VoIP Security
341
SECURITY SUPPORT WITH MITEL VOIP
A number of devices in the Mitel IP product range now include additional security measures.
These include:
•
Encryption of voice and signalling payload data
•
Network Access Authentication (802.1X)
Encryption is used to “hide” the information that is carried in the payload from unauthorized
users and applications.
Network access authentication is a method to restrict connections to the network, or guide the
device to particular parts of the network.
DATA ENCRYPTION
Encryption hides both the signalling information and the voice streaming. The network
connection, or path, remains the same whether the data in the payload is secured or not. Both
secure and non-secure devices use the same network paths to establish voice connections.
Although quite complex, data encryption involves two main aspects. These are:
•
key exchange
•
data encryption and decryption
Encryption scrambles the data using the available key information such that it cannot be easily
read and decoded by a third party. Only the endpoints have the necessary key information to
encode and decode the data correctly. The method used to pass this key information between
endpoints is known as the key exchange.
There are a number of standard methods to encrypt data. These are very secure in their coding,
and have been field tested over a number of years with critical information such as financial
and personal data. From a user view, all that is important is to know is that the data is secured.
The method used to encrypt the data is negotiated by the endpoints. If one or both of the
endpoints do not support encryption, the connection may still be established, but will be
unsecured. That is, a voice call can still be established with equipment that doesn’t support
encryption methods.
BANDWIDTH CONSIDERATIONS (VOICE AND SIGNALLING
ENCRYPTION)
The secure connection uses data encryption to modify the contents of the payload so that
someone collecting data packets will be unable to read the contents. It doesn’t modify the
contents of the IP header, since this is still needed to pass data over the existing Layer 3 routers
and Layer 2 network switches. If the headers were also encrypted, then every router in the path
would need to know how to decipher the information.
The data in the payload is intended for a particular application. It is the application that knows
how to decode the information. For the Voice over IP application, this payload contains the
signalling information or voice streaming.
Содержание MiVOICE BUSINESS
Страница 1: ...Mitel MiVoice Business RELEASE 7 2 ENGINEERING GUIDELINES ...
Страница 15: ...Chapter 1 ABOUT THIS DOCUMENT ...
Страница 16: ......
Страница 22: ...Engineering Guidelines 8 ...
Страница 23: ...Chapter 2 SYSTEM OVERVIEW ...
Страница 24: ......
Страница 28: ...Engineering Guidelines 14 ...
Страница 29: ...Chapter 3 TYPICAL CONFIGURATIONS ...
Страница 30: ......
Страница 73: ...Chapter 4 PHONES AND VOICE APPLICATIONS ...
Страница 74: ......
Страница 95: ...Phones and Voice Applications 81 Figure 9 ICP Connection Paths and Limitations ...
Страница 100: ...Engineering Guidelines 86 ...
Страница 101: ...Chapter 5 POWER ...
Страница 102: ......
Страница 128: ...Engineering Guidelines 114 ...
Страница 129: ...Chapter 6 PERFORMANCE ...
Страница 130: ......
Страница 135: ...Chapter 7 APPLICATIONS ...
Страница 136: ......
Страница 142: ...Engineering Guidelines 128 ...
Страница 143: ...Chapter 8 EMERGENCY SERVICES ...
Страница 144: ......
Страница 151: ...Chapter 9 IP NETWORKING ...
Страница 152: ......
Страница 167: ...Chapter 10 LICENSING ...
Страница 168: ......
Страница 183: ...Chapter 11 BANDWIDTH CODECS AND COMPRESSION ...
Страница 184: ......
Страница 209: ...Chapter 12 NETWORK CONFIGURATION CONCEPTS ...
Страница 210: ......
Страница 244: ...Engineering Guidelines 230 ...
Страница 245: ...Chapter 13 NETWORK CONFIGURATION SPECIFICS ...
Страница 246: ......
Страница 309: ...Appendix A CAT 3 WIRING ...
Страница 310: ......
Страница 315: ...CAT 3 Wiring 301 Figure 55 CX MX MXe AX and LX Minimum Cable Standard ...
Страница 316: ...Engineering Guidelines 302 ...
Страница 317: ...Appendix B INSTALLATION EXAMPLES ...
Страница 318: ......
Страница 335: ...Appendix C LLDP AND LLDP MED CONFIGURATION EXAMPLES ...
Страница 336: ......
Страница 347: ...Appendix D VOIP AND VLANS ...
Страница 348: ......
Страница 353: ...Appendix E VOIP SECURITY ...
Страница 354: ......
Страница 381: ... ...