cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5602
Views
0
Helpful
8
Replies

Securing VCS Expressway

pbzijerveld
Level 1
Level 1

Hi All,

Our customers are reporting more and more hack attempts on their VCS expressways, untill now unsuccessfull. But to be on the extra safe side i would like to check every installation if its still secure.

To check this i have a few questions:

1.     Is there a way that the VCS expressway can hide its identity in the SIP messages? If i do a Trace on the packetflow i see in clear text, "VCS                     expressway version X7.1" . Can we hide this announcement?

2.     Is there a way to set the TLS/HTTPS cipher to high instead of medium? Or can we use TLS version 1.2? (Patch for BEAST attack)

4.     Does the advanced account security license solve DDOS attacks or brute force attacks?

5.     Can i lower the connection established timer of the VCS expressway? e.g: If i build a session and then force to break the connection without a proper           BYE message, its possible to fillup all the call licenses because the established connections don't timeout very fast.

6.     Is there documentation about a high security installations and considerations? the VCS deployment guides don't show very high security designs.

Thank you for your time and answers!

8 Replies 8

rdahl
Level 5
Level 5

Have you looked at the X.7.2 guide for VCS? A lot of security measures are outlined there.

http://tools.cisco.com/search/JSP/search-results.get?strQueryText=x7.2&SearchAllcisco.com=cisco.com&language=en&country=US&thissection=f&accessLevel=Guest

Thank you,

--

Rick Dahl

Cisco - CSE - Business Video

video or email: rdahl@cisco.com

Phone: 408.894.5112

Partner Communities is a great resource for reference, if you don't find, please ask!

https://communities.cisco.com/community/partner/collaboration/bizvideo

Call me on video – download Jabber for free https://www.ciscojabbervideo.com/rdahl@cisco.com

Hi Richard,

Thank you for your answer. I have read the admin guide and have read about the general concepts of security and dual network interface but the real threads like DDOS are not discussed. It would like to know how Cisco sees the best and secure possible setup. Maybe with searchrules and transforms.

Michael Boscia
Level 4
Level 4

When customers have asked questions at Cisco Live! about concens like this, the short answer is introduce an IPS into the ASA/FW solution that protects the outside interface of the VCS-E.

Hi Michel,

That is an answer, but does it solve the weakness in TLS 1.0 and 1.1 for example?

admin11111
Level 4
Level 4

DDoS is really a concern. If someone intentionally wants to do a DDoS it can.

The VCS has the Loop Detection mechanism, but if the DDoS change source and destination at each attempt and send for example 100 attempts concurrently, this will cause a DDoS and up to now i couldn´t found a way to deny this directly on VCS config. Note that a license is granted after a search rule matches, so, for the most part of attempts, you can block it using CPLs.

The DDoS problem happen if a destination matches a valid destination range and so, the license will be in use during call processing (most part is very quickly but in some enviroments not).

I was thinking to send a feature request to Cisco developers. If someone knows how to send this to developers or product manager to cover this issue and speed up the sporcess would be great.

Regards

Best thing is to open TAC support  case   and have them enter this in as a feature request.

I will open a TAC case then, and share the results.

@rdal, the artical is solving the problem "ish" but its up to TAC to implement it in the VCS. I cannot compile their code..i wish!

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: