refer to the Site-to-Site IPSec VPN Solution Reference Network
Design (SRND), available at:
http://www.cisco.com/go/designzone
M
IP
M M
M M
PSTN
IP V
148896
Signaling
Media
The second way to deploy the gateway is outside the firewall. Because the only type of data that is ever
sent to the gateway from the phones is RTP streams, the access switch's QoS features control the amount
of RTP traffic that can be sent to that gateway. The only thing that Unified CM sends to the gateway is
the signaling to set up the call. If the gateway is put in an area of the network that is trusted, the only
communication that has to be allowed between Unified CM and the gateway is that signaling. (See
Figure 4-15.) This method of deployment decreases the load on the firewall because the RTP streams are
not going through the firewall.
Unlike an ACL, most firewall configurations will open only the RTP stream port that Unified CM has
told the phone and the gateway to use between those two devices as long as the signaling goes through
the firewall. The firewall also has additional features for DoS attacks and Cisco Intrusion Prevention
System (IPS) signatures to look at interesting traffic and determine if any attackers are doing something
they should not be doing.
As stated in the section on Firewalls, page 4-23, when a firewall is looking at all the signaling and RTP
streams from phones to a gateway, capacity could be an issue. Also, if data other than voice data is
running through the firewall, CPU usage must be monitored to make sure that the firewall does not affect
the calls that are running through the firewall.
SAF Service
Unified CM employs the Cisco Service Advertisement Framework (SAF) network service for its Call
Control Discovery (CCD) feature (see Service Advertisement Framework (SAF), page 3-69). This
capability uses a SIP trunk or a non-gatekeeper controlled H.323 trunk associated with the Call Control
Discovery advertising service. The service advertises the call negotiation information for these trunks,
including the dynamic port number for the H.323 trunk, the standard port 5060 for the SIP trunk, and the
SIP route header information.
The Adaptive Security Appliances do not have application inspection for the SAF network service.
When Unified CM uses a SAF-enabled H.323 trunk to place a call, the ASA cannot inspect the SAF
packet to learn the ephemeral port number used in the H.225 signalling. Therefore, in scenarios where
call traffic from SAF-enabled H.323 trunks traverses the ASAs, ACLs must be configured on the ASAs
to allow this signaling traffic. The ACL configuration must account for all the ports used by the H.225
and H.245 signaling. ACL configuration is not required when SAF-enabled SIP trunks with the standard
5060 port are used.
HTTPS
SIP/TLS
P0005
SRTP
Cisco Unified Border Element can register the enterprise network's E.164 DID numbers to the service
provider's SIP trunk on behalf of the endpoints behind it. If Cisco Unified Border Element is used to
proxy the network's E.164 DID numbers, the status of the actual endpoint is not monitored. Therefore
unregistered endpoints might still be seen as available.
Cisco Unified Border Element can connect RTP enterprise networks with SRTP over an external
network. This allows secure communications without the need to deploy SRTP within the enterprise. It
also supports RTP-SRTP interworking, but this is limited to a small number of codecs, including G.711
mulaw, G.711 alaw, G.729abr8, G.729ar8, G.729br8, and G.729r8.
Certain SIP service providers require SIP trunks to be registered before they allow call service. This
ensures that calls originate only from well-known endpoints, thus making the service negotiation
between the enterprise and the service provider more secure. Unified CM does not support registration
on SIP trunks natively, but this support can be accomplished by using a Cisco Unified Border Element.
The Cisco Unified Border Element registers to the service provider with the phone numbers of the
enterprise on behalf of Cisco Unified Communications Manager.
For configuration and product details about Cisco Unified Border Element, refer to the documentation at:
• http://www.cisco.com/en/US/products/sw/voicesw/ps5640/index.html
• http://www.cisco.com/en/US/products/sw/voicesw/ps5640/products_installation_and_configuration_
guides_list.html
SIP/TLS
9900 SRTP (Video)
Series
EX Series
P0006
EX Series C Series
Unified CM supports H.235 pass-through as a security mechanism when interacting with H.323 video
devices, and it has added support for Secure Real-Time Transport Protocol (SRTP) encryption of the
video and audio media streams of video calls of Cisco SIP video endpoints. However, interworking of
H.235 to SRTP is not currently supported in Unified CM. Whenever H.235 and SRTP are needed in a
video deployment, Cisco recommends registering the H.323 endpoints to a Cisco VCS as a gatekeeper
and using SIP-to-H.323 interworking, while providing SRTP for the SIP video endpoints in the
Unified CM side and a secure SIP trunk to the VCS. If the H.323 video endpoints are configured to use
H.235 with the VCS, the call can be encrypted end-to-end.
TP
Cisco Unified
SIP & Firewall Communications
Traversal Applications
Internet
346706
Traversal
SIP or H.323 protocol inspection (ALG fixup) on the firewall must be disabled. The firewall should be
configured for traversal and the requisite ports should be opened. For more details, refer to the latest
version of the Cisco VCS IP Port Usage for Firewall Traversal Deployment Guide, available at
http://www.cisco.com/en/US/products/ps11337/products_installation_and_configuration_guides_l
ist.html
Applications Servers
For a list of the Unified CM security features and how to enable them, refer to the Cisco Unified
Communications Manager Security Guide, available at
http://www.cisco.com/en/US/products/sw/voicesw/ps556/prod_maintenance_guides_list.html
Before enabling any of the Unified CM security features, verify that they will satisfy the security
requirements specified in your enterprise security policy for these types of devices in a network. For
more information, refer to the Cisco ASA 5500 Series Release Notes at
http://www.cisco.com/en/US/docs/security/asa/asa80/release/notes/asarn80.html
Single Sign-On
The Single Sign-On (SSO) feature allows end users to log into a Windows domain and have secure access
to the Unified Communication Manager's User Options page and the Cisco Unified Communications
Integration for Microsoft Office Communicator (CUCIMOC) application.
Configuring Single Sign-On requires integration of Cisco Unified CM with third-party applications,
including Microsoft Windows Servers, Microsoft Active Directory, and the ForgeRock Open Access
Manager (OpenAM). For configuration details, refer to the latest version of the Cisco Unified
Communications Manager Features and Services Guide, available at
http://www.cisco.com/en/US/products/sw/voicesw/ps556/prod_maintenance_guides_list.html
Deployment Examples
This section presents examples of what could be done from a security perspective for a lobby phone and
a firewall deployment. A good security policy should be in place to cover deployments similar to these
types.
Data
Center
Access Cisco Unified CM
IP
M
IP
M M
M M
DMZ
Voice
Gateways V
V
Voice
Applications
IP
148996
PSTN
IP
M
M
FUSION
Router
Data
Center
Inside
Outside
Campus
Core
Media
271407
VRF 1 IP
VRF 2
This scenario is the simplest to implement and is an incremental configuration change beyond the usual
network virtualization implementation. This design incorporates a data center router with the capability
to route packets to any VRF, and it is called the fusion router. (Refer to the Network Virtualization
documentation for details on the configuration of the fusion router.) The deployment scenario for
enabling peer-to-peer communications traffic utilizes the fusion router for routing between VRFs and
the firewall capabilities for securing access to the data center.
The following base requirements apply to this scenario:
• Campus routers send packets for other campus VRFs toward the fusion router via default routing,
so all router hops must route by default to the fusion router. The data center shared VRF has route
information about each campus VRF. All VRFs other than the shared VRF have no direct
connectivity.
• A Unified CM cluster is located in a shared VRF in the data center, and communication within that
shared VRF is totally unhindered.
• The shared VRF is located in the data center. If multiple data centers exist, the shared VRF spans
all the data centers.
The application layer gateway at the data center edge specifies access lists to open ports for TFTP and
SCCP or SIP sessions originated on the outside toward the Unified CM cluster in the data center. TFTP
is required to allow phones to download their configuration and software images from their TFTP server,
and SCCP or SIP is required to allow them to register with the Unified CM cluster. Refer to Unified CM
product documentation for a list of appropriate port numbers for the particular version of software used.
In this scenario, all call signaling from communication devices in each VRF passes through the
application layer gateway, and inspection of that signaling allows the application layer gateway to
dynamically open the necessary UDP pinholes for each VRF for the RTP traffic to pass from the outside
of the firewall toward the fusion router. Without the inspection occurring on the firewalls, each RTP
stream that originates from an endpoint on the outside is not allowed to pass through the firewall. It is
the inspection of the call control signaling that allows the UDP traffic to be forwarded through the
firewall.
This deployment model provides a method to allow communication devices on a VRF-enabled network
to have peer-to-peer connectivity. The application layer gateway provides secure access to the shared
VLAN and the fusion router. All media streams between different VRFs do not take the most direct path
between endpoints. The media is backhauled to the data center to be routed via the fusion router.
M
M M
M
FUSION FUSION
Router Router
Data
Center
Call
Signaling
Inside
Outside
STOP
Campus
Core
Call
Signaling
Media Media
VRF 1 VRF 2
IP
271408
The solution is to utilize Trusted Relay Point (TRP) functionality. (See Figure 4-22.) Subscribers in each
data center can invoke TRPs that provide anchoring of the media and ensure that the media streams flow
through the appropriate firewall. A phone controlled by a subscriber in the left data center must invoke
a TRP in that data center, and a phone controlled by a subscriber in the right data center must invoke a
TRP located in the right data center. The TRP provides an IP address that enables a specific host route
for media that can ensure the exact same routing path as the call signaling. This is used to ensure that
signaling and media pass via the same firewall, thus solving the issue.
M
M M
M
FUSION FUSION
Router Router
Data
Center
Call TRPs
Signaling
Inside
Outside
Campus
Core
Call
Signaling
Media
Media
VRF 1 VRF 2
IP
271409
TRPs are media termination point resources that are invoked at the device level for any call involving
that device. Each device has a configuration checkbox that specifies whether a TRP should be invoked.
Conclusion
This chapter did not cover all of the security that could be enabled to protect the voice and video data
within your network. The techniques presented here are just a subset of all the tools that are available to
network administrators to protect all the data within a network. On the other hand, even these tools do
not have to be enabled within a network, depending on what level of security is required for the data
within the network overall. Choose your security methods wisely. As the security within a network
increases, so do the complexity and troubleshooting problems. It is up to each enterprise to define both
the risks and the requirements of its organization and then to apply the appropriate security within the
network and on the devices attached to that network.