Avaya Aura Communication Manager Data Privacy Guide R10.2.x Dec2023
Avaya Aura Communication Manager Data Privacy Guide R10.2.x Dec2023
Release 10.2.x
Issue 1
December 2023
© 2016-2023, Avaya LLC Licenses
All Rights Reserved. THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA
Notice WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO,
UNDER THE LINK “AVAYA SOFTWARE LICENSE TERMS (Avaya
While reasonable efforts have been made to ensure that the infor- Products)” OR SUCH SUCCESSOR SITE AS DESIGNATED BY
mation in this document is complete and accurate at the time of AVAYA, ARE APPLICABLE TO ANYONE WHO DOWNLOADS,
printing, Avaya assumes no liability for any errors. Avaya reserves USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED
the right to make changes and corrections to the information in this FROM AVAYA LLC., ANY AVAYA AFFILIATE, OR AN AVAYA
document without the obligation to notify any person or organization CHANNEL PARTNER (AS APPLICABLE) UNDER A COMMERCIAL
of such changes. AGREEMENT WITH AVAYA OR AN AVAYA CHANNEL PARTNER.
Documentation disclaimer UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING,
AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE
“Documentation” means information published in varying mediums WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN AVAYA
which may include product information, operating instructions and AFFILIATE OR AN AVAYA CHANNEL PARTNER; AVAYA
performance specifications that are generally made available to users RESERVES THE RIGHT TO TAKE LEGAL ACTION AGAINST YOU
of products. Documentation does not include marketing materials. AND ANYONE ELSE USING OR SELLING THE SOFTWARE
Avaya shall not be responsible for any modifications, additions, or de- WITHOUT A LICENSE. BY INSTALLING, DOWNLOADING OR
letions to the original published version of Documentation unless USING THE SOFTWARE, OR AUTHORIZING OTHERS TO DO SO,
such modifications, additions, or deletions were performed by or on YOU, ON BEHALF OF YOURSELF AND THE ENTITY FOR WHOM
the express behalf of Avaya. End User agrees to indemnify and hold YOU ARE INSTALLING, DOWNLOADING OR USING THE
harmless Avaya, Avaya's agents, servants and employees against all SOFTWARE (HEREINAFTER REFERRED TO
claims, lawsuits, demands and judgments arising out of, or in connec- INTERCHANGEABLY AS “YOU” AND “END USER”), AGREE TO
tion with, subsequent modifications, additions or deletions to this doc- THESE TERMS AND CONDITIONS AND CREATE A BINDING
umentation, to the extent made by End User. CONTRACT BETWEEN YOU AND AVAYA LLC OR THE
Link disclaimer APPLICABLE AVAYA AFFILIATE (“AVAYA”).
Avaya is not responsible for the contents or reliability of any linked Avaya grants You a license within the scope of the license types de-
websites referenced within this site or Documentation provided by scribed below, with the exception of Heritage Nortel Software, for
Avaya. Avaya is not responsible for the accuracy of any information, which the scope of the license is detailed below. Where the order
statement or content provided on these sites and does not neces- documentation does not expressly identify a license type, the appli-
sarily endorse the products, services, or information described or of- cable license will be a Designated System License as set forth below
fered within them. Avaya does not guarantee that these links will in the Designated System(s) License (DS) section as applicable. The
work all the time and has no control over the availability of the linked applicable number of licenses and units of capacity for which the li-
pages. cense is granted will be one (1), unless a different number of li-
censes or units of capacity is specified in the documentation or other
Warranty materials available to You. “Software” means computer programs in
Avaya provides a limited warranty on Avaya hardware and software. object code, provided by Avaya or an Avaya Channel Partner,
Refer to your sales agreement to establish the terms of the limited whether as stand-alone products, pre-installed on hardware prod-
warranty. In addition, Avaya’s standard warranty language, as well as ucts, and any upgrades, updates, patches, bug fixes, or modified
information regarding support for this product while under warranty is versions thereto. “Designated Processor” means a single stand-
available to Avaya customers and other parties through the Avaya alone computing device. “Server” means a set of Designated Pro-
Support website: https://support.avaya.com/helpcenter/ getGener- cessors that hosts (physically or virtually) a software application to
icDetails?detailId=C20091120112456651010 under the link “Warranty be accessed by multiple users. “Instance” means a single copy of
& Product Lifecycle” or such successor site as designated by Avaya. the Software executing at a particular time: (i) on one physical ma-
Please note that if You acquired the product(s) from an authorized chine; or (ii) on one deployed software virtual machine (“VM”) or sim-
Avaya Channel Partner outside of the United States and Canada, the ilar deployment.
warranty is provided to You by said Avaya Channel Partner and not License types
by Avaya.
Designated System(s) License (DS). End User may install and use
“Hosted Service” means an Avaya hosted service subscription that each copy or an Instance of the Software only: 1) on a number of
You acquire from either Avaya or an authorized Avaya Channel Part- Designated Processors up to the number indicated in the order; or 2)
ner (as applicable) and which is described further in Hosted SAS or up to the number of Instances of the Software as indicated in the or-
other service description documentation regarding the applicable der, Documentation, or as authorized by Avaya in writing. Avaya
hosted service. If You purchase a Hosted Service subscription, the may require the Designated Processor(s) to be identified in the order
foregoing limited warranty may not apply but You may be entitled to by type, serial number, feature key, Instance, location or other spe-
support services in connection with the Hosted Service as described cific designation, or to be provided by End User to Avaya through
further in your service description documents for the applicable electronic means established by Avaya specifically for this purpose.
Hosted Service. Contact Avaya or Avaya Channel Partner (as appli-
cable) for more information. Named User License (NU). You may: (i) install and use each copy or
Instance of the Software on a single Designated Processor or Server
Hosted Service per authorized Named User (defined below); or (ii) install and use
each copy or Instance of the Software on a Server so long as only
THE FOLLOWING APPLIES ONLY IF YOU PURCHASE AN AVAYA
authorized Named Users access and use the Software. “Named
HOSTED SERVICE SUBSCRIPTION FROM AVAYA OR AN AVAYA
User”, means a user or device that has been expressly authorized by
CHANNEL PARTNER (AS APPLICABLE), THE TERMS OF USE
Avaya to access and use the Software. At Avaya’s sole discretion, a
FOR HOSTED SERVICES ARE AVAILABLE ON THE AVAYA
“Named User” may be, without limitation, designated by name, cor-
WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO UNDER
porate function (e.g., webmaster or helpdesk), an e-mail or voice
THE LINK “Avaya Terms of Use for Hosted Services” OR SUCH
mail account in the name of a person or corporate function, or a di-
SUCCESSOR SITE AS DESIGNATED BY AVAYA, AND ARE
rectory entry in the administrative database utilized by the Software
APPLICABLE TO ANYONE WHO ACCESSES OR USES THE
that permits one user to interface with the Software.
HOSTED SERVICE. BY ACCESSING OR USING THE HOSTED
SERVICE, OR AUTHORIZING OTHERS TO DO SO, YOU, ON Shrinkwrap License (SR). You may install and use the Software in
BEHALF OF YOURSELF AND THE ENTITY FOR WHOM YOU ARE accordance with the terms and conditions of the applicable license
DOING SO (HEREINAFTER REFERRED TO INTERCHANGEABLY agreements, such as “shrinkwrap” or “clickthrough” license accom-
AS “YOU” AND “END USER”), AGREE TO THE TERMS OF USE. IF panying or applicable to the Software (“Shrinkwrap License”).
YOU ARE ACCEPTING THE TERMS OF USE ON BEHALF A
COMPANY OR OTHER LEGAL ENTITY, YOU REPRESENT THAT
YOU HAVE THE AUTHORITY TO BIND SUCH ENTITY TO THESE Heritage Nortel Software
TERMS OF USE. IF YOU DO NOT HAVE SUCH AUTHORITY, OR IF
YOU DO NOT WISH TO ACCEPT THESE TERMS OF USE, YOU “Heritage Nortel Software” means the software that was acquired by
MUST NOT ACCESS OR USE THE HOSTED SERVICE OR Avaya as part of its purchase of the Nortel Enterprise Solutions Busi-
AUTHORIZE ANYONE TO ACCESS OR USE THE HOSTED ness in December 2009. The Heritage Nortel Software is the software
SERVICE. contained within the list of Heritage Nortel Products located at
https://support.avaya.com/LicenseInfo under the link “Heritage Nortel
Products” or such successor site as designated by Avaya. For Herit- HOSTING OF AVAYA PRODUCTS MUST BE AUTHORIZED IN
age Nortel Software, Avaya grants Customer a license to use Herit- WRITING BY AVAYA AND IF THOSE HOSTED PRODUCTS USE OR
age Nortel Software provided hereunder solely to the extent of the EMBED CERTAIN THIRD PARTY SOFTWARE, INCLUDING BUT
authorized activation or authorized usage level, solely for the pur- NOT LIMITED TO MICROSOFT SOFTWARE OR CODECS, THE
pose specified in the Documentation, and solely as embedded in, for AVAYA CHANNEL PARTNER IS REQUIRED TO INDEPENDENTLY
execution on, or for communication with Avaya equipment. OBTAIN ANY APPLICABLE LICENSE AGREEMENTS, AT THE
Charges for Heritage Nortel Software may be based on extent of AVAYA CHANNEL PARTNER’S EXPENSE, DIRECTLY FROM THE
activation or use authorized as specified in an order or invoice. APPLICABLE THIRD PARTY SUPPLIER.
Copyright WITH RESPECT TO CODECS, IF THE AVAYA CHANNEL
PARTNER IS HOSTING ANY PRODUCTS THAT USE OR EMBED
Except where expressly stated otherwise, no use should be made of
THE H.264 CODEC OR H.265 CODEC, THE AVAYA CHANNEL
materials on this site, the Documentation, Software, Hosted Service, PARTNER ACKNOWLEDGES AND AGREES THE AVAYA
or hardware provided by Avaya. All content on this site, the docu-
CHANNEL PARTNER IS RESPONSIBLE FOR ANY AND ALL
mentation, Hosted Service, and the product provided by Avaya in-
RELATED FEES AND/OR ROYALTIES. THE H.264 (AVC) CODEC
cluding the selection, arrangement and design of the content is
IS LICENSED UNDER THE AVC PATENT PORTFOLIO LICENSE
owned either by Avaya or its licensors and is protected by copyright
FOR THE PERSONAL USE OF A CONSUMER OR OTHER USES
and other intellectual property laws including the sui generis rights IN WHICH IT DOES NOT RECEIVE REMUNERATION TO: (I)
relating to the protection of databases. You may not modify, copy,
ENCODE VIDEO IN COMPLIANCE WITH THE AVC STANDARD
reproduce, republish, upload, post, transmit or distribute in any way (“AVC VIDEO”) AND/OR (II) DECODE AVC VIDEO THAT WAS
any content, in whole or in part, including any code and software un-
ENCODED BY A CONSUMER ENGAGED IN A PERSONAL
less expressly authorized by Avaya. Unauthorized reproduction, ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO PROVIDER
transmission, dissemination, storage, and or use without the express
LICENSED TO PROVIDE AVC VIDEO. NO LICENSE IS GRANTED
written consent of Avaya can be a criminal, as well as a civil offense OR SHALL BE IMPLIED FOR ANY OTHER USE. ADDITIONAL
under the applicable law.
INFORMATION FOR H.264 (AVC) AND H.265 (HEVC) CODECS
Virtualization MAY BE OBTAINED FROM MPEG LA, L.L.C. SEE HTTP://
WWW.MPEGLA.COM.
The following applies if the product is deployed on a virtual machine.
Each product has its own ordering code and license types. Unless Compliance with Laws
otherwise stated, each Instance of a product must be separately li- You acknowledge and agree that it is Your responsibility for comply-
censed and ordered. For example, if the end user customer or Avaya ing with any applicable laws and regulations, including, but not limited
Channel Partner would like to install two Instances of the same type to laws and regulations related to call recording, data privacy, intellec-
of products, then two products of that type must be ordered. tual property, trade secret, fraud, and music performance rights, in
Third Party Components the country or territory where the Avaya product is used.
“Third Party Components” mean certain software programs or por- Preventing Toll Fraud
tions thereof included in the Software or Hosted Service may contain “Toll Fraud” is the unauthorized use of your telecommunications sys-
software (including open source software) distributed under third tem by an unauthorized party (for example, a person who is not a
party agreements (“Third Party Components”), which contain terms corporate employee, agent, subcontractor, or is not working on your
regarding the rights to use certain portions of the Software (“Third
company's behalf). Be aware that there can be a risk of Toll Fraud
Party Terms”). As required, information regarding distributed Linux associated with your system and that, if Toll Fraud occurs, it can re-
OS source code (for those products that have distributed Linux OS
sult in substantial additional charges for your telecommunications
source code) and identifying the copyright holders of the Third Party services.
Components and the Third Party Terms that apply is available in the
products, Documentation or on Avaya’s website at: https:// sup- Avaya Toll Fraud intervention
port.avaya.com/Copyright or such successor site as designated by
If You suspect that You are being victimized by Toll Fraud and You
Avaya. The open source software license terms provided as Third
need technical assistance or support, call Technical Service Center
Party Terms are consistent with the license rights granted in these
Toll Fraud Intervention Hotline at +1-800-643-2353 for the United
Software License Terms, and may contain additional rights benefiting
States and Canada. For additional support telephone numbers, see
You, such as modification and distribution of the open source soft-
the Avaya Support website: https://support.avaya.com or such suc-
ware. The Third Party Terms shall take precedence over these Soft-
cessor site as designated by Avaya.
ware License Terms, solely with respect to the applicable Third Party
Components to the extent that these Software License Terms impose Security Vulnerabilities
greater restrictions on You than the applicable Third Party Terms.
Information about Avaya’s security support policies can be found in
The following applies only if the H.264 (AVC) codec is distributed with the Security Policies and Support section of https:// sup-
the product. THIS PRODUCT IS LICENSED UNDER THE AVC port.avaya.com/security.
PATENT PORTFOLIO LICENSE FOR THE PERSONAL USE OF A
CONSUMER OR OTHER USES IN WHICH IT DOES NOT RECEIVE Suspected Avaya product security vulnerabilities are handled per the
REMUNERATION TO (i) ENCODE VIDEO IN COMPLIANCE WITH Avaya Product Security Support Flow (https:// sup-
THE AVC STANDARD (“AVC VIDEO”) AND/OR (ii) DECODE AVC port.avaya.com/css/P8/documents/100161515).
VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A Downloading Documentation
PERSONAL ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO
PROVIDER LICENSED TO PROVIDE AVC VIDEO. NO LICENSE IS For the most current versions of Documentation, see the Avaya
GRANTED OR SHALL BE IMPLIED FOR ANY OTHER USE. Support website: https://support.avaya.com, or such successor site
ADDITIONAL INFORMATION MAY BE OBTAINED FROM MPEG LA, as designated by Avaya.
L.L.C. SEE HTTP://WWW.MPEGLA.COM. Contact Avaya Support
Service Provider See the Avaya Support website: https://support.avaya.com for product
THE FOLLOWING APPLIES TO AVAYA CHANNEL PARTNER’S or Hosted Service notices and articles, or to report a problem with your
HOSTING OF AVAYA PRODUCTS OR SERVICES. THE PRODUCT Avaya product or Hosted Service. For a list of support telephone num-
OR HOSTED SERVICE MAY USE THIRD PARTY COMPONENTS bers and contact addresses, go to the Avaya Support website:
SUBJECT TO THIRD PARTY TERMS AND REQUIRE A SERVICE https://support.avaya.com (or such successor site as designated by
PROVIDER TO BE INDEPENDENTLY LICENSED DIRECTLY FROM Avaya), scroll to the bottom of the page, and select Contact Avaya
THE THIRD PARTY SUPPLIER. AN AVAYA CHANNEL PARTNER’S Support.
Trademarks
The trademarks, logos and service marks (“Marks”) displayed in this
site, the Documentation, Hosted Service(s), and product(s) provided by
Avaya are the registered or unregistered Marks of Avaya, its affiliates,
its licensors, its suppliers, or other third parties. Users are not permit-
ted to use such Marks without prior written consent from Avaya or such
third party which may own the Mark. Nothing contained in this site, the
Documentation, Hosted Service(s) and product(s) should be construed
as granting, by implication, estoppel, or otherwise, any license or right
in and to the Marks without the express written permission of Avaya or
the applicable third party.
Avaya is a registered trademark of Avaya LLC.
All non-Avaya trademarks are the property of their respective owners.
Linux® is the registered trademark of Linus Torvalds in the U.S. and
other countries.
Table of Contents
1. INTRODUCTION ...................................................................................................................... 6
2. Document Change History .................................................................................................... 7
3. Consent Management ............................................................................................................ 7
4. Security of processing ........................................................................................................... 7
4.1 Security of Control Channel Processing – Data in transit .......................................... 7
4.1.1 Summary of How to Configure the TLS Control Channel Connections ................... 10
4.2 Security of Log Processing – Data in Transit ............................................................ 16
4.3 Security of Media Stream Processing – Data in Transit ........................................... 17
4.4 Protecting Data Transferred from Communcation Manager and Residing on
Another Server ......................................................................................................................... 17
4.5 Security of Processing – Data at Rest ........................................................................ 18
4.5.1 Encryption Terminology ........................................................................................... 18
4.5.2 OS-Level Encryption on Communication Manager ................................................. 20
4.5.3 Encryption Status Command ................................................................................... 24
4.5.4 Encryption Local Key Command ............................................................................. 24
4.5.5 Encryption Remote Key Command ......................................................................... 24
4.5.6 Encryption Passphrase Command .......................................................................... 25
4.5.7 Customer Configuration Upgrade Examples ........................................................... 27
4.5.8 Key Server Alarms ................................................................................................... 28
4.5.8.1 Summary of Communication Manager’s Key Server Inaccessibility
Maintenance Process ......................................................................................................... 28
4.5.8.2 Summary of How CM SNMP’s OID and data is Compiled ............................... 30
4.5.8.3 Summary of CM Server Alarms ........................................................................ 30
4.5.8.4 Summary of CM Alarm Varbinds. ..................................................................... 31
4.5.9 Performance Impact of Data Encryption .................................................................. 34
4.5.10 Backup and Restore ................................................................................................ 34
5. Personal Data Minimization - Retention ............................................................................. 35
5.1 Log Retention Configuration ....................................................................................... 35
6. Security for Administrative Access to Personal Data ...................................................... 39
6.1 Security For Administrative Access to Station Data ................................................. 39
7. Fulfillment of Data Subject Requests ................................................................................. 40
8. Data Anonymization and Pseudonymization .................................................................... 41
9. Maintaining Compliance After a Restore/Change Operation ........................................... 42
10. Trouble Shooting & Diagnostic Operation ....................................................................... 43
Appendix A: Logs Included in Log Retention Administration ............................................... 44
Appendix B: Logs Excluded from Log Retention Administration ......................................... 45
Appendix C: Setting up a Remote key Server ......................................................................... 47
Reference ..................................................................................................................................... 50
Page 5 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
1. INTRODUCTION
This guide provides a set of instructions to advise the Customer’s Data Privacy Administrator on
how to manually administer the Communication Manager (CM) so that the product solution may
best satisfy the care of Personal Data.
Whether on premises or in the cloud, Avaya wants to ensure you have the proper security
and privacy safeguards in place for your data.
Avaya Enterprise Cloud™ provides built-in safeguards to secure customer assets, specifically
customer data. Avaya Enterprise Cloud™ adheres to the following IT security and data privacy
requirements:
• General Data Protection Regulation (GDPR)
For more details about the security and data privacy safeguards Aura Enterprise Cloud can
provide, please refer to the following documents:
• Security for Avaya Enterprise Cloud (April 2023)
• Avaya is responsible for the security and privacy of data that resides in the Aura En-
terprise Cloud.
• The customer will adhere to all of the recommendations made within these Data Pri-
vacy Guidelines.
• The customer will adhere to all governmental data privacy requirements as required
by their business (e.g., GDPR, CCPA, PCI. HIPAA).
The Data Privacy solution will be served by the set of features in the individual product and by the
configuration of these product features as directed by the Customer’s Data Privacy Administrator.
An enterprise wide solution will require that all of the Avaya products be configured to operate in
a systematic and consistent fashion to achieve the Data Privacy policies required by the Avaya
customer to protect the privacy of both employees and their end-customers.
Page 6 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
➢ “Avaya Aura® Communication Manager Feature Description and Implementation” Re-
lease 10.2.x, December 2023.
➢ “Avaya Aura® Communication Manager Screen Reference” Release 10.2.x, December
2023.
➢ “Maintenance Commands for Avaya Aura® Communication Manage, Branch Gateways,
and Servers” Release 10.2.x, December 2023.
➢ Red Hat Enterprise Linux 8 Security Hardening:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/se-
curity_hardening
➢ “Administering Avaya G430 Branch Gateway” Release 10.1.x, December 2021.
➢ “Administering Avaya G450 Branch Gateway” Release 10.1.x, December 2021.
➢ “Avaya G430 Branch Gateway CLI Reference”, Release 10.1.x, December 2021.
➢ “Avaya G450 Branch Gateway CLI Reference”, Release 10.1.x, December 2021.
3. CONSENT MANAGEMENT
The Communication Manager does not provide consent management as part of its feature set.
Instead, the Data Privacy Administrator must find a suitable external consent management solu-
tion.
The solution must be managed so that the Data Privacy Administrator provides a consent request
to the third-party Data Subject (e.g., employee) at initial use and before processing of Personal
Data. The Data Privacy Administrator must securely store this consent information. In addition, if
the Data Subject decides to opt-out for the use of their personal information, the Data Privacy Ad-
ministrator must appropriately remove this personal information from configuration records using
the techniques described later in these configuration notes.
4. SECURITY OF PROCESSING
4.1 SECURITY OF CONTROL CHANNEL PROCESSING – DATA IN TRANSIT
The product must be configured so that all Personal Data in transit is encrypted.
The Data Privacy Administrator must configure the Communication Manager such that:
• The browser connection for Web-based administration is provided by a TLS connection.
• The SIP signaling links to peer CM and SM servers is provided by a TLS connection.
• The H.248 Control link between gateway and CM is provided by a TLS connection.
Page 7 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
• The control links to adjuncts (AES, CMS, CDR) is provided by a TLS connection. Some
of these are a new feature in 10.2.
• The H.323 signaling link between H323 phones and CM is provided by a TLS connection.
• All Syslog communication to remote Syslog server(s) must be conveyed over a TLS con-
nection. This is a new feature in 10.2.
To configure TLS connections, it is important to load Identity and CA certificates onto Communi-
cation Manager using the SMI interface pages for certificate management.
Details on how to administer TLS and Certificate Management on Communication Manger can be
found in the whitepaper “TLS & Certificate Management Guidelines for CM R7.1” and in the ad-
ministration documents as enumerated in the Abstract section.
