Security IP Telephony
Ref. : IPT009
Duration : 2 days
Place : Paris
Schedule : 9:15 am - 12:30 am / 1:30 pm - 5:30 pm
Objectives :
- Understand the various issues of security in IP telephony: the risks specific to ToIP protocols, the risks generated by the integration of ToIP SI
- Understand the solutions in terms of protocols, matéirles and configuration items on architectures company type and operator
- The proof is based on an architecture type multi-site business
Training program :
THE PROBLEM
Recalls Security
- Authentication, access control, integrity, confidentiality, non-repudiation, availability
Risks from the information system
- Flooding, spoofing, denial of service, virus
New risks
- Identity theft, unauthorized calls, eavesdropping, call interruption
Identifying weaknesses signaling protocols and media
Means available to test the security of their system (scanner, sniffer, cracker , spoof)
SOLUTIONS : THE THEORY
Different security standards
- VoIP Standards (SIP , H.235 , SRTP)
- Network Standards (TLS , IPSec, S/MIME, Mikey)
Element of an information security system
- Firewall, VPN , IDS / IPS , NAT, VLAN , DHCP
Element performance qualification of a secure ToIP infrastructure
- Security vs . Performance: Quality, Delay, Jitter ...
- Testing Tools
SOLUTIONS : THE PRACTICE
Business solution vs Centrex solution
- Presentation of the two architectures
- Access to communication infrastructure (network attachment , recording, authentication)
- Heart of infrastructure (mutual authentication of routing equipment and processing trusted domain)
- Associated services (subscriber mobility , unified messaging)
Securing elements implemented by Builders
- Proprietary protocols (authentication and signaling)
- External encryption modules
Subscribe to the INTER of your choice :
ILEXIA adapts this training session INTRA Enterprise.
Illustrations & Demonstrations :
Architectural Overview of tests: multi-site business
VoIP attacks based on already known attacks IF (eavesdropping, call interruption, degradation of communication, identity theft)
Presentation of an Open Source PBX Asterisk or SER, implemented with secure VoIP standards
From the demonstration in the first part, incorporates elements that make up the PFS and define defense strategy to adopt to counter major attacksPractical work (Exercises and Ateliers) :
Provision of our data network and mail servers, web, DHCP, DNS, LDAP throughout training (Switch, RouteurSwitch, Broadband Router, ISDN Router, Firewall, VPN Router)
It allows integration across different cases to simulate specific cases clients on a Cisco infrastructure.
The systems on the model :
- Aastra Matra
- Alcatel-Lucent
- Asterisk
- Avaya
- whitefish
- HP
- LG Ericsson
- PowerDsine
Participants :
- Engineers, project managers ToIP, technicians and technical reponsables responsible for the operational management of the company réseauxx
- Prerequisites: Experience & telecom networks
- Equipment provided: Support course paper