 |
|
|
|
In this one day seminar you will learn the security aspects of the Session
Initiation Protocol. You will understand the SIP attack surface and the various
security enhancements to the SIP protocol (SIPS & SRTP). We will analyze the
behavior of the protocol in Firewall and NAT/NAPT environment, and discuss how
SIP enabled Firewalls and SBC handle the SIP security threats.
|
|
|
 |
|
|
- SIP Security Overview
- SIP Attack Surface
- Registration Hijacking
- Impersonating a server
- Interception/modification - message tampering
- Session tear-down
- SIP Denial of Service (DOS/DDOS)
- SIP SPAM/SPIT
- The danger of soft-phones
- And others….
- SIP Authentication
- Methods of authentication for SIP
- Authenticated registration
- Authenticated outgoing calls
- Authenticated incoming calls
- Black lists
- SIPS (SIP Secure)
- TLS (Transport Layer Security)
- SIP over SSL/TLS
- Secure Real Time Transport Protocol
(SRTP)
- Packet structure
- Authentication
- Encryption
- SIP Enabled Firewalls
- Firewall limitations to handle SIP
- SIP traversal through Firewall
- SIPS traversal throughFirewall
- RTP traversal through Firewall
- Firewall enhancements to handle SIP
|
|
- NAT Traversal in SIP
- NAT types
- SIP – NAT problem
- Simple Traversal of UP through NAT (STUN)
- Traversal Using Relay NATs (TURN)
- Universal Plug and Play (UPNP)
- Interactive Connectivity Establishmnet (ICE) – The IETF approach
- Session Border Controller (SBC)
- What is SBC?
- Main SBC Security features
- Conclusion
- Glossary
|
|
|
|
|
 |
 |
 |
- Professional people in the communication and IT, Engineers, software developer,
Technical support, field engineers
|
 |
 |
 |
|
|
 |
 |
 |
|
|
|
|
|
|
|
|