S 5.15 Shielding of external remote accesses of PBX systems

Initiation responsibility: IT Security Officer, PBX System Manager

Implementation responsibility: Administrator

In this safeguard, every access using the maintenance interface of the PBX system via public switching systems and data networks, such as the Internet, is referred to as external remote access. This may become necessary due to the fact that either the individual systems of the cluster are not or not only (see comment) connected via dedicated lines or that quick support of the manufacturer in emergencies is absolutely necessary. In these cases, the maintenance port (modem) must be fully entitled to direct outward dialling.

State-of-the-art PBX systems can often be configured using data networks. Depending on the network structure, the PBX system is connect to a LAN or to a separate management network. Direct access to the PBX system connected to the internal network from public networks must be prevented. If the PBX system is nevertheless to be accessed from a public data network, a virtual private network (VPN, see S 4.4 VPN) should be used. Here, a protected data link to the VPN end point, normally located in the demilitarised zone (DMZ), is generated. From there, a connection can be established taking into consideration the recommendations in S 5.14 Shielding of internal remote accesses of PBX systems.

The following figure represents a typical scenario of an external remote access port to a remote administration port using a modem. The PBX system is administrated from the external maintenance location using modem 1 - public network - PBX - modem 2 - V.24 maintenance interface.

Establishing external remote administration via modem
Figure: Establishing external remote administration via modem

For security reasons, it makes sense to avoid external remote maintenance. If this is not possible, additional shielding safeguards are absolutely necessary in addition to the safeguards for internal remote accesses.

Comment: Some systems provide the option of only processing a basic traffic load using dedicated lines and automatically routing load peaks over the public network. The user is not informed about this.

PC gateway (see comment)

A PC gateway should be installed between maintenance port and modem. This gateway must provide the following security functions:

Furthermore, additional functions can be implemented:

Physical shut-down of the remote maintenance access port

If no remote maintenance is normally required and if it should only be allowed for when required, it is recommendable to physically shut down the access port. If required, this port may possibly be enabled on short notice upon telephone consultation with the manufacturer or the maintenance company.

Closed user groups (CUGs)

In public ISDN and X.25 networks, the feature of forming CUGs is offered. This way, a virtual "network within the network" is made available by the network operator to a user. The closed user groups can be requested from the network operator for corresponding fees.

Alternatively, it may be considered to implement the closed user groups independently by using the ISDN auxiliary services Calling Line Identification and Presentation (CLIP) and Connected Line Identification and Presentation (COLP). If possible, this may be performed by correspondingly configuring the organisation's own PBX system or by designing the PC gateway accordingly.

Comment: This safeguard should also be applied to internal remote maintenance using virtual private networks.

Avoiding and/or controlling direct dial-in options

A direct dial-in option, e.g. from other networks using overlap dialling in multi-frequency dialling procedures, to the PBX system should be prevented as far as possible. Such procedures are often used for accessing server services. If this cannot be prevented for organisational reasons, it is recommendable to completely enable the available protection mechanisms and to regularly control for potential misuse.

Review questions: