Introducing Endpoint Security

Perhaps a bit of history is in order.... When TCP/IP was but a baby, there were two different types of devices with IP addresses, as follows:

Image    End Systems. An end system is essentially to a network what an end user is to computing. An end system is a device that you connect to a network but does not comprise a network device. PC workstations, IP printers, network servers, VoIP phones, VoIP gateways, and so on are considered end systems.

Image    Intermediate Systems. Perhaps you recognize intermediate systems by their other name: routers. “Ahh!,” you say. No surprise that one of the earliest scalable routing protocols was called IS-IS or Intermediate System–Intermediate System routing.

So, what is an endpoint, then? If you imagine a TCP connection as being a circuit between two devices, using a TCP/IP network for transport, the endpoints are the devices on each end of that circuit. According to Wikipedia:

In computer science, in discussions of communications protocols, an endpoint is the name for the entity on one end of a transport layer connection. In service-oriented architecture, an endpoint is the entry point to a service, a process, or a queue or topic destination.

Cisco’s Host Security Strategy

Securing endpoints in a Cisco Self-Defending Network falls within the category of Cisco Host Security Strategy. There are three prongs to this strategy:

Image    Endpoint Protection (Cisco Security Agent). Detecting and preventing viruses, worms, and trojans from implanting themselves in the network.

Image    Cisco Network Admission Control (NAC). Audits endpoint security posture and ensures that only endpoints that comply with the organization’s security policy can access the network.

Image    Network Infection Containment. Mitigates the effect of infections by speeding up the process of identifying infections, isolating affected systems, and cleaning up traffic.

Securing Software

What constitutes secure software? In a word, it is its trustworthiness. In Chapter 6, “Introducing Cryptographic Services,” we discovered that one of the important metrics for choosing the ciphers and other elements of a cryptosystem was the trustworthiness of each element. In Cisco’s Host Security Strategy, there are two main software elements that must be secured in order that an endpoint proves its trustworthiness, as follows:

Image    Operating systems

Image    Applications that run in the environment provided by the operating system

Because software is often the sole entry point when interfacing with an endpoint, it naturally follows that software is often a primary vector for a variety of attacks that might be leveraged against an endpoint. According to Cisco, the two elements of software—operating systems and applications—have specific vulnerabilities, which if not secured, can lead to exploits. Table 9.1 provides an overview of these software elements, their vulnerabilities and exploits, as well as which Cisco product(s) could be implemented to secure the software system.

TABLE 9.1 Cisco Products Used to Secure Software Element Vulnerabilities

Image

NOTE

Applications are very much like users of an operating system, and like users, the concept of least privileges should be followed. Applications should only have as much privilege given to them by the host operating system as they need to perform their functions.

Endpoint Attacks

Applications and operating systems are susceptible to DoS and access attacks in the same way that network devices are. Some specific attacks that endpoints may be susceptible to include the following:

Image    Buffer Overflows. The conduit through which entry is made to an unsecure system.

Image    Worms, Viruses, and Trojan Horses. The method or vector in which code is introduced to compromise the unsecure system.

Buffer Overflows

Buffer overflows usually result from a failure to properly validate input data. For example, a web server might be used to accept form data from an Internet user and then pass that data to a database server inside the organization’s network. Even if the communication path between the web server and the database server is secured and inspected for signs of intrusion by systems such as an IPS, these types of attacks are hard to discover. There is frequently nothing untoward in the pattern of data within the packets, and signature-based systems will be ineffective. Thus, to ensure endpoint security, software needs to be deployed on the endpoint to scan for anomalous behavior of the application stack.

Characteristics of a buffer overflow attack include the following:

Image    Input data that contains untested parameters, such as:

Image    Improperly formatted data.

Image    Too much data.

Image    Unexpected and improperly formatted control sequences.

Image    Embedded executable code and scripts.

Image    Not easy to discover and exploit by the hacker community but....

Image    When exploit code is discovered or invented by the hacker community, it can be prepackaged for widespread use.

Image    They generally overwrite memory in an application stack by cramming too much data into an application’s input.

The Cisco solution for preventing buffer overflows is Cisco Security Agent. This HIPS product was discussed in some detail in Chapter 8, “Network Security Using Cisco IOS IPS.”

Figure 9.1 illustrates how Cisco Security Agent (CSA) protects the operating system kernel from attack. Referring to Figure 9.1, when an application (step 1) attempts to make a call to the operating system kernel, CSA intercepts this call (step 2). In effect, CSA acts as a firewall in establishing a perimeter between the application and the operating system kernel. Once CSA establishes the trustworthiness of the application, the call is allowed to progress (step 3) to the operating system kernel.

FIGURE 9.1 Cisco Security Agent.

Cisco Security Agent.

There are two main types of buffer overflows:

Image    Remote exploits

Image    Local exploits

The most common methods of spreading buffer overflow attacks are the following:

Image    Worms

Image    Trojan horses

Image    Viruses

Image    Infected spam

EXAM ALERT

According to Cisco (and thus this book), the most common methods of spreading buffer overflows are worms, Trojan horses, viruses, and infected spam. In the real-world that we all live in, however, this is false. Buffer overflows are targeted attacks designed to exploit vulnerabilities in a particular application. Trojan horses and viruses have nothing to do with buffer overflows, but worms and (it’s a stretch) infected spam can be used to inject code, which results in a buffer overflow. In the end, if you are asked on the exam what the most common methods of spreading buffer overflows are, you might have to choose the right wrong answer.

Other characteristics of buffer overflows include the following:

Image    Most common software vulnerability

Image    Mostly used to root a system or create a DoS attack

NOTE

Rooting a system means to hack a system to become the superuser or root user. This is a UNIX term for someone who possesses the highest level of system privilege.

DoS attacks are not designed to access information, but to make a system unusable. This was discussed in Chapter 1, “Network Insecurity.”

Worms, Viruses, and Trojan Horses

The most common vector of attack for worms, viruses, and Trojan horses is buffer overflows. As previously stated, CSA is Cisco’s product that prevents buffer overflows so logically. CSA is extremely effective in defeating these vectors of attack.

EXAM ALERT

Know the definitions of worms, viruses, and Trojan horses.

The terms worm, virus, and Trojan horse are often improperly used at best, and are sometimes used interchangeably at worst. Here are accurate, succinct, high-level definitions for these terms:

Image    Worm. Takes its name from burrowing organisms that live in the “soil” of an infected host. The worm replicates, often without any user interaction, into the memory of an infected host that, in turn, infects other computers. Worms have three different parts:

Image    The enabling vulnerability (used to worm into the host).

Image    A propagation mechanism (to replicate and choose additional targets).

Image    Payload (contains the exploit code; to root the system and gain privileged access, for example).

Image    Virus. Like microorganisms that invade a human host, viruses attach to other programs and files and execute unwanted functions on that host. Unlike worms, viruses require a careless user’s interaction as their enabler (such as opening an infected email attachment), for their invasion to establish a beachhead on the endpoint.

Image    Trojan horse. Like the fabled Trojan horse that fooled the defenders of Troy, a Trojan horse is an application that is written to look like something innocuous, whereas it is actually an attack tool. Trojans are allowed past the defenses by unwitting (or witless!) defenders. Firewalls, for example, are rendered useless by this type of attack.

The Five Ps of a Worm Attack

Worms have five phases of operation, as follows:

  1. Probe. The worm uses various methods such as ping sweeps, and OS and application fingerprinting, to identify vulnerable targets.

  2. Penetrate. The exploit code in the worm’s payload is transferred to the host.

  3. Persist. The worm drops anchor and sets up shop in memory, installing new code that will survive even if the host is power-cycled.

  4. Propagate. Not satisfied with penetrating one host, the worm searches for vulnerabilities on neighbor systems, exploiting the likelihood that these neighbor systems might trust the infected host in order to replicate itself to those other systems. Active TCP connections, file transfers, and file and print sharing are common vectors.

  5. Paralyze. After the worm has used the host system to propagate to other systems to ensure its continuing survival, the worm can now paralyze the system that it first penetrated, erasing files, stealing data, and launching DDoS attacks.

Figure 9.2 illustrates these five phases.

FIGURE 9.2 The five Ps of a worm attack.

The five Ps of a worm attack.

Cisco Solutions to Secure Systems and Thwart Endpoint Attacks

As you have probably inferred from the preceding discussion, an Intrusion Protection System would not, by itself, be effective against viruses, worms, and Trojan horses. Many vendors, including Cisco, have products in their security portfolio that are especially effective against such network-borne contagions. We examine three solutions at a high level:

Image    IronPort

Image    NAC

Image    CSA

IronPort

IronPort is a recent acquisition by Cisco. IronPort comprises a line of security appliances, deployed at the network perimeter. There are three main series of IronPort security appliances:

Image    C-Series. Email security appliances. These use the same code base as on IronPortSenderBase, an email traffic-monitoring system used by 80% of the largest ISPs.

Image    S-Series. Web security appliances. These devices protect against web-borne malware using IronPort’s Web Reputation technology and the Dynamic Vectoring and Streaming™ (DVS) engine.

Image    M-Series. Security management appliances.

NAC

Network Admission Control has two components, the rather confusingly named NAC Framework and the Cisco NAC Appliance. (Why is the “framework” a component of NAC? Isn’t that backwards? Oh well....)

Image    NAC Framework. Software embedded inside NAC-enabled products, including some Cisco IOS routers. This software acts as an agent and allows the device to collect the bona fides (or “credentials”) of a user or other entity and determine whether they have sufficient privileges to be granted access to the network. These network access devices do not themselves determine whether access privileges should be granted. They forward the credentials to the NAC Appliance. The NAC framework integrates Cisco and other vendors’ NAC-enabled products.

Image    Cisco NAC Appliance. Rolls the four key NAC components into a single device. It is a good fit for enterprises that need a simple way to keep track of patch revisions of operating systems, as well as updates for antivirus software and vulnerabilities. Cisco’s NAC Appliance works in a mixed vendor environment and does not need a Cisco network to operate. The four key NAC components are as follows:

Image    Cisco NAC Appliance Server (NAS). A device deployed in-band or out-of-band to perform network access control. As users attempt network access, the user is redirected to the NAS, which checks the device’s compliance. A Cisco IOS router with the right version of Cisco IOS software can perform this function. (See the following Exam Alert for more about using the acronym NAS.)

Image    Cisco NAC Appliance Manager (NAM). A GUI-based central administrative interface for IT security personnel. Security policies and users are created and managed. The NAM manages the NAS, with the NAS remaining the device that actually enforces access.

Image    Cisco NAC Appliance Agent (NAA). This is software that resides on a client endpoint. It is queried by NAM to determine an endpoint’s compliance with the network security policy. The endpoint machine is deep-inspected for the following:

Registry settings

Services

Files

Required hot fixes for remediation can be determined, as well as the correct version of antivirus software and CSA. From a user’s perspective, this is the interface that they see when they interact with the NAC appliance.

Image    Rule-Set Updates. Quarantined hosts can obtain the latest patches, software revisions, hot fixes, and so on through automatic updates.

EXAM ALERT

Don’t you just hate acronyms that are made up of other acronyms! Even worse are acronyms that are reused. We saw “NAS” before in Chapter 3, “Security at the Network Perimeter.” In that context, NAS stood for Network Access Server. Even in the NAC context, a NAS (now a “NAC Appliance Server”) still decides whether an entity is allowed access to the network. They both collect credentials to validate against another device, but unlike AAA where the credentials validate a user’s identity, NAC credentials validate a user’s security posture and determine whether they are sufficient to gain access to the network. No wonder, then, that Cisco prefers to call an AAA NAS an “AAA client.” This terminology is becoming more prevalent.

In order to show how all of these components work in practice, Figure 9.3 represents a slight modification of our reference network design. A NAM and NAS have been added to the network in order to manage network admission control (NAC) to the Internet (or a company intranet) for a user.

FIGURE 9.3 NAC in action.

NAC in action.

Figure 9.3 illustrates these three basic steps:

  1. A user attempts to access a site on the corporate intranet or on the Internet. The connection attempt is intercepted and blocked by a network device (IOS router in the diagram) until the next steps complete.

  2. The user is redirected to a login page, where he is prompted for his login credentials by the NAS. While this occurs, the user’s PC and the network are scanned to determine whether they are compliant to the organization’s security policy.

  3. If the device is compliant, it is allowed to connect to the original destination (indicated by the “3A” in Figure 9.3). If the device is noncompliant, the connection is redirected to a quarantine network or sandbox, where remedial action can be taken (indicated by the “3B” in Figure 9.3). The user might be presented with a web page where they download the latest version of the organization’s anti-virus software or invited to reread the organization’s security policy. This network is typically deployed in a separate VLAN.

CSA

CSA was covered at a high level in Chapter 8. Take a look at Figure 8.5 of that chapter. You may recall that CSA sits between an application (malicious or not) and the operating system kernel. The question is what type of intelligence is in CSA, which is represented by the padlock in that figure. CSA comprises four interceptors, as follows:

Image    File System Interceptor. All file read/write requests are intercepted and permitted or denied based on the security policy.

