Avaya

Modular Messaging Help

 Getting Started 
 Administration 
 Maintenance 
 Reference 
Home > Getting started > Modular Messaging and Security > Security overview

Security overview

Avaya Modular Messaging setup

Avaya Modular Messaging is a standards-based messaging system that runs on the S3400 Message Server system. Avaya Modular Messaging converges voice and data networks and is a critical system for messaging and communications. Based on the functions, it is divided into two separate components:

Messaging Application Server (MAS). MAS is a Windows-based system that forms a front end that interfaces with the Private Branch Exchange (PBX) through associated voice ports.

Message Storage Server (MSS). MSS is a Linux-based system that forms the back end which provides message storage, message transport, and directory functions.

One or more MAS with one MSS together form a voice mail domain. The MAS and the MSS communicate over a dedicated private LAN. The MAS and the MSS together provide callers with a call-answering interface, subscribers with access to messages and directory, and administrators with access to system and subscriber configuration data. With this setup, Avaya has implemented various features and recommendations to provide users with a secure system that easily fits into their existing security profile.

 

Figure 1. Modular Messaging System
MM Layout

Security elements with Modular Messaging

Security concerns for the Avaya S3400 Message Server include toll fraud, unauthorized reprogramming of computer systems, unauthorized access to telecommunication system by misusing the call transfer capabilities of the system or through ports meant for remote administration or maintenance, unintended disclosure of confidential information, and virus attacks. These activities result in huge telephone bills, revenue loss, administrative costs, decreased system performance, and loss of customer confidence. The various security risks faced by telecommunication systems today are described in the following sections.

Telecommunications Fraud

Toll Fraud is a significant security concern in traditional voice messaging systems. Unauthorized people use personal computers, random number generators and password cracking programs to break into the most sophisticated systems and commit frauds. Today, with the convergence of voice and data and the advent of IP Telephony, security problems are not limited to toll fraud and unauthorized access. The advancement in technology has opened up a wide array of vulnerabilities that can compromise the security of the entire organization. See Telecommunication service thefts for more information on Toll Fraud.

Voice messaging features

Voice messaging systems provide a wide variety of applications, such as automated attendants, that operate like an electronic answering machine. Callers can leave messages for employees who have voice mailboxes assigned to them. These features allow the transfer of calls out of the voice mailboxes and into the PBX system. Hackers try to connect to the voice mail system and type-in digits to gain an outgoing trunk line. Some hackers gain entry into the voice messaging system and search for unassigned mailboxes. They then use such mailboxes to exchange toll-free messages. In addition, unauthorized access to the voice mail system also allows hackers to gain access to PBX and manipulate the administrative data.

Remote access

Remote access (also known as DISA, Direct Inward System Access) permits callers to access the system from public networks. Callers can dial into the system using CO, FX, DID or 800 service trunks to use the features and services of the system. Unprotected remote access numbers are a favorite target for hackers. Hackers attempt to decipher the security code by using automated programs to gain entry into the system and misuse its services. Expert toll hackers also target the administration and maintenance ports of systems to change the system features and parameters to make unauthorized long distance calls.

Internal threats

Securing a system does not begin with the system itself, but with the people and organizations that use it. In deciding who to protect the system against, one must not forget to look internally. A significant number of attacks come from within. Internal security is important to the protection of information and assets. It is easier to misuse or damage the system by physical methods than by hacking the system passwords. Employees can easily access the mailbox of another employee and pass critical and confidential information, such as passwords, to unauthorized people. It is necessary to enforce a proper security policy against such internal breach of communications.

Internet threats

Modular Messaging is deployed into the existing corporate LAN and is exposed to the Internet. Security is a primary concern when an organization connects its network to the Internet. Network administrators have increasing concerns about the security of their networks when they expose their organization’s private data and networking infrastructure to Internet crackers. Some of the common methods of attacks from the Internet include Internet worms, virus attacks, malicious e-mail attachments, IP spoofing, Password attacks, Network packet sniffers, Denial of Service attacks, and Application layer attacks. These attacks can lead to theft, and to destruction and corruption that can cause irreparable damage to sensitive and confidential information.

What you need to do

It is extremely important that system managers and administrators plan and implement the necessary security measures and ensure that:

  • Modular Messaging servers integrate into your existing TCP/IP network in accordance with the corporate networking policies, and these servers also allow the usage of existing firewall and of corporate security policies and practices.

  • The network prevents exposure of potentially sensitive customer messages by using sending restrictions that provide data for you to check to ensure that there has been no unauthorized usage.

  • You prevent unauthorized use of the server capabilities by protecting the server with administrator and user passwords. Lengthy and random passwords minimize the possibility of hacking.

  • The network prevents unauthorized command-line access to the main server.

  • The network prevents all well known types of hacker attacks, including denial of service attacks.

  • The servers provide sufficient logs, like the Administrator History Log, to facilitate detection of actual and attempted unauthorized usage and identification of sources of unauthorized usage.

Top of page