Page 8 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Figure 1: TLS Links Employed by Communication Manager with Identity Certificates
Page 9 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
4.1.1 Summary of How to Configure the TLS Control Channel Connections
With reference to Figure 1, the configuration of the TLS encryption option for transport of control
channels is spread across several unique feature administration steps that are supplied by both
the SAT interface and the web-based SMI pages. To help guide the customer to the correct docu-
mentation, the subsection will summarize the location of the necessary administration screens.
For some of the less common commands, sample administrative screen captures are provided to
help the customer locate the administrative fields on these screens.
Page 10 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Figure 2: TLS Link for CDR1 and CDR2 Application
Page 11 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
add media-gateway next Page 1 of 2
MEDIA GATEWAY 3
Type: g450
Name:
Serial No:
Link Encryption Type: TLS-only
Network Region: Location: 1
Site Data:
Recovery Rule: none
Registered? n
FW Version/HW Vintage:
MGP IPV4 Address:
MGP IPV6 Address:
Controller IP Address:
MAC Address:
Mutual Authentication? y
Page 12 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Figure 4: TLS Link for H.323 Phone on CM’s IP Network Region Form
Page 13 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
d. The ‘Server Access’ SMI page has a middle pane which is entitled “Minimum
TLS Version”. The field name “Filesync connections” must be configured. to op-
erate successfully with the version of CM supported on the customer site. We
recommend that “TLS Version 1.2” be selected for best security.
Page 14 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Figure 5: TLS Link for the Processor Channel between CM and the CMS Server
Page 15 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
4.2 SECURITY OF LOG PROCESSING – DATA IN TRANSIT
Communication Manager provides the ability for a Data Privacy Administrator to select the use of
TLS transport of the log information which is to be conveyed to a remote Syslog server.
CM supports a pane entitled ‘Syslog Servers’ on the ‘Server Log Files SMI” configuration web
page. Figure 6 illustrates the configuration page.
Page 16 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Details on how to administer TLS and Certificate Management on CM can be found in the white-
paper “TLS & Certificate Management Guidelines for CM R7.1” and in the administration docu-
ments as enumerated on the Abstract section.
There is a “filter” option that allows the Data Privacy Administrator to select which log events may
be sent via Syslog over to the remote Syslog server. The categories are:
• Security events
• CM IP events
• Command History of the Linux shell
• Kernel events
• General message events (for the OS).
Communication Manager operates as a feature server and directs all the media handling which
the G4xx gateway and AMS Software media gateway anchors. Communication Manager is the
“Master” or “Head End” server and the Gateway is the directed “Slave” device in this relationship.
On the Communication Manager SAT administrative interface, the properties for the codec set
and IP network region define how voice and video media streams are managed.
Specifically, on the IP Codec SET form the following items must be configured:
• ‘Media Encryption’ must be set for using either AES128 or AES256 for encrypted RTP
operation.
• ‘Encrypted SRTCP’ must be set for proper operation.
Once this information is configured on Communication Manager, it will be pushed down across
the H.248 control channel to the G4xx Media gateway and via the SIP control link to Avaya Media
Server; so that call connections, involving the gateway, will be established using the desired se-
curity services by the Data Privacy Administrator.
The Data Privacy Administration must ensure that all data transferred from Communication Man-
ager to another server is stored in a secure manner.
This includes:
• Backups
• Call Detail Record (CDR) Data
• All Logs transferred to a remote server via Remote Syslog
• Configuration data on the Main CM server which is shadowed over to memory on the Du-
plicated CM server.
• Configuration data on the Main CM server which is remotely filesync-ed down to the sur-
vivable processor (ESS or LSP).
Page 17 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
4.5 SECURITY OF PROCESSING – DATA AT REST
The following terminology is used in this guide when describing the Data Encryption feature:
Communication
Manager
CLEVIS – a Red Hat Enterprise Linux client application used on Communication Manager to
retrieve a remote encryption key during system startup.
Data at Rest – Data that resides on the Avaya Aura® Communication Manager application’s
Disk drive(s).
Encryption of Data at Rest - Encryption of Data at Rest that is implemented using Linux
Unified Key Setup (LUKS) OS-Level Encryption.
Linux Unified Key Setup (LUKS) – A method of encryption provided by the Linux Operating
system that will automatically encrypt any data that is written to the disk and will automatically
decrypt the data when it is read from the disk.
Local Key – A key file that is stored locally on the server to gain access to the Encrypted
Data at Rest. A Local key may be used instead of having to manually entering an Encryption
Page 18 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Passphrase at system startup. Although convenient, it is not very secure and should be used
temporarily and with caution.
Communication
Manager
Keyfile
Remote Key –a key that is provided by a separate, Remote Key Server to gain access to the
Encrypted Data at Rest. A Remote Key may be used instead of having to manually enter an
Encryption Passphrase at system startup (Recommended).
Remote Key Server – a remote server running the Linux TANG application.
During system startup, Communication Manager client uses the Linux CLEVIS application to
request a remote key from the Remote Key Server.
TANG – a Red Hat Enterprise Linux server application used by a Remote Key Server to pro-
vide a remote encryption key during a Communication Manager’s system startup.
Page 19 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
4.5.2 OS-Level Encryption on Communication Manager
• For OVA-based deployment, the file system is typically partitioned across individual disk
partitions as follows:
1. Application object code is located on one disk partition.
2. Operational data (static configuration & dynamic processing data) is located on
another disk partition.
3. The /var/log data typically resides on another disk partition.
Avaya has defined that the “Operational data”, “Backup data”, “Configuration data”, and
“/var/log data” reside in a structure that is encrypted. This approach ensures that per-
sonal data will be encrypted along with the normal operational data.
Important! SDM Release 10.2 or later must be used when using SDM to deploy the Release
10.2 OVA. The Data Encryption options described below may not be correctly displayed in earlier
versions of SDM.
This will provide the appropriate disk partitioning to support the encryption process. Additionally,
CM Feature Package 10.2 must be installed. Figure 10 and Figure 11 illustrate this installation
screen. The following steps will be required for the OVA installation:
1) The installer tool will check the OVF structure to see if “encryption_supported is set to
“true”. If this is correct, proceed to step #2.
2) An explicit conformation will be required by the customer to indicate whether OS-level en-
cryption should be enabled or disabled.
NOTE: It is extremely important that you remember the Encryption Passphrase and
keep it secure! There is no way to recover an Encryption Passphrase! If an Encryp-
tion Passphrase is forgotten, the only solution is to first re-deploy the Release with
OVA.
4) If the “Encryption Passphrase” is valid and meets the complexity policy of LUKS, the in-
staller will pass this “Encryption Passphrase” in the environment file to the application’s
bootloader.
5) On finding the Encryption Passphrase present in the environment file, the application’s
bootloader will send this Encryption Passphrase to the LUKS utility service. This will re-
sult in LUKS creating an encryption key and will store this so that it may only be ac-
cessed by the “Encryption Passphrase”.
Page 20 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
6) Finally, the Installer will present an option:
• Require Encryption Passphrase at Boot-Time.
• If you leave this box “checked”, the Avaya Application’s bootloader will require
that this Encryption Passphrase be manually re-entered whenever the system is
rebooted.
• If you “uncheck” the box, the Avaya application’s bootloader will create a local
key file. This will allow the Application’s bootloader to start unattended without
needing to re-enter the Encryption Passphrase.
Once the application has booted up, the Release 10.2 and later Avaya Aura® application
will support a set of OS-CLI commands for viewing the administrative settings, managing
the Local Key Store and configuring the Remote Key Server(s).
These commands are:
• encryptionStatus
• encryptionLocalKey
• encryptionRemoteKey
• encryptionPassphrase
7) When the OVA is installed and when encryption has been enabled, the Clevis client will
install a ‘clevis” administration account on CM.
• This account in not accessible by any other administration account.
• The account has a status description of “ /sbin/nologin” and the account is
locked.
