VoIP Security
345
IP path to the gateway will be secure, where possible. The connection on the TDM devices will
remain a dedicated connection to the requested service.
A conference call with a number of users requires multiple connections to the IP gateway.
Connections between the IP end device and this gateway will be encrypted, where possible.
Connections to the conference bridge are established over the internal TDM infrastructure.
PSTN connections or TDM devices connected into this bridge will not use encryption, but will
maintain their normal dedicated connections.
VOICE STREAMING TO APPLICATIONS
A number of applications and end devices support encryption. There are some, however, that
do not support encryption measures. Connections to these devices will be established without
encryption. For a list of devices and applications that support encryption, refer to Table 83.
End devices that connect to the external port of the MiVoice Border Gateway (formerly
Teleworker solution) are secure, but when similar end devices are used within the LAN
environment, they may not be fully secured.
Further details can be found in the
MiVoice Border Gateway Engineering Guidelines
. The
MiVoice Border Gateway also terminates both internal and external secure connections. This
allows for differences in encryption methods; external secure connection and unsecured internal
connection.
MiCollab Client provides a softphone with encrypted call path and call signalling and secure
instant messaging to keep IM traffic encrypted and inside the network.
The SpectraLink wireless phones and the Mitel WLAN stands may use security on the air access
interface (radio link) such as WEP or WPA2. However, this only covers the wireless connection
and not necessarily the remaining connection across the remaining network infrastructure.
DATA ENCRYPTION SUPPORT
A number of end devices support secure signalling and secure voice media streaming. The
following table lists the devices and security support:
Table 83: Security Support by Device
DEVICE
SECURE
SIGNALLING (SSL)
SECURE
SIGNALLING
(SECURE MINET)
VOICE
ENCRYPTION
Controllers/Gateway
3300 CX/AX/MXe/ISS
Yes
Yes
Yes
SX-200 ICP CX/MX
No
Yes
Yes
Phones
5001
No
Yes
Yes
5005
No
Yes
Yes
5010 No
Yes
Yes
Page 1 of 3
Summary of Contents for MiVOICE BUSINESS
Page 1: ...Mitel MiVoice Business RELEASE 7 2 ENGINEERING GUIDELINES ...
Page 15: ...Chapter 1 ABOUT THIS DOCUMENT ...
Page 16: ......
Page 22: ...Engineering Guidelines 8 ...
Page 23: ...Chapter 2 SYSTEM OVERVIEW ...
Page 24: ......
Page 28: ...Engineering Guidelines 14 ...
Page 29: ...Chapter 3 TYPICAL CONFIGURATIONS ...
Page 30: ......
Page 73: ...Chapter 4 PHONES AND VOICE APPLICATIONS ...
Page 74: ......
Page 95: ...Phones and Voice Applications 81 Figure 9 ICP Connection Paths and Limitations ...
Page 100: ...Engineering Guidelines 86 ...
Page 101: ...Chapter 5 POWER ...
Page 102: ......
Page 128: ...Engineering Guidelines 114 ...
Page 129: ...Chapter 6 PERFORMANCE ...
Page 130: ......
Page 135: ...Chapter 7 APPLICATIONS ...
Page 136: ......
Page 142: ...Engineering Guidelines 128 ...
Page 143: ...Chapter 8 EMERGENCY SERVICES ...
Page 144: ......
Page 151: ...Chapter 9 IP NETWORKING ...
Page 152: ......
Page 167: ...Chapter 10 LICENSING ...
Page 168: ......
Page 183: ...Chapter 11 BANDWIDTH CODECS AND COMPRESSION ...
Page 184: ......
Page 209: ...Chapter 12 NETWORK CONFIGURATION CONCEPTS ...
Page 210: ......
Page 244: ...Engineering Guidelines 230 ...
Page 245: ...Chapter 13 NETWORK CONFIGURATION SPECIFICS ...
Page 246: ......
Page 309: ...Appendix A CAT 3 WIRING ...
Page 310: ......
Page 315: ...CAT 3 Wiring 301 Figure 55 CX MX MXe AX and LX Minimum Cable Standard ...
Page 316: ...Engineering Guidelines 302 ...
Page 317: ...Appendix B INSTALLATION EXAMPLES ...
Page 318: ......
Page 335: ...Appendix C LLDP AND LLDP MED CONFIGURATION EXAMPLES ...
Page 336: ......
Page 347: ...Appendix D VOIP AND VLANS ...
Page 348: ......
Page 353: ...Appendix E VOIP SECURITY ...
Page 354: ......
Page 381: ... ...