S 2.376 Separation of data network and VoIP network

Initiation responsibility: IT Security Officer, Head of IT, Building Services Manager

Implementation responsibility: Building Services, Administrator, Head of IT

With IP telephony it is possible to make telephone calls using existing IP data networks. However, the data networks may also be separated logically from the voice networks to increase the scalability, quality of service (QoS), administration capabilities, and security. It must be examined whether separation of the data and VoIP networks is necessary. Separation makes sense when the data and VoIP networks have different protection requirements.

Separating the networks using VLANs

Local networks can be segmented physically using active network components or logically using a corresponding VLAN (Virtual Local Area Network) configuration. Logical separation can be obtained with VLAN technology in Layer 2 using VLAN-enabled switches (see also S 2.277 Functional description of a switch). VLANs alone, though, do not offer any protection against attackers who physically connect to the VLAN using their own IT system (PC, laptop, or server). Since the network connection, i.e. the VLAN port, of the telephone can be accessed directly by anyone, an attacker could attack the telephones in the VLAN directly by connecting his/her PC to the VLAN instead of his/her telephone, for example.

For this reason, additional safeguards extending beyond logical network separation should be implemented to counteract such attacks.

Physical separation of the networks

When the security requirements are high, it makes sense to physically separate the entire voice network from the data network. Physical separation of the data and voice networks significantly reduces the possibilities for an attack. In addition, when one network fails (for example due to the failure of the active network components or a broken wire), the other network can be used for communication purposes. Due to the separation, the load placed on the data network has no effect on the load placed on the voice network.

Problems with separation

However, other problems may arise elsewhere in practical applications when the VoIP network is completely separated from the IP data network:

These problems can be solved, however, by installing corresponding gateways between the data and voice networks. A proxy server could be operated in the voice network for many services that forwards requests from the voice network to the data network.

Protecting the ports

If hardphones or other VoIP terminal devices will be used solely for making telephone calls, it must be ensured that only the intended VoIP connections can be established on the network ports these devices are connected to. Otherwise, an attacker could connect a mobile IT system to the network connection intended for the PBX terminal device and access information and services not intended to be used by the attacker. An example of this is a telephone located in an area that is not monitored continuously such as an underground car park. This protection can be obtained by specifying the corresponding filter rules on the active network components.

Depending on the protection requirements, additional safeguards such as authentication according to IEEE 802.1X can be used to guarantee secure operation. It must be taken into account, though, that dynamic or static assignment of the MAC address to a (switch) port or a VLAN access list alone does not provide sufficient protection, since MAC addresses can be forged easily.

Review questions: