|
List of Figures and Tables |
|
|
xv | |
Foreword |
|
xvii | |
Preface |
|
xxiii | |
Acknowledgments |
|
xxvii | |
|
The (Business) Value of VoIP |
|
|
1 | (10) |
|
Internet Telephony versus Telephony over the Internet |
|
|
2 | (1) |
|
The Value of VoIP: Return on Investment (ROI) |
|
|
2 | (6) |
|
Getting the Most from VoIP: Cost Savings |
|
|
3 | (1) |
|
Capital and Expense Savings |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
Convergence of Technologies |
|
|
6 | (1) |
|
Potential Drawbacks in VoIP Implementations |
|
|
6 | (1) |
|
VoIP Implementation Realities of ROI |
|
|
7 | (1) |
|
What about VoIP Security? |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (2) |
|
Digital Voice Fundamentals |
|
|
11 | (36) |
|
|
12 | (1) |
|
|
13 | (2) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (2) |
|
Uniform or Linear Quantizers |
|
|
17 | (1) |
|
Nonuniform (Logarithmic) Quantization |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (24) |
|
Time Domain Coding: Pulse Code Modulation (G.711) |
|
|
19 | (7) |
|
G.711 PCM Standardization |
|
|
26 | (1) |
|
Time Domain Coding: Differential PCM (DPCM) |
|
|
26 | (1) |
|
Time Domain Coding: Adaptive Differential PCM (G.721/G.726) |
|
|
27 | (1) |
|
Continuously Variable Slope Delta (CVSD) Modulation |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (3) |
|
|
32 | (5) |
|
|
37 | (1) |
|
G.728 Low-Delay CELP Recommendation |
|
|
37 | (1) |
|
|
38 | (3) |
|
|
41 | (1) |
|
Digital Speech Interpolation |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (2) |
|
|
47 | (28) |
|
Introduction to Telephony |
|
|
47 | (3) |
|
|
50 | (5) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (2) |
|
|
55 | (1) |
|
Subscriber Loop Signaling |
|
|
56 | (9) |
|
|
56 | (6) |
|
|
62 | (2) |
|
|
64 | (1) |
|
Components of the Phone System |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
Making the Basic Telephone Connection |
|
|
66 | (3) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
North American Numbering Plan (NANP) |
|
|
69 | (1) |
|
International Numbering Plan (ITU-T E.164) |
|
|
70 | (1) |
|
|
70 | (2) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
73 | (2) |
|
|
75 | (58) |
|
Packet Networking Overview |
|
|
75 | (5) |
|
|
75 | (4) |
|
|
79 | (1) |
|
|
80 | (7) |
|
|
80 | (5) |
|
|
85 | (1) |
|
Distance-Vector Routing Protocols |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (8) |
|
Address Resolution Protocol (ARP) |
|
|
87 | (1) |
|
Understanding IP, TCP, UDP, and ICMP Packets |
|
|
88 | (7) |
|
|
95 | (9) |
|
H.235 and Security Profiles |
|
|
95 | (1) |
|
|
95 | (1) |
|
H.235v2 Annex D: Baseline Security Profile |
|
|
95 | (1) |
|
H.235v2 Annex E: Signature Security Profile |
|
|
96 | (1) |
|
|
96 | (1) |
|
H.235v2 Annex F: Hybrid Security Profile |
|
|
97 | (1) |
|
|
98 | (1) |
|
Baseline Security Profile Enhancements |
|
|
98 | (1) |
|
Draft H.235v3 Annex G: SRTP and MIKEY usage |
|
|
98 | (2) |
|
Draft H.235v3 Annex H: RAS Key Management |
|
|
100 | (1) |
|
H.235v3 for Direct-Routed Scenarios |
|
|
101 | (1) |
|
|
102 | (1) |
|
Existing Security Features in the SIP Protocol |
|
|
103 | (1) |
|
Signaling Authentication using HTTP Digest Authentication |
|
|
103 | (1) |
|
|
103 | (1) |
|
Confidentiality of Media Data in SIP |
|
|
104 | (6) |
|
|
104 | (1) |
|
|
105 | (1) |
|
Security Enhancements for SIP |
|
|
105 | (1) |
|
SIP Authenticated Identity Body |
|
|
105 | (1) |
|
SIP Authenticated Identity Management |
|
|
105 | (1) |
|
|
106 | (1) |
|
SIP End-to-Middle, Middle-to-Middle, Middle-to-End Security |
|
|
107 | (1) |
|
|
107 | (2) |
|
|
109 | (1) |
|
|
109 | (1) |
|
MGCP Security Considerations |
|
|
109 | (1) |
|
Voice Transport Protocols |
|
|
110 | (4) |
|
Real-time Transport Protocol (RTP) |
|
|
110 | (1) |
|
Transport Control Protocol (TCP) and User Datagram Protocol (UDP) |
|
|
110 | (1) |
|
Real-Time Control Protocol (RTCP) |
|
|
111 | (1) |
|
Stream Control Transmission Protocol (SCTP) |
|
|
112 | (1) |
|
Trivial File Transfer Protocol (TFTP) |
|
|
113 | (1) |
|
|
114 | (3) |
|
|
114 | (1) |
|
|
114 | (2) |
