Avaya

Message Networking Help

Home | Search  
Print | Back | Fwd | Close
  
Getting Started Admin Maintenance Reference
Home > Getting started > Concepts and features > System security > Network security

Network security

The Message Networking system is designed to be located securely within the network and should not be directly connected to the Internet. You should leverage the existing network security policy to protect the system from malicious activities from external and internal sources. Although protecting information may be a high priority, protecting the integrity of your network should not be less important. When your network is connected to the Internet, it is exposed to various types attacks including Network packet sniffers, IP spoofing, password attacks, Denial-of-service attacks, and application layer attacks. A breach of integrity can be extremely dangerous and can open the doors for continued attacks on your system. Your network, security and applications teams should work together to plan and manage security. You should consider the measures described below for reducing security risks when deploying the Message Networking system into your network.

Internet Firewalls

An Internet firewall is a system or a group of systems that enforces a security barrier between your network and the Internet. The firewall determines which inside services can be accessed from outside and which outside services can be accessed by insiders. Because the Message Networking server will be implemented as an email receiver, the customer site must have a firewall between the Message Networking server and the Internet.

To properly secure FTP access into the Message Networking system, access to the FTP port (21) outside of the firewall must be prohibited.

It is also advisable to explicitly identify the untrusted networks from which the firewall can accept requests. Ensure that all the traffic to and from the Internet passes through the firewall.

Intrusion Detection System (IDS)

An Intrusion Detection System (IDS) can be used for detecting unauthorized break-ins to your systems. It is advisable to implement a network-based intrusion detection system as a secondary security system. Following are some of the reasons for adding an IDS to your network. IDS:

  • Cross-checks incorrectly configured firewalls

  • Detects attacks that firewalls legitimately allow through (such as attacks against Web servers)

  • Detects failed hacking attempts to get into your system

  • Detects insider hacking

Trusted Server

A trusted server for Message Networking is an LDAP client that is given privileged access to Message Networking's LDAP server. The first step in securing the system is to make certain that only trusted systems are working together.

 

Top of page

.

Home | Search | Print | Back | Fwd | Close
©2006 Avaya Inc. All rights reserved.
Last modified 11 January, 2006