Intro To Voice and SAN Security
Intro To Voice and SAN Security
http://www.thebryantadvantage.com/
Back To Index
In this section, we're taking a strictly introductory look at VoIP and voice
security issues and strategies. This section will not be as detailed as
other sections in the course, but it's just as important as the other sections
- so let's get started!
First and foremost are the phones themselves! That's obvious enough,
but what might not be as obvious is that not all phones on our telephony
network are going to be IP phones - some are going to be good ol'
fashioned analog phones.
Those analog phones are going to require a gateway to run properly on
our telephony network, and as you'll soon see, Cisco routers make great
gateways. The gateway is the termination point for the local media, and
also the point at which the digital-to-analog and analog-to-digital signal
conversions take place.
The gateway may also be a gatekeeper. Cisco's website mentions three
specific benefits regarding gatekeepers on their website:
VoIP Protocols
We've got quite a few VoIP protocols, but just as with routing and
switching, they don't all do the same thing.
The overall stages of a VoIP call are just like the stages of an ISDN call:
In ISDN, we left signaling to the D-channel, and that was that. With VoIP,
however, we've got three separate protocols that can be used for
signaling:
Denial Of Service
Faking login credentials
Eavesdropping
Man-in-the-Middle attacks (the attacker intercepts SIP packets)
.... but there are some unique VoIP network attacks as well. You've
probably heard of phishing, where a potential intruders sends hundreds or
hundreds of thousands of emails designed to look like they're from a
company such as eBay. (If you have an eBay account, you know how
many fake emails result from that!) Most people will not answer these
phishing emails, but a few will - and those few will soon have their
account compromised.
The good ol' fashioned telephone can also be used to gather this
information - and when it is, we call it voice phishing, or vishing. One of
the best defenses against vishing is end user education; there is never a
good reason to give credit card or banking information to someone who
calls you.
And don't think you're not dealing with Spam on a voice network actually, you're dealing with SPIT.
Spam Over IP Telephony, that is. One side effect of SPIT (and yes, it is
hard to say that with a straight face) is the loss of your sanity when the
phone rings every few minutes. Again, SIP is the culprit, since SIP
allows the caller to know if the phone is available for a call before even
Obviously, there's much more to SAN than we can cover here, so we'll
concentrate on that third bullet point. To learn more about the Cisco
storage networking solutions, start here:
http://www.cisco.com/en/US/netsol/ns893/networking_solutions_package.html
Now let's talk about SAN security! The concerns we have in this area are
similar to those we have about our "regular" networks...
Is hardware-based
Is considered more secure than soft zoning
Soft zoning:
A server can see only allowed devices, *but* can still contact "hidden"
devices by their address.
Is software-based
Not particularly secure (putting it nicely)
Virtual SANs (VSANs)
You might have thought that SAN Zones sounded a little like VLANs.
Well, VSANs really sound and operate like VLANs.
VSANs are simply ports on interconnected FC switches that are virtually
grouped. Just as with VLANs, you can put ports on a single FC switch into
separate VLANs, and you can put ports on separate FC switches into the
same VLAN.
We have two authentication protocols for our VSANs, and at least one will
sound familiar! You learned all about CHAP (the Challenge Handshake
Authentication Protocol) during your initial CCNA studies; it would not hurt
to review CHAP's operation for your CCNA Security exam. CHAP is used
by iSCCI.
An improvement to CHAP, DH-CHAP (the Diffie-Hellman Challenge
Handshake Authentication Protocol) is available for authentication of hosts
connecting to one of our FC switches.
Just as we use BPDU Guard and Root Guard to prevent rogue Ethernet
switches from joining our network, we can use DH-CHAP to authenticate a
switch-to-switch connection and prevent unauthorized FC switches from
joining the network.
FCAP and FCPAP
The Fibre Channel Authentication Protocol (FCAP) is strictly optional, and
this protocol gives us a stronger authentication option for our FC
connections. FCAP's great, but one drawback is its reliance on a Public
Key Infrastructure (PKI). An alternative to FCAP, the Fibre Channel
Password Authentication Protocol (FCPAP) is not reliant on a PKI.
Hot Spots And Gotchas
The "manager" of a VoIP network is the gatekeeper. Gatekeepers can be
configured to do a wide range of VoIP management tasks, including
allowing calls only when adequate bandwidth for high-quality calls exists
(Call Admission Control) and to keep VoIP calls separate from data traffic.
VoIP signaling protocols: H.323, MGCP, SIP