Avaya Modular Messaging is a standards-based messaging system that
converges voice and data networks. Modular Messaging is a critical system for messaging
and communications.
Topics in this section include:
Modular Messaging setup
Depending on the installation, Modular Messaging is divided into two
separate components:
- Messaging Application Server (MAS). The MAS is
a Windows-based system that provides telephone user interfaces (TUIs), such as Modular Messaging Aria, Modular Messaging AUDIX, and Modular Messaging Serenade. The MAS forms a front end that interacts
with the private branch exchange (PBX) through associated voice
ports. Depending on the switch integration and configuration, the MAS can interact
with the Avaya PBX through various communications protocols including Internet Protocol (IP) and QSIG.
The MAS also provides IP-based interfaces for system management
and subscriber access. In the Modular Messaging with Microsoft Exchange configuration, the MAS communicates with the Microsoft Outlook Client through IP. In the Modular Messaging with Avaya Message
Storage Server configuration, the MAS communicates with the
message store and directory server through a private local area network (LAN). The switch hub for the LAN is delivered
with the Modular Messaging product. The MSS and Exchange servers connect to the MAS with Distributed Componenet Object Model (DCOM).
- Message Storage Server (MSS). The MSS is a Linux-based
system that provides the following features:
A voice mail domain consists of one or more MAS and a message storage server.
The MAS and the Avaya MSS communicate over a dedicated private LAN. The
MAS and the MSS provide the following services to users:
-
Callers can use a call-answering interface.
-
Subscribers can send and receive messages and use a directory.
-
Administrators can use system and subscriber configuration data.
With this setup, Avaya has implemented various features and recommendations
that provide users a secure system.
Security concerns with Modular Messaging
Security concerns for the Avaya message servers include the following activities:
Toll fraud
Unauthorized reprogramming of computer systems
-
Unauthorized access to telecommunications systems through misused call transfer
capabilities of the system or ports that are meant for remote
administration or maintenance
Unintended disclosure of confidential information
Virus attacks
These activities can result in expensive
telephone bills, revenue loss, and administrative costs. The activities can also decrease system
performance and reduce customer confidence.
The following sections describe security risks faced by telecommunications systems today:
Telecommunications fraud
Telecommunications fraud is also referred to as toll fraud. Toll fraud is a significant security concern in traditional voice
messaging systems. Unauthorized people use personal computers, random
number generators, and password cracking programs to break into the
most sophisticated systems and to commit fraud. Password cracking is a term to describe when a network or system resource that is secured with a password is unlocked with or without tools.
With the convergence
of voice and data, and the advent of IP Telephony, security problems
are not limited to toll fraud and unauthorized access. Advances
in technology have opened a wide array of vulnerabilities that
can compromise the security of the entire organization. For more information about toll fraud, see Telecommunications
service thefts. For a list of Web sites about security information and updates, see References.
Voice messaging features
Voice messaging systems provide a wide variety of applications,
such as automated attendants, that operate like an electronic answering
machine. Callers can leave messages for employees who have voice
mailboxes assigned to them. Callers can transfer
calls to other extensions that sometimes can be external telephone numbers.
Using the Find Me feature, subscribers can specify a list of
telephone numbers that the system can dial to reach the subscriber.
The Call Me feature provides notification mechanisms. These features allow the transfer
of calls from the voice mailboxes and to the PBX system.
Hackers
try to connect to the voice mail system and enter digits to access
an outgoing trunk line. Some hackers use the voice messaging
system to search for unassigned mailboxes. They then use the unassigned mailboxes
to exchange toll-free messages.
For more information on Toll fraud, see Telecommunications
service thefts.
Remote access
Remote access is also referred to as Direct Inward System Access (DISA). With DISA,
callers can enter the system from public networks. Callers
can use the following methods to dial in to the system and use the system features and services:
Unprotected remote access numbers
are a favorite target for hackers. Hackers attempt to decipher the
security code by using automated programs to access the
system and misuse its services. Expert toll hackers also target
the administration and maintenance ports of systems to change the
system features and parameters to make unauthorized long-distance
calls.
Internal threats
Security starts with the people and organizations that use it. Look internally when you decide against whom to protect the system. A significant
number of attacks come from within. Internal security also protects information and assets. It may be easier to misuse
or damage the system by physical methods than by hacking the system
passwords.
Another example of improper internal security is improper storage of passwords.
If employees write passwords on papers and leave the papers on employee desks,
other employees can use the passwords to do the following activities:
- Use the mailbox of another employee
- Pass critical and confidential information to others
- Pass the password to unauthorized people
You must enforce a proper security policy against such
internal breaches of communications.
Internet threats
Modular Messaging is deployed into the existing corporate LAN and
can be exposed to a variety of threats that originate on
the Internet. Security is a primary concern when an organization
connects its network to the Internet. Network administrators have concerns about the network security when Internet hackers can use the organization's private data and networking infrastructure.
Some common methods of Internet attacks include Internet worms, virus attacks, and malicious e-mail
attachments. Internet attacks can also occur through IP spoofing, password attacks, and network packet sniffers. Additional attacks include
denial of service attacks and application layer attacks. Attacks can lead to theft, destruction, and corruption of sensitive and confidential information.
If you suspect that you are experiencing threats, contact your system administrator and refer to the references available in References.
What organizations need to do
System managers and administrators
must plan and implement the necessary security measures, including:
-
Integrate Modular Messaging servers into your existing TCP/IP
network according to the corporate networking policies.
You can use existing firewalls,
and corporate security policies and practices for the Modular Messaging system. You cannot use existing firewalls between the MAS and the MSS.
-
Consider the security implications when you configure the following types of
client access to the Modular Messaging system:
IMAP4 or POP3 standards-based client access
Modular Messaging Web Client access
Subscriber Options
Outlook thick client access
Lotus thick client access
Speech access
-
Prevent unauthorized use of the server capabilities. Protect the server with administrator and user passwords. Use lengthy and random passwords to minimize the possibility of hacking. Ensure that you secure the passwords properly.
-
Protect the network to prevent all well-known types of hacker attacks,
including denial of service attacks.
-
Use server logs to detect actual and attempted
unauthorized use and to identify its source.
Top of page
|