Avaya Communication Manager and Media Servers
Issue 3.4.1 June 2005
197
Testing
During the development of the S8300, S8500, and S8700 Media Servers, or in production of
upgrades to its software, Avaya subjects the system to a variety of common “attack tools” to find
any overlooked or accidentally created security holes. The exact set of tools that are used
varies to keep up with the technology. Common tools include nmap and nessus. Security
problems found by these efforts are corrected before the product or the update is released.
Environment
Avaya S8700 and S8300 servers are as secure as reasonably possible, consistent with the
operational needs of the product and business in which they are used. Security, however, does
not end with the servers. These servers are connected to one or more networks that are, in turn,
connected to other equipment in the enterprise.
Recommendations for network security
Avaya recommends that these servers be located behind a firewall. Where this firewall is
located with respect to other LAN components must be designed on a case-by-case basis.
Avaya Professional Services can assist owners in configuring their networks for both security
and optimal IP Telephony operation. Other vendors also specialize in this type of consulting.
Owners are advised to seek assistance if internal staff is not trained in these areas. Security
holes that arise from negligence, ignorance, or oversight or the pressures of schedule or budget
are all equally usable by hackers. Malicious activity is a moving target, and what is safe today
might not be safe tomorrow. Avaya is committed to providing appropriate secure solutions for its
products, and to continuously monitoring evolving security threats. Avaya S8700 and S8300
servers are appropriately secure against the known threats. Avaya responds quickly should new
threats appear. Consult these resources for the latest security information:
●
Your Avaya account team
●
The Avaya support Web site:
http://www.avaya.com/support
Click Security Advisory in the Technical Database list on the left side of the page.
Summary of Contents for Application Solutions
Page 1: ...Avaya Application Solutions IP Telephony Deployment Guide 555 245 600 Issue 3 4 1 June 2005 ...
Page 20: ...About This Book 20 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 21: ...Issue 3 4 1 June 2005 21 Section 1 Avaya Application Solutions product guide ...
Page 22: ...22 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 106: ...Call processing 106 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 124: ...Avaya LAN switching products 124 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 139: ...Issue 3 4 1 June 2005 139 Section 2 Deploying IP Telephony ...
Page 140: ...140 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 186: ...Traffic engineering 186 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 204: ...Security 204 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 228: ...Avaya Integrated Management 228 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 274: ...Reliability and Recovery 274 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 275: ...Issue 3 4 1 June 2005 275 Section 3 Getting the IP network ready for telephony ...
Page 276: ...276 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 356: ...Network recovery 356 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 366: ...Network assessment offer 366 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 367: ...Issue 3 4 1 June 2005 367 Appendixes ...
Page 368: ...Appendixes 368 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 394: ...Access list 394 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 414: ...DHCP TFTP 414 Avaya Application Solutions IP Telephony Deployment Guide ...