Cm Security
Cm Security
Security Design
Release 6.3
03-601973
Issue 6
May 2013
© 2013 Avaya Inc. Link disclaimer
All Rights Reserved. Avaya is not responsible for the contents or reliability of any linked
websites referenced within this site or documentation provided by
Notice Avaya. Avaya is not responsible for the accuracy of any information,
statement or content provided on these sites and does not necessarily
While reasonable efforts have been made to ensure that the endorse the products, services, or information described or offered
information in this document is complete and accurate at the time of within them. Avaya does not guarantee that these links will work all the
printing, Avaya assumes no liability for any errors. Avaya reserves the time and has no control over the availability of the linked pages.
right to make changes and corrections to the information in this
document without the obligation to notify any person or organization of Licenses
such changes.
THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA
Warranty WEBSITE, HTTP://SUPPORT.AVAYA.COM/LICENSEINFO ARE
APPLICABLE TO ANYONE WHO DOWNLOADS, USES AND/OR
Avaya provides a limited warranty on its hardware and Software INSTALLS AVAYA SOFTWARE, PURCHASED FROM AVAYA INC.,
(“Product(s)”). Refer to your sales agreement to establish the terms of ANY AVAYA AFFILIATE, OR AN AUTHORIZED AVAYA CHANNEL
the limited warranty. In addition, Avaya’s standard warranty language, PARTNER (AS APPLICABLE) UNDER A COMMERCIAL
as well as information regarding support for this Product while under AGREEMENT WITH AVAYA OR AN AUTHORIZED AVAYA
warranty is available to Avaya customers and other parties through the CHANNEL PARTNER. UNLESS OTHERWISE AGREED TO BY
Avaya Support website: http://support.avaya.com. Please note that if AVAYA IN WRITING, AVAYA DOES NOT EXTEND THIS LICENSE IF
you acquired the Product(s) from an authorized Avaya Channel Partner THE SOFTWARE WAS OBTAINED FROM ANYONE OTHER THAN
outside of the United States and Canada, the warranty is provided to AVAYA, AN AVAYA AFFILIATE OR AN AVAYA AUTHORIZED
you by said Avaya Channel Partner and not by Avaya. “Software” AVAYA CHANNEL PARTNER; AVAYA RESERVES THE RIGHT TO
means computer programs in object code, provided by Avaya or an TAKE LEGAL ACTION AGAINST YOU AND ANYONE ELSE USING
Avaya Channel Partner, whether as stand-alone products or pre- OR SELLING THE SOFTWARE WITHOUT A LICENSE. BY
installed on hardware products, and any upgrades, updates, bug fixes, INSTALLING, DOWNLOADING OR USING THE SOFTWARE, OR
or modified versions. AUTHORIZING OTHERS TO DO SO, YOU, ON BEHALF OF
YOURSELF AND THE ENTITY FOR WHOM YOU ARE INSTALLING,
Third Party Components DOWNLOADING OR USING THE SOFTWARE (HEREINAFTER
REFERRED TO INTERCHANGEABLY AS “YOU” AND “END USER”),
“Third Party Components” mean certain software programs or portions
AGREE TO THESE TERMS AND CONDITIONS AND CREATE A
thereof included in the Software that may contain software (including
BINDING CONTRACT BETWEEN YOU AND AVAYA INC. OR THE
open source software) distributed under third party agreements (“Third
APPLICABLE AVAYA AFFILIATE (“AVAYA”).
Party Components”), which contain terms regarding the rights to use
certain portions of the Software (“Third Party Terms”). Information Avaya grants you a license within the scope of the license types
regarding distributed Linux OS source code (for those Products that described below, for which the scope of the license is detailed below.
have distributed Linux OS source code) and identifying the copyright Where the order documentation does not expressly identify a license
holders of the Third Party Components and the Third Party Terms that type, the applicable license will be a Designated System License. The
apply is available in the Documentation or on Avaya’s website at: http:// applicable number of licenses and units of capacity for which the
support.avaya.com/Copyright. You agree to the Third Party Terms for license is granted will be one (1), unless a different number of licenses
any such Third Party Components. or units of capacity is specified in the documentation or other materials
available to you. “Designated Processor” means a single stand-alone
Preventing Toll Fraud
computing device. “Server” means a Designated Processor that hosts
“Toll Fraud” is the unauthorized use of your telecommunications a software application to be accessed by multiple users.
system by an unauthorized party (for example, a person who is not a
corporate employee, agent, subcontractor, or is not working on your License types
company's behalf). Be aware that there can be a risk of Toll Fraud
associated with your system and that, if Toll Fraud occurs, it can result • Designated System(s) License (DS). End User may install and
in substantial additional charges for your telecommunications services. use each copy or an Instance of the Software only on a number
of Designated Processors up to the number indicated in the
Avaya Toll Fraud intervention order. Avaya may require the Designated Processor(s) to be
identified in the order by type, serial number, feature key,
If you suspect that you are being victimized by Toll Fraud and you need
Instance, location or other specific designation, or to be provided
technical assistance or support, call Technical Service Center Toll
by End User to Avaya through electronic means established by
Fraud Intervention Hotline at +1-800-643-2353 for the United States
Avaya specifically for this purpose.
and Canada. For additional support telephone numbers, see the Avaya
Support website: http://support.avaya.com. Suspected security • Concurrent User License (CU). End User may install and use
vulnerabilities with Avaya products should be reported to Avaya by the Software on multiple Designated Processors or one or more
sending mail to: [email protected]. Servers, so long as only the licensed number of Units are
accessing and using the Software at any given time. A “Unit”
Documentation disclaimer means the unit on which Avaya, at its sole discretion, bases the
“Documentation” means information published by Avaya in varying pricing of its licenses and can be, without limitation, an agent,
mediums which may include product information, operating instructions port or user, an e-mail or voice mail account in the name of a
and performance specifications that Avaya generally makes available person or corporate function (e.g., webmaster or helpdesk), or
to users of its products. Documentation does not include marketing a directory entry in the administrative database utilized by the
materials. Avaya shall not be responsible for any modifications, Software that permits one user to interface with the Software.
additions, or deletions to the original published version of Units may be linked to a specific, identified Server or an Instance
documentation unless such modifications, additions, or deletions were of the Software.
performed by Avaya. End User agrees to indemnify and hold harmless • Database License (DL). End User may install and use each copy
Avaya, Avaya's agents, servants and employees against all claims, or an Instance of the Software on one Server or on multiple
lawsuits, demands and judgments arising out of, or in connection with, Servers provided that each of the Servers on which the Software
subsequent modifications, additions or deletions to this documentation, is installed communicates with no more than an Instance of the
to the extent made by End User. same database.
This product complies with and conforms to the following international • answered by the attendant,
EMC standards, as applicable:
• routed to a recorded announcement that can be
• CISPR 22, including all national standards based on CISPR 22. administered by the customer premises
equipment (CPE) user
• CISPR 24, including all national standards based on CISPR 24.
• routed to a dial prompt
• IEC 61000-3-2 and IEC 61000-3-3.
2. This equipment returns answer supervision signals on
Avaya Inc. is not responsible for any radio or television interference all (DID) calls forwarded back to the PSTN.
caused by unauthorized modifications of this equipment or the
substitution or attachment of connecting cables and equipment other Permissible exceptions are:
than those specified by Avaya Inc. The correction of interference
caused by such unauthorized modifications, substitution or attachment • A call is unanswered
will be the responsibility of the user. Pursuant to Part 15 of the Federal
Communications Commission (FCC) Rules, the user is cautioned that • A busy tone is received
changes or modifications not expressly approved by Avaya Inc. could • A reorder tone is received
void the user’s authority to operate this equipment.
Avaya attests that this registered equipment is capable of providing
Federal Communications Commission Part 15 Statement: users access to interstate providers of operator services through the
use of access codes. Modification of this equipment by call aggregators
For a Class A digital device or peripheral: to block access dialing codes is a violation of the Telephone Operator
Consumers Act of 1990.
The REN is used to determine the quantity of devices that may be If trouble is experienced with this equipment, for repair or warranty
connected to the telephone line. Excessive RENs on the telephone line information, please contact the Technical Service Center at 1-800-242-
may result in devices not ringing in response to an incoming call. In 2121 or contact your local Avaya representative. If the equipment is
most, but not all areas, the sum of RENs should not exceed 5.0. causing harm to the telephone network, the telephone company may
request that you disconnect the equipment until the problem is
L’indice d’équivalence de la sonnerie (IES) sert à indiquer le nombre resolved.
maximal de terminaux qui peuvent être raccordés à une interface
téléphonique. La terminaison d’une interface peut consister en une A plug and jack used to connect this equipment to the premises wiring
combinaison quelconque de dispositifs, à la seule condition que la and telephone network must comply with the applicable FCC Part 68
somme d’indices d’équivalence de la sonnerie de tous les dispositifs rules and requirements adopted by the ACTA. A compliant telephone
n’excède pas cinq. cord and modular plug is provided with this product. It is designed to
be connected to a compatible modular jack that is also compliant.
To be certain of the number of devices that may be connected to a line,
as determined by the total RENs, contact the local telephone company. Connection to party line service is subject to state tariffs. Contact the
For products approved after July 23, 2001, the REN for this product is state public utility commission, public service commission or
part of the product identifier that has the format US:AAAEQ##TXXX. corporation commission for information.
The digits represented by ## are the REN without a decimal point (for
example, 03 is a REN of 0.3). For earlier products, the REN is Installation and Repairs
separately shown on the label.
Before installing this equipment, users should ensure that it is
Means of Connection: permissible to be connected to the facilities of the local
telecommunications company. The equipment must also be installed
Connection of this equipment to the telephone network is shown in the using an acceptable method of connection. The customer should be
following table: aware that compliance with the above conditions may not prevent
degradation of service in some situations.
Manufact FIC Code SOC/ Network Repairs to certified equipment should be coordinated by a
urer’s REN/A.S. Jacks representative designated by the supplier. It is recommended that
Port Code repairs be performed by Avaya certified technicians.
Identifier
Off OL13C 9.0F RJ2GX, FCC Part 68 Supplier’s Declarations of Conformity
premises RJ21X,
station RJ11C Avaya Inc. in the United States of America hereby certifies that the
equipment described in this document and bearing a TIA TSB-168 label
DID trunk 02RV2.T AS.2 RJ2GX, identification number complies with the FCC’s Rules and Regulations
RJ21X, 47 CFR Part 68, and the Administrative Council on Terminal
RJ11C Attachments (ACTA) adopted technical criteria.
CO trunk 02GS2 0.3A RJ21X, Avaya further asserts that Avaya handset-equipped terminal
RJ11C equipment described in this document complies with Paragraph 68.316
of the FCC Rules and Regulations defining Hearing Aid Compatibility
02LS2 0.3A RJ21X, and is deemed compatible with hearing aids.
RJ11C
Copies of SDoCs signed by the Responsible Party in the U. S. can be
Tie trunk TL31M 9.0F RJ2GX obtained by contacting your local sales representative and are
available on the following Web site: http://support.avaya.com/DoC.
