31.07.2015 Views

Cisco - Gateway to Gatekeeper (H.235) and ... - VOIP Information

Cisco - Gateway to Gatekeeper (H.235) and ... - VOIP Information

Cisco - Gateway to Gatekeeper (H.235) and ... - VOIP Information

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Cisco</strong> - <strong>Gateway</strong> <strong>to</strong> <strong>Gatekeeper</strong> (<strong>H.235</strong>) <strong>and</strong> <strong>Gatekeeper</strong> <strong>to</strong> <strong>Gatekeeper</strong> (IZCT) Security Troubleshooting Guide<strong>to</strong>ken in all attempts <strong>to</strong> connect with an alternate endpoint.OSP Token SupportCurrently the Open Settlement Pro<strong>to</strong>col (OSP) <strong>and</strong> its <strong>to</strong>kens are only supported on <strong>Cisco</strong> gateways; there is no support on the gatekeeper.The gateway recognizes OSP <strong>to</strong>kens received from a settlement server <strong>and</strong> inserts them in<strong>to</strong> the Q.931 setup message <strong>to</strong> a terminatinggateway.Different Levels of Security for each Endpoint or ZoneCurrently you cannot configure different levels of security for each endpoint or zone. The security level is for all zones managed by thatgatekeeper. A feature request can be opened for such issue.Interdomain <strong>Gatekeeper</strong> <strong>to</strong> <strong>Gatekeeper</strong> SecurityInterdomain gatekeeper <strong>to</strong> gatekeeper security provides the ability <strong>to</strong> validate intradomain <strong>and</strong> interdomain gatekeeper-<strong>to</strong>-gatekeeperrequests on a per-hop basis. This means that the destination gatekeeper will terminate the CAT <strong>and</strong> generate a new one if the gatekeeperdecides <strong>to</strong> forward the LRQ onwards. If the gatekeeper detects an invalid LRQ signature it responds by sending a Location Reject (LRJ).Implementing <strong>Gatekeeper</strong> <strong>to</strong> <strong>Gatekeeper</strong> SecurityThe originating gatekeeper generates an Inter-zone ClearToken (IZCT) when a location request (LRQ) is initiated or an ACF is about <strong>to</strong> besent in case of an intra-zone call. This <strong>to</strong>ken is traversed through its routing path. Along the path, each gatekeeper updates the destinationgatekeeper ID <strong>and</strong>/or source gatekeeper ID, if necessary, <strong>to</strong> reflect the zone information. The terminating gatekeeper generates a <strong>to</strong>ken withits password, <strong>and</strong> this <strong>to</strong>ken is carried back in the location confirmation (LCF) messages <strong>and</strong> passed <strong>to</strong> OGW. The OGW includes this <strong>to</strong>kenin the H.225 SETUP message. When the TGW receives the <strong>to</strong>ken, it is forwarded in the ARQ answerCall <strong>and</strong> validated by the terminatinggatekeeper (TGK) without any need for a RADIUS server.The authentication type is based on password with hashing as described in ITU <strong>H.235</strong>. Specifically, the encryption method is MD5 withpassword hashing.The purpose of the IZCT is <strong>to</strong> know if the LRQ has arrived from a foreign domain, from which zone, from which carrier. It is also used <strong>to</strong>pass a <strong>to</strong>ken <strong>to</strong> the OGW in the LCF from the TGK. Within the IZCT format, the following information is required:●●●●●●srcCarrierID -Source carrier identificationdstCarrierID - Destination carrier identificationintCarrierID - Intermediate carrier identificationsrcZone - Source zonedstZone - Destination zoneinterzone type❍❍❍❍INTRA_DOMAIN_CISCOINTER_DOMAIN_CISCOINTRA_DOMAIN_TERM_NOT_CISCOINTER_DOMAIN_ORIG_NOT_CISCOThis feature will work fine without any need for carrier ID from the gateway or a Carrier Sensitive Routing (CSR) server. In such case, thefields about the carrier ID will be empty. The examples below do not include any carrier ID. For a detailed call flow, release <strong>and</strong> platformsupport, <strong>and</strong> configurations, refer <strong>to</strong> the Interdomain <strong>Gatekeeper</strong> Security Enhancement document.<strong>Gatekeeper</strong> ConfigurationThe IZCT feature requires the following configuration on the gatekeeper.Router(gk-config)#[no] security izct password The password should be six <strong>to</strong> eight characters. You will also need <strong>to</strong> identify which zone is in a foreign domain as follows:http://kbase:8000/paws/servlet/ViewFile/18729/gw_security.xml?convertPaths=1 (28 of 49) [12/2/2003 5:34:20 PM]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!