<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Securing VCS Expressway in Collaboration Applications</title>
    <link>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420916#M31101</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;DDoS is really a concern. If someone intentionally wants to do a DDoS it can.&lt;/P&gt;&lt;P&gt;The VCS has the Loop Detection mechanism, but if the DDoS change source and destination at each attempt and send for example 100 attempts concurrently, this will cause a DDoS and up to now i couldn´t found a way to deny this directly on VCS config. Note that a license is granted after a search rule matches, so, for the most part of attempts, you can block it using CPLs.&lt;/P&gt;&lt;P&gt;The DDoS problem happen if a destination matches a valid destination range and so, the license will be in use during call processing (most part is very quickly but in some enviroments not).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was thinking to send a feature request to Cisco developers. If someone knows how to send this to developers or product manager to cover this issue and speed up the sporcess would be great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Sep 2012 18:06:59 GMT</pubDate>
    <dc:creator>admin11111</dc:creator>
    <dc:date>2012-09-17T18:06:59Z</dc:date>
    <item>
      <title>Securing VCS Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420910#M31095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our customers are reporting more and more hack attempts on their VCS expressways, untill now unsuccessfull. But to be on the extra safe side i would like to check every installation if its still secure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To check this i have a few questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there a way that the VCS expressway can hide its identity in the SIP messages? If i do a Trace on the packetflow i see in clear text, "VCS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; expressway version X7.1" . Can we hide this announcement? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there a way to set the TLS/HTTPS cipher to high instead of medium? Or can we use TLS version 1.2? (Patch for BEAST attack)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Does the advanced account security license solve DDOS attacks or brute force attacks? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Can i lower the connection established timer of the VCS expressway? e.g: If i build a session and then force to break the connection without a proper&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BYE message, its possible to fillup all the call licenses because the established connections don't timeout very fast. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there documentation about a high security installations and considerations? the VCS deployment guides don't show very high security designs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your time and answers! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 12:10:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420910#M31095</guid>
      <dc:creator>pbzijerveld</dc:creator>
      <dc:date>2012-09-17T12:10:33Z</dc:date>
    </item>
    <item>
      <title>Re: Securing VCS Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420911#M31096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you looked at the X.7.2 guide for VCS? A lot of security measures are outlined there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http://tools.cisco.com/search/JSP/search-results.get?strQueryText=x7.2&amp;amp;Search&lt;EM&gt;All&lt;/EM&gt;cisco.com=cisco.com&amp;amp;language=en&amp;amp;country=US&amp;amp;thissection=f&amp;amp;accessLevel=Guest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick Dahl&lt;/P&gt;&lt;P&gt;Cisco - CSE - Business Video&lt;/P&gt;&lt;P&gt;video or email:   rdahl@cisco.com&lt;/P&gt;&lt;P&gt;Phone:                 408.894.5112&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Partner Communities is a great resource for reference, if you don't find, please ask!&lt;/P&gt;&lt;P&gt;https://communities.cisco.com/community/partner/collaboration/bizvideo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Call me on video – download Jabber for free https://www.ciscojabbervideo.com/rdahl@cisco.com&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 14:01:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420911#M31096</guid>
      <dc:creator>rdahl</dc:creator>
      <dc:date>2012-09-17T14:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: Securing VCS Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420912#M31097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When customers have asked questions at Cisco Live! about concens like this, the short answer is introduce an IPS into the ASA/FW solution that protects the outside interface of the VCS-E.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 14:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420912#M31097</guid>
      <dc:creator>Michael Boscia</dc:creator>
      <dc:date>2012-09-17T14:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: Securing VCS Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420913#M31098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Richard, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your answer. I have read the admin guide and have read about the general concepts of security and dual network interface but the real threads like DDOS are not discussed. It would like to know how Cisco sees the best and secure possible setup. Maybe with searchrules and transforms. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 14:32:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420913#M31098</guid>
      <dc:creator>pbzijerveld</dc:creator>
      <dc:date>2012-09-17T14:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: Securing VCS Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420914#M31099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Michel, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is an answer, but does it solve the weakness in TLS 1.0 and 1.1 for example? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 14:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420914#M31099</guid>
      <dc:creator>pbzijerveld</dc:creator>
      <dc:date>2012-09-17T14:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: Securing VCS Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420915#M31100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does this help?&lt;/P&gt;&lt;P&gt;&lt;A class="loading active_link" href="http://blogs.cisco.com/security/beat-the-beast-with-tls/" title="http://blogs.cisco.com/security/beat-the-beast-with-tls/"&gt;http://blogs.cisco.com/security/beat-the-beast-with-tls/&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 16:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420915#M31100</guid>
      <dc:creator>rdahl</dc:creator>
      <dc:date>2012-09-17T16:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: Securing VCS Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420916#M31101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;DDoS is really a concern. If someone intentionally wants to do a DDoS it can.&lt;/P&gt;&lt;P&gt;The VCS has the Loop Detection mechanism, but if the DDoS change source and destination at each attempt and send for example 100 attempts concurrently, this will cause a DDoS and up to now i couldn´t found a way to deny this directly on VCS config. Note that a license is granted after a search rule matches, so, for the most part of attempts, you can block it using CPLs.&lt;/P&gt;&lt;P&gt;The DDoS problem happen if a destination matches a valid destination range and so, the license will be in use during call processing (most part is very quickly but in some enviroments not).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was thinking to send a feature request to Cisco developers. If someone knows how to send this to developers or product manager to cover this issue and speed up the sporcess would be great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 18:06:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420916#M31101</guid>
      <dc:creator>admin11111</dc:creator>
      <dc:date>2012-09-17T18:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: Securing VCS Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420917#M31102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Best thing is to open TAC support&amp;nbsp; case&amp;nbsp;&amp;nbsp; and have them enter this in as a feature request.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 18:10:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420917#M31102</guid>
      <dc:creator>rdahl</dc:creator>
      <dc:date>2012-09-17T18:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: Securing VCS Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420918#M31103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will open a TAC case then, and share the results. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;@rdal, the artical is solving the problem "ish" but its up to TAC to implement it in the VCS. I cannot compile their code..i wish! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 21:04:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/securing-vcs-expressway/m-p/3420918#M31103</guid>
      <dc:creator>admin11111</dc:creator>
      <dc:date>2012-09-17T21:04:39Z</dc:date>
    </item>
  </channel>
</rss>