SECURITY
NOTE 1: The use of a Remote Key Server is the most secure environment and is recommended.
NOTE 2: The use of the LocalKey is not as secure and should be used with caution. Its primary
purpose is to serve during a staging period of product installation. There may be some key diag-
nostic sessions in which it is advantageous to use this feature when the network is down, and the
Remote Key Server(s) are inaccessible.
NOTE 1: In previous versions of Avaya Aura® Communication Manager, when Solution Deploy-
ment Manager was used to upgrade from one major release to a new major release (using a new
OVA) SDM would preserve the old system’s logs and home directories and attach that to the new
system thus preserving that data. Due to the nature of the disk encryption technology being used,
that functionality is now disabled. The SDM installation process will no longer copy the old /var
and /var/logs from the old system to the new system, even if the user chooses not to encrypt.
Page 21 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Figure 10: OVA Installation Administration Screen 1
Page 22 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Figure 11: OVA Installation Administration Screen 2
Page 23 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
4.5.3 Encryption Status Command
NOTE 1: Once the customer has successful installed the 10.2 OVA and has subsequently added
the CM Feature Pack 10.2, if the customer types this command, the presence of a response is an
indication that 10.2 is successfully loaded.
NOTE 2: After the Data Privacy Administrator has completed the 10.2 patch install, a new termi-
nal session must be opened in order to invoke the encryptionStatus CLI command.
NOTE 3: If the Remote Key Server is down, then the encryptionStatus command may take
around 2 minutes and 10 seconds to execute.
Once the Avaya Aura® 10.2 Communication Manager has booted-up, the following OS-CLI com-
mand is available to check the status of encryption:
➢ encryptionStatus
o This command is available via a customer suser account.
o This command displays the status of the data encryption options.
o The display shall be as follows:
data encryption: {enabled | disabled}
local key: {enabled | disabled}
Encryption Passphrase required at boot-time: {yes/no}
remoteKeyServers:
remoteServer1 IPaddr, port {accessible/not accessible}
…
remoteServer6 IPaddr, port {accessible/not accessible}
NOTE: The primary usage case for this command is for the case where the customer leaves the
“Require Encryption Passphrase at Boot-Time” box checked and then discovers that he would
rather operate with the Local Key. He could issue a CLI command for “encryptionLocalKey ena-
ble” to configure the Local Key.
Subsequently, a customer may wish to disable the Local Key and return to an Encryption Pass-
phrase operation by using the command “encryptionLocalKey disable”.
A Local Key entry will have precedence for access on a Remote Key Server search if there are
entries for both Local Key and Remote Key Server in this LUKS table.
Page 24 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
o This command informs the application that the Remote Key Server table is to be con-
figured. These commands result in changes to the Encryption Slot table (under con-
trol of Red Hat).
o The command options are:
• add: Add a server address to the Remote Key Server table.
▪ The associated parameter is “address”.
• remove: Remove a server address from the Remote Key Server table.
▪ The associated parameter is “address”.
• list: List all of the entries in the Remote Key Server table.
• [address] specifies the IP address of the given Remote Key Server.
▪ The address may be IPv4 or IPv6.
▪ Alternatively, the address may be an FQDN.
• [port] specifies the TCP port number used to reach the given Remote Key server.
➢ Output response is “Local Key is now disabled”.
Once one or more entries are added to the Remote Key Server table:
1) If one or more entries are entered into the Remote Key Server table, then the Local Key
will be disabled.
2) If customer subsequently desires to use the Local Key (even with one or more Remote
Key Servers provisioned, he may execute the “encryptionLocalKey enable” CLI com-
mand.
3) A maximum of six entries may be entered into the Remote Key Server table. If there are
seven entries, the customer must “remove” one entry before attempting to add another
entry.
4) In the CM application there will be a maintenance routine which will periodically (once
every 15 minutes) attempt to access the Remote Server address(s) in the Encryption Slot
table. If a server address in unavailable, the CM application shall issue an alarm.
Page 25 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
o To add another Encryption Passphrase, you must identify yourself by
typing a current passphrase.
o Interactively, you will be asked to enter:
❖ Current Encryption Passphrase
❖ New Encryption Passphrase
❖ Confirm New Encryption Passphrase
• remove: Remove one of the Encryption Passphrase(s) from the Encryption Slot
table.
NOTE1: It is more secure if the customer will select a unique Encryption Passphrase for each
virtual application server which is created.
NOTE2: LUKS supports the ability to support more than one Encryption Passphrase. So, we
have continued this ability with our CM-OSI commands.
a) For simplicity, we require a minimum on one entry for an Encryption Passphrase, one en-
try to accommodate changing the Encryption Passphrase, and the final six entries may
be used for either Remote Key Server addresses or additional manual Passphrase(s).
b) If a customer has a Remote Key Server and subsequently (for staging or diagnostic pur-
poses) wish to enable the Local Key option, this will also occupy a Encryption Slot.
This will result in the status table to show:
c) Note that once the Local Key option is enabled (as in part (b)), that if the customer subse-
quently then enables another Remote Key server, this will cause the Local Key option to
be disabled.
Page 26 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
4.5.6.1.1 Encryption Slots
Encryption slots are used to maintain the product’s encryption configuration. Each Encryption
Passphrase, Local Key, or Remote Key Server consumes one encryption slot. A total of 31 en-
cryption slots are available for use by the administrator of the Avaya Aura® Communication Man-
ager application and one slot is reserved for internal use.
Encryption slots are displayed by the “encryptionPassphrase list” and “encryptionRemoteKey list”
commands:
$ encryptionPassphrase list
➢ Scenario 1A: Existing customer desires data encryption feature & does not want to use
Remote Key Server, & DOES want to enter Boot-Time Passphrase
1) Customer deploys the 10.2 OVA for the desired target application.
a) Customer enters “Enable” for data encryption.
b) Customer checks the option “Require Encryption Passphrase at Boot-
Time” to enable the Local Key.
2) Customer then installs FP/SP for 10.2 if available.
➢ Scenario 1B: Existing customer or a green field customer desires data encryption fea-
ture & does not want to use the Remote Key Server, & does NOT want to enter Boot-
Time Passphrase
1) Customer deploys the 10.2 OVA for the desired target application.
a) Customer enters “Enable” for data encryption.
b) Customer unchecks the option “Require Encryption Passphrase at Boot-
Time” to enable the Local Key.
2) Customer then installs FP/SP for 10.2 if available.
➢ Scenario 2: Existing customer or a green field customer desires data encryption feature
& does not want to use the Remote Key Server, & does NOT want to enter Boot-Time
Passphrase
1) Customer deploys the 10.2 OVA for the desired target application.
a) Customer enters “Enable” for data encryption.
b) Customer unchecks the option “Require Encryption Passphrase at Boot-
Time” to enable the Local Key.
2) Customer then installs FP/SP for 10.2 if available.
➢ Scenario 3: Existing customer desires data encryption feature & does want to use Re-
mote Key Server.
1) Customer deploys the 10.2 OVA for the desired target application.
Page 27 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
a) Customer enters “Enable” for data encryption.
b) Customer unchecks the option “Require Encryption Passphrase at Boot-
Time” to enable the Local Key.
2) Customer then installs FP/SP for 10.2 if available.
3) Customer supplies their own Remote Key Server.
4) The customer issue the OS-CLI command for “encryptionRemoteKey” to enter
one or more addresses for the Remote Key Server(s).
a) The Local Key will automatically be disabled.
➢ Scenario 4: Existing customer or green field customer desires data encryption feature &
does want to use Remote Key Server.
1) Customer deploys the 10.2 OVA for the desired target application.
a) Customer enters “Enable” for data encryption.
b) Customer unchecks the option “Require Encryption Passphrase at Boot-
Time” for enable Local Key.