|
MEGACO Security Considerations |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (5) |
|
Label Distribution Protocol (LDP) |
|
|
119 | (2) |
|
Constraint-based Routing---Label Distribution Protocol (CR-LDP) |
|
|
121 | (1) |
|
|
121 | (2) |
|
Voice over Frame Relay Access Devices (VFRADs) |
|
|
123 | (2) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (2) |
|
|
129 | (4) |
|
|
133 | (18) |
|
|
133 | (1) |
|
|
134 | (1) |
|
VoIP Packet Processing Issues |
|
|
135 | (3) |
|
|
135 | (1) |
|
|
136 | (2) |
|
VoIP Call Setup Protocols |
|
|
138 | (1) |
|
Call Setup Protocols from the Telephony Community |
|
|
138 | (1) |
|
Call Setup Protocols from the Data-Networking Community |
|
|
138 | (1) |
|
Voice Streaming Protocols |
|
|
139 | (1) |
|
IP Telephony Servers, PBXs, and Gatekeepers |
|
|
140 | (1) |
|
VoIP Gateways, Routers, and Switches |
|
|
141 | (3) |
|
|
144 | (1) |
|
VoIP and Converged Network Regulatory Issues |
|
|
144 | (2) |
|
The VoIP Regulatory Freedom Act of 2004 |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (3) |
|
VoIP Implementation Basics |
|
|
151 | (30) |
|
Stages of VoIP Implementation |
|
|
151 | (2) |
|
Achieving VoIP Quality and Reliability |
|
|
153 | (10) |
|
The Need for Quality of Service (QoS) |
|
|
154 | (1) |
|
Link-layer QoS techniques |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (4) |
|
|
160 | (1) |
|
QoS in a Voice Over Packet System |
|
|
161 | (2) |
|
|
163 | (3) |
|
Configuration and Testing |
|
|
166 | (2) |
|
|
168 | (3) |
|
Service Level Agreements (SLAs) |
|
|
171 | (5) |
|
|
173 | (3) |
|
Other VoIP Implementation Issues |
|
|
176 | (4) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
VoIP Header Overhead Problem |
|
|
178 | (1) |
|
Standards are Lacking for Call Control Information |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (54) |
|
VoIP Infrastructure Risks |
|
|
182 | (28) |
|
VoIP Inherits the Same Threats as the IP Data Network |
|
|
182 | (2) |
|
Operating System Vulnerability |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
Unintentional and Inadvertent Risks |
|
|
187 | (1) |
|
|
188 | (1) |
|
Nonemployee or Temporary Employee Granted Access |
|
|
188 | (1) |
|
Phreakers Using Phone Systems |
|
|
189 | (1) |
|
Hackers Using Computer Systems |
|
|
189 | (1) |
|
Service Disruption and Denial of Service |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
Distributed Denial-of-Service Attacks |
|
|
193 | (2) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
198 | (3) |
|
|
201 | (1) |
|
VoIP Servers and Configuration Exploits |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (2) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (4) |
|
|
210 | (20) |
|
Insertion and Evasion Attacks |
|
|
210 | (2) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
Monitoring (Eavesdropping) |
|
|
213 | (1) |
|
Controlling a Conversation |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
Manipulation of Accounting Data |
|
|
215 | (1) |
|
|
215 | (2) |
|
|
217 | (1) |
|
Back-End Service Impersonation |
|
|
218 | (1) |
|
|
218 | (1) |
|
Rogue VoIP Server or Gateway |
|
|
219 | (1) |
|
Viruses and Other Malicious Software |
|
|
219 | (1) |
|
|
220 | (2) |
|
|
222 | (1) |
|
Man-in-the Middle Attacks |
|
|
223 | (1) |
|
|
224 | (2) |
|
|
226 | (1) |
|
Wardialers and Telephone Line Scanners |
|
|
226 | (2) |
|
Annoyances and Spam Calls |
|
|
228 | (1) |
|
|
228 | (2) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (3) |
|
VoIP Security Best Practices |
|
|
235 | (68) |
|
|
235 | (11) |
|
Maintain Strong Physical Security |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
Secure the Environment around the Equipment |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
Manage Your Storage Intelligently |
|
|
239 | (1) |
|
Create a Secure Build Image |
|
|
239 | (1) |
|
Secure the System and Application Software |
|
|
240 | (2) |
|
Log Consolidation and Unusual Pattern Log Analysis |
|
|
242 | (1) |
|
Stay Up to Date with Your Network Equipment Vendors |
|
|
243 | (1) |
|
Stay Up to Date with Your Software Vendors |