Image    Network Interceptor. All network read/write requests (network connections) through the NDIS (Network Driver Interface Specification) driver are filtered through the security policy. DoS attacks can be stymied by limiting the number of connections that can be made in a specified period.

Image    Configuration Interceptor. Read/write requests to the Windows system registry or (in Unix) the run control (rc) files are cleared by the security policy.

Image    Execution Space Interceptor. This interceptor ensures that each application plays by the rules by only allowing write access to memory that is owned by that application. It also blocks the injection of arbitrary code in Dynamic Link Libraries (DLLs) and buffer overflows and maintains the integrity of dynamic resources such as memory and network I/O.

EXAM ALERT

Memorize these four CSA interceptors.

You may have guessed that the interceptors perform functions similar to some of the functions of HIPS and firewalls. Very intuitive! In fact, CSA’s interceptors perform many functions, some of them complimentary. Table 9.2 lists the interceptors and how they correspond to certain high-level security applications

TABLE 9.2 CSA Interceptors and Corresponding Security Applications

Image

Endpoint Best Practices

As always, there is the classic tradeoff between usability and security. That said, assume the worst and design for the worst. A reasonable level of paranoia in operating system and application design is not only healthy but strongly encouraged.

Specifically for applications, consider the following best practices:

Image    Make security part of the design and not an afterthought.

Image    Follow the principle of least privilege.

Image    Modularize.

Image    Employ practices of secure programming.

Image    Use cryptography where practical against both inside and outside attacks.

Image    Assume data from outside sources is untrustworthy.

Image    Assume that your application users are malicious.

The following are best practices for operating systems:

Image    Consider using trusted operating systems for critical systems.

Image    Hardening of the operating system remains critical for sensitive environments.

Image    NAC firewalls are recommended to limit hosts’ exposure.

Image    Other security add-ons are indicated, including integrity checkers and HIPS and host-based firewalls.

Exploring SAN Security

A Storage Area Network (SAN) is a fast and reliable network that provides access to internal and external storage resources. Typically, the intra-SAN traffic does not cross any of the cables of the production network and is usually deployed in its own IP subnet and VLAN for security and performance reasons. Storage devices are shared as peer resources amongst all network servers and are not owned by any one server. A well-designed SAN exemplifies the principle of separation of services.

SAN Advantages

There are three main benefits of SANs:

Image    Reduced capital and operating expenses.

Image    Flexibility and scalability as the business grows and application requirements change.

Image    Greater reach for replication and backups when compared with storage devices collocated with network servers.

SAN Technologies

There are three main SAN interconnection technologies, all based on the Small Computer Systems Interface (SCSI) communications model:

Image    Fiber Channel. This is SCSI over a network infrastructure and has these features:

Image    Used for host-to-SAN connections.

Image    Is the primary transport technology for SANs.

Image    iSCSI (SCSI over TCP/IP). This is SCSI using TCP/IP for transport and has these features:

Image    Used for host-to-SAN connections.

Image    Typically used for implementing SAN connectivity in a LAN environment.

Image    FCIP (Fiber Channel over IP). Used to communicate fiber channel commands over IP and to interconnect SANs:

Image    SAN-to-SAN connections.

Image    Typically used in a Metropolitan Area Network (MAN) or WAN.

EXAM ALERT

Understand which SAN technology is used for host-to-SAN and SAN-to-SAN connectivity.

SAN Address Vulnerabilities

There are two types of logical addresses implemented within a SAN:

Image    Logical Unit Number (LUN): A 64-bit field that SCSI uses to identify a logically addressable unit of a target within a SCSI device. This address can be masked through a process called LUN masking to hide physical or logical volumes from misbehaving servers but is considered unsecure because these addresses can be spoofed.

NOTE

In a SAN, iSCSI volumes will definitely be “targets.” Ugly pun, but you’ll remember the terminology now, right?

Image    World Wide Names (WWN). A 64-bit field used by Fiber Channel to uniquely identify each element on that fiber channel network. Zoning of the fiber switch fabric (similar to VLANs) can use WWNs to assign security permissions, but this is considered unsecure because WWNs are user-configurable. This zoning capability is only possible in a fiber-switched infrastructure and not a simple fiber channel.

Virtual SANs (VSANs)

Given the relative ease of spoofing both LUNs and WWNs, existing SAN technology cannot be trusted to separate the different SANs’ data planes. With virtual SANs (VSANs):

Image    SAN traffic is isolated by hardware.

Image    A single switch can be configured with ports in multiple VSANs.

Image    Only ports in the same VSAN can communicate with each other.

Image    In a similar fashion to VLANs, a VSAN can span several switches because all the inter-switch traffic is tagged with the VSAN membership info.

NOTE

Cisco invented VSANs, although VSANs have since been adopted as an ANSI standard.

SAN Security Strategies

There are six areas to target in securing a SAN, as follows:

Image    SAN Management Access. Secure management services access.

Image    Fabric Access. Secure access of devices to fiber fabric service.

Image    Target Access. Secure access to LUNs and targets. Can be secured with zoning (see the next section).

Image    IP Storage Access. iSCSI and FCIP use IP for transport. Secure the underlying IP network. Can be secured with these features in Cisco IOS routers:

Image    IPSec VPNs when transiting public carriers.

Image    Hardware-accelerated encryption.

Image    Firewall filters.

Image    SAN Protocol. Secure FCIP, the switch-to-switch communication protocol.

Image    Data Integrity and Confidentiality (Secrecy). Secure data that crosses the network, as well as stored on volumes.

NOTE

iSCSI has many similarities to security features that we have examined in previous chapters:

Image    Fiber Channel zones are similar to ACLs.

Image    Fiber Channel VSANs are similar to VLANs.

Image    Fiber Channel port security is similar to 802.1X port-based authentication.

Zoning

The main strategy for securing access to SAN targets is zoning. We saw zoning a bit earlier in the context of using user-configurable WWNs to place SAN devices in different zones. This is the same idea, but a different context. In fact, zoning to assure target access security is probably most analogous to zones in the Zone-Based Policy Firewall (ZPF) that we introduced in Chapter 5, “Using Cisco IOS Firewalls to Implement a Network Security Policy.”

There are two basic steps, as follows:

  1. Associate physical ports on the SAN Fiber switch with VSANs (again, much like a VLAN).

  2. Logically divide the VSANs into zones. Zones can be either soft or hard:

Image    Soft Zoning. The visibility of device IDs is restricted, although a server can still connect to a known target using its address.

Image    Hard Zoning. More secure than soft zoning. Access to SAN resources is physically controlled across the switch fabric. This is most commonly used.

Zoning is illustrated in Figure 9.4. Two VSANs are created inside a single physical topology, with each VSAN containing more than one zone. Disks and hosts can exist across multiple zones in a single VSAN but can never span VSANs.

FIGURE 9.4 VSANs and zoning.

VSANs and zoning.

Exploring Voice Security

Given that VoIP is another application that uses an IP network, it is also fair to say that many of the best practices that we have discussed in previous chapters will be employed in securing a VoIP network. Before we look at methods of securing a VoIP network, we first look at some basic VoIP terminology. Only then can we examine specific vulnerabilities and the possible exploits that might be leveraged against those vulnerabilities.

VoIP Components

In order to understand VoIP security, you should first understand these basic VoIP components and concepts:

Image    IP Phones. Responsible for delivering voice over IP to the desktop.

Image    Gatekeeper. Like a traffic cop on a VoIP network. Provides Call Admission Control (CAC), bandwidth management and control, and network address translation.

Image    Gateway. Translates VoIP to PSTN and vice versa. A gateway also represents a physical connection point for an organization’s local analog and digital voice devices (phones, fax machines, and so on) and Private Branch Exchanges (PBXs).

Image    Multipoint Control Unit (MCU). Allows multiple participants in different locations to connect to the same conference call or video conference.

Image    Call Agent. Similar to a proxy, acts as an agent for controlling IP phones, CAC (see Gatekeeper above), bandwidth management and control, and network address translation. Cisco Unified Communications Manager (UCM) and Unified Communications Manager Business Edition serve as call agents.

Image    Application Servers. These provide extra services such as unified messaging and voice mail. Cisco Unity is an application server.

Image    Videoconference Station. Provides an interface to videoconferencing services for an end user. The stations have a camera for video input capture and a microphone for audio, as well as screens and speakers to provide two-way videoconferencing with a remote user.

Common VoIP Protocols

Table 9.3 lists and defines some common VoIP protocols.