2) Customer then installs FP/SP for 10.2 if available.
3) Customer supplies their own Remote Key Server.
4) The customer issue the OS-CLI command for “encryptionRemoteKey” to enter
one or more addresses for the Remote Key Server(s).
a) The Local Key will automatically be disabled.
➢ Scenario 5: Existing customer was using the Local Key and now decides to upgrade his
security to begin using a Remote Key Server.
1) Customer supplies their own Remote Key Server.
2) The customer issues the OS-CLI command for “encryptionRemoteKey” to enter
one or more addresses for the Remote Key Server(s).
a) The Local Key will automatically be disabled.
The 10.2 feature of OS-Level Encryption provides for the strong security support that has the en-
cryption key stored in a Remote Key Server. For redundancy purposes, it is possible for a single
Communication Manager to point to more than one key server. The design supports a maximum
of six key servers to be supported.
If there should be a problem with accessing the Remote Key Server(s), this could create prob-
lems when the Communication Manager application undergoes a reboot operation. To help the
Services organization(s), there is a maintenance process which continuously scans access to
these servers and if there is an outage, an alarm is posted and an SNMP trap message is send.
There is a Key Server Accessibility shell script that will execute at a rate of once every 15 minutes
to go out and check the list of configured Remote Key Servers to see if they are all accessible.
This shell script will invoke the “encryptionStatus” OS-CLI command to obtain the list of config-
ured servers, along with the IP address and the status of whether the access is “accessible” or
“not-accessible”.
Page 28 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
In response to an SNMP alarm, the customer/craftsperson should manually invoke the “encryp-
tionStatus” OS-CLI command to obtain the precise status about which Remote Key server has
either entered an alarm state or has resolved the alarm. For illustrative purpose, the following
subsection provides a scenario of how alarms are raised and cleared when access to the Re-
mote Key Server(s) is changing with time.
3. Remote Key Server Y also becomes unavailable (leaving no remote key servers accessi-
ble)
a. CCM generates a warning alarm for avCMAlmServMinor notification type.
b. In the varbind group, avCmAlmServEvtID = 11 to denote a warning that no serv-
ers are accessable
c. In the varbind group, avCmalmAlarmSeverity = 5 to denote a minor
d. In the varbind group, avCmAlmAlarmDescription is filled with the string “all key
servers are unreachable”.
Page 29 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
e. There are now no alarms outstanding.
All SNMP operations involve access to an object instance. Recall that only “leaf” objects in the
object identifier tree may be accessed (that is only scalar objects).
It is possible in SNMP to group a number of operations to the same trap into a single message.
Thus, a management operator may get the values of all the scalar objects of this particular group
in a single SNMP trap message, listing all values.
To implement multiple-object exchanges, the SNMP PDU includes a “variableBindings” field. This
field consists of a sequence of references to object instances, together with the value of those ob-
jects. This sequence list is commonly referred to as the “varbind” list. In the case of the CM trap
structure, we use a set of eleven objects in the varbind group.
The set of “notifications” for sending trap messages for the category of CM Server Alarms
is shown in the list below.
Note 1: Only the “Minor”, “Warning”, and “Resolved” Notification messages are employed
with the Remote Key Server Alarms.
Note 2: The full OID is the base OID & the Notification number.
For example, 1.3.1.4.1.6889.2.73.9.0.3001 is the full OID for Minor server alarm.
Note3: The Varbind list varies by the alarm type. Not that the difference between an
“alarm” and a “Resolved (clearing) alarm” is that the “resolved date/time” is substituted
for “alarmed data/time”.
-- 1.3.1.4.1.6889.2.73.9.0.3001
avCmAlmServMinor NOTIFICATION-TYPE
OBJECTS { avCmAlmIPAddress, avCmAlmSystemName, avCmAlmProductID,
avCmAlmServSourceName, avCmAlmServEvtID,
avCmAlmAlarmSeverity, avCmAlmOrigModAlarmSeverity,
avCmAlmAlarmedDate, avCmAlmAlarmedTime,
avCmAlmServLogID, avCmAlmServAlarmDescription }
STATUS current
DESCRIPTION " A Minor Server alarm has been generated by the
system. "
::= { avCmAlmNotifications 3001 }
-- 1.3.1.4.1.6889.2.73.9.0.3002
avCmAlmServWarning NOTIFICATION-TYPE
OBJECTS { avCmAlmIPAddress, avCmAlmSystemName, avCmAlmProductID,
avCmAlmServSourceName, avCmAlmServEvtID,
avCmAlmAlarmSeverity, avCmAlmOrigModAlarmSeverity,
avCmAlmAlarmedDate, avCmAlmAlarmedTime,
avCmAlmServLogID, avCmAlmServAlarmDescription }
STATUS current
Page 30 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
DESCRIPTION " A Warning Server alarm has been generated by the
system. "
::= { avCmAlmNotifications 3002 }
-- 1.3.1.4.1.6889.2.73.9.0.3003
avCmAlmServResolved NOTIFICATION-TYPE
OBJECTS { avCmAlmIPAddress, avCmAlmSystemName, avCmAlmProductID,
avCmAlmServSourceName, avCmAlmServEvtID,
avCmAlmAlarmSeverity, avCmAlmOrigModAlarmSeverity,
avCmAlmResolvedDate, avCmAlmResolvedTime,
avCmAlmServLogID, avCmAlmServAlarmDescription }
STATUS current
DESCRIPTION " A Server Alarm has been resolved by the system. "
::= { avCmAlmNotifications 3003 }
Page 31 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Alarm Varbind List Value Notes
warning (6)
avCmAlmOrigModAlarm- Char string (11 max) This object contains the original alarm se-
Severity verity as well as the modified/reported
alarm severity of a CM process alarm.
1.3.6.1.4.1.6889.2.73.9.1.1.9
avCmAlmAlarmedDate Char string (5) This is the date that the alarm was gener-
ated by the source CMprocess.
1.3.6.1.4.1.6889.2.73.9.1.1.10 Day/Month in format “11/12”.
This is applied by the GMM.
avCmAlmAlarmedTime Char string (8) This is the time that the alarm was gener-
ated by the source CM process.
1.3.6.1.4.1.6889.2.73.9.1.1.11 Time in hours/min/sec in format
“xx:yy:zz”.
This is applied by the GMM.
avCmAlmServLogID Char string (5 max) Logical ID for the server location. This is
set to “A’
1.3.6.1.4.1.6889.2.73.9.1.1.32
The full set of choices are:
• “*” for Security
• “A” for Application
• “S” for System
• “M” for System Mgmt.
avCmAlmServAlarmDescrip- Char string (80) Dependent upon the alarm condition with
tion respect to Key server access, one of the
following strings is included in this field:
1.3.6.1.4.1.6889.2.73.9.1.1.33
• “one or more key servers are un-
reachable”.
• “all key servers are unreachable”.
• “all key servers are reachable”.
avCmAlmSystemName Char string (256 max) Host name of the CM server sending this
alarm.
1.3.6.1.4.1.6889.2.73.9.1.1.2 This is applied by the GMM.
avCmAlmProductID Char string (11 max) This is the CM product ID of the system
which is sending the trap notification.
1.3.6.1.4.1.6889.2.73.9.1.1.3 This is applied by the GMM.
Page 32 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Alarm Varbind List Value Notes
avCmAlmSourceName Char String (10 max) This is the source name for the server
1.3.6.1.4.1.6889.2.73.9.1.1.30 alarm.
• “_LX”.
avCmAlmServEvtID Char string (5 max) This is set to event type for the server
alarm.
1.3.6.1.4.1.6889.2.73.9.1.1.31 • “10” for “warning, one or more key
servers are unreachable”
• “11” for “minor, all key servers are
unreachable”
avCmAlrmAlarmSeverity Char string (3 max) This contains the alarm severity of the CM
process
1.3.6.1.4.1.6889.2.73.9.1.1.8
Gateway products use a list with the fol-
lowing values:
cleared (1),
indeterminate (2),
critical (3),
major (4),
minor (5),
warning (6)
avCmAlmOrigModAlarm- Char string (11 max) This object contains the original alarm se-
Severity verity as well as the
modified/reported alarm severity of a CM
1.3.6.1.4.1.6889.2.73.9.1.1.9 process alarm.
avCmAlmResolvedDate Char string (5) This is the date that the alarm was re-
solved (cleared) by the source CMprocess.
1.3.6.1.4.1.6889.2.73.9.1.1.12 Day/Month in format “11/12”.
This is applied by the GMM.
avCmAlmResolvedTime Char string (8) This is the time that the alarm was re-
solved (cleared) by the source CM pro-
1.3.6.1.4.1.6889.2.73.9.1.1.13 cess.
Time in hours/min/sec in format
“xx:yy:zz”.
This is applied by the GMM.
avCmAlmServLogID Char string (5 max) Logical ID for the server location. This is
set to “A’
1.3.6.1.4.1.6889.2.73.9.1.1.32
The full set of choices are:
• “*” for Security
• “A” for Application
• “S” for System
• “M” for System Mgmt.
Page 33 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Alarm Varbind List Value Notes
avCmAlmServAlarmDescrip- Char string (80) Dependent upon the alarm condition with
tion respect to Key server access, one of the
following strings is included in this field:
1.3.6.1.4.1.6889.2.73.9.1.1.33
• “one or more key servers are un-
reachable”.
• “all key servers are unreachable”.
• “all key servers are reachable”.
Data Encryption using OS-Level Encryption appears to have very little impact on the performance
of Communication Manager (less than 2%).
The operation of all backup and restore features will work the same regardless of whether OS
Level Encryption has been enabled. This means that data can be freely transferred to and from
encrypted and unencrypted filesystems.
Specifically,
• Backups from an unencrypted filesystem can be restored to either an unencrypted or an
encrypted filesystem.
• Backups from an encrypted filesystem can be restored to either an unencrypted or an en-
crypted filesystem.
Page 34 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
5. PERSONAL DATA MINIMIZATION - RETENTION
The Communication Manager will only collect and process the Personal Data necessary to per-
form the purpose of the call processing.
The Data Privacy Administrator shall use the logging feature in a secure and careful fashion. Only
those logs that are necessary for the maintenance of the gateway product shall be used and
shared with service providers.
NOTE: The Survivable CDR reporting is administrated separately from the Communication Man-
ager Main server. the Log Retention configuration parameters are saved in a Registry file on the
CM main server. This Registry file is pushed by the Filesync procedure and sent down to the Sur-
vivable server (ESS and LSP). The Customer/Craft person may access these Log Retention fea-
tures via the administrative interface on the Survivable server and modify some of the values. But
these new settings may not be “saved” in the translation records after a reboot/restart event.
With reference to Figure 12, there is a parameter named “CDR Retention (days) which is how the
Data Privacy Administrator would configure the log retention for the CDR logs. The following is a
summary of the capabilities:
o The current design has a capacity for storage of 20 files (each 20 Mbytes in size).
o The customer can access these files via the CDR account profile. With this account pro-
file, the customer may transfer and remove files in the directory /var/home/ftp/CDR.
o The range of the retention is from 1 to 20 days.
▪ Note that the CM’s CDR Capacity Scan will delete the oldest of the twenty aged
log files. So, this leaves 19 collected days plus the current day.
Page 35 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Figure 12: System Parameters -CDR SAT page –Log Retention Configuration
With reference to Figure 13, on the SMI page for ‘Server Log Files’ there has been a bottom
pane added for “Log Retention Period”. On this administrative pane, the customer may configure
the retention period (days) and the capacity (megabytes for the following:
1) Command History (include SAT interface and SMI interface activity, along with OS-CLI
commands)
a. The days of log events collected can be configured from 0 to 365 days.
b. The storage capacity may be configured from 1 to 600 megabytes.
2) CM ecs log files (including MST traces)
a. The days of log events collected can be configured from 0 to 30 days.
b. The storage capacity can be configured from 100 to 1000 megabytes.
i. From empirical experience, these can grow by 100 megabytes per day if
the customer/services craft are collecting MST traces, so they may fill
Page 36 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
storage capacity in ten days. The customer/services craft is responsible
for off-loading the collected information every few days.
3) Linux OS level general logs
a. The days of log events collected can be configured from 0 to 180 days.
b. The storage capacity can be configured from 1 to 50 megabytes.
General Notes:
• These log categories have been identified as having the potential to have some per-
sonal customer data. For this reason, these log categories have been provided with
the retention period coverage.
• Secondly, it is important to note that Communication Manager rolls-over the daily col-
lection around midnight (12:00AM for the local time zone). If configured for one day
or more, this is the time that the current day of storage becomes entered as “day 1”.
The current “day 1” becomes rolled into “day 2”, and similarly for other days of stor-
age.
• There will always be some log data that is saved in the current file. Only at the rollo-
ver period is that current file transferred into the “day 1” storage.
• If the day is set to “0”, there may be events collected during the partial day. But at
midnight’s rollover, this day’s events would not be stored. So, there is no residual
events saved past the rollover period.
• The Data Privacy Administrator should apply the configuration settings to the CM
Main server. This server will then do a filesync with the survivable processors (ESP
and LSP). While it is possible to log into the survivable processors and to change the
Log Retention feature settings, it should be noted that any of these local changes to
the survivable processors will be overwritten when the main CM server conducts its
daily audits (and resynchronization.
Page 37 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
Figure 13: Server Log Files SMI page –Log Retention Configuration
Cautionary Note: A customer who is experiencing service problems, should not set the Log Re-
tention Period for a duration that is less than 30 days (CDR has a maximum limit of 20 days). This
will allow the Avaya Tier Support personal to gain access to important log information for purpose
of problem re-creation and efficient debugging operation.
Page 38 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
6. SECURITY FOR ADMINISTRATIVE ACCESS TO PERSONAL DATA
Most of the information contained with the SAT screens and the SMI web-based pages, do not
contain personal data. However, through the association of the “name” field on the station form
and the “extension number” it would be possible to start a search of administration records and
associate of some information across the other administration fields.
The following SAT forms have a “Name” field where the customer’s employee or contact center
agent exists. The Data Privacy Administrator must ensure that the use of the content in this
“Name” field is consistent with the Consent Management forms.
If there is a concern not to share names, the Data Privacy Administrator should consider the fol-
lowing:
• Leave the ‘name’ field blank.
• Or provide pseudonymization of the name field, such as “Tier Support Agent10”.
Identified SAT forms:
1. Station – page 1
o “Name” field
2. Station – page 4
o “Feature Button Label” field
3. IP Node Name
o “Name” field
▪ The presence of an actual name in this form would directly link an Inter-
net URL with this name.
4. Pickup Group
o “Name” field
▪ This is an optional field for allowing a name to be added to a pickup key
on a station.
6. Agent Login
o “Name” field
7. BCMS
o “Name” field
▪ This “Basic” CMS name is not likely to be associated with a real person,
but it is possible.
Page 39 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
7. FULFILLMENT OF DATA SUBJECT REQUESTS
The Data Privacy Administrator may fulfill requests by Data Subjects to review, change, or delete
their personal data by using the following features described earlier in this document:
1) User Data
a. Communication Manager: Administration of Station & Agent SAT screens
2) Call History
a. Communication Manager: Command History logs
3) Call Detail Records
a. Communication Manager: CDR Logs
4) Log/Trace Data
a. Communication Manager MST Trace logs and General OS logs
Page 40 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
8. DATA ANONYMIZATION AND PSEUDONYMIZATION
Page 41 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
9. MAINTAINING COMPLIANCE AFTER A RESTORE/CHANGE OPERATION
The Communication Manager does not provide an automated ability to recall any actions taken
by the Data Privacy Administrator (or any other administrator) after a backup operation has oc-
curred.
Therefore, it is the duty of the Data Privacy Administrator to maintain current backups and to
backup each, and every time an administration change is executed.
Page 42 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
10. TROUBLE SHOOTING & DIAGNOSTIC OPERATION
In response to a customer notification of a reported problem with product operation, Avaya Ser-
vices (and/or Business Partner) will investigate the problem. This investigation will require collec-
tion of the following:
• Collection of the trouble description which the customer provides.
• Collection of existing logs which may be stored on the Communication Manager
• Collection of log information which the customer (or Services partner) may have stored
on a remote log server.
• Services team may have to enable some diagnostic trace tools and execute some call
testing with the Communication Manager and then collect new traces.
Upon further analysis, the problem may be escalated through both the Services organization and
product development. There may be some further iteration of testing such that it takes some
length of time to resolve the problem (days/weeks). Once the problem is identified and resolved,
there may need to be some configuration and/or design patches applied as part of the trouble
resolution. Finally, this customer site may have to be observed for some additional time.
During this entire duration of trouble investigation, it may be necessary for the Services team to
keep diagnostic traces/logs for purpose of before/after comparison.
Once the Services team (and design team) and the customer reach agreement on the trouble
resolution, then all debugging trace/log information shall be destroyed/deleted. Operationally
speaking, both the Data Privacy Administration and the Customer’s IT staff; along with the Ser-
vices team shall consult to make sure that all debugging information has been removed and that
the customer equipment has been configured for proper operation going forward.
Page 43 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
APPENDIX A: LOGS INCLUDED IN LOG RETENTION ADMINISTRATION
The following Communication Manager logs will have Log Retention settings applied to them:
• /var/log/ecs/commandhistory
• /var/log/messages
• /var/log/ecs/<timestamp>.log
• /var/home/ftp/CDR/S000001-0001-190924-10_47
• /var/home/ftp/CDR/S000001-0001-190924-11_13
• /var/home/ftp/CDR/S000001-0001-190924-11_17
Page 44 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
APPENDIX B: LOGS EXCLUDED FROM LOG RETENTION ADMINISTRATION
The following Communication Manager logs will NOT have Log Retention settings applied to
them. These files are not viewed as containing personal data. Rather they are OS operational log
data.
• /var/log/kernel
• /var/log/aide/*.log
• /var/log/audit/*
• /var/log/boot.log
• /var/log/btmp
• /var/log/coreservices/*
• /var/log/defty/dumps/*
• /var/log/dmesg
• /var/log/dupmgr/*
• /var/log/defty/dumps/*
• /var/log/dmesg
• /var/log/dupmgr/*
• /var/log/ecs/wdlog
• /var/log/filesync/*
• /var/log/httpd/access_log
• /var/log/httpd/error_log
• /var/log/httpd/ssl_requests.log
• /var/log/krm/*
• /var/log/maillog
• /var/log/mgetty.tty*.log
• /var/log/mt/*
• /var/log/ntpstats/*
• /var/log/ppp/connect-errors
• /var/log/sa/*
Page 45 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
• /var/log/spooler
• /var/log/tallylog
• /var/log/up2date
• /var/log/wpa_supplicant.log
• /var/log/wtmp
• /var/log/yum.log
Page 46 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
APPENDIX C: SETTING UP A REMOTE KEY SERVER
It is highly recommended that multiple Remote Key Servers be administered so that there is al-
ways one available if an individual Remote Key Server becomes inaccessible.
Careful network planning is required to ensure that at least one Remote Key Server is accessible
during network outages. If no Remote Key Server can be accessed, manual entry of the Encryp-
tion Passphrase will be required at system startup if the machine reboots during the outage (un-
less a Local Key has also been enabled).
Note! To ensure a secure environment, the Remote Key Server should not reside on the same
Virtual Machine Host as Avaya Aura® Communication Manager or any other Avaya Aura® appli-
cation(s) that use the Remote Key Server.
The following describes the basic steps required to setup a Remote Key Server on a Linux Plat-
form.
2. On the Remote Key Server, update the existing installed Linux software packages.
$ yum update
Page 47 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
$ yum -y install
Loaded plugins: product-id, search-disabled-repos, subscription-manager
This system is not registered with an entitlement server. You can use subscripti
on-manager to register.
repository | 3.0 kB 00:00
repository/primary_db | 109 MB 00:02
Resolving Dependencies
--> Running transaction check
---> Package tang.x86_64 0:6-1.el7 will be installed
--> Processing Dependency: jose >= 8 for package: tang-6-1.el7.x86_64
--> Processing Dependency: libjose.so.0(LIBJOSE_1.0)(64bit) for package: tang-6-
1.el7.x86_64
--> Processing Dependency: libjose.so.0()(64bit) for package: tang-6-1.el7.x86_6
4
--> Processing Dependency: libhttp_parser.so.2()(64bit) for package: tang-6-1.el
7.x86_64
--> Running transaction check
---> Package http-parser.x86_64 0:2.7.1-5.el7_4 will be installed
---> Package jose.x86_64 0:10-1.el7 will be installed
---> Package libjose.x86_64 0:10-1.el7 will be installed
--> Finished Dependency Resolution
Dependencies Resolved
================================================================================
Package Arch Version Repository Size
================================================================================
Installing:
tang x86_64 6-1.el7 repository 32 k
Installing for dependencies:
http-parser x86_64 2.7.1-5.el7_4 repository 28 k
jose x86_64 10-1.el7 repository 47 k
libjose x86_64 10-1.el7 repository 56 k
Transaction Summary
================================================================================
Install 1 Package (+3 Dependent packages)
Total download size: 162 k
Installed size: 358 k
Downloading packages:
(1/4): http-parser-2.7.1-5.el7_4.x86_64.rpm | 28 kB 00:00
(2/4): jose-10-1.el7.x86_64.rpm | 47 kB 00:00
(3/4): libjose-10-1.el7.x86_64.rpm | 56 kB 00:00
(4/4): tang-6-1.el7.x86_64.rpm | 32 kB 00:00
--------------------------------------------------------------------------------
Total 798 kB/s | 162 kB 00:00
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
Installing : libjose-10-1.el7.x86_64 1/4
Installing : jose-10-1.el7.x86_64 2/4
Installing : http-parser-2.7.1-5.el7_4.x86_64 3/4
Installing : tang-6-1.el7.x86_64 4/4
Verifying : jose-10-1.el7.x86_64
1/4
Verifying : http-parser-2.7.1-5.el7_4.x86_64
2/4
Verifying : tang-6-1.el7.x86_64
3/4
Verifying : libjose-10-1.el7.x86_64
4/4
Installed:
tang.x86_64 0:6-1.el7
Dependency Installed:
http-parser.x86_64 0:2.7.1-5.el7_4 jose.x86_64 0:10-1.el7 libjose.x86_64
0:10-1.el7
Complete!
Page 48 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
4. Setup Firewall on the Remote Key Server to enable the port that it will use (e.g., port 80).
$firewall-cmd --reload
success
6. On Communication Manager, add the Remote Key Server using the “encryptionRemoteKey add”
command. The command will only succeed if the Avaya Aura® Communication Manager appli-
cation can connect to it.
7. On Communication Manager, verify connectivity with the Remote Key Server using the “encryp-
tionStatus” command.
Red Hat Enterprise Linux 8 Security Guide – Using Network-Bound Disk Encryption
https://access.redhat.com/documentation/en-
US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Using_Network-
Bound_Disk_Encryption.html
Page 49 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023
REFERENCE
Page 50 of 50 Avaya Aura® Communication Manager Data Privacy Guidelines Dec 2023