<!DOCTYPE html
SYSTEM "about:legacy-compat">
<html lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta charset="UTF-8"><meta name="copyright" content="(C) Copyright 2023"><meta name="DC.rights.owner" content="(C) Copyright 2023"><meta name="DC.type" content="concept"><meta name="description" content="At Media5, we use state-of-the-art security technologies to secure our units. Therefore, when using Mediatrix Gateways for Internet telephony network applications, one can be assured to be protected with the best security mechanisms and features available in the industry."><meta name="prodname" content="Mediatrix Multi-service Gateways"><meta name="version" content="DGW 49.12.28842941"><meta name="platform" content="All"><meta name="DC.date.modified" content="2023-0308-2809"><meta name="DC.date.issued" content="2023-0308-2809"><meta name="DC.date.available" content="2023-0308-2809"><meta name="ChapterNumbering" content="no"><meta name="DC.format" content="HTML5"><meta name="DC.identifier" content="concept_uxk_l5b_dx"><link href="https://fonts.googleapis.com/css?family=Open+Sans" rel="stylesheet"><link rel="stylesheet" type="text/css" href="https://documentation.media5corp.com/download/attachments/62825785/commonltr.css"><link rel="stylesheet" type="text/css" href="https://documentation.media5corp.com/download/attachments/62825785/custom.css"><title>Secure Communications on VoIP Networks</title></head><body><header role="banner"><div class="topicmeta title">Secure Communications on VoIP Networks</div><div class="topicmeta date">2023-0308-28<09</div><div class="topicmeta product">Mediatrix Multi-service Gateways</div><div class="topicmeta version">DGW 49.12.2884<2941</div><div class="topicmeta pdf"><a href="https://documentation.media5corp.com/download/attachments/62825785/Secure%20Communications%20on%20VoIP%20Networks.pdf" rel="nofollow">Download PDF Document</a></div><hr><span style="float: inline-end;"></span></header><nav role="toc"><ul><li><a href="#concept_uxk_l5b_dx">Internet Telephony Network Security</a><ul><li><a href="#concept_tpv_m4d_dx">Authentication</a></li><li><a href="#concept_q2d_fcj_dx">X-509 Certificates</a></li><li><a href="#concept_dwd_mz5_1x">Transport Layer Security (TLS) </a></li><li><a href="#concept_rrf_jjd_dx">Hypertext Transfer Protocol Secure (HTTPS) </a></li></ul></li><li><a href="#concept_vq5_r4w_1x">Communications Security</a><ul><li><a href="#concept_xqq_svc_dx">Unit Signaling Security </a></li><li><a href="#concept_zrr_d1d_dx">Media Security</a></li><li><a href="#concept_adt_3yc_dx">Denial of Service Attacks </a></li><li><a href="#concept_xft_fvl_1r">Sbc Service</a></li></ul></li><li><a href="#concept_fvf_qmw_1x">Management Security</a><ul><li><a href="#concept_u1b_xgv_cx">TR-069 Remote Management </a></li><li><a href="#concept_chw_njv_1x">Password Protection </a></li><li><a href="#concept_gqt_pmj_dx">Security Using a Customer Profile </a></li><li><a href="#concept_mmb_qq3_br">Configuration Scripts</a></li><li><a href="#concept_zqb_h14_1r">Command Line Interface (CLI)</a></li><li><a href="#concept_lx5_xhv_1x">Simple Network Management Protocol (SNMP)</a></li></ul></li><li><a href="#concept_dfv_gxc_dx">Firewalls</a></li><li><a href="#topic_title_Appendix_d1e33">Appendix</a><ul><li><a href="#concept_bxv_zxl_ls">Certificates</a></li><li><a href="#unique_776279460392266536">X-509 Certificates </a></li><li><a href="#concept_sfd_ljg_1r">TR-069 or CPE WAN Management Protocol (CWMP)</a></li><li><a href="#reference_wp5_5dq_4cb">Transport Layer Security (TLS) Parameters</a></li><li><a href="#concept_ct2_ns1_bq">SIP Transport Types</a></li></ul></li><li><a href="#reference_j4g_nbv_gfb">Online Help</a></li><li><a href="#concept_v4k_q3h_1r">DGW Documentation</a></li><li><a href="#concept_fqm_rv4_k4">Copyright Notice</a></li></ul></nav><main role="main"><article role="article" aria-labelledby="ariaid-title1"><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="nested0" aria-labelledby="ariaid-title1" id="concept_uxk_l5b_dx">
<h1 class="title topictitle1" id="ariaid-title1">Internet Telephony Network Security</h1>
<div class="body conbody"><p class="shortdesc">At Media5, we use state-of-the-art security technologies to secure our units.
