SlideShare uma empresa Scribd logo
1 de 11
Why Do I Need an SBC ? PacketBase, Inc.
MM App App VP App CM Application Platform Application Platform Avaya Aura™ Session Manager Avaya Aura™ SBC Avaya Aura™ SBC and the Reference Architecture Application MX SystemManager PSTN trunking providers, hosted services, federated partners Media Servers SIP Trunks or Connection SIP Trunks Avaya Aura SBC or Acme Packet SBC SIP Avaya one-X® endpoints Internet Access 3rd Party PBXs Avaya CM (branch or  standalone) Remote workers via Internet (future) 3rd Party endpoints 2
Things to think about… Service Providers maximize revenue by designing their network to be highly optimized with minimal maintenance Their SBC’s, Softswitches, and Media Gateways are widely shared resources Unique customer configuration requirements deviate from this theme For SIP Trunks, each Service Provider has explicitly defined User to Network Interface (UNI) requirements The requirements include supported SIP message types requests/responds, methods, formatting, headers, fields, codec’s, QoS markings etc.  Within a single Service Provider, the UNI will differ with each unique service offering. Enterprise customers do not subscribe to the same model, instead focusing on implementing solutions that meet customer needs and differentiate their business Traditional demarcation points, i.e. media gateways, no longer act as natural boundaries to enforce expected service provider behaviors and requirements
Why use an SBC? Flexibility Providers layer of independence from Service Provider – allows enterprise to make changes more quickly vs. negotiating / relying on Service Provider if needs change Normalization point for signaling and RTP media streams to multiple SIP stacks in the enterprise  Allows for multiple SIP trunk provider access points (now or in future) Support of enterprise-specific call flows that may not be directed supported by SIP trunk provider Security Enforces a customer’s unique security policies  SIP trunk provider’s own SBC (if private SIP trunk service) focuses on the provider’s security concerns Complete network topology hiding Addresses set of issues specific to SIP-based communication (deep packet inspection) Accountability Per call status – QoS, SLA monitoring Report on intrusion attempts Session recording 4
Analyst View - SBCs and the Enterprise 5
The Security Threat - Examples June 2009 – International Phone Fraud Ring busted – Softpedia Eight indicted for stealing calls totaling over 12 million minutes and resulting in phone bills of more than $55 million May 2010 – FBI warns on VoIP attacks TDoS attacks create diversion for information thieves to loot bank account information October 2010 - VoIP Attacks On The Rise! Secure Your VoIP Servers – blog.sipvicious.org Cloud-initiated wave of SIPVicious port 5060 scans lead to €11 million loss December 2010 – Major VoIP Fraud Gang Dismantled in Romania 50 individuals used “Zoiper” program to route calls to premium rate numbers through hacked VoIP accounts in exchange for commission 6
Gartner – SBC Evaluation Criteria Has been thoroughly tested and documented as an integral part of the enterprise UC solution Has been incorporated into the certification configurations of the enterprise UC solution with the SIP trunk service provider Provides support and maintenance services for UC   Provides a full set of security features, including prevention of DoS and DDoS attacks  Source: http://www.gartner.com/technology/media-products/reprints/avaya/vol6/article8/article8.html  7
8 Enterprise and contact center security threats Denial of Service Call/registration overload Malformed messages (fuzzing) Configuration errors Mis-configured devices Operator and application errors  Theft of service Unauthorized users Unauthorized media types Viruses & SPIT Viruses via SIP messages  Malware via IM sessions SPIT – unwanted traffic Enterprise Adoption of Collaboration Tools Source: Nemertes Research Increased usage of collaboration tools means security threats are more of a concern
SBC DoS  protection Fraud Access prevention control Service infrastructure Topology hiding DoS & privacy prevention Viruses malware & SPIT mitigation Avaya Aura™ SBC & Acme Packet Net-Net SBC Security Framework  SBC DoS/DDoS protection Protect against DoS/DDoS attacks Access control & VPN separation Dynamic, session-aware access control for signaling & media Topology hiding & privacy  Viruses, malware & SPIT mitigation Deep packet inspection  Encryption and Authentication TLS, SRTP, IPSec Monitoring and reporting Record attacks & attackers Provide audit trails 9
GSSCP (Global Service Provider SIP Compliance Program) Program to test and document valid working configurations with SIP trunk providers Tests are tied to 6 defined Avaya reference configurations Avaya has recently published Interoperability Guidelines document  SBC testing guidelines Implications of implementing a non-tested configuration 3rd party SBC guidelines 10
SBC Feature Summary The SBC will provide the interworking function between the Avaya Aura Communication Core and SP specific SIP methods  Faster deployment of Avaya Aura solutions at lower risk and cost  Easier integration of Avaya Aura with external third-party applications and services  The SBC provides DoS (Denial of Service) protection by rate limiting traffic into the enterprise  The SBC provides topology hiding for the enterprise infrastructure  The SBC will be the anchoring point for in-bound calls and will consume REFER method indications to redirect traffic internal to the enterprise  The SBC may need to fork media for recording purposes The SBC may be required to transcode media Reference point for Interop testing with SIP trunk providers 11

Mais conteúdo relacionado

Mais procurados

Homer - Workshop at Kamailio World 2017
Homer - Workshop at Kamailio World 2017Homer - Workshop at Kamailio World 2017
Homer - Workshop at Kamailio World 2017Giacomo Vacca
 
Avaya IP Office Overview
Avaya IP Office OverviewAvaya IP Office Overview
Avaya IP Office OverviewMotty Ben Atia
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBasePacketBase, Inc.
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQAlan Percy
 
Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)William Lee
 
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSridhar Kumar N
 
Avaya Aura Messaging Portfolio
Avaya Aura Messaging PortfolioAvaya Aura Messaging Portfolio
Avaya Aura Messaging PortfolioMotty Ben Atia
 
Avaya ip office beginners training
Avaya ip office beginners trainingAvaya ip office beginners training
Avaya ip office beginners trainingShashank Kapil
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...ALTANAI BISHT
 
Genesys voice portal whitepaper
Genesys voice portal whitepaperGenesys voice portal whitepaper
Genesys voice portal whitepaperRanjit Patel
 
Avaya Aura Contact Center Elite
Avaya Aura Contact Center EliteAvaya Aura Contact Center Elite
Avaya Aura Contact Center EliteMotty Ben Atia
 
Avaya call routing_flowchart
Avaya call routing_flowchartAvaya call routing_flowchart
Avaya call routing_flowchartdborsan
 
Design of small to large multi site solution, based on 8300, 8800 simplex, 88...
Design of small to large multi site solution, based on 8300, 8800 simplex, 88...Design of small to large multi site solution, based on 8300, 8800 simplex, 88...
Design of small to large multi site solution, based on 8300, 8800 simplex, 88...AURACA
 
Session initiation protocol SIP
Session initiation protocol SIPSession initiation protocol SIP
Session initiation protocol SIPLaraib Khan
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact centerCisco Canada
 
Avaya outbound update apr 2015
Avaya outbound update apr 2015Avaya outbound update apr 2015
Avaya outbound update apr 2015David Ward
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunkingorionnow
 

Mais procurados (20)

Homer - Workshop at Kamailio World 2017
Homer - Workshop at Kamailio World 2017Homer - Workshop at Kamailio World 2017
Homer - Workshop at Kamailio World 2017
 
Avaya IP Office Overview
Avaya IP Office OverviewAvaya IP Office Overview
Avaya IP Office Overview
 
Avaya Aura
Avaya AuraAvaya Aura
Avaya Aura
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
 
High-Density Wireless Networks for Auditoriums
High-Density Wireless Networks for AuditoriumsHigh-Density Wireless Networks for Auditoriums
High-Density Wireless Networks for Auditoriums
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
 
Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)
 
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
 
Avaya Aura Messaging Portfolio
Avaya Aura Messaging PortfolioAvaya Aura Messaging Portfolio
Avaya Aura Messaging Portfolio
 
Avaya ip office beginners training
Avaya ip office beginners trainingAvaya ip office beginners training
Avaya ip office beginners training
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
 
Genesys voice portal whitepaper
Genesys voice portal whitepaperGenesys voice portal whitepaper
Genesys voice portal whitepaper
 
Avaya Aura Contact Center Elite
Avaya Aura Contact Center EliteAvaya Aura Contact Center Elite
Avaya Aura Contact Center Elite
 
Avaya call routing_flowchart
Avaya call routing_flowchartAvaya call routing_flowchart
Avaya call routing_flowchart
 
Design of small to large multi site solution, based on 8300, 8800 simplex, 88...
Design of small to large multi site solution, based on 8300, 8800 simplex, 88...Design of small to large multi site solution, based on 8300, 8800 simplex, 88...
Design of small to large multi site solution, based on 8300, 8800 simplex, 88...
 
Session initiation protocol SIP
Session initiation protocol SIPSession initiation protocol SIP
Session initiation protocol SIP
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact center
 
Sip
SipSip
Sip
 
Avaya outbound update apr 2015
Avaya outbound update apr 2015Avaya outbound update apr 2015
Avaya outbound update apr 2015
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunking
 

Semelhante a Why Do I Need an SBC

ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...Biznes to Rozmowy
 
Sbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSelf Employed
 
Case study about voip
Case study about voipCase study about voip
Case study about voipelmudthir
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsTelcoBridges Inc.
 
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...Erol TOKALACOGLU
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsAlan Percy
 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sonajayconde
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days
 
IP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMSIP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMSInam Khosa
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationWaldir R. Pires Jr
 
FRAFOS Secure Session Border Control
FRAFOS Secure Session Border ControlFRAFOS Secure Session Border Control
FRAFOS Secure Session Border Controlstefansayer
 
What is an SBC? A look at the role of the Session Border Controller
What is an SBC?  A look at the role of the Session Border ControllerWhat is an SBC?  A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border ControllerAlan Percy
 
What is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border ControllerWhat is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border ControllerTelcoBridges Inc.
 
Layer 7: Getting Your SOA to Production Without Cost and Complexity
Layer 7: Getting Your SOA to Production Without Cost and ComplexityLayer 7: Getting Your SOA to Production Without Cost and Complexity
Layer 7: Getting Your SOA to Production Without Cost and ComplexityCA API Management
 
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...Oliver Pfaff
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacksEditor IJCATR
 

Semelhante a Why Do I Need an SBC (20)

ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
 
Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
 
Digital network lecturer4
Digital network  lecturer4Digital network  lecturer4
Digital network lecturer4
 
Sbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX Deloyment
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sona
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
 
IP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMSIP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMS
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
 
FRAFOS Secure Session Border Control
FRAFOS Secure Session Border ControlFRAFOS Secure Session Border Control
FRAFOS Secure Session Border Control
 
What is an SBC? A look at the role of the Session Border Controller
What is an SBC?  A look at the role of the Session Border ControllerWhat is an SBC?  A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border Controller
 
Jvvnl 071108
Jvvnl 071108Jvvnl 071108
Jvvnl 071108
 
What is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border ControllerWhat is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border Controller
 
Layer 7: Getting Your SOA to Production Without Cost and Complexity
Layer 7: Getting Your SOA to Production Without Cost and ComplexityLayer 7: Getting Your SOA to Production Without Cost and Complexity
Layer 7: Getting Your SOA to Production Without Cost and Complexity
 
Web-services
Web-services Web-services
Web-services
 
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 

Mais de PacketBase, Inc.

Avaya One-X Mobile SIP for Apple iOS by PacketBase
Avaya One-X Mobile SIP for Apple iOS by PacketBaseAvaya One-X Mobile SIP for Apple iOS by PacketBase
Avaya One-X Mobile SIP for Apple iOS by PacketBasePacketBase, Inc.
 
Avaya Healthcare Solutions by PacketBase
Avaya Healthcare Solutions by PacketBaseAvaya Healthcare Solutions by PacketBase
Avaya Healthcare Solutions by PacketBasePacketBase, Inc.
 