Basic 02IS5 6.0F, 6.0Y RJ49C
Rate Canadian Conformity Information
Interface
This Class A (or B) digital apparatus complies with Canadian ICES-003.
1.544 04DU9.B 6.0F RJ48C,
digital N RJ48M Cet appareil numérique de la classe A (ou B) est conforme à la norme
interface NMB-003 du Canada.
04DU9.1K 6.0F RJ48C,
N RJ48M This product meets the applicable Industry Canada technical
specifications/Le présent materiel est conforme aux specifications
04DU9.1S 6.0F RJ48C, techniques applicables d’Industrie Canada.
N RJ48M
European Union Declarations of Conformity
120A4 04DU9.D 6.0Y RJ48C
channel N
service
unit
Avaya Inc. declares that the equipment specified in this document
If this equipment causes harm to the telephone network, the telephone bearing the "CE" (Conformité Europeénne) mark conforms to the
company will notify you in advance that temporary discontinuance of European Union Radio and Telecommunications Terminal Equipment
service may be required. But if advance notice is not practical, the Directive (1999/5/EC), including the Electromagnetic Compatibility
telephone company will notify the customer as soon as possible. Also, Directive (2004/108/EC) and Low Voltage Directive (2006/95/EC).
you will be advised of your right to file a complaint with the FCC if you
believe it is necessary. Copies of these Declarations of Conformity (DoCs) can be obtained by
contacting your local sales representative and are available on the
The telephone company may make changes in its facilities, equipment, following Web site: http://support.avaya.com/DoC.
operations or procedures that could affect the operation of the
equipment. If this happens, the telephone company will provide
Japan
The power cord set included in the shipment or associated with the
product is meant to be used with the said product only. Do not use the
cord set for any other purpose. Any non-recommended usage could
lead to hazardous incidents like fire disaster, electric shock, and faulty
operation.
Trademarks
The trademarks, logos and service marks (“Marks”) displayed in this
site, the Documentation and Product(s) provided by Avaya are the
registered or unregistered Marks of Avaya, its affiliates, or other third
parties. Users are not permitted to use such Marks without prior written
consent from Avaya or such third party which may own the Mark.
Nothing contained in this site, the Documentation and Product(s)
should be construed as granting, by implication, estoppel, or otherwise,
any license or right in and to the Marks without the express written
permission of Avaya or the applicable third party.
Downloading Documentation
For the most current versions of Documentation, see the Avaya
Support website: http://support.avaya.com.
Chapter 1: Introduction...................................................................................................... 11
Purpose..................................................................................................................................................... 11
Intended audience.................................................................................................................................... 11
Document changes since last issue.......................................................................................................... 11
Related resources..................................................................................................................................... 11
Documentation................................................................................................................................. 11
Avaya Mentor videos........................................................................................................................ 13
Training............................................................................................................................................ 14
Avaya information classifications.............................................................................................................. 15
Communication Manager security philosophy overview........................................................................... 15
Responsibility for Communication Manager security....................................................................... 16
Product-specific security guides of Avaya................................................................................................ 17
Support...................................................................................................................................................... 17
Warranty.................................................................................................................................................... 17
Chapter 2: Communication Manager Security Overview................................................ 19
Secure by design...................................................................................................................................... 19
Secure by default...................................................................................................................................... 21
Secure communications................................................................................................................... 22
Operating system hardening..................................................................................................................... 23
Linux as the chosen operating system for Communication Manager............................................... 23
Approach of Avaya to improve Linux................................................................................................ 24
Benefits of using SSH/SCP.............................................................................................................. 26
Protection from viruses and worms.................................................................................................. 27
Protection from Denial of Service (DoS) attacks.............................................................................. 28
Digital certificates...................................................................................................................................... 30
Security problems addressed by digital certificates......................................................................... 30
Signed firmware assures data integrity............................................................................................ 31
Secure administration............................................................................................................................... 31
Access profiles................................................................................................................................. 31
Chapter 3: Configurable Security...................................................................................... 37
Encryption overview.................................................................................................................................. 37
Transport and storage encryption algorithms........................................................................................... 38
IPSI link security............................................................................................................................... 39
H.248 link security............................................................................................................................ 39
H.225.0 Registration, Admission, and Status (RAS)........................................................................ 39
H.225.0 call signaling....................................................................................................................... 40
RTP encryption................................................................................................................................. 40
Timers and key exchange details..................................................................................................... 41
Branch gateway support................................................................................................................... 43
Deskphones and client endpoint support......................................................................................... 43
Interaction of encryption with Communication Manager features.................................................... 45
Encryption summary......................................................................................................................... 46
Additional information on secure communication............................................................................. 50
Encryption administration in Avaya solutions............................................................................................ 51
Purpose
This book is designed to provide a certain level of security-related information.
Intended audience
This document is intended for anyone who wants to gain a high-level understanding of
Communication Manager security, tackling vulnerabilities, and making the communications
system of an organization safe and secure.
Related resources
Documentation
The following table lists the documents related to this product. Download the documents from
the Avaya Support website at http://support.avaya.com.
Administration
Avaya Toll Fraud and Security Describes steps to prevent toll Implementation
Handbook, 555-025-600 fraud in Communication Manager Engineers,
Support
Personnel
Note:
Videos are not available for all products.
Training
The following courses are available on https://www.avaya-learning.com. To search for the
course, in the Search field, enter the course code and click Go.
Classification Description
Avaya Restricted This classification is for extremely sensitive business information,
intended strictly for use within Avaya. Unauthorized disclosure of this
information can have a severe adverse impact on Avaya and the
customers, the Business Partners, and the suppliers of Avaya.
Avaya This classification applies to less sensitive business information
Confidential intended for use within Avaya. Unauthorized disclosure of this
information can have significant adverse impact on Avaya, and the
customers, the Business Partners, and the suppliers of Avaya.
Information that can be private for some people is included in this
classification.
Avaya Proprietary This classification applies to all other information that does not clearly
fit into the above two classifications, and is considered sensitive only
outside of Avaya. While disclosure might not have a serious adverse
impact on Avaya, and the customers, Business Partners, and suppliers
of Avaya, this information belongs to Avaya, and unauthorized
disclosure is against Avaya policy.
Public This classification applies to information explicitly approved by Avaya
management as nonsensitive information available for external
release.
have the additional need for protection that were previously specific only to data networking.
Telephony services must be protected from security threats such as:
• Denial of Service (DoS) attacks
• Theft of data
• Theft of service
• Worms
• Viruses
Support
Visit the Avaya Support website at http://support.avaya.com for the most up-to-date
documentation, product notices, and knowledge articles. You can also search for release
notes, downloads, and resolutions to issues. Use the online service request system to create
a service request. Chat with live agents to get answers to questions, or request an agent to
connect you to a support team if an issue requires additional expertise.
Warranty
Avaya provides a 90-day limited warranty on Communication Manager. To understand the
terms of the limited warranty, see the sales agreement or other applicable documentation. In
addition, the standard warranty of Avaya and the details regarding support for Communication
Manager in the warranty period is available on the Avaya Support website at http://
support.avaya.com/ under Help & Policies > Policies & Legal > Warranty & Product
Lifecycle. See also Help & Policies > Policies & Legal > License Terms.
Secure by design
Secure by design encompasses a secure deployment strategy that separates servers
providing communication services from the enterprise production network. Gateways protect
and isolate Communication Manager from viruses, worms, DoS, and other malicious
attacks.
In the figure on page 20, the architecture design is related to the trusted communication
framework, infrastructure, and security layer. With this architecture, enterprises can design
dedicated security zones for:
• Administration
• Gateway control network
• Enterprise network
• Adjuncts
Avaya isolates assets so that each secure zone is inaccessible from the enterprise or branch
office zones. The zones are similar to dedicated networks for particular functions or services.
The zones accommodate zone-specific data without the need to gain access from or to other
zones. This architecture provides protection against attacks from within the enterprise and
branch office zone. The the figure on page 20 shows that you can gain access into the red
Server zone through the range of endpoints and branch office gateways used for signaling
traffic.
Gateways with dedicated gatekeeper front-end interfaces, such as CLANs, inspect the data
traffic, and protect the Server zone from flooding attacks and malformed IP packets. The
dedicated front-end interface also prevents a hacker to gain unauthorized administrative
access of the Server through the Gateways.
This secure by design architecture and framework also flexibly enhances the virtual enterprise
and integrates branch offices into the main corporate network. The security zone from the
branch office can stop at the central Gateway interfaces protecting Communication
Manager.
Secure by default
Secure by default, the second security layer of Avaya, incorporates a hardened Linux operating
system with inherent security features for Avaya Servers and Communication Manager. The
hardened Linux operating system provides only the functions necessary to support the core
applications. The hardened Linux operating system supports the core applications that are
important for:
• securing mission-critical call processing applications
• protecting the customer from toll fraud and other malicious attacks
Avaya modifies and hardens the standard Linux kernel to provide for secure, real-time
telephony processing.
The Linux operating system that Avaya has hardened limits the number of access ports,
services, and executable files. The limitations of the Avaya-modified Linux operating system
help protect the system from typical modes of attacks. The elimination of some functions from
Linux reduces the number of mandatory security patches needed and the risk of the narrow
vulnerability-to-exploit time window.
software. The co resident antivirus software can interfere with call processing functions and
can require continuous administrative attention to ensure that the antivirus databases are up-
to-date.
Secure communications
Secure communications, the third layer of the hardening strategy of Avaya, uses numerous
features and protocols to protect access to and the transmissions from Avaya communications
systems. Communication Managerand the gateways of Communication Manager use
encryption to ensure privacy for the voice stream. With encryption, integrated signaling security
protects and authenticates messages to all connected gateways and IP telephones and
eliminates tampering with confidential call information. These features protect sensitive
information of:
• Caller
• Called party numbers
• User authorization
• Barrier codes
• Credit card numbers
• Other personal information that a user dials during calls to banks or automated
retailers.
You can encrypt critical adjunct connections, for example, the CTI link, which you can separate
in a dedicated security zone.
Avaya IP endpoints can also authenticate to the network infrastructure by supporting supplicant
802.1X. Network infrastructure devices, gateways, or data switches function as authenticators
and forwards this authentication request to a customer authentication service.
• Security experts worldwide review the source code looking for defects and
vulnerabilities.
• Before incorporating any changes into Avaya products, the developers and testers at
Avaya supervise and review the enhancements and improvements that the Linux
community creates.
• Linux-based Avaya servers and gateways protect against any Denial of Service (DoS)
attacks such as SYN floods, ping floods, malformed packets, oversized packets, and
sequence number spoofing.
Note:
Because of operating system hardening, Communication Manager does not respond
to the following:
- ICMP timestamp
- TCP timestamp
- Address-mask queries
- Broadcast ping
RPMs removed
The Linux general distribution includes Red Hat Package Management (RPM) modules that
install, remove, verify, query, and update software packages. For IP telephony applications,
Avaya requires only 30% of the nearly 800 distributed RPMs. Therefore, Avaya has removed
all unused RPMs from the Linux general distribution. For example, tcpdump and wireshark
(ethereal) packet capturing tools are two of the RPMs that Avaya has removed. Removing
unused RPMs makes the software file images smaller and more manageable. The operating
system also becomes more secure as hackers cannot change RPMs that are not present.