Therefore, when using Mediatrix Gateways for Internet telephony network applications, one can be
assured to be protected with the best security mechanisms and features available in the
industry. </p>
<div class="p">In an Internet telephony network, there are two aspects that must be secured:<ul class="ul" id="concept_uxk_l5b_dx__ul_jfj_3rc_dx">
<li class="li">customer communications</li>
<li class="li">network management </li>
</ul></div>
<div class="p">To provide security, the following must be tackled: <ul class="ul" id="concept_uxk_l5b_dx__ul_wbx_wcd_dx">
<li class="li"><a class="xref" href="#concept_xqq_svc_dx" title="Signaling is the protocol that activates a device located in the network and establishes calls between peers.">Signaling security</a></li>
<li class="li"><a class="xref" href="#concept_zrr_d1d_dx" title="Media is voice, video, or data exchanged between 2 endpoints during a communication.">Media security</a></li>
<li class="li"><a class="xref" href="#concept_adt_3yc_dx" title="The Denial of Service (DoS) attack is an attempt to make a machine or network resource unavailable by overloading it with useless traffic. This has the effect of temporarily or indefinitely interrupting or suspending services of a user connected to the Internet.">Denial of Service
attacks</a></li>
<li class="li"><a class="xref" href="#concept_fvf_qmw_1x" title="An important aspect of Management security is that data used for operation, administration, maintenance, provisioning, and troubleshooting (OAMPT) of the CPE device remains private and secured at all times when management tasks are being carried out.">Management
Security</a></li>
</ul></div>
<div class="p">Furthermore, several security mechanisms are used in our Mediatrix products to ensure
security:<ul class="ul" id="concept_uxk_l5b_dx__ul_yhx_psc_dx">
<li class="li">Data encryption </li>
<li class="li"><a class="xref" href="#concept_tpv_m4d_dx" title="As defined in the Oxford Dictionary, authentication is the process or action of verifying the identity of a user or process.">Authentication</a>
</li>
<li class="li"><a class="xref" href="#concept_dwd_mz5_1x" title="The Transport Layer Security protocol provides data privacy and integrity for computer network communications.">TLS</a> and <a class="xref" href="#concept_rrf_jjd_dx" title="HTTPS is a transfer protocol widely used to secure communications over Internet telephony networks.">HTTPS</a> secured transport protocols </li>
<li class="li"><a class="xref" href="#concept_bxv_zxl_ls" title="The Mediatrix unit uses digital certificates, which are a collection of data used to verify the identity of individuals, computers, and other entities on a network.">Certificates</a></li>
<li class="li"><a class="xref" href="#concept_u1b_xgv_cx" title="The TR-069 also known as CWMP, is a Broadband Forum technical specification. This protocol can be used to remotely monitor and update customer-premise equipment configurations and firmware.">TR-069 </a></li>
</ul></div>
</div>
<hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title2" id="concept_tpv_m4d_dx">
<h2 class="title topictitle2" id="ariaid-title2">Authentication</h2>
<div class="body conbody"><p class="shortdesc">As defined in the Oxford Dictionary, authentication is the process or action of
verifying the identity of a user or process.</p>
<p class="p">In an Internet telephony network environment, authentication will allow the Mediatrix unit to
make sure the peer it is communicating with is the proper network or endpoint (unit or end-user
device). This provides a level of security for communications as no communication will be allowed
if the authentication is not confirmed. </p>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title3" id="concept_q2d_fcj_dx">
<h2 class="title topictitle2" id="ariaid-title3">X-509 Certificates</h2>
<div class="body conbody"><p class="shortdesc">The Mediatrix unit uses digital X-509 certificates which are based on the international
X.509 Public Key Infrastructure (PKI) standard. These certificates are a collection of data used
to verify the identity of individuals, computers, and other entities on a network.</p>
<p class="p">X.509 certificates provide guaranties on confidentiality, authentication, integrity, and
non-repudiation. The Public Key Infrastructure (PKI) is a set of rules, specific to an
environment, that manages, distributes, stores, and revokes the certificates. Therefore, the PKI
guaranties that the signed certificates can be trusted. </p>
<div class="p">Certificates are used to secure the following TLS based connections:<ul class="ul" id="concept_q2d_fcj_dx__ul_i4n_mbb_br">
<li class="li">SIP</li>
<li class="li">Configuration Web pages</li>
<li class="li">File transfers (scripts, firmwares, etc.) with HTTPS</li>
<li class="li">Configuration using TR-069</li>
<li class="li">Wired Ethernet Authentication with EAP-TLS (802.1x)</li>
</ul>Certificates contain:<ul class="ul" id="concept_q2d_fcj_dx__ul_wjn_v33_ns">
<li class="li">the certificate's name</li>
<li class="li">the issuer and issued to names </li>
<li class="li">the validity period (the certificate is not valid before or after this period) </li>
<li class="li">the use of certificates (Client or server)</li>
<li class="li">whether or not the certificate is delivered by a Certification Authority (CA)</li>
</ul>
</div>
<div class="p">
<br><img class="image" id="concept_q2d_fcj_dx__image_cjy_wgq_dx" src="https://documentation.media5corp.com/download/attachments/62825785/MatchingCertificates.jpg" width="650"><br>
</div>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title4" id="concept_dwd_mz5_1x">
<h2 class="title topictitle2" id="ariaid-title4">Transport Layer Security (TLS) </h2>
<div class="body conbody"><p class="shortdesc">The Transport Layer Security protocol provides data privacy and integrity for computer
network communications.</p>
<div class="p">In other words, it provides <a class="xref" href="#concept_xqq_svc_dx" title="Signaling is the protocol that activates a device located in the network and establishes calls between peers.">signaling
security</a> and <a class="xref" href="#concept_vq5_r4w_1x" title="An important aspect of communications security, is that data sent and received from one endpoint to another remains secured, reliable, and private at all times.">communication
security</a>. TLS is a widely used security protocol that allows for: <ul class="ul" id="concept_dwd_mz5_1x__ul_khp_j1v_1x">
<li class="li">Server and Client authentication </li>
<li class="li">Data confidentiality </li>
<li class="li">Data integrity</li>
</ul></div>
<div class="p">TLS is used for: <ul class="ul" id="concept_dwd_mz5_1x__ul_nnq_nmn_qcb">
<li class="li">DGW Web Access</li>
<li class="li">HTTP-based Configuration/Firmware File Transfer</li>
<li class="li">802.1X</li>
<li class="li">SIP communications</li>
<li class="li">TR-069 (CWMP)</li>
</ul></div>
<div class="p">When a <a class="xref" href="#unique_776279460392266536" title="The Mediatrix unit uses digital X-509 certificates which are based on the international X.509 public key infrastructure (PKI) standard. The certificates are a collection of data used to verify the identity of individuals, computers, and other entities on a network.">certificate</a> is <a class="xref" href="#concept_tpv_m4d_dx" title="As defined in the Oxford Dictionary, authentication is the process or action of verifying the identity of a user or process.">authenticated</a>, a secure TLS
connection is established with a peer. Then <a class="xref" href="#concept_ct2_ns1_bq">SIP</a>, <a class="xref" href="#concept_rrf_jjd_dx" title="HTTPS is a transfer protocol widely used to secure communications over Internet telephony networks.">HTTPS</a>, and <a class="xref" href="#concept_sfd_ljg_1r" title="The Technical Report 069 (TR-069), also known as CWMP, is a Broadband Forum technical specification. This protocol can be used to monitor and update the Mediatrix unit configurations and firmware. In other words, when using TR-069, the Mediatrix unit can get in contact with an Auto Configuration Server (ACS) to initiate a configuration script transfer/execution and a firmware upgrade.">TR-069</a> can be used over the TLS connection.