TABLE 9.3 Common VoIP Protocols

Image

EXAM ALERT

Memorize these terms, as they will likely be on the exam. Also, although all of these VoIP protocols have their own specific vulnerabilities, SIP has such a large (and growing) installed base that Cisco has chosen SIP alone as an example to analyze shortly in the subsection, “SIP Vulnerabilities.”

Threats to VoIP Endpoints

Regardless of the VoIP protocol chosen, there are common threats to a VoIP network:

Image    Reconnaissance. Using commonly known reconnaissance techniques to discover the protocols that are being used for the VoIP implementation.

Image    Spam over IP Telephony (SPIT). Not a problem yet, but the fact that we are talking about it means that it might be a future threat. Traditional anti-spam measures (such as IronPort) will not be effective in dealing with this threat. That said, simple measures, such as implementing authentication and TLS (Transport Layer Security), would be effective tools to mitigate its threat.

Image    DoS Attacks. These fall into three general categories:

Image    Network resource overload. Most commonly uses bandwidth overloading to make a network resource such as a VoIP phone or a call agent unavailable.

Image    Host resource starvation. Using up host resources such that the host can no longer serve legitimate connection requests. A SYN flood is a good example.

Image    Out-of-bounds attacks. The process of creating anomalous data packets with unexpected data that is outside the scope (or bounds) causing system crashes.

Image    Eavesdropping. The unauthorized interception of RTP media streams of VoIP packets for the purpose of accessing confidential information. Can be mitigated simply by using encryption.

Image    Man-in-the-Middle Attacks. Common man-in-the middle attacks such as those discussed in Chapter 1, “Network Insecurity,” could prove to be effective.

Fraud

The two most common forms of fraud on VoIP networks are the following:

Image    Vishing. Phishing a VoIP network to attempt to compromise confidentiality.

Image    Theft and Toll Fraud. Fraudulently using VoIP services that do not belong to you.

These Cisco Unified Communications Manager (UCM) features can protect the VoIP network against fraud:

Image    Partitioning. Limit phone access to only certain parts of the dial plan.

Image    Dial Plans. Filter possibly exploitive phone numbers.

Image    Forced Authorization Codes (FACs). A feature in UCM that can track calls and prevent unauthorized calls in the first place.

SIP Vulnerabilities

As mentioned, all VoIP protocols have specific vulnerabilities. SIP is a good example of a protocol whose design did not include security, and as such is a poster child for examining securing VoIP protocols. SIP has very little integral security. It is a relatively immature protocol that is nevertheless seeing widespread adoption. There are three main vulnerabilities with the protocol, as follows:

Image    Registration Hacking. Hackers can intercept incoming calls and spoof the registration server, thus rerouting the calls through themselves. This is similar to an ICMP redirect (see Chapter 1).

Image    Message Tampering. Because the VoIP messages are carried in cleartext, it is relatively simple for a hacker to alter the VoIP packet contents traveling between SIP endpoints.

Image    Session Tear-Down. Allows a hacker to prematurely tear down an existing VoIP session. Similar to an RST attack employed in many IP DoS attacks.

These three main vulnerabilities can be mitigated using the techniques and technologies discussed in the next section, “Mitigating VoIP Hacking.”

Mitigating VoIP Hacking

Although we have only (and briefly) examined specific SIP vulnerabilities, the following techniques can be used to secure any VoIP infrastructure regardless of the protocol employed and will be examined separately:

Image    Voice VLANs (VVLANs)

Image    Firewalls

Image    VPNs

Image    Correct VoIP Endpoint Configuration

Image    Correct VoIP Server Configuration

Voice VLANs (VVLANs)

Recall the concept of separating traffic into different planes. For example, the data plane should be kept separate from the management plane whenever possible. This same discussion holds true for VoIP too. If the VoIP traffic can be separated into a VLAN separate from the data VLAN, it would be much more difficult for a hacker to use a Man-in-the-Middle (MiM) attack or similar to eavesdrop, tamper with, or reconnoiter the VoIP traffic. Figure 9.5 illustrates using separate VLANs for voice and data. A VoIP phone is connected via an IEEE 802.1Q trunk to a Cisco Catalyst switch. A user’s PC is connected to the VoIP phone via the supplied data jack. The switch port in which the VoIP phone is connected is set to trust the VoIP phone’s tagging of its own Ethernet frames with the VLAN number of the Voice VLAN (VVLAN). Other frames, such as those from the PC connected to the VoIP phone, will be tagged for the data VLAN, keeping the data and voice planes separate. This has the further advantage of making Quality of Service (QoS) possible for the VoIP traffic because the VLAN tag makes it simple to identify and allows the QoS-aware switch to apply differentiated, possibly preferential, treatment to the VoIP traffic.

