S 4.289 Restricting the accessibility via VoIP

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

It is only advisable in a very limited number of cases to allow access to the VoIP components of a government agency and/or company directly from the internet. Direct access, for example by establishing a connection to an internal IP address, opens numerous possible points of attack. For this reason, it must be decided how people from outside will be permitted to contact the organisation using the VoIP architecture.

It must first be checked if establishing direct VoIP connections from the outside should even be permitted at all. It is often sufficient to allow connections to be established from the outside using a line switching telephone network. In this case, no internal VoIP components should be accessible from the public data network. Access from the public data network should also be impossible using the gateway operated between the public line switching telephone network and the local VoIP network. However, there are disadvantages when access from the outside by external communication partners using VoIP is prohibited in general. Even if the communication partners are connected to a public data network, they will still need to establish a connection using the public line switching telephone network in this case. The costs incurred are generally higher than when establishing a connection directly to a VoIP address, for example to a SIP URL. Since accepting this disadvantage comes in conjunction with many other advantages, especially in applications critical to security, accessibility from the outside using VoIP should be examined critically.

SPIT (Spam over IP Telephone) is also avoided when connections from the outside are only permitted using the public line switching telephone network. Since SPIT cannot be transmitted inexpensively using the data network in this case, the call will cost just as much as a call to a user who does not use VoIP.

However, if establishing connections to or from the public data network is to be allowed nevertheless, the decision, including the residual risks, must be documented. Furthermore, the corresponding security safeguards must be implemented. For example, all data traffic can be transmitted via a concentrator responding to connection queries like a proxy server and then forwarding them to the next system, for example to another server or directly to a terminal device. When using a concentrator, the following aspects should be taken into consideration:

For this, many manufacturers offer partially proprietary systems. An alternative from the Open Source environment that meets many of these requirements is the Asterisk software telephone system, which can be operated as an appliance. Another advantage of using a concentrator is that the problems arising from the use of NAT (Network Address Translation) are avoided.

Review questions: