logo

Network Security: Architecture & Communication, Secured Operations, Research and Development

14 Pages3926 Words63 Views
   

Added on  2023-01-13

About This Document

This document provides an overview of network security, including the configuration of Asterisk IP-PBX, creation of dial plan, implementation of Postfix MTA, and configuration of IAX trunks. It also discusses attacks against VoIP systems and pivoting against user mailboxes.

Network Security: Architecture & Communication, Secured Operations, Research and Development

   Added on 2023-01-13

ShareRelated Documents
Network Security
Table of Contents
Network Security: Architecture & Communication, Secured Operations, Research and Development_1
Introduction......................................................................................................................................1
Block A: Architecture & Communication.......................................................................................1
1. Configuration of Asterisk IP-PBX with logical addressing scheme.......................................1
2. Creation of dial plan for around 150 distinct extensions.........................................................3
3. Design as well as implementation Postfix MTA for voicemail from extensions to user
mailboxes.....................................................................................................................................5
4. Configuration of IAX trunks for demonstration of connectivity among Asterisk servers......6
Block B: Secured operations as well as service delivery................................................................7
5. Illustrate 3 attacks against VoIP system and one attack must illustrate pivoting against
mailbox of users...........................................................................................................................7
6. Designing as well as implementation of comprehensive security policies for VoIP system
along with relevant security controls...........................................................................................8
7. Implementation of comprehensive NIDS as well as test their efficiency with respect to
deployment..................................................................................................................................8
Block C: Research and Development............................................................................................10
8. Deployment of authentication mechanism for user agent.....................................................10
9. Encryption of VoIP traffic through usage of standardised security protocols.......................11
10. Critically illustrate ways in which cyber resilience can be attained within unified
communication..........................................................................................................................11
Conclusion.....................................................................................................................................11
References......................................................................................................................................12
Network Security: Architecture & Communication, Secured Operations, Research and Development_2
Introduction
The activity that is designed for protecting usability along with integrity of data and
network is referred to as network security. This comprises of software as well as hardware
technologies which target different threats. Basically, it involves practices and policies which are
adopted for prevention as well as monitoring unauthorised access, denial of computer network
and modification (Bentall Airbus DS Ltd, 2019). Asterisk denotes an open source framework
that is liable for building up communication applications. To acknowledge the concept of
network security, Lotus Consulting International Limited which is a consultancy firm and
renders their services in areas like transactions, construction and commercial matters. This report
comprises architecture as well as communication, service delivery, along with research and
development.
Block A: Architecture & Communication
1. Configuration of Asterisk IP-PBX with logical addressing scheme.
The software execution of private branch exchange (PBX) is referred to as asterisk. This
is being utilised for establishment as well as controlling telephone calls among
telecommunication endpoints. IP PBX system is liable for handling internal traffic among
stations which act as gatekeeper (What Is A IP PBX?, 2020). This is liable for rendering features
such as VoIP ready, voice messaging, conferencing, reporting and mobility. Asterisk comprises
of components that are crucial for building up scalable and powerful business phone system. It is
liable for enabling Voice over Internet Protocol (VoIP) and Public Switched Telephone Network
(PSTN) connection for communicating with each other. The Asterisk PBX can be installed
within Ubuntu (Linux version), it is specified below:
sudo apt-get install asterisk
Type Y when user is prompted to do so.
Do you want to continue [Y/N]?
The figure with respect to this is shown below:
1
Network Security: Architecture & Communication, Secured Operations, Research and Development_3
Illustration 1 Configuration of Asterisk
Type Y in order to proceed further.
The installation will begin. Next step involved within this is configuration as well as
compilation of asterisk (Duffield and et. al., 2016). For this within the terminal the following
command can be entered:
sudo ./configure
After having a successful configuration, it can be compiled now in which installation
might take time.
sudo make
sudo make install
After successful installation, sample configuration files may be used (Fisch, White and
Pooch, 2017). This can be done by making use of command illustrated below:
sudo make samples
The last step comprises of configuring systemctl init scripts for management of Asterisk
service as well as clearing some cache.
2
Network Security: Architecture & Communication, Secured Operations, Research and Development_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security: Architecture, Attacks, and Prevention
|13
|3784
|59

AgroXYZ Network & Communications Presentation
|13
|902
|79