Our customers are reporting more and more hack attempts on their VCS expressways, untill now unsuccessfull. But to be on the extra safe side i would like to check every installation if its still secure.
To check this i have a few questions:
1. Is there a way that the VCS expressway can hide its identity in the SIP messages? If i do a Trace on the packetflow i see in clear text, "VCS expressway version X7.1" . Can we hide this announcement?
2. Is there a way to set the TLS/HTTPS cipher to high instead of medium? Or can we use TLS version 1.2? (Patch for BEAST attack)
4. Does the advanced account security license solve DDOS attacks or brute force attacks?
5. Can i lower the connection established timer of the VCS expressway? e.g: If i build a session and then force to break the connection without a proper BYE message, its possible to fillup all the call licenses because the established connections don't timeout very fast.
6. Is there documentation about a high security installations and considerations? the VCS deployment guides don't show very high security designs.
Thank you for your time and answers!
Have you looked at the X.7.2 guide for VCS? A lot of security measures are outlined there.
Cisco - CSE - Business Video
video or email: firstname.lastname@example.org
Partner Communities is a great resource for reference, if you don't find, please ask!
Call me on video – download Jabber for free https://email@example.com
Thank you for your answer. I have read the admin guide and have read about the general concepts of security and dual network interface but the real threads like DDOS are not discussed. It would like to know how Cisco sees the best and secure possible setup. Maybe with searchrules and transforms.
When customers have asked questions at Cisco Live! about concens like this, the short answer is introduce an IPS into the ASA/FW solution that protects the outside interface of the VCS-E.
DDoS is really a concern. If someone intentionally wants to do a DDoS it can.
The VCS has the Loop Detection mechanism, but if the DDoS change source and destination at each attempt and send for example 100 attempts concurrently, this will cause a DDoS and up to now i couldn´t found a way to deny this directly on VCS config. Note that a license is granted after a search rule matches, so, for the most part of attempts, you can block it using CPLs.
The DDoS problem happen if a destination matches a valid destination range and so, the license will be in use during call processing (most part is very quickly but in some enviroments not).
I was thinking to send a feature request to Cisco developers. If someone knows how to send this to developers or product manager to cover this issue and speed up the sporcess would be great.
I will open a TAC case then, and share the results.
@rdal, the artical is solving the problem "ish" but its up to TAC to implement it in the VCS. I cannot compile their code..i wish!