Avaya 1XC Mobile SIP for Apple
Avaya 1XC Mobile SIP for AppleAvaya 1XC Mobile SIP for Apple
Avaya 1XC Mobile SIP for ApplePacketBase, Inc.
 
Avaya web alive by PacketBase
Avaya web alive by PacketBaseAvaya web alive by PacketBase
Avaya web alive by PacketBasePacketBase, Inc.
 
Avaya and Skype Connect PacketBase is an Avaya BusinessPartner
Avaya and Skype Connect PacketBase is an Avaya BusinessPartnerAvaya and Skype Connect PacketBase is an Avaya BusinessPartner
Avaya and Skype Connect PacketBase is an Avaya BusinessPartnerPacketBase, Inc.
 
Avaya Collaborative Tagging System by PacketBase
Avaya Collaborative Tagging System by PacketBaseAvaya Collaborative Tagging System by PacketBase
Avaya Collaborative Tagging System by PacketBasePacketBase, Inc.
 
Avaya Aura Five Nines by PacketBase
Avaya Aura Five Nines by PacketBaseAvaya Aura Five Nines by PacketBase
Avaya Aura Five Nines by PacketBasePacketBase, Inc.
 

Mais de PacketBase, Inc. (7)

Avaya One-X Mobile SIP for Apple iOS by PacketBase
Avaya One-X Mobile SIP for Apple iOS by PacketBaseAvaya One-X Mobile SIP for Apple iOS by PacketBase
Avaya One-X Mobile SIP for Apple iOS by PacketBase
 
Avaya Healthcare Solutions by PacketBase
Avaya Healthcare Solutions by PacketBaseAvaya Healthcare Solutions by PacketBase
Avaya Healthcare Solutions by PacketBase
 
Avaya 1XC Mobile SIP for Apple
Avaya 1XC Mobile SIP for AppleAvaya 1XC Mobile SIP for Apple
Avaya 1XC Mobile SIP for Apple
 
Avaya web alive by PacketBase
Avaya web alive by PacketBaseAvaya web alive by PacketBase
Avaya web alive by PacketBase
 
Avaya and Skype Connect PacketBase is an Avaya BusinessPartner
Avaya and Skype Connect PacketBase is an Avaya BusinessPartnerAvaya and Skype Connect PacketBase is an Avaya BusinessPartner
Avaya and Skype Connect PacketBase is an Avaya BusinessPartner
 
Avaya Collaborative Tagging System by PacketBase
Avaya Collaborative Tagging System by PacketBaseAvaya Collaborative Tagging System by PacketBase
Avaya Collaborative Tagging System by PacketBase
 
Avaya Aura Five Nines by PacketBase
Avaya Aura Five Nines by PacketBaseAvaya Aura Five Nines by PacketBase
Avaya Aura Five Nines by PacketBase
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Why Do I Need an SBC

  • 1. Why Do I Need an SBC ? PacketBase, Inc.
  • 2. MM App App VP App CM Application Platform Application Platform Avaya Aura™ Session Manager Avaya Aura™ SBC Avaya Aura™ SBC and the Reference Architecture Application MX SystemManager PSTN trunking providers, hosted services, federated partners Media Servers SIP Trunks or Connection SIP Trunks Avaya Aura SBC or Acme Packet SBC SIP Avaya one-X® endpoints Internet Access 3rd Party PBXs Avaya CM (branch or standalone) Remote workers via Internet (future) 3rd Party endpoints 2
  • 3. Things to think about… Service Providers maximize revenue by designing their network to be highly optimized with minimal maintenance Their SBC’s, Softswitches, and Media Gateways are widely shared resources Unique customer configuration requirements deviate from this theme For SIP Trunks, each Service Provider has explicitly defined User to Network Interface (UNI) requirements The requirements include supported SIP message types requests/responds, methods, formatting, headers, fields, codec’s, QoS markings etc. Within a single Service Provider, the UNI will differ with each unique service offering. Enterprise customers do not subscribe to the same model, instead focusing on implementing solutions that meet customer needs and differentiate their business Traditional demarcation points, i.e. media gateways, no longer act as natural boundaries to enforce expected service provider behaviors and requirements
  • 4. Why use an SBC? Flexibility Providers layer of independence from Service Provider – allows enterprise to make changes more quickly vs. negotiating / relying on Service Provider if needs change Normalization point for signaling and RTP media streams to multiple SIP stacks in the enterprise Allows for multiple SIP trunk provider access points (now or in future) Support of enterprise-specific call flows that may not be directed supported by SIP trunk provider Security Enforces a customer’s unique security policies SIP trunk provider’s own SBC (if private SIP trunk service) focuses on the provider’s security concerns Complete network topology hiding Addresses set of issues specific to SIP-based communication (deep packet inspection) Accountability Per call status – QoS, SLA monitoring Report on intrusion attempts Session recording 4
  • 5. Analyst View - SBCs and the Enterprise 5
  • 6. The Security Threat - Examples June 2009 – International Phone Fraud Ring busted – Softpedia Eight indicted for stealing calls totaling over 12 million minutes and resulting in phone bills of more than $55 million May 2010 – FBI warns on VoIP attacks TDoS attacks create diversion for information thieves to loot bank account information October 2010 - VoIP Attacks On The Rise! Secure Your VoIP Servers – blog.sipvicious.org Cloud-initiated wave of SIPVicious port 5060 scans lead to €11 million loss December 2010 – Major VoIP Fraud Gang Dismantled in Romania 50 individuals used “Zoiper” program to route calls to premium rate numbers through hacked VoIP accounts in exchange for commission 6
  • 7. Gartner – SBC Evaluation Criteria Has been thoroughly tested and documented as an integral part of the enterprise UC solution Has been incorporated into the certification configurations of the enterprise UC solution with the SIP trunk service provider Provides support and maintenance services for UC Provides a full set of security features, including prevention of DoS and DDoS attacks Source: http://www.gartner.com/technology/media-products/reprints/avaya/vol6/article8/article8.html 7
  • 8. 8 Enterprise and contact center security threats Denial of Service Call/registration overload Malformed messages (fuzzing) Configuration errors Mis-configured devices Operator and application errors Theft of service Unauthorized users Unauthorized media types Viruses & SPIT Viruses via SIP messages Malware via IM sessions SPIT – unwanted traffic Enterprise Adoption of Collaboration Tools Source: Nemertes Research Increased usage of collaboration tools means security threats are more of a concern
  • 9. SBC DoS protection Fraud Access prevention control Service infrastructure Topology hiding DoS & privacy prevention Viruses malware & SPIT mitigation Avaya Aura™ SBC & Acme Packet Net-Net SBC Security Framework SBC DoS/DDoS protection Protect against DoS/DDoS attacks Access control & VPN separation Dynamic, session-aware access control for signaling & media Topology hiding & privacy Viruses, malware & SPIT mitigation Deep packet inspection Encryption and Authentication TLS, SRTP, IPSec Monitoring and reporting Record attacks & attackers Provide audit trails 9
  • 10. GSSCP (Global Service Provider SIP Compliance Program) Program to test and document valid working configurations with SIP trunk providers Tests are tied to 6 defined Avaya reference configurations Avaya has recently published Interoperability Guidelines document SBC testing guidelines Implications of implementing a non-tested configuration 3rd party SBC guidelines 10
  • 11. SBC Feature Summary The SBC will provide the interworking function between the Avaya Aura Communication Core and SP specific SIP methods Faster deployment of Avaya Aura solutions at lower risk and cost Easier integration of Avaya Aura with external third-party applications and services The SBC provides DoS (Denial of Service) protection by rate limiting traffic into the enterprise The SBC provides topology hiding for the enterprise infrastructure The SBC will be the anchoring point for in-bound calls and will consume REFER method indications to redirect traffic internal to the enterprise The SBC may need to fork media for recording purposes The SBC may be required to transcode media Reference point for Interop testing with SIP trunk providers 11

Notas do Editor

  1. SBC Value within the Avaya Aura Architecture As enterprises are moving rapidly to adopt Session Initiation Protocol (SIP) for connection to service providers (SIP Trunks), hosted application providers, extranet partners and remote workers, a common question is: ‘Since the SIP trunk provider already has an SBC in their network, why does a customer of that provider require an SBC on their premise as well ?  SecurityAn enterprise SBC provides essential SIP security regardless of whether the public SIP trunk service is delivered as a dedicated connection from the SIP trunk provider or via a shared MPLS network. VoIP is a service that runs on IP, just like email and web browsing. Enterprises do not rely on their Internet Service Providers to protect those services using a central, communal firewall. An enterprise SBC enforces the customer’s unique VoIP security policies – just like an enterprise firewall does for data – and ensures that any regulatory requirements for data security are met. It provides the enterprise complete network topology hiding, up to Layer 7, meaning all extra-enterprise SIP signaling and RTP media are anchored through the enterprise SBC, mitigating the risk of exposing large ranges of private IP addresses to an externally controlled foreign entity and the associated possibilities of intentional or unintentional (misconfiguration) attack. Unlike an enterprise firewall, an enterprise SBC is specifically designed to parse each SIP message via deep packet inspection and manipulate the SIP headers if necessary to ensure protocol compliant formatting. The SBC is able to enforce signalling rate limiting and media bandwidth policing and reduce the impact of DoS attacks by using dynamic access lists triggered by behavioral analysis of users and traffic.  FlexibilityWithout an enterprise SBC, certain configuration changes may need to be done at the central SBC by the service provider. The service providers network operations processes preclude rapid and frequent changes to the central SBC platform configuration – primarily for stability reasons. Most service providers only offer one enterprise-facing configuration and will not change it. Those who will make changes will only do so after extensive regression testing – and this takes place very infrequently – at most 1 or 2 times a year. This means that it is often very difficult to meet the changing needs of customers and/or meet a customer’s specific needs for interfacing their particular communication infrastructure and associated security policy requirements. By installing an enterprise SBC, the customer’s specific communications requirements can be fully addressed, insulating the service providers SBC from any changes. This means that the specific business needs of the customer can be met in a quick and easy way. Also, any adaptation costs are specific to that customer and do not impact the on-going network operations costs. The enterprise SBC provides an ideal reference interface for network border interoperability testing by normalizing the signaling and RTP streams into the enterprise. Additionally, an enterprise may wish to work with multiple SIP trunk providers. The SBC is an enabler if more than 1 SIP trunk provider is terminating to the enterprise, providing common demarcation point for normalization. Finally, an enterprise’s business requirements, now or in the future, will drive enterprise specific call flows that may not necessarily be supported or directly interoperable with a SIP trunk provider. A premise SBC can be configured to meet an enterprise’s specific requirements.  AccountabilityAn enterprise SBC can generate per-call statistics including QoS measurements for independent SLA monitoring. It can also provide reports on intrusion attempts (IDT) and provide session replication for call recording to meet industry or regulatory requirements. Thus, for these reasons, Avaya strongly recommends deployment of the Avaya Aura Session Border Controller or Acme Packet-branded SBCs within the Avaya Aura architecture.
  2. 49% growth in Enterprise SBC slaes between 2008 to 2013 estimated by Infonetics (report was written in late 2007).Infonetics acknowledges the momentum of the SBC toward the enterprise for functions previously only addressed by the SP.Gartner acknowledges security and interoperability advantages to an enterprise SBC.The most interesting statement from Gartner is the last, which highlights the partnership of SBC with a session manager. Avaya is unique in the Enterprise with the concept of a session manager, and its inherent ability to broker applications. This session-based architecture makes the need for an SBC much more prevalent than some of our more traditional competitors. In other words, the Aura architecture is different. And this is why SPs are not seeing the demand for a premise SBC from all Enterprise SIP trunking vendors . . . Yet.