Viewing RPMs
About this task
Use this procedure to view the RPMs that Avaya uses.
Procedure
Firewall protection
The Linux-based products of Avaya use the IPTables firewall that protects the system against
various network-based attacks. The firewall also protects against Ingress services that the
XINETD process activates. The XINETD process listens for incoming connection requests on
specific ports and runs the services related to the ports.
Using the Communication Manager System Management Interface that manages the host-
based IPTables firewall, customers can control open and closed ports to accommodate for
network security requirements.
Drive partitioning
File and folder permissions minimize access and act as a preventive measure against malware
and tampering. For more information, refer to section Protection from viruses and worms on
page 27. Some of the benefits of drive partitioning are:
• You can store the executable files in separate hard drive partitions.
• You can store the data in separate partitions. The data files do not have the execute
permissions (the NOEXEC flag).
Tip:
You cannot perform a remote login with root. Only switch users (su) with privilege escalation
can have root privilege.
Note:
If a customer chooses to use FTP or TELNET or both, the customer can enable the
functionality in certain products, but the fuctionality remains disabled by default.
Using the following protocols, Avaya products protect the authentication credentials and file
transfers, when sent across the network:
• Secure Shell (SSH)
• Secure Copy (SCP) or Secure File Transfer Protocol (SFTP)
• SNMP with the following specifications:
- SNMPv3 is the preferred version because of a built-in security mechanism.
- SNMPv1 or v2c, while supported, provides only a limited security capability based
on community names.
- The community name for SNMPv1 and SNMPv2c is unprotected for read-only MIBs:
- The community name for SNMPv1 and SNMPv2c is protected when accessing
writable MIBs.
SNMP security codes, for example, community strings, are customer-administrable.
• Other protocols protected using a Transport Layer Security (TLS) or Internet Protocol
Security (IPSEC) connection
Avaya Services
Non-secure data networks such as the Internet and SNMP notifications protect the data
transmission to and from Avaya Services for customer equipment. For more information about
Avaya services, referAvaya Enterprise Services Platform Security Overview to.
File permissions The superusers (root) with write permissions can install programs,
resulting in few virus outbreaks within the Linux operating system.
Performance Avaya has tested third-party, host-based antivirus products on
degradation Linux-based servers of Avaya and uncovered significant
performance degradation. Customers must not install such
antivirus products on the Linux-based servers of Avaya.
Antivirus products Customers have successfully used third-party antivirus packages
on selected Avaya products. Although, virus and worm attacks are
minimal because of the hardening of the operating system. For
customers who prefer to install antivirus software, customers must
perform a scan only when the server is under minimal or no load so
that impact to the user is minimum.
PING flood As many ping utilities support ICMP echo requests, a person can
inadvertently send a huge number of PING requests that can
overload network links causing resource depletion.
Finger of death The attacker continuously sends finger requests to a specific
computer without disconnecting. Failure to terminate the
connection can quickly overload the process tables of the server.
The finger listen port number is 79 (see RFC 742).
Chargen packet storm The attacker can spoof the chargen service port, port number 19,
from one service on one computer to another service on another
computer causing an infinite loop and causing loss of performance
or total shutdown of the affected network segments.
Malformed or Protocol handlers stop functioning when malformed packets are
oversized packets sent in odd formations or the malformed packets are sent as part
of the protocol.
Oversized packet attacks place data in an order that does not
adhere to specification or the attacks can create packets that are
larger than the maximum permitted size.
For more information on preventing DoS attacks, see section Recommendations for preventing
DoS attacks on page 119.
Digital certificates
Secure administration
Access profiles
Use the System Management Interface (SMI) and the system access terminal (SAT) to gain
access to Communication Manager, the underlying operating system, and the hardware
components. For example, gateways and IP telephones.:
• With System Management Interface, you can:
- Gain access to system alarms, logs, diagnostics.
- Configure and monitor the security aspects of the system.
• The SAT interface provides access and functionality similar to the SMI and in-depth
administration, diagnostics, and reports for the Communication Manager system.
Examples of in-depth administration include parameters for call routing patterns and
coverage, stations, trunks, signaling groups, and network regions. Note that the user
cannot gain access to the Linux operating system through the SAT interface.
Default login accounts that grants access to the SMI and the SAT screens are similar as the
login accounts use numbered user profiles. The numbered user profiles usually correspond to
Role-Based Access Control (RBAC). The interfaces and the account names of SMI and SAT
are different.
For more information about profiles and default permissions for SMI and SAT interfaces, see:
• System Management Interface default profiles and permissions on page 32
• Communication Manager default SAT profiles and permissions on page 33
Note:
Members of the susers group have full access to all Web pages. Members of the users
group have access to a limited subset of Web pages.
Table 4: Communication Manager System Management Interface default
profiles(continued)
Note:
Coresident applications such as Avaya Aura® Communication Manager Messaging or Octel
voice mail adjuncts require a standard profile to support TSC access to Communication
Manager.
Table 5: Communication Manager default SAT profiles
At the SAT interface, type add user-profile n, where n is the new profile number,
which may range from 20 to 69, to add a new SAT profile and administer profile
permissions.
The Cat field lists categories in alphabetic order with a brief description in the Name
field. In the Enblfield, the default setting is n for each category indicating that the
access permissions are disabled.
Privilege escalation
Technicians who need higher privileges must log in using normal service accounts and then
escalate privileges to perform more restrictive tasks, for example, software upgrades. An
escalation requires a password or ASG response that significantly restricts an intruder from
root-level privileges.
The system logs the entries for privilege escalation and superuser activities in the following
folders:
• Privilege escalation are logged in /var/log/secure.
• Superuser (su) operations are logged in /var/log/ecs/commandhistory.
Reading superuser permissions and restrictions
About this task
Use this procedure to read superuser permissions and restrictions.
Procedure
Related topics:
Credentials complexity and expiration requirements on page 76
Managing Communication Manager accounts on page 83
Administration of authentication passwords on page 84
To prevent a system lockout, you must administer at least one local host account on
Communication Manager so that the server is accessible when access to an external AAA
server is blocked. You can use local host accounts at the same time as any of the other external
AAA services. The local host configuration on Communication Manager uses the /etc/passwd, /
etc/shadow, and /etc/group files, among others.
Encryption overview
Digital encryption eliminates the risk of exposing critical data in telephone conversations, voice
mail, and signaling messages. A digital telephone call consists of voice data also called as
bearer data and call signaling messages also called as control messages. Bearer data and
signaling data pass through many devices and networks, sometimes over different networks
or virtual paths. Without encrypting both data types, anyone with access to the networks and
devices can intercept the following:
• Digitized voice signals in telephone calls and voice mail
• Call signaling messages that can:
- Set up, maintain, and tear down calls
- Contain call duration
- Reveal the names and numbers of the callers
- Transmit encryption keys
• Translation or administration data in transit to or saved on a storage device. This data
can include IP addresses and routing information from which an attacker can analyze
traffic patterns.
• Configuration data through TLS connections
• Application-specific traffic
• Data exchanged during management and administration sessions
The table on page 37 compares how encryption mitigates the vulnerabilities in signaling and
bearer type of data.
.
Table 6: Comparisons in signaling and bearer traffic
The following sections describe cryptographic algorithms and key functions for the different
data links:
• IPSI link security on page 39 (Note 6)
• H.248 link security on page 39 (Note 7)
• H.225.0 Registration, Admission, and Status (RAS) on page 39 and H.225.0 call
signaling on page 40 (Notes 1 and 5)
• RTP encryption on page 40 (Notes 2, 3, and 4)
such as the endpoint PIN, to offline attacks. This is achieved while providing registration
authentication and replay protection. This authentication process is part of the H.225.0 security
profile in H.235.5.
The endpoint and gatekeeper negotiate multiple keys of significant size (128-bits or greater)
that are used for authenticating registration messages as well as encrypting and authenticating
signaling messages. This ensures a secure registration process because it uses the HMAC-
SHA1 authentication algorithm combined with an encrypted DH key exchange.
Since the keys are negotiated each time the endpoint registers, the keys are retained only in
endpoint and gatekeeper RAM and are inaccessible by users or administrators.
RTP encryption
Avaya supports the following three encryption algorithms, all based on RFC3711:
• Avaya Encryption Algorithm (AEA), a 104-bit, RC4-like encryption algorithm
• Advanced Encryption Standard (AES), a 128-bit encryption algorithm
• Secure real-time transport protocol (SRTP)
For SRTP to work correctly, you must first enable SRTP, and administer SRTP using the
administrative tools that Communication Manager provides.
Symmetric encryption keys that are generated dynamically are used for encrypting bearer
traffic, also called as voice data. Any redirection in the RTP stream generates a new symmetric
encryption key that is encrypted and sent from Communication Manager to H.323 endpoints.
In addition to supporting H.235.5 for signaling encryption to the IP telephones, Avaya also
Note:
For more information, see
Administering Network
Connectivity on Avaya Aura®
Communication Manager.
TN2602AP (IP Resource SRTP support Supports AEA or AES, and SRTP.
320) Does not use “extra DSPs” for either
method chosen.
TN2312BP (IPSI) AES-128-Cipher Block Chaining
H.248 Branch Gateways Supports AEA or AES (128-Output
(G350, G450, G430, FeedBack), and SRTP
G250)
• Extra DSP Utilization using Avaya
Encryption AES variant (differs
based on the type of Branch
Gateway)
• Extra DSP utilization using SRTP
Encryption summary
Within Communication Manager, communications are secured from end-to-end using standard
encryption and authentication algorithms. Keys are dynamically generated and are stored in
RAM where the keys are overwritten whenever the links are disabled or re-created.
Additionally, all links support the use of the AES encryption algorithm using 128-bit keys. When
authentication is used, the HMAC-SHA1-96 authentication algorithm is implemented.
The table on page 47 shows that Communication Manager operations are secured from end-
to-end using standard encryption and authentication algorithms and key negotiation.
Table 13: Communication Manager secure protocols
Important:
SRTP Encryption is supported by 96xx telephones only.
Result
IP Codec Set
Codec Set: 1
Audio Silence Frames Packet
Codec Suppression Per Pkt Size(ms)
1: G.711MU n 2 20
2:
3:
4:
5:
6:
7:
Media Encryption
1:
2:
3:
1. On the SAT screen, type change ip-network-region n, where n is the network region
number.
2. In the Codec Set field, enter the CODEC set that you administered in the IP CODEC
Set screen.
To administer a combination of encrypted and nonencrypted policies across
multiple network regions, see Encrypted and nonencrypted policies on page 55.
1. On the SAT screen, type change signaling-group n, where n is the signaling group
number.
2. Set the Media Encryption field to y. The system displays the Media Encryption
field on the Signaling Group screen only when the Encryption field on the
Customer Options screen is set to y and the Encryption over IP feature is enabled
in the license file.
3. In the Passphrase field, enter a string that has a maximum length of 30
characters.