TLS connections also prevents man-in-the-middle attacks.<div class="note important note_important"><span class="note__title">IMPORTANT:</span> The Mediatrix
unit does not support a mix of both TLS and non-TLS links. Once TLS is enabled, it is
enabled for all configured SIP gateways.</div></div>
<div class="p">Although some parameters are available through the Web GUI, many parameters are not accessible
through the Web GUI:<ul class="ul" id="concept_dwd_mz5_1x__ul_lgy_b1l_rdb">
<li class="li">
<ul class="ul" id="concept_dwd_mz5_1x__ul_dzb_k1l_rdb">
<li class="li">Cipher Suite</li>
<li class="li">TLS version</li>
<li class="li">Certificate validation and trust level</li>
</ul>
</li>
</ul></div>
<p class="p">For more details on advanced parameters, refer to <a class="xref" href="#reference_wp5_5dq_4cb">Transport Layer Security (TLS) Parameters</a>.</p>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title5" id="concept_rrf_jjd_dx">
<h2 class="title topictitle2" id="ariaid-title5">Hypertext Transfer Protocol Secure (HTTPS) </h2>
<div class="body conbody"><p class="shortdesc">HTTPS is a transfer protocol widely used to secure communications over Internet
telephony networks.</p>
<p class="p">HTTPS allows for communications over Hypertext Transfer Protocol (HTTP) within a connection
encrypted by <a class="xref" href="#concept_dwd_mz5_1x" title="The Transport Layer Security protocol provides data privacy and integrity for computer network communications.">Transport Layer
Security</a> (TLS). HTTPS is mainly used to secure the content of a Web site and securely
transfer files.</p>
<p class="p">A communication using HTTPS reasonably guaranties that the targeted peer is the proper one, not
an impostor, and that media cannot be read or tampered by any third-party.</p>
</div>
</article></article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title6" id="concept_vq5_r4w_1x">
<h1 class="title topictitle1" id="ariaid-title6">Communications Security</h1>
<div class="body conbody"><p class="shortdesc">An important aspect of communications security, is that data sent and received from one
endpoint to another remains secured, reliable, and private at all times.</p>
<div class="p">When configured for complete security, signaling is performed with TLS with the use of a
certificate and the unit transports the audio and video through Secure RTP (SRTP). The Mediatrix
unit will make sure that the certificate specifically encrypted for the session and issued by the
end user is valid, e.g.:<ul class="ul" id="concept_vq5_r4w_1x__ul_uvg_t5w_1x">
<li class="li">the date and hour are not expired</li>
<li class="li">the certificate was issued by a recognised authority and configured within the unit</li>
<li class="li">the certificate was issued for the proper IP address or specific FQDN</li>
</ul>The following diagram combines several use cases of communications security.<br><img class="image" id="concept_vq5_r4w_1x__image_mmn_lf1_cx" src="https://documentation.media5corp.com/download/attachments/62825785/CommunicationSecurity.png" width="800"><br></div>
</div>
<hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title7" id="concept_xqq_svc_dx">
<h2 class="title topictitle2" id="ariaid-title7">Unit Signaling Security </h2>
<div class="body conbody"><p class="shortdesc">Signaling is the protocol that activates a device located in the network and establishes
calls between peers. </p>
<p class="p">To provide security to signaling, the Mediatrix unit will connect to the network via SIP over
TLS. The network is then authenticated by a certificate that guaranties that the Mediatrix unit
is connected to a "safe" network.</p>
<p class="p">The network will then authenticate the device with the username and password to make sure the
device is part of the network's subscriber list. This authentication is done with the digest
authentication. The result of these authentications and verifications provides private and
reliable communications between the network and the device. Calls will be established without
leaving any possibility to a third party to identify the called or callee number, or to be able
to interfere with the communication in any way. </p>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title8" id="concept_zrr_d1d_dx">
<h2 class="title topictitle2" id="ariaid-title8">Media Security</h2>
<div class="body conbody"><p class="shortdesc">Media is voice, video, or data exchanged between 2 endpoints during a
communication.</p>
<p class="p">To secure media routed from one endpoint to another, a secret and unique encryption key is
generated for that specific exchange of media. For security, the key is exchanged during
signaling, via a TLS connection. Once the key is exchanged, endpoints will directly communicate
one with another using SRTP with an encrypted communication. </p>
<p class="p">This ensures that voice, video or data, is impossible to decrypt by any one else than the
endpoints involved in the communication. Therefore calls will be carried out without leaving any
possibility to a third party to eavesdrop the media in any way.</p>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title9" id="concept_adt_3yc_dx">
<h2 class="title topictitle2" id="ariaid-title9">Denial of Service Attacks </h2>
<div class="body conbody"><p class="shortdesc">The Denial of Service (DoS) attack is an attempt to make a machine or network resource
unavailable by overloading it with useless traffic. This has the effect of temporarily or
indefinitely interrupting or suspending services of a user connected to the Internet. </p>
<p class="p">The Mediatrix units can address these DoS with the use of <a class="xref" href="#concept_dfv_gxc_dx" title="Firewalls allows you to create and configure rules to filter packets to ensure the information comes from a trusted sender.">Firewalls</a> and the Sbc service. </p>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title10" id="concept_xft_fvl_1r">
<h2 class="title topictitle2" id="ariaid-title10">Sbc Service</h2>
<div class="body conbody">
<p class="p">The Sbc service, available only on the Mediatrix Sentinel series, offers major security
functionalities.</p>
<ul class="ul" id="concept_xft_fvl_1r__ul_ysh_gxl_1r">
<li class="li">set a demarcation point to protect your private network topology information by
substituting the IP addresses and the identifiers with aliases.</li>
<li class="li">secure the communications between the public and the private network by converting
signaling between UDP/TCP and <a class="xref" href="#concept_dwd_mz5_1x" title="The Transport Layer Security protocol provides data privacy and integrity for computer network communications.">TLS</a>.</li>
<li class="li">secure the media by converting it from RTP to SRTP.</li>
<li class="li">protect against Denial of Service attacks (<a class="xref" href="#concept_adt_3yc_dx" title="The Denial of Service (DoS) attack is an attempt to make a machine or network resource unavailable by overloading it with useless traffic. This has the effect of temporarily or indefinitely interrupting or suspending services of a user connected to the Internet.">DoS</a>) by
automatically blacklisting peers attempting to connect at a frequency higher than
normal.</li>
</ul>
</div>
</article></article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title11" id="concept_fvf_qmw_1x">
<h1 class="title topictitle1" id="ariaid-title11">Management Security</h1>
<div class="body conbody"><p class="shortdesc">An important aspect of Management security is that data used for operation,
administration, maintenance, provisioning, and troubleshooting (OAMPT) of the CPE device
remains private and secured at all times when management tasks are being carried out. </p>
<p class="p">The Mediatrix units can be configured with different tools, but in all situations, data
is always protected; either by using passwords or by Transport Layer Security (<a class="xref" href="#concept_dwd_mz5_1x" title="The Transport Layer Security protocol provides data privacy and integrity for computer network communications.">TLS</a>). </p>
<img class="image" id="concept_fvf_qmw_1x__image_bjf_rmk_kdb" src="https://documentation.media5corp.com/download/attachments/62825785/MediatrixManagementTools.png" width="800">
</div>
<hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title12" id="concept_u1b_xgv_cx">
<h2 class="title topictitle2" id="ariaid-title12">TR-069 Remote Management </h2>
<div class="body conbody"><p class="shortdesc">The TR-069 also known as CWMP, is a Broadband Forum technical specification. This
protocol can be used to remotely monitor and update customer-premise equipment configurations and
firmware.</p>
<p class="p">Simply said, TR-069 defines a protocol to remotely and automatically configure and manage
Mediatrix devices with Auto Configuration Servers (ACS). </p>
<p class="p">Because data used to remotely manage end-user devices include personal and private information
(for instance username and passwords) it is vital that the communication channel be secured and
the device always be authenticated by the ACS. </p>
<p class="p">Using the HTTPS protocol, the device authenticates the ACS by verifying the ACS certificate and
device identity is verified by the ACS using a password which can be changed at each session.
</p>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title13" id="concept_chw_njv_1x">
<h2 class="title topictitle2" id="ariaid-title13">Password Protection </h2>
<div class="body conbody"><p class="shortdesc">The unit configuration is password-protected. </p>
<p class="p">The unit configuration is restricted in all the interfaces by password protection i.e. a
password is required for all security protections (TR-069, SNMPv3, etc.). Local passwords or a
centrally managed password (with RADIUS) can be used. </p>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title14" id="concept_gqt_pmj_dx">
<h2 class="title topictitle2" id="ariaid-title14">Security Using a Customer Profile </h2>
<div class="body conbody"><p class="shortdesc">A profile is a factory customisation where parameter values, skins, and branding are
defined specifically for a customer. </p>
<div class="p"> The customer profile can include security information such as: <ul class="ul" id="concept_gqt_pmj_dx__ul_ssp_wmj_dx">
<li class="li">default administrator accounts and <a class="xref" href="#concept_chw_njv_1x" title="The unit configuration is password-protected.">Password Protection</a>
policies</li>
<li class="li">security parameters to be activated </li>
<li class="li">specific services to activate or not </li>
<li class="li"><a class="xref" href="#concept_u1b_xgv_cx" title="The TR-069 also known as CWMP, is a Broadband Forum technical specification. This protocol can be used to remotely monitor and update customer-premise equipment configurations and firmware.">TLS X.509
certificates</a></li>
<li class="li">force secure access only (HTTPS and SSH)</li>
<li class="li">set/disable management options:<ul class="ul" id="concept_gqt_pmj_dx__ul_lkp_4nj_dx">
<li class="li"><a class="xref" href="#concept_lx5_xhv_1x" title="The Simple Network Management Protocol (SNMP) allows you to configure and monitor the device parameters inside a network.">SNMP</a>
(v1,v2, or v3)</li>
<li class="li"><a class="xref" href="#concept_u1b_xgv_cx" title="The TR-069 also known as CWMP, is a Broadband Forum technical specification. This protocol can be used to remotely monitor and update customer-premise equipment configurations and firmware.">TR-069</a></li>
<li class="li">Provisioning servers</li>
</ul></li>
<li class="li">encrypt configuration scripts for remote management using custom private keys</li>
</ul></div>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title15" id="concept_mmb_qq3_br">
<h2 class="title topictitle2" id="ariaid-title15">Configuration Scripts</h2>
<div class="body conbody"><p class="shortdesc">Carriers and service providers usually define a configuration that will apply to a large
number of units in compliance with the network architecture. It is the commands and the parameter
values grouped in a text file that produce the Configuration Scripts.</p>
<p class="p">To enforce security, configuration scripts can be encrypted and only Mediatrix units with the
matching encryption key will be capable of decrypting and applying the configuration settings.
Furthermore, configuration scripts can be downloaded and uploaded using <a class="xref" href="#concept_rrf_jjd_dx" title="HTTPS is a transfer protocol widely used to secure communications over Internet telephony networks.">HTTPS</a>.</p>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title16" id="concept_zqb_h14_1r">
<h2 class="title topictitle2" id="ariaid-title16">Command Line Interface (CLI)</h2>
<div class="body conbody"><p class="shortdesc">The Command Line Interface (CLI) provides an access to interactively configure all the
Mediatrix unit parameters.</p>
<div class="p"><div class="note important note_important"><span class="note__title">IMPORTANT:</span> Although it is possible to configure existing ruleset parameters via the
CLI, it is not possible to create or edit a ruleset from the CLI: it must be either imported
or directly created or edited in the DGW Web interface.</div>The CLI is accessed through
either a secure SSH session (default) or an unsecure TELNET session. When using a secure SSH
session, all communications between Client and server are encrypted before being sent over the
network, thus packet sniffers are unable to extract user names, passwords, and other
potentially sensitive data. This is the default and recommended way to access the Command Line
Interface.</div>
<p class="p">The command interpreter interface of the CLI allows the user to browse the unit parameters,
write the command lines, and display the system's notification log.</p>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title17" id="concept_lx5_xhv_1x">
<h2 class="title topictitle2" id="ariaid-title17">Simple Network Management Protocol (SNMP)</h2>
<div class="body conbody"><p class="shortdesc">The Simple Network Management Protocol (SNMP) allows you to configure and monitor the
device parameters inside a network.</p>
<p class="p">The Mediatrix units support SNMPv3, allowing the authentication and encryption of the
management traffic. This feature provides secure connections between Mediatrix devices and
Element Management System (EMS). Interoperable, SNMPv3 is a standard-based protocol that is
defined in RFCs 3413 to 3415.</p>
</div>
</article></article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title18" id="concept_dfv_gxc_dx">
<h1 class="title topictitle1" id="ariaid-title18">Firewalls</h1>
<div class="body conbody"><p class="shortdesc">Firewalls allows you to create and configure rules to filter packets to ensure the
information comes from a trusted sender. </p>
<div class="p">The Mediatrix units support two types of firewalls:<ul class="ul" id="concept_dfv_gxc_dx__ul_oqn_tnd_dx">
<li class="li">Local firewalls to filter incoming packets that have the Mediatrix unit as
destination</li>
<li class="li">Network firewalls to filter packets forwarded by the Mediatrix unit used as a router to
secure the traffic routed to the devices inside the network.</li>
</ul></div>
<p class="p">The local firewall is a security feature that allows you to protect your Mediatrix unit from
receiving packets from unwanted or unauthorised peers. The local firewall, by default, drops
all incoming packets and lets incoming packets go through only if they match the requirement
of a rule.</p>
<p class="p">The network firewall provides a means to dynamically create and configure rules to filter
packets forwarded by the unit. Since this is a network firewall, rules only apply to packets
forwarded by the unit. The traffic is analysed and filtered by all the rules configured. </p>
<p class="p">Firewalls provides a protection against Denial of Service attacks by limiting the connection
frequency under the configurable thresholds and by sending the faulty peers to a
blacklist.</p>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic nested0 nobody" aria-labelledby="ariaid-title19" id="topic_title_Appendix_d1e33">
<h1 class="title topictitle1" id="ariaid-title19">Appendix</h1>
<article class="topic concept nested1" aria-labelledby="ariaid-title20" id="concept_bxv_zxl_ls">
<h2 class="title topictitle2" id="ariaid-title20">Certificates</h2>
<div class="body conbody"><p class="shortdesc">The Mediatrix unit uses digital certificates, which are a collection of data used to
verify the identity of individuals, computers, and other entities on a network. </p>
<div class="p">Certificates contain:<ul class="ul" id="concept_bxv_zxl_ls__ul_wjn_v33_ns">
<li class="li">the certificate's name</li>
<li class="li">the issuer and issued to names </li>
<li class="li">the validity period (the certificate is not valid before or after this period) </li>
<li class="li">the use of certificates such as:<ul class="ul" id="concept_bxv_zxl_ls__ul_jyv_x33_ns">
<li class="li">TlsClient: The certificate identifies a TLS client. A host authenticated by this
kind of certificate can act as a client in a SIP over TLS connection when mutual
authentication is required by the server.</li>
<li class="li">TlsServer: The certificate identifies a TLS server. A host authenticated by this
kind of certificate can serve files or web pages using the HTTPS protocol or can act
as a server in a SIP over TLS connection.</li>
</ul></li>
<li class="li">whether or not the certificate is owned by a Certification Authority (CA)</li>
</ul></div>
<p class="p">Although certificates are factory-installed new ones can also be added. Since TLS
certificates are validated in terms of time (certificate validation/expiration date, etc.),
the use of NTP (Network Time Protocol) is mandatory when using the security features. </p>
<div class="p">The Mediatrix unit uses two types of certificates: <ul class="ul" id="concept_bxv_zxl_ls__ul_bkm_gj3_ns">
<li class="li">Host Certificates: used to certify the unit (e.g.: a web server with HTTPS requires a
host certificate).</li>
<li class="li">Others: Any other certificate including trusted CA certificates used to certify peers
(e.g.: a SIP server with TLS).</li>
</ul></div>
<div class="p">The Conf, Cwmp, Eth, Fpu, Nlm, Sbc, and SipEp services are considered secure as they require
certificate validation to establish a secure connection to a remote host. The following
parameters, available by the CLI, are used to determine whether or not the connection to the
remote host should be validated with the service certificate. By default, the parameters are
always set to a value requiring validation.<ul class="ul" id="concept_bxv_zxl_ls__ul_qs1_bnf_r3b">
<li class="li">Conf.ScriptsTransferCertificateValidation</li>
<li class="li">Cwmp.TransportCertificateValidation</li>
<li class="li">Eth.Eap.CertificateValidation</li>
<li class="li">Fpu.MfpTransferCertificateValidation</li>
<li class="li">Nlm.PCaptureTransferCertificateValidation</li>
<li class="li">Sbc.CertificateValidation</li>
<li class="li">SipEp.InteropTlsCertificateValidation (also available in the DGW Web page under
SIP/Interop)</li>
</ul></div>
<p class="p">The certificates must be uploaded to the Mediatrix units. They define how a Mediatrix unit
will certify the remote host in order to mark it as secure and suitable for a TLS connection.
