SIP Trunks CUBE CUCM Security V2 PDF
SIP Trunks CUBE CUCM Security V2 PDF
SIP Trunks CUBE CUCM Security V2 PDF
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Fragen aus der Praxis
CUBE / xDSL
CUCM Router
SIP
SIP (1TR118)
• Kann der Kunde die CUBE Funktionen und den Internet Anschluss auf dem gleichen Router
verwenden?
• Kann der Anschluss ausschließlich für Voice genutzt werden?
• Wie kann der CUBE-Router am VDSL / ADSL abgesichert werden?
• Kann eine Firewall davor installiert werden?
• Kann eine Firewall dahinter installiert werden?
• Kann der CUBE hinter einem anderen Internet Router mit NAT installiert werden?
• Welche Security Features bietet der CUBE auf der Applikationsebene für Voice?
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Warum ein Session Border Controller ?
Session
Security Interop Resiliency
Control
• Network Topology hiding • Protocol Interworking • Call Admission Control • SIP Trunk load balancing
• NAT (L3 level) • SIP<->H323 • Bandwidth & Platform • Connectivity to more
• SIP<->SIP allocation then one SIP Trunk
• Voice Application Firewall • Load balancing
• TDOS • Media interworking
• Access Control • Transcoding • Service Provider Geo
• Inspection and • Translating redundancy
Monitoring
• Media Services • Local PSTN breakout
• Encryption • Call Recording
• TLS/SRTP • MOH • High Availability
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Five Layers of Security in CUBE
EXTERNAL
SECURITY
Policy
APPLICATION LAYER
Dialpeer
Matching
NETWORK LAYER
Access Control
Lists
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
CUBE Voice Security Protection per Design Specs
Signaling Media
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
SIP Trunks und Firewall Design
Scenarios
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CUBE & external Firewall Deployment Scenarios
CUBE
PBX Router
SIP
No Firewall, SIP Trunk
#1
CUBE only
PBX CUBE
F/W Router Router
& FW
between SIP SIP Trunk
CUBE and #3
SP
CUBE
PBX FW Router Router
F/W on SIP
& FW
SIP Trunk
either side #4
of CUBE
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Firewall : General Guidelines mit ALL-IP Sip Trunks
• #1, #2: CUBE hat eine Public IP-Adresse und muss durch CUBE eigene Verfahren
geschütz werden
• # 3, #4: CUBE steht hinter einer Firewall bzw. NAT Router
• DT Sip Trunk Plattform erkennt, dass CUBE hinter einem NAT Router steht
• NAT Router sollte SIP ALG unterstützen
• Externe Firewall: NAT Pinholing und Firewall Regeln sollten dynamisch au bzw. abgebaut
werden
• SIP Ports: TCP 5060 , TCP 5061 (TLS)
• Media Ports: 1025 - 65.536
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
9 9
ACLs für WAN Interfaces, um nur SIP, RTP und DNS zu erlauben
permit udp 217.0.0.0 0.0.255.255 range 1025 65525 any ! RTP Port Range
!
interface Dialer0
....
ip access-group FROM-DT-TO-CUBE in
....
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CUBE Security Features
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topology/Address Hiding
IP WAN
Inside Outside
Service Provider
• Requirements
• Maintain connectivity without exposing the IP network details
• B2BUA provides complete topology hiding on signaling and media
• Maintains security and operational independence of both networks
• Provides implicit NAT service by substituting Cisco Unified Border Element IP addresses on
all traffic
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Voice IP Trust List for SIP Signaling
• 1. Enable CUBE Application
voice service voip
mode border-element license capacity 20 à License count entered here not enforced though
this CLI is required to see “show cube” CLI output
allow-connections sip to sip à By default IOS/IOS-XE voice devices do not allow
an incoming VoIP leg to go out as VoIP
14
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Close Unused Session Transport Mechanisms and
Protocols
• Close Unused H.323/SIP Ports and Transport Mechanisms
sip-ua
no transport udp
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SIP Registration/Digest Authentication
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SIP Listening Port Protection
§ Die Möglichkeit besteht, die Listen Ports von “well-known” auf andere Ports
umzuändern
§ Gilt nicht für ALL-IP SIP Trunks, da bei ALL-IP 5060 / 5061 vorausgesetzt
wird
§ i.d.R gültig für Private SIP Trunks
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Call Admission Control at the edge...
CUBE provides various CAC mechanisms to safeguard your network from SIP based attacks and to enforce policies based on:
• Total calls • Maximum connections per destination
• CPU & Memory • Dial-peer or interface bandwidth
• Call spike detection
CUBE CUBE
call threshold global [total/mem/cpu] calls low xx high yy If a call spike is detected, reject
call treatment on calls
CUBE CUBE
call threshold global [total/mem/cpu] calls low xx high yy If a call spike is detected, reject
call treatment on calls
Configuration on CUBE
Step1 : § Set the threshold for Total-Calls
call threshold global total-calls low <low-threshold> high <high-threshold>
! call threshold global total-calls low 20 high 24
! The call threshold global total-callscommand controls the total number of calls to be
! supported on the CUBE. The command tracks the number of calls, rejecting the 25th call
! and not accepting calls again until the total number of calls falls below 20
Configuration on CUBE
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Call Admission Control based on Call spikes
§ Call spike CAC monitors call arrival rate over a moving window of time; calls exceeding the
configured rate threshold are rejected
§ Protection against unexpected high call volumes, and INVITE-based DOS attacks
§ Can be configured globally or on a per dial-peer level
§ Error code will be sent when a call spike occurs
§ This error code is also configurable globally or on a per dial-peer level
Call Spike
Detection
CUBE
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Call Admission Control based on Call spikes
Configuration on CUBE
call spike call-number [steps number-of-steps size milliseconds]
SIP SP A
CUBE
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Call Admission Control based on Bandwidth
§ Bandwidth based CAC feature provides a mechanism to limit number of SIP calls based
on the aggregate media bandwidth limit either at:
§ Dial-Peer level or,
§ Interface level
§ Provides the ability to configure the SIP error response code for calls rejected by this
feature
§ Examples:
Call #1 – 80Kbps
Call #2 – 80 Kbps dial-peer voice 1 voip
max-bandwidth 160
Call #3 – 80 Kbps
CUBE Call #3 Rejected by CUBE
At Dial-Peer level At Interface level
dial-peer voice 1 voip !
destination-pattern 2... CUBE# call threshold interface GigabitEthernet0/0 int-bandwidth
max-bandwidth 160 low 120 high 160
session protocol sipv2 !
session target ipv4:9.44.44.9:6080
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CUBE Dial-Peer Configuration
Outbound Dial-peer vom CUBE zum ALL-IP SIP-Trunk
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2
5
CUBE Dial-Peer Configuration
Inbound Dial-peer vom CUBE zum ALL-IP SIP-Trunk
!
dial-peer voice 2002 voip
description ***inbound PSTN DIAL-PEER***
session protocol sipv2
destination dpg 2002
incoming called-number +492284335329.T !
Wenn möglich kein incoming called-number .T konfigurieren !
voice-class codec 1
voice-class sip profiles 5000
inbound voice-class sip tenant 2000
dtmf-relay rtp-nte
fax-relay ecm disable
fax rate 14400
ip qos dscp cs6 signaling
clid strip name
no vad
!
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2
6
RTP Port Range and Phantom Packets
§ A phantom packet is a valid RTP packet meant for the CUBE or Voice TDM gateway without an
existing signaling session
§ When a phantom packet is received by the VoIP RTP layers of the gateways, the packet is punted
to the UDP process to check if it is required by any other applications causing performance issues
§ A malicious attacker can also send a large number of phantom/rogue packets to impact CPU
§ Configure VoIP port range for phantom packets. If a phantom packet is received on the
configured port, the VoIP RTP layer can safely drop the packet. If a phantom packet is received
on any other port, the VoIP RTP layer punts the packet to the UDP process.
§ RTP port range on ISR G2 is from 16K to 32K, and 8K to 48K on ISR 4K, ASR1K, and vCUBE
voice service voip
!
media-address range 192.168.10.1 192.168.10.254 ß Internal Interface
media-address range 217.0.0.1 217.0.255.254 ß External Interface
! the port-range here decides which ports to be used for this media-range
! used to drop phantom packets within this port-range, no impact on which ports to use
sip
source filter ! Filter out incoming incorrect remote addr/port RTP packets
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Media Policing to protect against RTP Floods
§ Leaky Bucket Algorithm (LBA) checks RTP payload in the
RTP packet against the expected negotiated rate in SIP
signaling and identify violation if any
§ LBA identifies violation and triggers policing actions on
violated rtp packets.
§ Policing actions can be one of the following:
§ Drop all violated packets
§ Drop all the violated packets as well as disconnect call once it
reaches the configured number of violations, or
§ Ignore the violations
§ SYSLOG and SNMP trap can be generated to inform
violation to the system administrator.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
28 28
Introduction to Multi-VRF
VRF
VRF
VRF
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multi-VRF Aware Call Routing on CUBE .6
15 6.3.
/
.2T 1
VRF VRF 1
XE
Interface Interface
Tenant Tenant
Dial-Peer Dial-Peer
VRF
VRF
VRF
• CUBE allows intra and inter VRF routing of voice and video calls without the need of Route
Leaks improving security at the network level
• Overlapped IP addressing and Dial Plan with Multi VRF feature provides seamless integration
of networks
• Provision to configure RTP port ranges for each VRF and allocation of Local RTP ports based
upon VRF.
• Listen sockets on UDP, TCP and TLS transports based on the VRF
VRF and ALL IP SIP Trunks à IOS XE 16.7 because of “DNS aware VRF”
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SIP TLS & SRTP
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SIP TLS & SRTP mit ALL- IP SIP Trunk
CUCM Cluster DT NGN
TCP / RTP CUBE
TCP / SRTP
TLS / RTP TCP / RTP
TLS / SRTP TLS / SRTP
• Das CA Certificate der DT muss in den Truststore des Routers importiert werden
• https://www.telesec.de/de/public-key-infrastruktur/support/root-zertifikate/category/58-deutsche-telekom-root-ca-2
• Root CA .cer oder der konvertieren zum. “.der”, damit es in den Router importiert werden kann
• SRTP: AES_CM_128_HMAC_SHA1_80 oder AES_CM_128_HMAC_SHA1_32
• SIP: TLS 1.2
• 29xx und 39xx Router: SRTP – RTP Interworking benötigt DSP’s
• 43xx und 44xx Router: SRTP – RTP Interworking auf der CPU, daher keine DSP’s notwendig
• Performancewert des Routers mit SRTP / TLS beachten
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Wie kann CUBE vor unterschiedlichen
Security Attacken schützen (Summary)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Voice Security Attacks
CUBE Protection at Various Layers (1 of 4)
SBC Threat / Network Layer (protects at entry point in the Application Layer (CUBE)
network)
Security Requirement Protection built in the B2BUA layer
ACLs, NBAR, CoPP
Calls/Traffic from untrusted Access Control Lists (ACLs) to Allow/Deny Explicit Toll Fraud prevention using
sources Sources of Calls
a. IP Trust Lists [IOS 15.1(2)T]
a. Only allow service provider’s SBC to initiate
b. Silent-discard CLI – TDoS attack
traffic from PSTN side
mitigation [IOS 15.3(3)M]
b. Only allow your enterprise PBX (CUCM) to
c. Topology/Address Hiding for both media
initiate traffic from internal network side
and signaling
c. Modifiable port range
d. SIP Trunk Registration/Authentication –
Close unused H323/SIP ports and transport prevents session hijacking
mechanisms.
DoS/TDoS Attacks e. Option to change well known listening
sip-ua
ports
no transport udp
voice service voip f. Explicit incoming/outgoing dial-peer
h323 matching
call service stop
Malformed Signaling NBAR – protection against Automatic checks by SIP/H.323 Protocol stacks
Packets signaling(SIP/H.323/SIP-TLS), UDP attacks on
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
in IOS Voice code 36
open RTP ports, and crafted packets
Voice Security Attacks
CUBE Protection at Various Layers (2 of 4)
SBC Threat / Network Layer (protects at entry point in the Application Layer (CUBE)
network)
Security Requirement Protection built in the B2BUA layer
ACLs, NBAR, CoPP
Large Rate of packet Control Plane Policing (CoPP policy) • CAC mechanisms based on
arrival, flooding implemented with ACLs – limits the rate of CPU/memory/bandwidth utilization and
packets and mitigates attacks from otherwise total number of calls
Trustred Sources
• Call Spike monitors call arrival rate over
a moving window of time
Rogue/Phantom RTP / Deep packet inspection with ACL and NBAR • Define media address and RTP port
RTCP packets Policing ranges
• Source filter - Filters out incoming
incorrect remote address/port RTP
Packets
• Automatic checks by IOS Voice code
on Call-ID, RTP sequence numbers,
SSRC
Malformed RTP / RTCP NBAR Policing to classify them as invalid RTP Library check in the IOS Voice code,
packets DSP check
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Voice Security Attacks
CUBE Protection at Various Layers (3 of 4)
SBC Threat / Network Layer (protects at entry point in Application Layer (CUBE)
the network)
Security Requirement Protection built in the B2BUA layer
ACLs, NBAR, CoPP
Encrypted signaling or • Service Providers provide SIP trunks over • TLS signed INVITES / Digest
media secure VPN Authentication
• IPSec for untrusted WAN segments, • TLS to non-TLS, SRTP Passthru,
deploy TLS/SRTP internally SRTP/RTP interworking
• Optional : Front end CUBE with an external • SHA1-80, SHA1-128, SHA1-256
FW crypto suite, NGE
Rogue BYEs Policed with ACLs and Control Plane Policing Automatic checks at signaling Protocol
(ie Bye with Random Stack, Call Leg Transaction checks within
CallID) IOS Voice code
Eavesdropping/Privacy Encryption SIP-TLS with sRTP
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Voice Security Attacks
CUBE Protection at Various Layers (4 of 4)
SBC Threat / Network Layer (protects at entry point in the Application Layer (CUBE)
network)
Security Requirement Protection built in the B2BUA layer
ACLs, NBAR, CoPP
Service Theft ACLs • Class of Restriction
IPSec • Toll Fraud prevention mechanisms
• SIP Trunk Registration
(authentication/credentials CLI)
• SIP Hostname Validation
• Encryption (TLS with SRTP)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39