Result
For more information on signaling group encryption and caveats regarding end-to-end trunk
and passphrase administration, see Administering Network Connectivity on Avaya Aura®
Communication Manager.
change signaling-group 1
Page 1 of x
SIGNALING GROUP
Group Number: 1 Group Type: h.323
SBS? n Remote Office? n Max number of NCA TSC: 0
Q-SIP: n Max number of CA TSC: 0
IP Video: n Trunk Group for NCA TSC:
Trunk Group for Channel Selection: X-Mobility/Wireless Type: NONE
TSC Supplementary Service Protocol: b Network Call Transfer? n
Location for Routing Incoming Calls: 1 T303 Timer (sec): 10
H.245 DTMF Signal Tone Duration(msec):
Near-end Node Name: Far-end Node Name:
Near-end Listen Port: 1720 Far-end Listen Port:
Far-end Network Region:
LRQ Required? n Calls Share IP Signaling Connection? n
RRQ Required? n
Media Encryption? y Bypass If IP Threshold Exceeded? n
Passphrase: H.235 Annex H Required? n
DTMF over IP: out of band Direct IP-IP Audio Connections? y
Link Loss Delay Timer(sec): 90 IP Audio Hairpinning? n
Important:
Installing the authentication files also installs the Avaya digital certificate for Communication
Manager.
Authentication file
AFS authentication files contain a plain text XML header with encrypted authentication data
and an encrypted server certificate.
Each authentication file is identified with an authentication file ID (AFID). You need this AFID
to create a new authentication file for an upgrade or to replace the current authentication file
on the server.
9. You can use WordPad to open the authentication file and view the header
information in the authentication file. The header includes the AFID, product name
and release number, and the date and time that the authentication file was
generated.
message that contains the system type, release, and authentication file ID
(AFID).
8. To receive the authentication file sent in an email message:
a. Enter the e-mail address in the Email Address field.
b. Click Download file via email. AFS sends the e-mail message that includes
the authentication file as an attachment and the AFID, system type, and release
in the message text.
c. Save the authentication file to the local computer. After the authentication file
is created, AFS displays a confirmation message that contains the system type,
release, and authentication file ID (AFID).
9. You can use WordPad to open the authentication file and view the header
information in the authentication file. The header includes the AFID, product name
and release number, and the date and time that the authentication file was
generated.
Note:
To override validation of the AFID and the date and time, select Force load of
new file on the Authentication File page. Select this option if:
• You must install an authentication file that has a different AFID than the file
that is currently installed
• You have already installed a new authentication file, but must reinstall the
original file. You must not select this option if you are replacing the default
authentication file with a unique authentication file.
Caution:
Use caution when selecting the Force load of new file option. If you install
the wrong authentication file, certificate errors and login issues might
occur.
5. Click Install. The system uploads and validates the selected authentication file.
After validation, the system installs the authentication file.
6. To confirm that the authentication file is installed on Communication Manager,
check the Authentication File page from the SMI.
Chain of trust
Digital certificates certify the identity of the public-key owner. A trusted party signs the public
key and the information about the owner, creating a public-key certificate. The certificate is
similar to a driver’s license that guarantees the identity of the owner.
A trusted party that issues digital certificates is called a certification authority (CA), similar to
a governmental agency that issues drivers’ licenses. A CA can be an external certification
service provider or even a government. The CA also can belong to the same organization as
the entities the organization serves. CAs can issue certificates to other sub-CAs, which creates
a tree-like certification hierarchy called a public-key infrastructure (PKI).
Communication Manager servers require that the unique certificate chain of trust reverts back
to the root CA. The chain of trust consists of the:
• Server certificate, signed by a Remote Feature Activation (RFA) Issuing Authority (IA)
• RFA IA certificate, signed by the Avaya Product Root Certificate Authority (CA)
• Root certificate for the Avaya Product CA
The server certificate and the IA certificate are embedded in the authentication file along with
the private key associated with the certificate. The Avaya Product Root CA certificate is
embedded in the Communication Manager software base, not in the authentication file.
Avaya RFA uses a:
• FIPS 140-2 level 4 certified cryptographic module to sign server certificates.
• Certificate daemon to:
- Generate public/private key pairs using OpenSSL
- Obtain digital certificates for server certificates
- Retrieve a copy of the IA certificate
The secure hardware and daemon ensure that server certificates are stored securely, are used
only for the purpose of signing authorized certificates, and are protected from unauthorized
access or duplication.
successful PKI provides the management infrastructure for integrating public key technology
(digital certificates, public keys, and certificate authorities) across the infrastructure of the
customer, including IP telephony.
The goal is to conduct electronic business with the confidence that:
• The sending process/person is actually the originator.
• The receiving process/person is the intended recipient.
• Data integrity is uncompromised.
Avaya uses standard X.509 PKI to manage certificates in the enterprise in which the hierarchy
of certificates is always a top-down tree, with a root certificate at the top, representing the
central Certificate Authority (CA) that is integral to the trusted-party scheme and does not need
third-party authentication. From Communication Manager 6.0, Avaya certificates are installed
with the installation of the authentication files. Prior to Communication Manager 6.0, there were
only self-signed digital certificates.
The Avaya product PKI is limited to device-to-device authentication primarily to automatically
establish a TLS or similar connection to ensure confidentiality, integrity, and authenticity. VoIP
devices that use Avaya software or must establish a TLS connection with other devices
manufactured or distributed by Avaya or used in coordination with Avaya products, use
certificates issued by CAs or downloads from Signing Authorities (SAs) under the Avaya
Product PKI.
Communication Manager uses a consistent PKI model, including the following:
• Private key located in /etc/opt/ecs/certs/cm/private/server.key
• Certificate located in /etc/opt/ecs/certs/cm/ID/server.crt
• Trusted CA certificates located in /etc/opt/ecs/certs/cm/CA/all-ca.crt
The table on page 64 lists the Avaya public and private keys and their uses.
Table 15: Key pair and certificate usage
Note:
The Avaya Product Certificate Authority does perform the following:
Important:
Before you can log in to the Avaya server, you must accept or store the server certificate.
updates to the IP telephone. For further information, see section PKI in H.323 and SIP
endpoints on page 71.
• Download configuration data from Communication Manager for file synchronization. for
more information, see section Filesync to duplicated or survivable servers on
page 74.
• Authenticate access to the Communication Manager Web interface. For more
information, see section, Connection to Communication Manager Web interface on
page 74.
• SIP/TLS connections
- Management
- Signaling
Installing a Root Certificate on a Personal Computer
About this task
With the Install Root Certificate page, you can install the security certificate that contains the
Avaya digital signature. The security certificate with the Avaya digital signature prevents
unauthorized users from intercepting and viewing passwords and other sensitive
information.
The Root Certificate establishes Avaya Inc. as a trusted Certificate Authority (CA). You must
install the Root Certificate after you log in.
Warning:
You must install a CA certificate as a Root Certificate.
If you do not install the Root Certificate, you will get a Security Alert stating that the company
is not trusted.
Procedure
Trusted certificates
With the Trusted Certificates page, you can manage the trusted certificate repositories for
the server. All the installed certificates are listed on the Trusted Certificates page. Use this
page to install a certificate, copy an existing certificate to other repositories, or remove a
certificate from repositories.
Displaying a trusted certificate on the server
Procedure
On the Trusted Certificate page, select a certificate entry, and click Display
1. On the Trusted Certificate page, select a certificate entry, and click Remove.
2. On the Trusted Certificate - Remove page, select the repositories you want the
certificate deleted from, and click Remove.
Copying a trusted certificate on the server from one repository to another repository
Procedure
1. On the Trusted Certificate page, select a certificate entry, and click Copy.
2. On the Trusted Certificates – Copy page, select the repositories you want the
certificate copied to, and click Copy.The system checks for the following:
a. The certificate name is unique.
b. The certificate is not a duplicate certificate with a new name.
Note:
If the certificate fails to install in one repository, it does not mean that the
certificate failed to install in the other selected repositories.
Important:
You must update the server certificate every time you change the server name.
The Avaya server has two server certificates. One certificate is specific to the service
technicians who log in to many servers. The service technician certificate is issued to the
services Ethernet interface address, 192.11.13.6, and identifies the certificate authority as
the Avaya Call Server. The second certificate is specific to the site-specific server name.
You must accept or store the server certificate before you can log in to the Avaya server. Ensure
that you have a secure connection to the server.
Use the Server/Application Certificates page, to manage both server and application
certificate repositories for the server. The Server/Application Certificates page displays all
the installed certificates, and with this page, you can install, remove, and copy an existing
certificate to another repository.
Note:
One of the CAs in the server certificate must be a part of the Communication Manager trusted
certificates repository.
Displaying a server certificate or application certificate
Procedure
Important:
Log in with the suser credential to add a server or application certificate.
Procedure
Note:
The default file name of the certificate is server.crt. For a single server and
application certificate chain, the server sub directory of a repository is limited to
a single file for a single certificate chain. The file name is server.crt. This certificate
represents the identity of only one server. The system overwrites any existing
server.crt file with the new certificate.
Procedure
remaining certificates, and generates a minor alarm and adds an entry in the syslog file to
notify the user about the error condition.
Third-party certificate management
The table on page 71 describes how Communication Manager handles third-party
certificates.
Table 16: Communication Manager third-party certificate management
Activity Description
File sync To prevent overwriting a customer-installed, third-party certificate,
file sync does not synchronize any certificates.
Upgrades See Upgrading the third-party certificate on page 71.
Backup / restore Backup and restore software does not back up or restore trusted
certificates.
Note:
You must not delete the original certificate file. However, if the original file is
deleted, you must copy the original certificate file from the source to the server.
Note:
The firmware in the Avaya IP telephones does not verify whether the Communication
Manager identity certificate has expired, but the firmware verifies the chain of trust for
the incoming Communication Manager certificate.
IP telephones are typically provisioned in a staging area where the certificate authority and a
Web server are on a physically-separated LAN. The IP telephones download the certificate
parameters from the Web server and perform a certificate request using the Simple Certificate
Enrollment Protocol (SCEP) protocol. Once the certificates are provisioned in the IP
telephones, you can use the certificates anywhere in an enterprise.
The digital certificate, private key, and trusted-CA certificates are stored in flash memory in the
IP telephone. The same certificate can also be used for 802.1x authentication and for SIP/TLS
authentication.
When the IP telephone boots, it reads the 46xxsettings.txt file that contains the following
certificate-related parameters:
• URL for the Certificate Authority
• List of trusted certificates to download to the telephone
• Certificate Common Name (CN)
- $SERIALNO for the telephone serial number
- $MACADDR for the telephone MAC address
Note:
The CN in the telephone certificate is typically the telephone serial number,
however the CN is not used in SIP signaling.
• Certificate Distinguished Name
• Certificate Authority Identifier
• Certificate Key Length
• Certificate Renewal Threshold
• Certificate Wait Behavior
Note: Note:
Beginning with 46XX H.323 Release Includes 46xxsettings.txt,
2.9 firmware and 96XX H.323 46xxupgrade.scr,
Release 2.0 firmware customers can 96xxupgrade.txt, etc.
import trusted third-party certificates downloaded through the
Note: Note:
Beginning with 46XX H.323 Release Includes 46xxsettings.txt,
2.9 firmware and 96XX H.323 46xxupgrade.scr,
Release 2.0 firmware customers can 96xxupgrade.txt, etc.
import trusted third-party certificates downloaded through the
to the telephone using the Communication Manager
TRUSTCERT parameter. HTTPS server.
16XX (H.323) Avaya Product Root Certificate Authority Download configuration files
Note:
Includes 46xxsettings.txt,
46xxupgrade.scr,
96xxupgrade.txt, etc.
downloaded through the
Communication Manager
HTTPS server.
96XX SIP Avaya Product Root Certificate Download configuration files over
Authority HTTPS, when enabled.
Establishes a SIP/TLS
Note: connection to the Avaya Session
Simple Object Access Protocol Manager server and used if
(SOAP) between the 96XX SIP 802.1X EAP/TLS is enabled.
telephones and Session Manager by
default uses HTTP but can be Note:
configured for HTTPS, in which case Uses TLSSRVR, TSLPORT,
the Avaya Product Root Certificate HTTPSRVR, and HTTPPORT
Authority (CA) certificate parameters in the DHCP
authenticates the Session Manager Option #242. The TLS
server through the signed CA identity connection from the SIP
certificate. telephone to the Session
x.509 Identity Certificate Manager server is encrypted
using
Tip: TLS_RSA_WITH_AES_128_
Customers can replace the default CBC_SHA.
identify certificate using the Simple
Certificate Enrollment Protocol
(SCEP, see Additional information on
digital certificate on page 76).
SIP Hard-coded certificate SIP Softphone firmware includes
Softphone a default telephone certificate.
Note:
Customers must use a
uniquely-provisioned
telephone certificate installed
through Simple Certificate
Enrollment Protocol (SCEP).
For more information, see
Additional information on
digital certificate on
page 76.
Who can request The following entities or people can request certificate revocations:
revocation?
• The certificate subscriber
• The Registration Authority (RA) that has performed the validation
of the certificate request
• Any entity presenting proof of responsibility for a certified Avaya
SIP product
• Any entity presenting proof of the certificate misuse
• Any entity presenting proof of the private key compromise
The final decision on revocation of the certificate is left to the Avaya
Product Certificate Authority.
Procedure for The Avaya Product Certificate Authority accepts revocation
revocation request requests by e-mail only: [email protected].
The e-mail must be authenticated and must include the serial
number and subject name of the certificate in question.
Revocation request Avaya determines a timeframe for response at the time of the
grace period request.
Certificate alarms
The system administrator can generate early notification alarms for impending expiration of
certificates.
The system automatically generates major alarms seven days before the certificate expires
and also on the day the certificate expires on the server.
You cannot disable or reconfigure these two alarms. You can only remove or replace the
expired certificate.
Creating certificate alarms
About this task
Using the Certificate Alarms page, you can configure alarms at three different time periods
before the first automatically generated alarm. The first automatically generated alarm occurs
seven days before the certificate expiration date.
Procedure
Administrative accounts
Password complexity rules that apply for the Branch Gateways are listed below:
Table 20: Password complexity rules for Branch Gateways
Note:
To manage credentials expiration and lockout policies for branch gateways, you must log
in to gateways CLI.
For more information on password management, credentials expiration, and lockout policies
for branch gateways, see:
• Administration for the Avaya G250 and Avaya G350 Branch Gateways, 03-300436
• Administering Avaya G430 Branch Gateway, 03-603228
• Administering Avaya G450 Branch Gateway, 03-602055
Name Description
Credential Expiration Parameters
The maximum number of days a 1-99999
password can be used
(PASS_MAX_DAYS):
The minimum number of days permitted 0-99999
between password changes
(PASS_MIN_DAYS):
The number of days a warning is given 0-30
before a password expires
(PASS_WARN_AGE):
The number of days after a password 0-99999
expires to lock the account (INACTIVE, 0=
immediate, 99999=never): Note:
0 = immediate 99999 = never
Failed Login Response
Enable account lock out parameters If unchecked, the remaining parameters
(PAM Tally) (below) are ignored.
Lock out account after the following 1-9
number of unsuccessful attempts
(DENY):
Automatically unlock a locked account 1-99999
after the following number of seconds
(UNLOCK_TIME):
Reset the failed attempt counter after last Yes or No
failed attempt (UNLOCK_RESET):
Credentials management
Credentials, such as usernames and passwords, for standard Linux accounts in
Communication Manager are stored in /etc/passwd, /etc/shadow, and /etc/group, along
with the backup of the credential files, for example, /etc/group- and /etc/passwd-.
Communication Manager does not use a database to store credentials information.
• Passwords for local accounts are stored in /etc/shadow. Passwords in /etc/shadow are
stored as a one-way hash. The file /etc/shadow is root restricted.
• Any user logged in Linux can view the usernames and group membership for local
Communication Manager accounts.
• ASG accounts have additional information stored in files that are AES encrypted.
• Credentials configured for an external AAA server such as RADIUS or LDAP are stored
in the external server, not within Communication Manager.
Name Description
Login name Up to 31 characters (a-z, A-Z, 0-9). The login
name must be unique and cannot be a
protected login name.
New or modified ASG customer protected
logins require an AES key.
Primary group Set to susers and cannot be changed.
Additional groups The drop-down menu contains profiles 18
through 69. Profile 18 is the default.
Linux shell Set to /bin/bash and cannot be changed.
Home directory Updated automatically to /var/home/
login-name when you enter the Login
name. The entry cannot be changed.
Lock this account Select this check box to lock the user from
logging into the system. (Optional)
Date to disable The date indicates when the login ID
becomes disabled. The date must be in the
yyyy-mm-dd format or blank (never
disabled).
Type of authentication • Password
• ASG: Enter key (user defined, ASG user
information must include the ASG key)
• ASG: Auto-generate key (Avaya Aura® CM
automatically generates the ASG key). If
you select this option, the system
deactivates the Enter key or password
and Re-enter key or password fields.
Name Description
• hyphens (-)
• underscores ( _ )
• dollar sign ($)
• a blank space
• colons (:)
• semi-colons (;)
• commas (,)
• equal sign (=)
• forward slash (/)
• ampersand (&)
• pound sign (#)
• plus sign (+)
• apostrophe (’)
• asterisk (*)
• quotation marks (“” )
• parentheses( () )
In previous releases of Communication
Manager, the ASG key must be exactly 20
digits. Each digit must be an octal number,
that is, between 0-7. The last digit must be
zero ("0”) and the penultimate digit must be
an even number.
From Communication Manager 6.0, the ASG
key is AES encrypted with a 32-digit key with
hexadecimal characters.
Re-enter key or password Enter the password or key to exactly match
the Enter key or password field (required if
Authentication is Password or ASG.
Force password/key change on first login Select Yes (requires password change on
first use) or No.
on every product. When you install a new product, an Avaya security management system
called the ASG Manager creates new ASG encryption keys for each Avaya login on every
system. Every Avaya login on an Avaya system is associated with a different key. If a key were
ever compromised, only a single login on a single system is affected. The encryption keys are
themselves encrypted before they are installed. ASG is session-oriented. A unique challenge
is presented, and a unique response must be provided each time the user wants to be
authenticated by the Avaya system. ASG uses Advanced Encryption Standard (128-bit AES
key) technology.
Avaya Services accounts use the ASG process to log in to customer-created administrator
logins. ASG replaces static password authentication and adds a level of security to system
administration and maintenance ports and logins on any Avaya product. Customers can also
use ASG if it is enabled in the system license.
A regular password account uses a fixed user name and a password that can be used multiple
times to log in to the system. A person or device that can supervise the login messages, such
as network sniffers, can capture this password and gain unauthorized access to Avaya
products. ASG instead uses a one-time challenge/response mechanism to authenticate users.
The user can log in only when the user enters the correct response. The password or challenge
is unique for every session and the challenge cannot be reused. Customers can enable ASG
from the System Management Interface if the feature is enabled in the system license.
ASG Guard II
Avaya ASG Guard II supports 4 console ports that enable security of physically-connected
devices through serial interfaces and 16 logical IP ports. By utilizing integrated VPN Firewall
router functionality, ASG Guard II can also protect administrative access points on up to 16
IP-enabled devices. Therefore, in a VoIP environment, administrator-level users can access
only the devices that they have access to.
- Call-forwarding command
/var/log
folder
.
The first level sub-directory is a major component of CMM and contains the security syslogs
for that component, for example, /var/log/cmm/iim/security.log.
Security-related events
Security events are related to the following actions or activities:
• Successful and unsuccessful attempts of log in or log off.
• Establishment of a new administrative access session regardless of port of entry
• Assignment of a user profile to an administrative session
• Display, list, change, add or delete a user profile
• Any administrative access to local user accounts (view, add, change, delete)
• Attempt to access an object or execute an action to which the user does not have access
• Any access to the security control configuration of the server, such as logging
configuration, the PAM configuration, or the firewall configuration.
Note:
You cannot disable logging of security events.
The table on page 89 shows the syslog priority and facility for security and non-security
events.
Table 24: Logging facility and priority for security and non-security events
Depending on your logging or notification requirements, use the following sections to configure
security events notifications:
• Configuration of SNMP in Communication Manager on page 89
• Configuration of syslog server in Communication Manager on page 91
• Access system logs through the Web on page 95 provides another way to select, filter
and view the syslog through the Communication Manager System Management
Interface.
• Define permissions to access system logs on page 129 has information on how to assign
or restrict user access privileges to the syslog.
4. Go to Alarms > SNMP Agents on the left-side navigation pane to configure the
SNMP agent.
Note:
SNMP agents always log user activity; you cannot enable or disable this
logging.
On the SNMP Agents screen, you can:
• Block access to the SNMP port.
• Monitor the SNMP port for incoming requests and commands (gets and sets)
from specific or random IP address.
• Enable SNMP v1, v2, or v3.
5. Go to SNMP Traps page.
On the SNMP Traps page, you can specify which alarms can be set as traps.
6. Click Add/Change to administer alarm traps and their destinations from the SNMP
Traps (Add Trap Destination) page.
7. To administer alarm traps and the destination of the alarm traps, on the SNMP
Traps Page, click Add/Change.
Result
The highest SNMP protocol, version 3, is the most secure and permits three (3) security levels
(Security Model field):
• None : Traps are sent in plain text without a digital certificate.
• Authentication : An authentication password is required. SNMP v3 uses this pass phrase
to digitally sign v3 traps using MD5 protocol to associate the traps with the user.
• Privacy : Both an authentication password and a privacy password are required for user-
specific authentication and encryption. Traps are signed and encrypted using Data
Encryption Standard (DES) protocol.
Note:
SNMP agents log access that changes values or initiates actions, for example set
commands, to any object or command outside of Communication Manager. For example,
SNMP agents do not log the following Communication Manager activities:
• You can synchronize the syslog.conf file to the standby server and all Survivable Core
or Survivable Remote servers.
• The external syslog server configuration is saved as part of the security backup data
set.
• The server firewall automatically opens outbound for the syslog port (514 UDP) if the user
enables logging to an external syslog server and automatically closes if logging is not
enabled.
Note:
By default, Communication Manager disables logging to an external syslog server.
Procedure
On the second page of the Logging Levels screen, as shown in the figure on page 93, you
can further the information that is delivered to the syslog.
Name Description
Enable Command Logging • no: SAT activity is not logged.
• yes: SAT activity is logged based on the
selections on the Logging Levels form
Log Data Values • none: Only the object, the qualifier, and the
command action are logged.
• new: Only the new value of any field is
logged; the old value is not logged.
• both: Both the field value prior to the
change and the field value after the change
are logged.
When enabled, log commands associated • y(es): Creates a log entry for this action.
with the following actions
• n(o): Does not create a log entry for this
action.
Name Description
Warning:
By default, the IP services that are checked on the Firewall page are already enabled. To
disable IP services, you must manually deselect the services. While disabling common IP
services, you must ensure that the common IP services do not adversely affect the Avaya
server.
In the case of a Duplicated Server that connects to the Gateway, the control network is
inherently separated because the server is connected to the IPSI TN2312BP circuit pack,
which then carries control signaling to the gateways. The bearer network bypasses the server
and the Processor circuit pack in the Gateway and connects the endpoints over the LAN.
The routes that control signals take between endpoints and the server can be different from
the routes that bearer signals take. For example, when you enable the Inter-Gateway Alternate
Routing (IGAR) feature, control signals can continue to pass over the normal network of
Ethernet switches, routers, C-LAN circuit packs, and IPSIs, and the bearer signals can be
routed over the public switched telephone network (PSTN) when the internal LAN/WAN
network is overloaded. In the case of Avaya Softphone in telecommuter mode, IP signals
related to a call are routed over an Internet Service Provider using a VPN to the personal
computer of the user, and the bearer signaling is routed over the PSTN to the telephone of the
user.
G430/G450 Branch Gateways, the router capabilities of these gateways can protect data
flowing to Communication Manager without the need for a separate router.
The security features you can use are as follows:
• Generic Routing Encapsulation tunneling on page 101
• IP Security virtual private network on page 101
• Access control lists on page 103
• 802.1X and LLDP on page 109
Note:
G450 and G430 Branch gateways do not support 802.1X and LLDP features.
IPSec support is available on the G250-series and G350 Branch Gateways and the IG550
Integrated Gateway. IPSec is available on the Motorola CN620 Mobile Office Device.
The G250-series and G350 Branch Gateways and the IG550 Integrated Gateway offer the
following features of IPSec:
• Standards-based IPSec implementation [RFC 2401-RFC 2412].
• Standard encryption and authentication algorithms for IKE and ESP. These algorithms
include DES, TDES, AES (128-bit), MD5-HMAC, SHA1-HMAC, and IKE DH groups 1 and
2.
• ESP for data protection and IKE for key exchange.
• Quick Mode key negotiation with Perfect Forward Secrecy (PFS).
• IKE peer authentication through a preshared secret key.
• Up to 50 IPSec peers for mesh and hub-and-spoke IPSec topologies.
• IPSec protection that can be applied on any output port and on many ports concurrently,
for maximum installation flexibility.
• Security policy with bypass capability for every interface.
• Smooth integration with the on board GRE tunneling feature. This tight integration
provides the ability to use GRE over IPSec in a manner that maintains QoS for the
encapsulated traffic.
• Random preshared key-generation service.
• Load Balancing Resiliency through core routing features, such as backup interface and
GRE.
• Support for dynamic local address, which can be acquired through DHCP/Ethernet or
IPCP/PPPoE. This is achieved by initiating Aggressive Mode, and identifying the Gateway
through an FQDN string rather than an IP address.
• Remote peer failover support.
• Standard and legacy methods of NAT traversal support.
• Optimized bandwidth consumption by IP compression support and transport mode ESP
support (can help when using GRE over IPSec).
• Enhanced service assurance by employing continuous IKE and IPSec SA
establishment.
• Support for a comprehensive proprietary monitoring MIB.
For Communication Manager in a Duplicated-series server, an intervening Avaya security
gateway or a third party router must be administered to provide IPSec VPN security. Non-
Avaya equipment that is compatible with the Avaya branch gateway functionality using IPSec
include:
• Cisco IOS 3660 v12.3
• Cisco IOS 2600 v12.3 / v12.2
Note:
G700 Branch Gateway does not provide ACL capabilities or DoS protection. A separate
customer-provided router must provide these capabilities.
Token - based • RSA SecurID (provides only • Can be used directly from the Avaya
accounts user authentication) Server, when a license is purchased
• RSA SecurID or from the vendor and software is
installed on the Avaya Server.
• Secure • Secure Computing SafeWord
Computing (provides only user • Can be used behind a RADIUS
SafeWord authentication) server.
For detailed information on configuring external AAA Servers, see Avaya Aura®
Communication Manager Administrator Logins on the Avaya Support website at http://
support.avaya.com/.
LDAP servers
The figure on page 106 shows the tested configuration for external LDAP servers with Name
Service Switch (NSS) and Name Service Caching Daemon (NSCD). Login requires an entry
in LDAP only.
RADIUS servers
An external RADIUS server provides only user authentication and accounting as shown in the
figure on page 107.
Note:
Communication Manager Branch Gateways support only RADIUS servers.
Token servers
RSA SecurID is a token-based authentication method from RSA Security that provides only
user authentication. The figure on page 107 shows configurations with an LDAP server and
with a local host.
Secure Computing SafeWord is a token-based authentication method from RSA Security that
provides only user authentication. The figure on page 107 shows configurations with an LDAP
server and with a local host.
assigned to the IP telephone VLAN and the trunks can be assigned to a separate trunk
VLAN.
ARP spoofing
A server, gateway, or IP telephone needs the media access control (MAC) address of the target
device for communication. Similarly, any device that tries to communicate with an Avaya
server, gateway, or IP telephone needs the MAC address of the server, gateway, or IP
telephone. When the MAC address is not yet known, the system sends an Address Resolution
Protocol (ARP) request along with the IP address of the target device to determine the MAC
address of the device. For example, device A initiates communication with device B by sending
an Address Resolution Protocol (ARP) request along with the IP address of device B. Device
B then replies to device A along with the MAC address of device B. Device A then updates the
ARP cache to save the MAC address of for any future communications with device B.
An attacker uses an ARP spoofing tool to identify the IP and MAC addresses of the target
device. The target device can be a server, a gateway, or an IP telephone. Since the initiating
device sends an ARP request as a broadcast, the ARP-spoofing tool can listen for these
requests. After determining the IP addresses of device A and device B, the tool can send fake
ARP replies to each device. Each device then changes the ARP cache for that device such
that device A has the MAC address of the attacker instead of the MAC address of device B,
and device B has the MAC address of the attacker instead of the MAC address of device A.
Therefore, any traffic that comes in or goes out of device A or B, the traffic will always be routed
through the attacker computer. With sniffing tools, the attacker can then eavesdrop on calls
and sniff the packets for data such as user names, logins, and passwords. This rerouting and
manipulations of data is called a man-in-the-middle attack.
DHCP vulnerabilities
Each IP telephone automatically sends out a DHCP request for an IP address with which to
register. The DHCP server then sends the IP telephone the IP address of the Communication
Manager server and any TFTP servers and Survivable Remote servers that are known to the
DHCP server. The IP telephone then registers automatically with Communication Manager.
This sequence could open the server, as well as any IP telephones, to attack if the attacker
can successfully spoof the DHCP server. DHCP is inherently vulnerable to spoofing as it is not
an authenticated protocol. An attacker can provide incorrect network settings to a telephone,
which could result in a denial of service, redirection of calls to malicious servers, or man-in-
the-middle attacks. Malicious DHCP clients can also cause denial of service by continuously
requesting IP addresses until none are left for legitimate devices.
The attacker can change the firmware of the IP telephone or the configuration file of the IP
telephone in the following ways:
• After spoofing the DHCP server, an attacker can perform a man-in-the-middle attack to
intercept and replace the files as they are downloaded from the server.
• The attacker can compromise the server that stores the firmware and configuration files
of telephones. This is a more serious problem as control of a download server enables
the attacker to target all telephones in an organization.
DHCP security
To provide greater security to DHCP servers in a network, you can use one or more of the
following security measures:
• Assign static IP addresses to the Communication Manager server and gateways. For
more information, see the appropriate installation document for Communication Manager
servers.
You can also assign static IP addresses to IP telephones that serve critical functions.
However, this option is often impractical as the IP telephones of an organization are
numerous and frequently keep changing. In addition, with a static IP address, each time
an IP telephone reboots, the telephone does not automatically re-register with the servers.
For more information, see the document 4600 Series IP Telephone LAN Administrator
Guide, 555-233-507.
As with the Communication Manager server, C-LAN and processor circuit packs are
assigned static IP addresses. For more information, see Administering Network
Connectivity on Avaya Aura® Communication Manager, 555-233-504.
• Limit the use of automatic registration and DHCP to periods of significant IP telephone
deployment and disable DHCP once registration is complete. You can safely enable
DHCP when the network is protected by anti-spoofing features that keep associations of
IP address, MAC address, and switch port in access and infrastructure devices.
Loss of LAN connectivity causes IP telephones to search for an IP address, therefore
disabling DHCP can be impractical. In the event of a break in LAN connectivity, IP
telephones cannot reregister until the DHCP server is enabled again.
• Use separate DHCP servers to support the devices in the IP telephony VLANs and the
devices in the rest of the data network. Since ARP-spoofing cannot work across VLAN
boundaries, attacks on DHCP servers are limited to the data network only or the VoIP
network only. In addition, if VLANs are associated with a single geographical location,
attacks on a particular DHCP server are limited to physical access points within that
particular geographical location.
Use the Communication Manager IP Interface screen and the Network Mapping screen
to assign VLANs to IP telephones and gateways. In addition, use the Locations, Location
Parameters, and Network Region screens to further define the characteristics of each
VLAN. Finally, administer a DHCP server support for each VLAN.
• Configure access control lists on routers and firewalls to limit access to the DHCP client
ports.
• Enable link layer authentication, such as 802.1x, on IP telephones and gateways before
connecting to the network.
• Administer network switches, when possible, to associate Ethernet address, IP address,
and switch ports. When the system receives a packet with an address that does not match
on a port, the system drops the packet.
• Encrypt all firmware and configuration files that you download over the network. Ensure
that all the telephones have the signature verification key loaded in a secure manner. The
telephone must verify the signature on every downloaded file from the network and reject
any files with invalid signatures. The signing key must be saved in a secure place and not
be stored on the download server.
DNS vulnerabilities
Like DHCP servers, DNS servers are also vulnerable to spoofing. Not only can the IP address
associated with names be spoofed, but the names themselves can be spoofed with names of
similar-looking spellings. Such vulnerabilities can lead to man-in-the-middle attacks across
many devices in the network.
DNS security
To provide greater security to DNS servers in a network, you can use one or more of the
following security measures:
• Use separate DNS servers to support the devices in the IP telephony VLAN or VLANs
and the devices in the rest of the data network.
• Enable DNSSec encryption on all DNS servers and enable DNS resolvers with DNSSec
support on all DNS clients in the network. This solution, however, means that the DNS
server or servers transmit the entire list of names within a DNS zone when it queries or
responds to DNS requests. Such a transmission might be unlawful in some countries and
could enable an attacker to determine the existence of the DNS clients in the zone.
and data interception, and denial of service attacks. When compared to TDM systems, VoIP
communications system is more vulnerable as eavesdroppers can access the packets in the
network surreptitiously.
The following sections describe the vulnerabilities to confidentiality and privacy, each with a
NIST recommendation for reducing the vulnerabilities and a description of how Communication
Manager addresses the vulnerability.
Integrity issues
Integrity of information means that information remains unaltered by unauthorized users.
Misuse of information might not necessarily involve illegitimate users. A legitimate user can
also perform an incorrect, or unauthorized operation. This is possible because of several
factors, including the possibility that the level of access permission granted to the user is higher
than what the user needs. Information can be compromised in one of the following ways:
• An intruder acquires the credentials of a legitimate user and accesses an operations port
of the switch. Then, the intruder can perform the following operations:
- Disclosing confidential data
- Causing service deterioration by modifying the system software
- Crashing the system
- Removing all traces of the intrusion by modifying the security log
• There can be situations when the system becomes vulnerable because:
- After a system restart or during a disaster recovery, the default security features
such as passwords are reverted to the default system password.
- At the time of installation, the switch is vulnerable until the default security features
are installed.
Name Description
stations-first The direction for this restrict call is inbound.
Denies new traffic generated by internal
stations, permitting inbound calls only (best
for call center environments).
all-trunks-first The direction for this restrict call is
outbound.
Denies all outbound calls to trunks, tie-lines,
and stations, and all station-originated calls.
public-trunks-first The direction for this restrict call is inbound.
Denies all inbound calls from trunks and tie-
lines.
Note:
The default value of the RMS Feature Enabled field is n, meaning that the Remote Managed
Service feature is disabled.
Use the recommendations in which table to alert you of security-related events, including DoS
conditions.
When you set this field to y, the Port Board Security Notification and Port Board
Security Notification Interval fields is visible. Default is n.
2. Set the Port Board Security Notification field to y.
When you enter y in this field, the Port Board Security Notification Interval field
is visible. Default is n.
3. Enter the required interval (in seconds) between port board Denial of Service
notifications (traps). The value of the interval is 60 to 3600 in interval of 10. Default
is 60 (1 minute).
Note:
There is no delay before the first trap is sent. The interval administered in this
field applies only to the period between traps.
For more information, see section Description of the Security Violations Status reports on
page 134.
to receive advisories. The advisories are distributed in a timeframe as indicated in the table on
page 126:
Table 28: Avaya Security Advisories time frames
Structure of an advisory
Each Avaya Security Advisory contains the following information:
• Overview: A description of the vulnerability.
For operating system or third-party software, Avaya provides a link for quick access to a
website that provides the following information:
- A description of the risk
- Instructions on how to correct the problem. The instructions can include:
• Installing an update
• Reviewing administration of the product
- A description of additional security fixes, if any, are also included in the update.
• Avaya Software-Only Products: This section contains a listing of the specific Avaya
products that use, but are not bundled with, operating system software that can be
vulnerable. The information in this section includes:
- The version of the affected product
- Possible actions to take to reduce or eliminate the risk
• Avaya System Products: This section contains a listing of the individual Avaya products
that are vulnerable or products that are bundled with operating system software that are
vulnerable. The information in this section includes:
- The level of risk
- The version of the affected product
- Possible actions to take to reduce or eliminate the risk
• Recommended Actions: This section contains steps to take to eliminate the
vulnerability. The steps can include installing a security update, administering a security
feature, or performing a software upgrade. For operating system and third-party software,
the recommended actions are listed out in detail through the website links in the security
advisory.
Avaya releases a security update, Avaya thoroughly tests the update on a non-production
system, along with all the other software that is normally loaded on a Communication Manager
server. Sometimes Avaya must modify the update before the update works correctly.
Customers who apply third-party patches without Avaya recommendation void the warranty of
the Avaya products.
In some instances, when a software vendor provides an update to address a vulnerability,
Avaya can decide to address the vulnerability through other means to prevent potential risks
to Communication Manager. This can include modification of existing software through an
Avaya-issued update which is released separately or incorporated into future releases of the
product. The advisory describes this decision to offer an alternative remediation.
For a complete discussion of the Web Access Mask page, see Avaya Aura® Communication
Manager Feature Description and Implementation, 555-245-205.
Variable Description
yyyy The year
mm The month of the year
dd The day of the month
hh:mm:sssss The time in 24-hour format
text The log event text as supplied by the event source module. A module
name, process ID, and priority are the leading portion of this text
string.
Note:
An ASCII error code might follow the letter “f” and an optional colon (:),
for example, “f:123456.”
set The string “set”
object A human readable name for the object being accessed
value The new value for the object being set.
Note:
Only sets are logged, gets are not.SNMP agents log a single asterisk (*) for any passwords,
pins, encryption keys, or security tokens, if any.
Field Description
mmm The month in text format, for example “Aug”
dd The day of the month
hh:mm:ss The time in 24-hour format
server-name The host name of this server
Field Description
text The text field contains the log event text that is supplied by the module
logging the event. For on the text field see the following sections:
• Description of the command history log for SAT on page 135
• Description of the command history log for Web activity on page 137
Each of the four Linux platform command log entries ends with the command that was issued
at the Linux command line interface (CLI): productid, almcall, almenable, and
serialnumber.
Procedure
Name Description
Date The date of the security violation (MM/DD).
Time The time of the logged security violation
(HH:MM).
Origin _______________________________
(authorization violations only)
Auth-Cd The failed authorization code that generated
the security violation (authorization
violations only).
TG Trunk group through which the security
violation occurred.
TG No The trunk group number that carried the
incoming access attempt.
Mbr Trunk group member through which the
security violation occurred.
Ext Extension number through which the
security violation occurred.
Port/Ext The type of port and extension through which
the security violation occurred.
Bar-Cd Bar code of the physical equipment used
(authorization violations only).
FAC Feature Access Code (FAC) used (station
violations only).
CLI/ANI
Dialed Digits
For a list and description of the text formats in the log entry for SAT, see Communication
Manager SAT command history log format.
For more information about logging levels, see Administration of logging levels in
Communication Manager on page 93.
Name Description
module-name The name of the software module that
created the entry in the log.
pid The Linux process ID that created the entry
in the log.
sat The text string “sat” identifies a
Communication Manager SAT log entry.
sid The parent process ID of the autostat
process, or the process ID of the TUI process
associated with this SAT session when this
SAT session was through a C-LAN.
uid The numeric ID of the SAT user.
uname The login name of the SAT user.
Name Description
uname2 The secondary login name of the SAT user.
profile The access profile number that is assigned
to this user.
R The status of the action:
• s: The action successful.
• f: The action failed due to a non-security
related reason. An ASCII error code might
follow the letter “f” and an optional colon (:),
for example, “f:123456.”
• v: The action failed due to a security
violation.
Security alert:
The system does not display authorization codes, PINs, encryption keys, and passwords in
the command history log.
• Commands that do not change data only log the form invocation.
module-name[98765]:sat 13533 778 login login 0 s display station 1000
This log entry indicates that the user accessed the station form for extension 1000, but
did not make any changes.
• One log entry is created for the form invocation and one log entry is created for each field
that was changed for commands that change one or more fields within a form:
module-name[98765]: sat 13533 778 login login 0 s display station 1000
module-name[98765]: sat 13533 778 login login 0 s change station 1000 Name | Joe
Smith | Mary Jones
module-name[98765]: sat 13533 778 login login 0 s change station 1000 Security
Code | * | *
module-name[98765]: sat 13533 778 login login 0 s change station 1000 Coverage
Path 1 | 3 | 6
module-name[98765]: sat 13533 778 login login 0 s change station 1000
Personalized Ringing Pattern 1 | 2 | 4
These entries indicate the following:
- The name associated with extension 1000 changed from “Joe Smith” to “Mary
Jones.”
- The security code for extension 1000 changed, but the security codes (indicated by
“*”) do not display in the log.
- The Coverage Path 1 field for station 1000 changed from 3 to 6.
- The Personalized Ringing Pattern 1 field for station 1000 changed from 2 to 4.
Note:
For commands that log new entries, the system logs only values that change from
a default value.
Abbreviated Dialing Button Programming command history log format lists and describes the
text formats in the log entry for Web activity.
Name Description
module-name The name of the software module that
created the entry in the log
Name Description
pid The Linux process ID that created the entry
in the log
web The text string “web” to indicate a web log
entry.
ip The IP address of the user accessing the
server
uid The ID number of the user establishing the
web session
uname The login name of user establishing the web
session.
profile The access profile number assigned to the
user
R The status of the action:
• s: The action is successful.
• f: A nonsecurity-related reason is causing
the action to fail. An ASCII error code might
follow the letter f and an optional colon (:),
for example, f:12345
• v: A security violation is causing the action
to fail.
Only the first event is logged unless the user clicked the Start Backup button. Field changes
are not logged unless the page is actually submitted. The field name Avaya Call Processing
(ACP) Translations is abbreviated to try to make the log entry short but recognizable.
Avaya incorporates a third-party update into Avaya software in one of the following ways:
• Avaya bundles the specific update or the new release of the affected software with the
Communication Manager software such that the security-related updates are
automatically incorporated into the Avaya product operation.
• Avaya modifies the Communication Manager software so that the specific update or the
new release of the affected software is appropriately incorporated into the Communication
Manager operation.
• Avaya modifies the specific update or the new release of the affected software so that the
security-related updates are automatically incorporated into the Communication Manager
operation.
When Avaya incorporates one or more security fixes into Avaya product software, the fixes
can be delivered in one of the following ways:
• A security update: A security update includes operating system security fixes or third-
party software security fixes or both.
• An Avaya software update: An Avaya software update includes software security fixes to
the Avaya application software.
• An Avaya full release of software: An Avaya full release of software includes all software
for the Avaya product, including software security fixes to the Avaya application software
and/or security fixes for the operating system and third-party fixes.
there are no adverse affects to the published functionality of the products. In addition, Avaya
thoroughly tests the third-party updates that are included in new software releases.
Avaya-generated security updates are also tested on all affected products prior to release.
Avaya security updates are likewise tested before incorporation into subsequent releases.
Testing meets requirements of internal Avaya testing standards, including testing for the
following:
• Denial of Service
• Encryption standards
• Certificate management
• Audits and logging
• Access control
Result
On the Linux command line, type the command update_info <security patch name>,
where <security patch name> is the name of the Avaya security update, to display
information about Avaya security updates. The customer can log on to the Avaya Security Web
page and view the contents for each security advisory.
Regulatory issues
Note:
This law applies to U.S. customers only. Customers must seek appropriate legal advice for
interpretation of the requirements of this act. Suggestions in this document are not to be
construed as a substitute for legal advice or a definitive list of all possible legal
considerations.
