Avaya

Modular Messaging Help

 Getting Started 
 Installation 
 Administration 
 Maintenance 
 Reference 
Home > Getting started > Modular Messaging and security > Security overview

Security overview

Avaya Modular Messaging is a standards-based messaging system that converges voice and data networks. Modular Messaging is a critical system for messaging and communications.

Topics in this section include:

Modular Messaging setup

Depending on the installation, Modular Messaging is divided into two separate components:

  • Messaging Application Server (MAS). The MAS is a Windows-based system that provides telephone user interfaces (TUIs), such as Modular Messaging Aria, Modular Messaging AUDIX, and Modular Messaging Serenade. The MAS forms a front end that interacts with the private branch exchange (PBX) through associated voice ports. Depending on the switch integration and configuration, the MAS can interact with the Avaya PBX through various communications protocols including Internet Protocol (IP) and QSIG. The MAS also provides IP-based interfaces for system management and subscriber access. In the Modular Messaging with Microsoft Exchange configuration, the MAS communicates with the Microsoft Outlook Client through IP. In the Modular Messaging with Avaya Message Storage Server configuration, the MAS communicates with the message store and directory server through a private local area network (LAN). The switch hub for the LAN is delivered with the Modular Messaging product. The MSS and Exchange servers connect to the MAS with Distributed Componenet Object Model (DCOM).
  • Message Storage Server (MSS). The MSS is a Linux-based system that provides the following features:
    • Message storage
    • Message transport

    • Subscriber client access

    • System management interfaces

    • Directory

    • Message networking functions

A voice mail domain consists of one or more MAS and a message storage server. The MAS and the Avaya MSS communicate over a dedicated private LAN. The MAS and the MSS provide the following services to users:

  • Callers can use a call-answering interface.

  • Subscribers can send and receive messages and use a directory.

  • Administrators can use system and subscriber configuration data.

With this setup, Avaya has implemented various features and recommendations that provide users a secure system.

Security concerns with Modular Messaging

Security concerns for the Avaya message servers include the following activities:

  • Toll fraud

  • Unauthorized reprogramming of computer systems

  • Unauthorized access to telecommunications systems through misused call transfer capabilities of the system or ports that are meant for remote administration or maintenance

  • Unintended disclosure of confidential information

  • Virus attacks

These activities can result in expensive telephone bills, revenue loss, and administrative costs. The activities can also decrease system performance and reduce customer confidence.

The following sections describe security risks faced by telecommunications systems today:

Telecommunications fraud

Telecommunications fraud is also referred to as toll fraud. Toll fraud is a significant security concern in traditional voice messaging systems. Unauthorized people use personal computers, random number generators, and password cracking programs to break into the most sophisticated systems and to commit fraud. Password cracking is a term to describe when a network or system resource that is secured with a password is unlocked with or without tools.

With the convergence of voice and data, and the advent of IP Telephony, security problems are not limited to toll fraud and unauthorized access. Advances in technology have opened a wide array of vulnerabilities that can compromise the security of the entire organization. For more information about toll fraud, see Telecommunications service thefts. For a list of Web sites about security information and updates, see References.

Voice messaging features

Voice messaging systems provide a wide variety of applications, such as automated attendants, that operate like an electronic answering machine. Callers can leave messages for employees who have voice mailboxes assigned to them. Callers can transfer calls to other extensions that sometimes can be external telephone numbers. Using the Find Me feature, subscribers can specify a list of telephone numbers that the system can dial to reach the subscriber. The Call Me feature provides notification mechanisms. These features allow the transfer of calls from the voice mailboxes and to the PBX system.

Hackers try to connect to the voice mail system and enter digits to access an outgoing trunk line. Some hackers use the voice messaging system to search for unassigned mailboxes. They then use the unassigned mailboxes to exchange toll-free messages.

For more information on Toll fraud, see Telecommunications service thefts.

Remote access

Remote access is also referred to as Direct Inward System Access (DISA). With DISA, callers can enter the system from public networks. Callers can use the following methods to dial in to the system and use the system features and services:

  • Central Office (CO)

  • Foreign Exchange (FX)

  • Direct Inward Dialing (DID)

  • 800 service trunks

Unprotected remote access numbers are a favorite target for hackers. Hackers attempt to decipher the security code by using automated programs to access the system and misuse its services. Expert toll hackers also target the administration and maintenance ports of systems to change the system features and parameters to make unauthorized long-distance calls.

Internal threats

Security starts with the people and organizations that use it. Look internally when you decide against whom to protect the system. A significant number of attacks come from within. Internal security also protects information and assets. It may be easier to misuse or damage the system by physical methods than by hacking the system passwords.

Another example of improper internal security is improper storage of passwords. If employees write passwords on papers and leave the papers on employee desks, other employees can use the passwords to do the following activities:

  • Use the mailbox of another employee
  • Pass critical and confidential information to others
  • Pass the password to unauthorized people

You must enforce a proper security policy against such internal breaches of communications.

Internet threats

Modular Messaging is deployed into the existing corporate LAN and can be exposed to a variety of threats that originate on the Internet. Security is a primary concern when an organization connects its network to the Internet. Network administrators have concerns about the network security when Internet hackers can use the organization's private data and networking infrastructure.

Some common methods of Internet attacks include Internet worms, virus attacks, and malicious e-mail attachments. Internet attacks can also occur through IP spoofing, password attacks, and network packet sniffers. Additional attacks include denial of service attacks and application layer attacks. Attacks can lead to theft, destruction, and corruption of sensitive and confidential information.

If you suspect that you are experiencing threats, contact your system administrator and refer to the references available in References.

What organizations need to do

System managers and administrators must plan and implement the necessary security measures, including:

  • Integrate Modular Messaging servers into your existing TCP/IP network according to the corporate networking policies. You can use existing firewalls, and corporate security policies and practices for the Modular Messaging system. You cannot use existing firewalls between the MAS and the MSS.

  • Consider the security implications when you configure the following types of client access to the Modular Messaging system:

    • IMAP4 or POP3 standards-based client access

    • Modular Messaging Web Client access

    • Subscriber Options

    • Outlook thick client access

    • Lotus thick client access

    • Speech access

  • Prevent unauthorized use of the server capabilities. Protect the server with administrator and user passwords. Use lengthy and random passwords to minimize the possibility of hacking. Ensure that you secure the passwords properly.

  • Protect the network to prevent all well-known types of hacker attacks, including denial of service attacks.

  • Use server logs to detect actual and attempted unauthorized use and to identify its source.

Top of page