Sie sind auf Seite 1von 5

Implementation of IPsec VPN with SIP Softphones using

GNS3
Amirisetti Sushma Teerapat Sanguankotchakorn
Asian Institute of Technology,Thailand Asian Institute of Technology, Thailand
12-13-691/9/2,Tarnaka, Hyderabad P.O.Box 4, Klong Luang,
0928469157, +918977557055 Pathumthani, Thailand 121200
vickysweety275@gmail.com teerapat@ait.ac.th

ABSTRACT the product’s security. It would violate upon their company and
Over the past decades, Session Initiation Protocol (SIP) has moreover affect many users. Many discussions has been
achieved much attention regarding Voice over IP services(VOIP) continued because of this issue and users are aware of their
when comparing with various protocols like H.323 or MGCP. SIP privacy and how it is secured. Successfully some services like
is the special protocol for present and future IP telephony services Whats-App have increased end-to-end security through encryption.
which is turning as real challenger for traditional telephony Privacy is mostly related to personal data and private
services. Due to its open architecture, the available services are communications. As bandwidth requirement has increased and
vulnerable to various kinds of security threats like presently live mobile networks has been widely spreading, our communications
on the Internet. Hence, there is a need to provide security to SIP have moved greatly from fixed line telephony or Internet
based VOIP implementations, especially, a remotely secure networks. Presently, VoIP (Voice over Internet Protocol) is slowly
communication using Virtual Private Networks (VPN). In this replacing our telephony requirements. Similarly, the email has
paper, we discuss about site-to-site IPsec VPN which greatly dominated our message transfer needs. From last few
communicate in the intra-nets. The implementation of IPsec VPN years, VOIP traffic mostly has gone through traditional IP
is done with security protocols for exchanging key management, networks. SIP with peer-to-peer communication was started after
authentication and integrity using Graphical Network Simulator 3 many research activities [2, 3].
(GNS3). The encryption of data packets when information is Today, many mobile networks provide enough bandwidth to
transferred between different sites is tested and verified using support a VoIP connection, but they may be unreliable,
tools like Ping, IPerf and Wireshark. The performance in terms of originating problems in the communication. These problems
delay, bandwidth consumption, jitter and the data rate of the namely, delay and jitter in the network, immediately degrade the
proposed method with and without Firewalls is analyzed. It is quality of the conversation mostly, lowering the VOIP call than a
obvious that our proposed method can provide the security and standard call. VoIP and all other traffics that use the secure tunnel
prohibit the attackers to attack the network. are protected by using VPN. If it is feasible, this can give an
intrinsic solution. The main objective of this paper is to
CCS Concepts implement a SIP enabled IP secure VPN tunnel which can provide
• Security and privacy➝Cryptography • Computing greater security to our network which was built using Cisco
methodologies➝Simulation support systems➝Simulation routers. Then, the network connectivity with and without firewall
tools.. access control lists in Site-to-Site IPsec VPN tunnel is compared
to each other using GNS3. The connectivity between Cisco
Keywords routers at two different sites is verified using Ping tool. Next, we
Session Initiation Protocol (SIP), IPsec, Tunneling, VPN, establish IPsec VPN tunnel and initiate calls from one site to
Network Address Translator(NAT), VOIP another using SIP softphones connected to Asterisk server. We
use Cisco router and Security Device Manager (SDM) software to
1. INTRODUCTION implement the access control policies on both of the
Nowadays, the privacy is an issue with increasing importance in eavesdropping, session tear down, stress-examining with
communication network for users. For instance, the Apple
malformed messages data gathering, signalling and session
company has put great effort to secure the privacy of their
hijacking. By observing the efficiencies of the targeted devices to
believed customers after the demand from FBI to settle a suspect's overcome and recover after the attack, the conclusions were
phone to access its data. The main issue is that the underlying drawn. As we know that day-by-day, new Denial of Service (DoS)
principle of a government has demanded a company to decrease
attacks have been developing. Hence, the security threats in VoIP
Permission to make digital or hard copies of all or part of this work for systems become necessary and underlying concern for people in
personal or classroom use is granted without fee provided that copies are charge of security in a correlated network. The business
not made or distributed for profit or commercial advantage and that copies endlessness of an organization, regarding confidentiality,
bear this notice and the full citation on the first page. Copyrights for
availability, and integrity of services, causing frequent losses of
components of this work owned by others than ACM must be honored.
Abstracting with credit is permitted. To copy otherwise, or republish, to both information and money are affected. The main objective of
post on servers or to redistribute to lists, requires prior specific permission connected/configured interfaces of the router in order to make our
and/or a fee. network highly secured.
Request permissions from Permissions@acm.org.
ICNCC 2018, December 14–16, 2018, Taipei City, Taiwan
© 2018 Association for Computing Machinery.
ACM ISBN 978-1-4503-6553-6/18/12…$15.00
DOI: http://dx.doi.org/ 10.1145/3301326.3301333

152
2. RELATED WORK between the two sites. The Cisco routers and Cisco SDM open
Different VPN tunneling protocol performances are analysed in software are used in this simulation to equip the access control
[1]. In [1],the performance metrics such as throughput, round trip policies and ID (Intrusion Prevention System) on the router. All
time, jitter and other security parameters of VPN tunnelling traffics received by the router’s interface are observed to allow
protocols namely GRE, IPsec, PPTP and L2TP with IPsec are only the IPsec secure tunnel data. The other traffic will be
main focuses. In [2], they analysed the mechanism of VOIP dropped. The process that takes place during site-to-site
system and the segments of SIP namely SIP User Agent and SIP communication over an IPsec VPN site-to-site tunnel is
network server. The inefficiency of SIP security mechanism was summarized as follows:
finally pointed out. SIP based VoIP is very useful to assure the 1. Configuring the desired topology with routers, Ethernet
security of SIP-based VoIP system. A brief idea to the motivation switch, cloud etc.The Site-A heading with router R2,
for P2P-SIP and the needs for building up its structure is given in has two interfaces f2/0 and f0/0. The interface f0/0 and
[3]. Then, two design choices of P2P-SIP architectures are f2/0 are configured with the IP addresses 1.1.1.2(outside)
introduced based on the present level. The data about site-to-site and 172.16.10.1(inside), respectively. Similarly, the
IPsec-VPN which connects the company intranets is provided in Site-B heading with router R3, has two interfaces f2/0
[4]. The IPsec VPN network with security protocols for key and f0/0. The interface f0/0 and f2/0 are configured with
exchange and management, integrity and authentication is the IP addresses 2.2.2.2(outside) and
implemented using GNS3. In [5], they collate the research using 192.168.10.1(inside) respectively.
Gateways, Gatekeeper, H.323 Cisco and several H.323 software 2. Installing Asterisk PBX software in Linux system and
clients on a virtual emulated VoIP architecture. The security configuring the softphones with IP addresses. The
evaluation was tested. The important points in [5] include [6] is to Asterisk server acts as a server for all the SIP
establish the basic measures to reduce DoS problems, based on softphones clients in both the sites.
the SIP which is possible in VOIP systems. In [6], a secure model 3. Configuring IPsec VPN tunnel between Router R2
known as MS-DOS-SIP which consists of two approaches is (outside) and R3 (outside) with access list policies and
proposed. Firstly, it analyses the proposals of international Crypto ISAKMP and IPsec commands.
security standards. Secondly, it approaches the account weakness 4. After establishing tunnel between R2-R3, the
and threats. It is shown that 92% of present vulnerabilities were connection between two different sites can be verified
minimized to allow the implementation of this idea in a VOIP using Ping tool.
system and the availability period of the VOIP service within an 5. Now when Site-A SIP soft phone client 1 starts calling
organization was increased. Site-B SIP soft phone client 2, the session is established
between two sites.
3. PROPOSED METHOD AND SYSTEM 6. Installing Cisco Security manager software on R1 and
DESIGN R2 and configuring access list rules and IPS.
Firstly, the scenario of Site-to-Site VPN IPsec tunnelling is
explained in detail. We use the inbuilt Firewall/IPS and IPsec
features of Cisco C7200 series routers for our implementation. All
the inbound traffics to two routers are observed and the trusted
interfaces are allowed to connect. In this work, the encryption
parameters are configured on router R1 for IPsec tunnel as shown
in the network diagram of figure 1 to create an IPsec VPN tunnel

153
other data will be refused to achieve the maximum reachable
security level.

4. RESULTS & DISCUSSION


a) Performance of the Network with and
without Firewall when Attack takes
place
i. Case 1: Without Firewall
Delay: By using PING tool, graphical representation of delay
versus time is measured.

Figure 2. Step-by-Step Procedure of our Figure 3. Delay vs Time of the Network without Firewall.
Proposed Method.
Bandwidth and Jitter: For analyzing Bandwidth, IPerf
software is used where we can specify the IP address as client or
a) Establishing tunnel between R2 and server, initiate the packets from client to server and measure
R3 & call between two SIP softphones bandwidth and jitter. As shown in figure 4, 5 and 6, these are the
Configuring Routers with crypto ISAKMP and IPsec policies with console results when an unknown attacker acts as client and initiates some
application in GNS3 .When Site-A acts as a session initiator, the call is packets transmission for 100 seconds. The result of bandwidth is
initiated by clients of Site-A and is accepted by clients in Site-B before measured every 1 second, while the jitter is shown in average.
establishing firewall

b) IPsec and Firewall Implementation


Configuring Routers with crypto ISAKMP and IPsec policies with
console application in GNS3 .When Site-A acts as a session
initiator, the call is initiated by clients of Site-A and is accepted
by clients in Site-B before establishing firewall

c) Firewall based access control policies


on R2 & R3
We have used Security Device Manager (SDM) software to
simulate the access control policies and Intrusion Prevention
System on the connected interfaces of the router.For Cisco IOS
Software featured routers, Cisco SDM is a tool for web related
device management. Services like Routing, Switching, Quality of
Service (QoS) and Security can be simply and easily connected
while enabling best management through performance observing.
It permits fast and easy management of access control lists and
data inspection rules through a graphical interface. This
connection is applied via SDM for the outside i.e untrusted
network. All the traffic arriving at the routers
FastEthernet0/0/(2.2.2.2) & FastEthernet0/0/(1.1.1.2) interfaces
Figure 4. Attacker’s Bandwidth vs Time of the Network
can be observed to allow the IPsec secure tunnel traffic. All the
without Firewall.

154
4.1.2 Case 2: With Firewall
Delay: when an attacker attacks the router with firewall, the
router drops the unknown packets coming from any unknown IP
address not specified in the router’s firewall access list. Hence,
there will be no packet flow when firewalls are ”ON” and no delay
can be obtained.

Bandwidth and Jitter: IPerf software is used to analyze


bandwidth, where we can specify the IP address as client or server,
initiate the packets from client to server and obtain bandwidth and
jitter. When an unknown attacker acts as client and initiates some
packets transmission for 100 seconds, the packets are dropped by
server i.e the router is protected with firewall access control list.
Hence, none of the packets will be received by the server.
Therefore, the bandwidth and jitter cannot be computed. So after
the configuration of firewall on routers, the router drops down the
unknown packets due to the security policies configured on the
router. Finally, the site-to-site IPsec VPN tunnel is established and
the connectivity between two sites can be tested using Ping tool.
Figure 5. Router’s (R3) Bandwidth vs Time of the Further, firewall is also tested.
Network without Firewall.

Figure 8. Attacker’s Bandwidth vs Time of the Network


with Firewall.

Figure 6. Router’s(R3) Jitter vs Time of the Network


without Firewall.

Figure 9. Packets vs Time of the Network with


Firewall.

Figure 7. Packets Rate vs Time of the Network without


Firewall

155
5. CONCLUSION 9th International Conference on Hybrid Intelligent Systems,
In this work, we implement and compare the network connectivity HIS 2009, 2, 408–410. http://doi.org/10.1109/HIS.2009.196
with and without firewall access control list in Site-to-Site IPsec [4] Jahan, S., Rahman, M. S., & Saha, S. (2017). Application
VPN tunnel using GNS3. We verify the connectivity between two specific tunneling protocol selection for Virtual Private
different sites of Cisco routers using Ping tool. We Establish IPsec Networks. Proceedings of 2017 International Conference on
VPN tunnel and initiate calls from one site to another using SIP Networking, Systems and Security, NSysS 2017, 39–44.
softphones connected to Asterisk server. We measure the http://doi.org/10.1109/NSysS.2017.7885799
performance in terms of delay, bandwidth, jitter in the network
[5] Kuhn, D. R., Walsh, T. J., & Fries, S. (2005). Security
with and without firewall to demonstrate the effectiveness of
Considerations for Voice Over IP Systems
security in prohibiting attackers. We used Cisco Router and
Recommendations of the National Institute of Standards and
Security Device Manager (SDM) software to perform the access
Technology. National Institute of Standards and Technology,
control policies on the connected interfaces of the router to make
(800–58), 1–93. http://doi.org/10.1177/0037768615587840
our network highly secured.
[6] Salman, F. A. (2017). Implementation of IPsec-VPN
6. REFERENCES tunneling using GNS3. Indonesian Journal of Electrical
[1] Kuhn, D. R., Walsh, T. J., & Fries, S. (2005). Security Engineering and Computer Science, 7(3), 855–860.
Considerations for Voice Over IP Systems http://doi.org/10.11591/ijeecs.v7.i3.pp855-860
Recommendations of the National Institute of Standards and [7] Herculea, M., & Dobrota, V. (n.d.). Security Assessment for
Technology. National Institute of Standards and Technology, an H . 323 VoIP Virtual Environment. Security.
(800–58), 1–93. http://doi.org/10.1177/0037768615587840
[2] Pu, F. (n.d.). P2P architecture for IP telephony using SIP
Overview of P2P.
[3] Shan, L., & Jiang, N. (2009). Research on security
mechanisms of SIP-based VoIP system. Proceedings - 2009

156

Das könnte Ihnen auch gefallen