The Sarbanes-Oxley Act of 2002 is a federal law enacted in response to a number of
accounting scandals involving major U.S. corporations. According to this act, public companies
must evaluate and disclose the efficiency of the internal controls of financial reporting. One
major area of internal control consists of information technology controls. As a result, the
Sarbanes-Oxley Act holds chief information officers responsible for the security, accuracy, and
the reliability of the systems that manage and report the financial data.
To the extent that a company uses data collected or transmitted by Communication Manager
as part of its overall cost or revenue reporting and financial management, the company can
use security-related features of Communication Manager to secure the data. Use of these
security-related features can further demonstrate the good faith of the organization in data
management and reporting.
Communication Manager security features also help prevent unauthorized access to the
customer network.
For more information about features related to data security, see the table on page 144.
Table 34: Data security features in this guide
Note:
This law applies to U.S. customers only. Customers must seek appropriate legal advice for
interpretation of the requirements of this act. Suggestions in this document are not to be
construed as a substitute for legal advice or a definitive list of all possible legal
considerations.
The Gramm-Leach-Bliley Act (GLB) requires financial institutions to disclose privacy policies
regarding customer data. This disclosure must describe the methods an institution can use to
disclose private information.
According to the policy, financial institutions must protect the critical as well as nonpublic, but
personal information of their customers. To ensure this protection, the Graham-Leach-Bliley
Act mandates that all institutions establish appropriate administrative, technical, and physical
safeguards.
The Graham-Leach-Bliley Act can also apply to Communication Manager data that includes
customer names and telephone numbers, called and calling number data, and abbreviated
dial lists.
With the following features, organizations can protect customer privacy and demonstrate that
the organization is compliant with the interagency guidelines supporting the Graham-Leach-
Bliley Act.
Note:
This law applies to U.S. customers only. Customers must seek appropriate legal advice for
interpretation of the requirements of this act. Suggestions in this document are not to be
construed as a substitute for legal advice or a definitive list of all possible legal
considerations.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires healthcare
providers to disclose to healthcare recipients the ways in which the institution can use and
disclose private information. HIPAA also requires healthcare providers to protect the privacy
of certain individually identifiable health data for healthcare recipients.
HIPAA can apply to Communication Manager data that includes customer names and
telephone numbers, and called and calling number data.
With the following features, healthcare providers can protect patient privacy and demonstrate
the compliance with HIPAA.
Note:
This law applies to U.S. customers only. Customers must seek appropriate legal advice for
interpretation of the requirements of this act. Suggestions in this document are not to be
construed as a substitute for legal advice or a definitive list of all possible legal
considerations.
In response to concerns that emerging technologies such as digital and wireless
communications are increasing the difficulty for law enforcement agencies to execute
authorized surveillance, the Congress in America enacted the Communication Assistance for
Law Enforcement Act (CALEA) in 1994. CALEA is intended to preserve the ability of law
enforcement agencies to conduct electronic surveillance by makding telecommunications
Note:
This law applies to U.S. customers only. Customers must seek appropriate legal advice for
interpretation of the requirements of this act. Suggestions in this document are not to be
construed as a substitute for legal advice or a definitive list of all possible legal
considerations.
The Federal Information Security Management Act of 2002 provides for development and
maintenance of minimum controls required to protect Federal information and information
systems. Telecommunications systems and commercially-developed information security
systems are included in the systems referenced under this act.
organization that prefers not to implement the suggestions must explain the decision to not
implement the suggested controls.
See the table on page 151 on how ISO 17799 addresses the different categories of data
security management.
Table 38: Communication Manager security and compliance of ISO 17799
• Use validation checks to control Use the System Log and Maintenance Alarm and
processing Event logs.
See:
• Configuration of SNMP and syslog on page 88
• Validate data input into your Communication Manager can track administration and
applications notify the administrator when changes are made. Use
the System Log, and the Maintenance Alarm and Event
logs.
See:
• Configuration of SNMP and syslog on page 88
• Maintenance Procedures for Avaya Aura®
Communication Manager, Gateways and Servers
(03-300432)
• Maintenance Commands for Avaya Aura®
Communication Manager, Gateways and Servers
(03-300431)
• Protect message integrity and Use digital certificates when transmitting data to
authenticity ensure authorization.
Restrict access to the system with logins, passwords,
and authentication keys.
See:
• Chain of trust on page 63
• Administration of authentication passwords on
page 84
• Validate your applications’ Use audits and status reports to verify output.
output data See:
• Maintenance Procedures for Avaya Aura®
Communication Manager, Gateways and Servers
(03-300432)
• Maintenance Commands for Avaya Aura®
Communication Manager, Gateways and Servers
(03-300431)
• Use cryptographic controls to Encrypt data to protect data from packet-sniffing and
protect your information eavesdropping.
See:
• Encryption overview on page 37
• Secure updates of Avaya software and firmware on
page 157
• Control the use of system data Avaya uses internal ISO-certified testing processes for
for testing software.
• Establish formal change control Avaya uses internal ISO-certified change control
procedures processes for software. For security-related updates,
Avaya uses a change policy as documented in
Classification of security updates on page 140.
• Review applications after Avaya uses internal ISO-certified test procedures after
operating system changes operating system changes. See Validation of a security
update on page 141.
• Restrict changes to software Avaya includes only the Linux software packages it
packages needs for Communication Manager. Communication
Manager software is proprietary, and Linux software
cannot be changed on an installed system. Standard
program binaries are normally installed with write
permissions only to the super-user (root) and cannot
be modified.
Control your technical system Communication Manager offers many features and
vulnerabilities processes to protect the customer’s communications
network. See:
• Encryption overview on page 37
• Managing Communication Manager accounts on
page 83
• Configuration of SNMP and syslog on page 88
• Chain of trust on page 63
• Avaya Public Key Infrastructure on page 63
• Configuration of SNMP and syslog on page 88
• Secure backups of Communication Manager data
and translations on page 156
• Secure updates of Avaya software and firmware on
page 157
Note:
This law applies to U.S. customers only. Customers must seek appropriate legal advice for
interpretation of the requirements of this act. Suggestions in this document are not to be
construed as a substitute for legal advice or a definitive list of all possible legal
considerations.
However, the Occupational Safety and Health Administration (OSHA) can interpret failure to
implement E-911 as a direct violation of Section 5(a)(1) of the Occupational Safety and Health
Act, also known as the General Duty Clause, which requires employers to furnish a workplace
which is free from recognized hazards, which might cause, or are likely to cause, death or
serious physical harm.
In addition, there are approximately 17 states with current or pending legislation requiring
enterprise switches to be able to dial 911 and report the number of the caller, associated with
a physical location. The customer must check with the regulations of the customer’s state to
clarify what state requirements might exist regarding 911 calling for enterprises providing
telephone systems for employees.
Note:
The customer must remember the password used for backups to restore the data. The
password is not retrievable from Communication Manager.
• The use of a 15-character to 256-character passphrase for encryption of the backup of
data.
For more information on backing up data with Communication Manager, see Maintenance
Procedures for Avaya Aura® Communication Manager, Branch Gateways and Servers,
03-300432.
Note:
You can backup and restore data of the G250, G350, G430, and G450 Branch Gateways
using a single CLI command for backup and a single CLI command for restore.
For information on backup and restore with Gateways, see:
• Administration for the Avaya G250 and Avaya G350 Branch Gateways, 03-300436
• Administering Avaya G430 Branch Gateway, 03-603228
• Administering Avaya G450 Branch Gateway, 03-602055
and to update firmware and resolve alarms. Using IP connectivity, SAC offers service at two
levels:
• SAC Basic: SAC Basic collects alarms from Avaya Products and sends the alarms to
Avaya over a B2B VPN/Frame Relay link. The firewall of the customer organization and
SSDP control inbound access to Avaya products.
• SAC Premium: SAC Premium builds on SAC Basic by adding inbound gateway
functionality to the SSG. The customer uses the SSG to control and supervise Avaya’s
access to the customer network and products and to record the following:
- What product was accessed
- Who accessed the product
- When was the product accessed
- Why was the product accessed
Only authorized Avaya maintenance technicians have access to customer data that is needed
to perform maintenance on customer products. SSDP logs the user, time and type of access,
as well as the reason for the access using the Trouble Ticket number.
Avaya-certified servers
Avaya Aura® Communication Manager supports the following servers:
• S8300D
• S8510
• S8800
• HP ProLiant DL360 G7 1U
• Dell™ PowerEdge™ R610 1U
• HP ProLiant DL360p G8
• Dell™ PowerEdge™ R620
For information about the supported servers, see Avaya Aura® Communication Manager
Hardware Description and Reference, 555-245-207.
Messaging Software X
A B
AAA servers ..............................................................108
access control list ..................................................... 104 bearer network ........................................................... 99
rules ................................................................... 104 separation from control network ...........................99
access control lists ............................................ 110, 112
configuring packet filtering routers or Layer 3 C
switches ................................................ 110
DHCP servers .................................................... 112 certificates .............................................................71, 74
Access Security Gateway (ASG) ......... 26, 79, 83, 84, 87 location and permissions ..................................... 74
ASG Guard .......................................................... 87 modifications ........................................................ 74
credentials storage ...............................................79 rekeyed ................................................................ 74
description ............................................................84 renewal ................................................................ 74
password management ........................................83 revocation ............................................................ 74
Address Resolution Protocol (ARP) .................. 111, 112 validated before firmware download to H.323
spoofing ..............................................................112 endpoints ................................................ 71
Domain Name System (DNS) ...................... 112 CLI commands ........................................................... 24
Dynamic Host Configuration Control (DHCP) rpm-ga ..................................................................24
......................................................... 112 Communication Manager ......................................33, 36
spoofing tool ....................................................... 111 local host account (default) .................................. 36
administering .............................................................. 92 logins ....................................................................33
syslog server ........................................................ 92 craft ............................................................... 33
administering profiles ................................................. 83 customer super-user ..................................... 33
Apache Web server .................................................... 30 dadmin ........................................................... 33
authentication ........................................................... 109 inads .............................................................. 33
802.1X Layer 2 devices ......................................109 init .................................................................. 33
Authentication, Authorization, and Auditing (AAA) non-super-user customer .............................. 33
services ....................................................... 104 control network ........................................................... 99
authorization ......................................................... 39, 40 separation from bearer network ........................... 99
algorithms ....................................................... 39, 40 Customer Telephone Activation (CTA) ....................... 94
HMAC-SHA 1 ................................................ 39
HMAC-SHA1 32 ............................................ 40
HMAC-SHA1 80 ............................................ 40 D
HMAC-SHA1 96 ............................................ 40
Avaya courses ............................................................ 14 Denial of Service (DoS) attacks .......................... 28, 112
Avaya Installation Wizard ......................................... 165 Chargen packet storm ..........................................28
Web Access Mask default settings .................... 165 Finger of death ..................................................... 28
Avaya Native Configuration Manager ....................... 165 Fraggle ................................................................. 28
Web Access Mask default settings .................... 165 H.323 / H.225v4 PROTOS ................................... 28