If the Mediatrix unit does not trust the remote certificate (i.e. does not authenticate it
with either one of the 3 methods: HostName, trustedCertificate, DnsSrv), then the Mediatrix
unit will not establish the connection.</p>
<div class="p">By default it is not possible to upload a Host certificate without first clicking on Activate
unsecure certificate transfer. This is because the certificate upload will be done in clear
text, which means the private key will be susceptible to interception. Establishing a
connection without certificate validation, i.e. establishing an unsecure connection, should
only be used :<ul class="ul" id="concept_bxv_zxl_ls__ul_cyh_b14_nkb">
<li class="li">for testing purpose,</li>
<li class="li">if one cannot identify the required CA cert, or </li>
<li class="li">the CA cert has mismatched Common Name/Subject Alternate Name. (In this case there is no
fallback, it will fail if the name does not match)</li>
</ul></div>
<div class="p">Certificates are used to secure the following connections:<ul class="ul" id="concept_bxv_zxl_ls__ul_i4n_mbb_br">
<li class="li">SIP</li>
<li class="li">Configuration Web pages</li>
<li class="li">File transfers (scripts, firmwares, etc.) with HTTPS</li>
<li class="li">Configuration using TR-069</li>
<li class="li">Wired Ethernet Authentication with EAP (802.1x) </li>
</ul></div>
<p class="p">One common use of the host certificate is to allow HTTPS Web access to the unit (which in
this case, the device is the TLS server). For more details refer to the <a class="xref" href="https://documentation.media5corp.com/display/DGWLATEST/Creating+a+Media5+Device+Host+Certificate+with+OpenSSL" target="_blank">Technical Bulletins - Creating a Media5 Host Certificate with
Open SSL</a> document on the <a class="xref" href="https://documentation.media5corp.com/" target="_blank">Media5 Documentation Portal</a>.</p>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title21" id="unique_776279460392266536">
<h2 class="title topictitle2" id="ariaid-title21">X-509 Certificates </h2>
<div class="body conbody"><p class="shortdesc">The Mediatrix unit uses digital X-509 certificates which are based on the international
X.509 public key infrastructure (PKI) standard. The certificates are a collection of data used to
verify the identity of individuals, computers, and other entities on a network.</p>
<p class="p">X.509 certificates provide guaranties on confidentiality, authentication, integrity, and
non-repudiation. It is the Public Key Infrastructure (PKI) which includes hardware, procedures,
and software than manages the certificates. The PKI also provides public-key encryption.
Therefore, the Public Key Infrastructure provides information that can guaranty that the signed
certificates can be trusted. </p>
<div class="p">To enable a TLS connection on Mediatrix units, at least one CA certificate is needed to
validate that the certificate presented by the server is valid. This certificate must be uploaded
to the Mediatrix units. The Mediatrix unit then checks the server's identity by validating the
host name used to contact it against the information found in the server's certificate. If the
validation fails, the Mediatrix unit refuses the secure connection. Certificates are used to
secure the following connections:<ul class="ul" id="unique_776279460392266536__ul_i4n_mbb_br">
<li class="li">SIP</li>
<li class="li">Configuration web pages</li>
<li class="li">File transfers (scripts, firmwares, etc.) with HTTPS</li>
<li class="li">Configuration using TR-069</li>
<li class="li">Wired Ethernet Authentication with EAP (802.1x)</li>
</ul>Certificates contain:<ul class="ul" id="unique_776279460392266536__ul_wjn_v33_ns">
<li class="li">the certificate's name</li>
<li class="li">the issuer and issued to names </li>
<li class="li">the validity period (the certificate is not valid before or after this period) </li>
<li class="li">the use of certificates (TlsClient or TlsServer)</li>
<li class="li">whether or not the certificate is owned by a Certification Authority (CA)</li>
</ul>
</div>
<p class="p"> </p>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title22" id="concept_sfd_ljg_1r">
<h2 class="title topictitle2" id="ariaid-title22">TR-069 or CPE WAN Management Protocol (CWMP)</h2>
<div class="body conbody"><p class="shortdesc">The Technical Report 069 (TR-069), also known as CWMP, is a Broadband Forum technical
specification. This protocol can be used to monitor and update the Mediatrix unit configurations
and firmware. In other words, when using TR-069, the Mediatrix unit can get in contact with an
Auto Configuration Server (ACS) to initiate a configuration script transfer/execution and a
firmware upgrade. </p>
<p class="p">The first time the Mediatrix unit is connected to the network, it will attempt to contact the
Auto Configuration Server (ACS), which is the entry point for the administrator. The Mediatrix
unit will obtain the URL of the ACS using either the DHCP server with option 43 or by retrieving
the information directly from the Customer's Profile. Therefore, upon start-up, the Mediatrix
unit will contact the ACS, which in return will send the required configuration files and
initiate, if necessary, a firmware update. This automated sequence is what is referred to as
zero-touch, as the Mediatrix unit is automatically configured by the ACS according to the
instructions given by the administrator without manual intervention on the unit.</p>
<div class="p">The administrator can determine a schedule for the Mediatrix unit to periodically contact the
ACS. These contacts will allow the Mediatrix unit to:<ul class="ul" id="concept_sfd_ljg_1r__ul_efh_f5m_1r">
<li class="li">verify if new configurations are available,</li>
<li class="li">verify if a new firmware update is available and</li>
<li class="li">send notifications for monitoring purposes.</li>
</ul></div>
<div class="p">Monitoring is achieved by regularly sending notifications to the ACS, through the mean of
"Inform" requests, which can be: <ul class="ul" id="concept_sfd_ljg_1r__ul_x24_k5m_1r">
<li class="li">Passive: the information is sent according to the schedule.</li>
<li class="li">Active: the information is sent immediately when a parameter status changes, regardless of
the periodic schedule.</li>
</ul>Because the Periodic Informs are initiated by the Mediatrix unit, they have no problem
passing through residential or enterprise NAT and firewalls. </div>
<p class="p">Furthermore, the administrator can initiate a connection to the Mediatrix unit to perform
immediate maintenance or monitoring. This will only be possible if the NAT firewall has been
configured to allow communications initiated by the ACS.</p>
<p class="p">The TR-069 protocol can be activated on units that are already deployed with a licence key (For
more details on licences refer to the<a class="xref" href="https://documentation.media5corp.com/display/DGWLATEST/How+to+Activate+a+Licence+on+a+Mediatrix+Device" target="_blank">Technical Bulletin - How to activate a licence on a Mediatrix
unit</a> published on the <a class="xref" href="https://documentation.media5corp.com/" target="_blank">Media5 Documentation Portal</a>). However, it can
be enabled/disabled for a specific configuration via the Management interface.</p>
<div class="p">TR-069 methods supported by the Mediatrix unit include:<ul class="ul" id="concept_sfd_ljg_1r__ul_b5p_hdm_1r">
<li class="li">SetParameterValues</li>
<li class="li">GetParameterValues </li>
<li class="li">AddObject </li>
<li class="li">DeleteObject</li>
<li class="li">Download </li>
<li class="li">Reboot</li>
<li class="li">Upload</li>
<li class="li">FactoryReset</li>
</ul></div>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic reference nested1" aria-labelledby="ariaid-title23" id="reference_wp5_5dq_4cb">
<h2 class="title topictitle2" id="ariaid-title23">Transport Layer Security (TLS) Parameters</h2>
<div class="body refbody">
<section class="section">
<div class="p">Although the services can be configured in great part in the Web browser, some aspects of
the configuration can only be completed with the MIB parameters by :<ul class="ul" id="reference_wp5_5dq_4cb__ul_gfn_14v_wr">
<li class="li">using a MIB browser</li>
<li class="li">using the CLI</li>
<li class="li">creating a configuration script containing the configuration parameters</li>
</ul></div>
</section>
<section class="section">For more details on the following parameters, refer to the <a class="xref" href="https://documentation.media5corp.com/display/DGWLATEST/Reference+Guide" target="_blank">DGW Configuration Guide - Reference
Guide</a> published on the <a class="xref" href="https://documentation.media5corp.com/" target="_blank">Media5 Documentation Portal</a>. The Reference Guide contains all the parameters
used in the DGW software with their description, default values, and
interactions. </section>
<section class="section"><h3 class="title sectiontitle">For certificate transfert</h3>
<ul class="ul" id="reference_wp5_5dq_4cb__ul_np5_blq_4cb">
<li class="li">To set the HTTPS transfer cipher suite for certificate transfer: <span class="keyword parmname">
Cert.TransferHttpsCipherSuite</span></li>
<li class="li">To set the HTTPS transfer Tls Version for certificate transfer::
<span class="keyword parmname">Cert.TransferHttpsTlsVersion</span>
</li>
<li class="li">To set the level of security to use when validating the server's
certificate when connecting to the ACS using HTTPS:
<span class="keyword parmname">Cwmp.TransportCertificateValidation
</span>
</li>
</ul>
</section>
<section class="section"><h3 class="title sectiontitle">For file transfer </h3>
<ul class="ul" id="reference_wp5_5dq_4cb__ul_qpp_cnn_qcb">
<li class="li">To set the HTTPS transfer cipher suite for file transfer:
<span class="keyword parmname">File.TransferHttpsCipherSuite</span></li>
<li class="li">To set the HTTPS transfer Tls Version configuration for file
transfer:
<span class="keyword wintitle">File.TransferHttpsTlsVersion</span></li>
</ul>
</section>
<section class="section"><h3 class="title sectiontitle">For DGW Web access </h3>
<ul class="ul" id="reference_wp5_5dq_4cb__ul_a2p_mkq_4cb">
<li class="li">To set the Https Cipher Suite for secure DGW Web access:
<span class="keyword parmname">Web.HttpsCipherSuite</span>.</li>
<li class="li">To set the Http Mode used for DGW Web access:
<span class="keyword parmname">Web.HttpMode</span></li>
<li class="li">To select the Secure Server Port used to access the DGW Web interface:
<span class="keyword parmname">Web.SecureServerPort</span></li>
<li class="li">To set the HTTPS Cipher Suite for secure DGW Web access:
<span class="keyword parmname">Web.HttpsCipherSuite</span></li>
<li class="li">To set the Tls Version used for secure DGW Web access:
<span class="keyword parmname">Web.TlsVersion</span></li>
</ul>
</section>
<section class="section"><h3 class="title sectiontitle">For SIP TLS transport</h3>
<ul class="ul" id="reference_wp5_5dq_4cb__ul_gqg_wmq_4cb">
<li class="li">To set the TLS transport cipher suite used for secure SIP
transport:
<span class="keyword parmname">SipEp.TransportTlsCipherSuite</span></li>
<li class="li">To set Transport Tls Version used for secure SIP transport:
<span class="keyword parmname">SipEp.TransportTlsVersion</span></li>
<li class="li">To set TLS client authentication: <span class="keyword parmname" id="reference_wp5_5dq_4cb__250120218">SipEp.InteropTlsClientAuthenticationEnable</span></li>
</ul>
</section>
<section class="section"><h3 class="title sectiontitle">For TR-069 (CWMP) establishment</h3>
<ul class="ul" id="reference_wp5_5dq_4cb__ul_ptl_33n_qcb">
<li class="li">To set the HTTPS transport cipher suite configuration for TR-069
(CWMP): <span class="keyword parmname">Cwmp.TransportHttpsCipherSuite
</span></li>
<li class="li">To set the HTTPS Transport Tls Version configuration for TR-069
(CWMP): <span class="keyword parmname">Cwmp.TransportHTTPSTlsVersion</span>
</li>
<li class="li">To set the level of security to use when validating the server's
certificate when connecting to the ACS using HTTPS:
<span class="keyword parmname">Cwmp.TransportCertificateValidation
</span>
</li>
</ul>
</section>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title24" id="concept_ct2_ns1_bq">
<h2 class="title topictitle2" id="ariaid-title24">SIP Transport Types</h2>
<div class="body conbody">
<p class="p">You can globally set the transport type for SIP all the endpoints of the Mediatrix unit to
either UDP (User Datagram Protocol), TCP (Transmission Control Protocol), or TLS (Transport
Layer Security). </p>
<p class="p">Please note that RFC 3261 states the implementations must be able to handle messages up to
the maximum datagram packet size. For UDP, this size is 65,535 bytes, including IP and UDP
headers. However, the maximum datagram packet size the Mediatrix unit supports for a SIP
request or response is 5120 bytes excluding the IP and UDP headers. This should be enough, as
a packet is rarely bigger than 2500 bytes.</p>
</div>
</article></article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic reference nested0" aria-labelledby="ariaid-title25" id="reference_j4g_nbv_gfb">
<h1 class="title topictitle1" id="ariaid-title25">Online Help</h1>
<p class="shortdesc"><span class="ph">If you are not familiar with the meaning of the fields and
buttons, click <span class="keyword wintitle">Show Help</span>, located at the upper right corner of
the Web page. When activated, the fields and buttons that offer online help will
change to green and if you hover over them, the description will bedisplayed.</span></p>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title26" id="concept_v4k_q3h_1r">
<h1 class="title topictitle1" id="ariaid-title26">DGW Documentation</h1>
<div class="body conbody"><p class="shortdesc">Mediatrix devices are supplied with an exhaustive set of documentation. </p>
<p class="p">Mediatrix user documentation is available on the <a class="xref" href="http://documentation.media5corp.com" target="_blank">Media5 Documentation
Portal</a>.</p>
<div class="p">Several types of documents were created to clearly present the information you are looking for.
Our documentation includes:<ul class="ul" id="concept_v4k_q3h_1r__ul_bqy_cjh_1r">
<li class="li"><strong class="ph b">Release notes</strong>: Generated at each GA release, this document includes the known and
solved issues of the software. It also outlines the changes and the new features the release
includes.</li>
<li class="li"><strong class="ph b">Configuration notes</strong>: These documents are created to facilitate the configuration of a
specific use case. They address a configuration aspect we consider that most users will need to
perform. However, in some cases, a configuration note is created after receiving a question
from a customer. They provide standard step-by-step procedures detailing the values of the
parameters to use. They provide a means of validation and present some conceptual information.
The configuration notes are specifically created to guide the user through an aspect of the
configuration. </li>
<li class="li"><strong class="ph b">Technical bulletins</strong>: These documents are created to facilitate the configuration of a
specific technical action, such as performing a firmware upgrade.</li>
<li class="li"><strong class="ph b">Hardware installation guide</strong>: They provide the detailed procedure on how to safely and
adequately install the unit. It provides information on card installation, cable connections,
and how to access for the first time the Management interface.</li>
<li class="li"><strong class="ph b">User guide</strong>: The user guide explains how to customise to your needs the configuration
of the unit. Although this document is task oriented, it provides conceptual information to
help the user understand the purpose and impact of each task. The User Guide will provide
information such as where and how TR-069 can be configured in the Management Interface, how to
set firewalls, or how to use the CLI to configure parameters that are not available in the
Management Interface.</li>
<li class="li"><strong class="ph b">Reference guide</strong>: This exhaustive document has been created for advanced users. It
includes a description of all the parameters used by all the services of the Mediatrix units.
You will find, for example, scripts to configure a specific parameter, notification messages
sent by a service, or an action description used to create Rulesets. This document includes
reference information such as a dictionary, and it does not include any step-by-step
procedures. </li>
</ul></div>
</div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title27" id="concept_fqm_rv4_k4">
<h1 class="title topictitle1" id="ariaid-title27">Copyright Notice</h1>
<div class="body conbody"><p class="shortdesc">Copyright © 2023 Media5 Corporation.</p>
<p class="p">This document contains information that is proprietary to Media5 Corporation.</p>
<p class="p">Media5 Corporation reserves all rights to this document as well as to the Intellectual Property
of the document and the technology and know-how that it includes and represents.</p>
<p class="p">This publication cannot be reproduced, neither in whole nor in part, in any form whatsoever,
without written prior approval by Media5 Corporation.</p>
<p class="p">Media5 Corporation reserves the right to revise this publication and make changes at any time
and without the obligation to notify any person and/or entity of such revisions and/or
changes.</p>
</div>
</article></article></main></body></html> |