|
|
243 | (1) |
|
Turn off Modem Support when Not Needed |
|
|
244 | (1) |
|
Create a Well Educated Security Team |
|
|
244 | (1) |
|
Perform Security Incident Postmortems |
|
|
244 | (1) |
|
Implement Policy Management |
|
|
245 | (1) |
|
|
246 | (6) |
|
Internal Control and Audit |
|
|
246 | (1) |
|
Eliminate Unnecessary Modems |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
Combating PBX and Voice-Mail Vulnerabilities |
|
|
249 | (3) |
|
|
252 | (42) |
|
|
252 | (1) |
|
|
253 | (1) |
|
Isolate IP PBXs and VoIP Servers on a VLAN |
|
|
253 | (1) |
|
Put Chatty Protocols on Their Own VLAN |
|
|
254 | (1) |
|
Isolate Voice Traffic on a Separate VLAN |
|
|
254 | (1) |
|
Unified Management Infrastructure |
|
|
254 | (1) |
|
Avoid Use of Voice on Shared Ethernet Segments |
|
|
254 | (1) |
|
Build Separate DHCP Servers |
|
|
255 | (1) |
|
Put VoIP Devices on Different Windows Domains |
|
|
255 | (1) |
|
|
255 | (1) |
|
Use Private IP Addressing Inside Your Enterprise |
|
|
255 | (1) |
|
Use Switches Instead of Hubs |
|
|
255 | (1) |
|
|
256 | (1) |
|
Maintain Strong Security on All VoIP Servers |
|
|
257 | (1) |
|
Filtering on All Segments |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (2) |
|
Use a Telecommunications Firewall |
|
|
261 | (2) |
|
Intrusion Detection and Prevention Systems |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (2) |
|
Use Existing Firewalls/IDS to Highlight Attempted Attacks |
|
|
266 | (1) |
|
Use Authentication to Exclude Requests from Unknown Hosts |
|
|
266 | (1) |
|
Use Dedicated VoIP Firewalls to Prevent Attacks |
|
|
266 | (1) |
|
Use a VoIP-Aware Firewall/IDS to Monitor Untrusted VoIP Traffic |
|
|
267 | (1) |
|
Security Issues with the Use of H.323, SIP, H.235v3, MGCP, and MEGACO/H.248 |
|
|
267 | (6) |
|
Network Address Translation (NAT) |
|
|
273 | (3) |
|
|
276 | (3) |
|
Virtual Private Networks (VPNs) and IP Security (IPSec) in VoIP |
|
|
279 | (12) |
|
IPSec VoIP Considerations |
|
|
291 | (1) |
|
Security Association (SA) |
|
|
292 | (1) |
|
Enhanced 911 (E911) VoIP Considerations |
|
|
293 | (1) |
|
|
294 | (3) |
|
Set up the IP Phones Securely |
|
|
295 | (1) |
|
Manage Phone Passwords Carefully |
|
|
295 | (1) |
|
Limit the Functions Available in Publicly Available Phones |
|
|
295 | (1) |
|
Allow Limited Administrative Access |
|
|
296 | (1) |
|
|
296 | (1) |
|
Disable Automated Phone Registration |
|
|
296 | (1) |
|
Maintain Vulnerability Assessments, Antivirus, and Firewall on Softphone Computers |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (3) |
|
|
301 | (2) |
|
VoIP Security and the Law |
|
|
303 | (26) |
|
|
304 | (3) |
|
The 1996 National Information Infrastructure Protection Act |
|
|
307 | (1) |
|
President's Executive Order on Critical Infrastructure Protection |
|
|
307 | (1) |
|
The USA PATRIOT Act of 2001 |
|
|
308 | (4) |
|
The Homeland Security Act of 2002 |
|
|
312 | (1) |
|
US Patriot Act and Changes to Computer-Related Laws |
|
|
313 | (13) |
|
Authority to Intercept Voice Communications |
|
|
313 | (1) |
|
Obtaining Voice-Mail and Other Stored Voice Communications |
|
|
314 | (1) |
|
Changes to Wiretapping Procedures |
|
|
314 | (1) |
|
Scope of Subpoenas for Electronic Evidence |
|
|
315 | (1) |
|
Clarifying the Scope of the Cable Act |
|
|
316 | (1) |
|
Emergency Disclosures by Communications Providers |
|
|
317 | (1) |
|
Pen Register and Trap and Trace Statute |
|
|
317 | (1) |
|
Intercepting Communications of Computer Trespassers |
|
|
318 | (1) |
|
Nationwide Search Warrants for E-mail |
|
|
319 | (1) |
|
Deterrence and Prevention of Cyberterrorism |
|
|
320 | (4) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (3) |
|
|
329 | (10) |
|
The New Breed of VoIP: Internet Telephony |
|
|
329 | (2) |
|
The Internet Telephony Providers |
|
|
331 | (2) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
VoIP over Wireless LAN (VoWLan) |
|
|
333 | (1) |
|
The Need for VoIP Security |
|
|
334 | (2) |
|
|
336 | (3) |
|
|
339 | (46) |
|
|
339 | (7) |
|
|
346 | (29) |
|
|
375 | (4) |
|
|
379 | (6) |
Index |
|
385 | |