FIGURE 9.5 Cisco VoIP phone trunked into switch.

Cisco VoIP phone trunked into switch.

Protect VoIP Networks with Firewalls

Firewalls such as the Cisco Adaptive Security Appliance (ASA) 5500 Series are an integral part in an overall VoIP security policy. Here are some of the features of Cisco firewalls that you can leverage on in order to increase the security of the VoIP implementation and mitigate some of the common threats that were previously outlined:

Image    Standards Compliance. Ensure that VoIP protocols are standard-compliant and that only SIP methods are sent to UCM.

Image    Rate Limiting. Rate limit SIP requests to prevent DoS attacks.

Image    Enforce Call Policies. Create an acceptable use policy of white lists, black lists, SIP URIs, and matching called/caller parties and enforce it.

Image    Inspection. Firewall dynamically opens TCP and UDP ports for Cisco applications by inspecting the VoIP sessions for this embedded information. Also enable the inspection of encrypted phone calls by the firewall.

Image    Registration. Permit only registered phones to make calls.

Protect VoIP Networks with VPNs

As we saw in Chapter 7, “Virtual Private Networks with IPsec,” VPNs seem to be the magic bullet for many issues where network confidentiality, integrity, and authentication are required. For example, an IPsec VPN could be constructed for VoIP-only traffic between two IOS routers acting as gateways. To accomplish this, an ACL specifying which protocols, addresses, port numbers, and so on will be necessary to properly differentiate the VoIP traffic from other site-to-site flows. The use of ACLs and their application to an IPsec crypto map were discussed in Chapter 7. The ACLs that we used in Chapter 7 were not very granular, in that they specified site-to-site flows based solely on IP addresses. These were essentially layer 3-only filters. There are some drawbacks to using an IPsec VPN solution for VoIP, though. Cisco points out that the more specific filtering for which traffic should be transported inside an IPsec VPN (such as would be needed for VoIP flows) should only be used if necessary, because this more granular filtering is more CPU-intensive.

Another caveat in using IPsec VPNs with VoIP is in the area of quality of service (QoS). The VoIP endpoint or server will definitely map the bits in the ToS (Type of Service) byte of the IP header in attempt to express its requirement for QoS on the network. This process is called marking. The IPsec VPN solution must find a way to map these bits into the unencrypted IP packet header, such that QoS-aware devices that are intermediate to the VoIP devices can properly honor the QoS marking of VoIP systems, and thus preserve end-to-end QoS in the network, even over the VPN.

NOTE

Be careful when you implement VoIP inside a VPN across a large public network such as the Internet. QoS is impossible to maintain end-to-end over the Internet because we have no control over the routers that will be forwarding the packets. This makes VoIP over the Internet somewhat problematic since QoS is traditionally a big issue with VoIP in general. An optimum solution would be a VPN constructed over a service provider’s network where the service provider is required to maintain a certain level of service as stipulated in a service level agreement (SLA).

Protect VoIP Networks with Correct Endpoint Configuration

Careful configuration of the VoIP telephone endpoints will go a long way to creating a secure VoIP network. Password protecting or disabling the ability to configure the device altogether by the user is a good first step. The following are other things you may consider:

Image    Firmware. Make sure that only firmware digitally signed by the manufacturer is installed on the devices. (Digital signatures and HMACs are covered in Chapter 6, “Introducing Cryptographic Services.”)

Image    Configuration files. Use only signed configuration files.

Image    Disable unnecessary features. Disable the following features if they are not needed. (Remember the principle of least privileges.):

Image    PC port

Image    Setting button

Image    Speakerphone

Image    WWW access

Protect VoIP Networks with Correct Server Configuration

Using a Cisco solution that includes the Unified Communications Manager means that several security features will be built in, as follows:

Image    File system and OS applications are inaccessible.

Image    Only images digitally signed by Cisco are installable.

Image    The device follows best practices for hardening including:

Image    Unused services are removed, and defaults such as usernames are disabled.

Image    UCM is constantly improved over time as new threats are discovered.

Image    UCM logs security events.

Image    CSA is enabled on UCM by default.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset