MiVoice Business on SMB Controller SECURITY GUIDELINES VERSION 1.0 MARCH 2023 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Networks™ Corporation (MITEL®). Mitel makes no warranty of any kind with regards to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. The information is subject to change without notice and should not be construed in any way as a commitment by Mitel or any of its affiliates or subsidiaries. Mitel and its affiliates and subsidiaries assume no responsibility for any errors or omissions in this document. Revisions of this document or new editions of it may be issued to incorporate such changes. No part of this document can be reproduced or transmitted in any form or by any means - electronic or mechanical - for any purpose without written permission from Mitel Networks Corporation. TRADEMARKS The trademarks, service marks, logos and graphics (collectively "Trademarks") appearing on Mitel's Internet sites or in its publications are registered and unregistered trademarks of Mitel Networks Corporation (MNC) or its subsidiaries (collectively "Mitel") or others. Use of the Trademarks is prohibited without the express consent from Mitel. Please contact our legal department at legal@mitel.com for additional information. For a list of the worldwide Mitel Networks Corporation registered trademarks, please refer to the website: http://www.mitel.com/trademarks. © Copyright 2023, Mitel Networks Corporation All rights reserved MiVoice Business on SMB Controller Security Guidelines Version 1.0 March 2023 TABLE OF CONTENTS Overview ...................................................................................................................... 1 New for this Release.................................................................................................................. 1 About MiVoice Business on SMBC .............................................................................. 2 MiVB on SMBC - Security Controls ........................................................................................... 3 About the MiVB on SMBC Documentation Set ............................................................. 4 MiVoice Business System Manual for Mitel SMB Controller ..................................................... 4 Related Product Documentation Sets.................................................................................................... 4 Product Security Documentation ............................................................................................... 5 Product Security Guidelines .................................................................................................................. 5 Product Personal Data Protection and Privacy Controls documents .................................................... 5 MiVB on SMBC - Security Documentation ................................................................................ 6 MiVoice Business................................................................................................................................... 6 IP Phones and MiVoice Business Console ........................................................................................... 6 MiVoice Border Gateway ....................................................................................................................... 6 Mitel Performance Analytics .................................................................................................................. 6 CloudLink Gateway ................................................................................................................................ 6 Mitel Standard Linux .............................................................................................................................. 6 Product Architecture ..................................................................................................... 7 Networking Guidelines ................................................................................................. 9 SMBC Ethernet Ports ................................................................................................................ 9 Ethernet Port 0 (Eth0) ............................................................................................................................ 9 Ethernet Port 1 (Eth1) .......................................................................................................................... 10 Ethernet Port 2 (Eth2) .......................................................................................................................... 10 Network Deployment Rules ..................................................................................................... 10 Management Tools - Security .................................................................................... 11 Mitel Standard Linux and Server Manager .............................................................................. 11 Server Manager – Administrative Access ............................................................................................ 11 Server Manager – Network Security .................................................................................................... 11 MSL – Additional Information.............................................................................................................. 12 Mitel Performance Analytics .................................................................................................... 12 Mitel Border Gateway .............................................................................................................. 13 Mitel Border Gateway – Additional Information ................................................................................... 13 CloudLink Gateway.................................................................................................................. 13 CloudLink Gateway – Additional Information....................................................................................... 13 MiVoice Business .................................................................................................................... 14 Embedded System Management (ESM) - Security ............................................................................. 14 iii TABLE OF CONTENTS MiVoice Business – Additional Information ......................................................................................... 14 SMB Controller Manager ......................................................................................................... 15 Controller Manager - Communications Security .................................................................................. 15 Controller Manager - User Accounts ................................................................................................... 16 MiVoice Business Console ......................................................................................... 19 Local Area Network (LAN) Security ............................................................................ 20 Network Access Security ......................................................................................................... 20 Using VLANs to Assist with Security ....................................................................................... 20 Securing Traffic........................................................................................................................ 21 Securing IP Endpoints ............................................................................................................. 21 Prevention of Toll Abuse.......................................................................................................... 21 Data Protection – General Recommendations ........................................................... 22 Protection of Customer Data ................................................................................................... 22 Protection of Communications Data ........................................................................................ 22 Software Patch Management Policy........................................................................... 23 Product Security Information ...................................................................................... 24 Mitel Product Security Vulnerabilities ...................................................................................... 24 Mitel Product Security Advisories ............................................................................................ 24 Mitel Security Documentation .................................................................................................. 24 Disclaimer .................................................................................................................. 25 MIVB ON SMBC - SECURITY GUIDELINES Overview This document will be of interest to personnel who are responsible for ensuring the secure deployment and the secure operation of MiVoice Business (MiVB) when deployed on Mitel’s Small and Medium Business Controller (SMBC) hardware platform. This document provides an overview of the security controls that are available to protect the MiVB on SMBC from network threats and maintain user data privacy. Every organization should have a clearly defined IT security policy in place, defining goals, assets, trust levels, processes and an incident handling procedure. The security mechanisms available in the MiVoice Business on the SMBC solution should be covered by and configured according to this policy. The MiVB on SMBC solution’s security controls are provided by the operating systems and the various applications that are deployed on the SMBC. Security is an integral part of the operating system and each application’s design. Detailed information about the security controls is covered in the security documentation for the various applications and the operating system. When necessary, this document will refer the reader to the security documentation for the various applications for more detailed information. Mitel product documentation can be found on Mitel’s Document Center Web Site. https://www.mitel.com/document-center New for this Release Version 1.0 of this document aligns with the introduction of the MiVB on SMBC solution. 1 MIVB ON SMBC - SECURITY GUIDELINES About MiVoice Business on SMBC Mitel ® MiVoice Business is the brand name of the call-processing software that runs on several hardware platforms, industry standard servers, virtual machines, and Mitel’s Small and Medium Business Controller (SMBC). This document is specific to the MiVB on SMBC solution. The MiVB on SMBC solution includes the following Mitel applications and operating systems: Applications • MiVoice Business (MiVB) is a Mitel IP PBX / Call Control application. • Mitel Border Gateway (MBG) is a Session Border Controller (SBC) for SIP trunks and phones, as well as for Mitel proprietary IP phones and applications. • CloudLink Gateway is a technology that enables secure communications between the MiVB, and Cloud based Unified Communication applications. • Mitel Performance Analytics (MPA) is a cloud-based management tool that is hosted on Amazon Web Services (AWS). MPA is the administration tool that is accessible to the Mitel partner and the customer and supports secured encrypted access. Operating Systems • Mitel Standard Linux (MSL) is a customized version of the Linux operating system that provides a base for managed services and Mitel applications. o • Server-Manager is a web-based administrator portal that the Administrator uses to manage MSL and the installed applications. Mitel Embedded Linux Software is a customized version of the Linux operating system that is specifically designed and optimized for use on the SMB Controller. o Controller Manager: Controller Manager is a web-based UI for configuring the SMB Controller. The MiVB on SMBC applications have been designed with a security-by-design mindset; all of the various applications have security features that address identity, authentication, encryption, access and authorization. The MiVB on SMBC applications have been designed in accordance with Mitel's Secure Development Life Cycle (MiSDLC), for further details see the section called Secure Development Life Cycle in this document. The security features of the various applications are either enabled in the system by default, enabled during the installation/configuration phase of the system, or need to be enabled manually by the system Administrator when the MiVB on SMBC system is initialized. 2 MIVB ON SMBC - SECURITY GUIDELINES MiVB on SMBC - Security Controls The security controls provided by the applications deployed on the SMBC are primarily based on the following open standard technologies and management access controls: • TLS – Transport Layer Security (TLS) provides: • Secure signaling between IP phones and MiVoice Business. • Secure signaling between remote IP phones and the MiVoice Border Gateway. • Secure access to the administration tools for managing the various applications. • Secure communications between the CloudLink platform and the Virtual Private Cloud. • SSH - Secure Shell (SSH) provides secure console-based access to: • • The MiVoice Business System Administration and configuration tools. • The MiVoice Border Gateway administration and configuration tools. • The SMB Controller Manager administration and configuration tool. SRTP - Secure Real-time Transport Protocol (SRTP) is used to protect: • The voice media streams between IP phones. • The voice media streams between IP phones and the MiVoice Business. • The voice media streams between remote IP phones and the MiVoice Border Gateway. • Correct configuration of identity and access management policies to ensure all end user and administrator accounts, roles, permissions and password policies. • OAuth2.0 (Open Authorization) may be used by voice mail to authenticate with other email applications such as Google Apps and Microsoft Office 365. • S-LDAP – Secure LDAP may be used for connectivity from MiVoice Business to a customer’s Active Directory server. Other mechanisms that can be employed to protect the MiVB on SMBC are based on the following: • A securely designed corporate Local Area Network (LAN) infrastructure. • Correct configuration of internal and external public facing routers and firewalls. In addition to the security recommendations described in this document and in the applications documentation, there are a number of general security aspects that should be addressed by the system Administrator and/or the Information Technology (IT) security officer. An important security measure is to establish and maintain physical security. Only authorized personnel should have access to server locations since many data-exposure attacks can be mounted by having physical access to a host. Further, the IT data infrastructure should be designed with security in mind, security controls and protocols should be enabled, and all components of the whole system should be correctly configured and maintained and updated as necessary. 3 MIVB ON SMBC - SECURITY GUIDELINES About the MiVB on SMBC Documentation Set Documents for Mitel® products are available on the Mitel Document Center web site. https://www.mitel.com/document-center The Mitel Document Center web site can also be accessed by anyone with a miaccess.mitel.com account via the MiAccess Portal. MiVoice Business System Manual for Mitel SMB Controller This document should be used in conjunction with the document called MiVoice Business System Manual for Mitel SMB Controller. The MiVoice Business System Manual for Mitel SMB Controller covers the following topics: • • • • • • • Product overview. Networking guidelines. Installation of hardware and software. Software upgrades. Maintenance and troubleshooting. Migration. Details about the Mitel applications associated with MiVB on SMBC. Related Product Documentation Sets For a complete list of Mitel product documentation related to MiVB on SMBC, refer to the Section called Related Documents in the document MiVoice Business System Manual for Mitel SMB Controller. Complete product installation, engineering and administration documentation related to the various applications that are deployed on the MiVB on SMBC solution can be found on Mitel’s Document Center web site. https://www.mitel.com/document-center 4 MIVB ON SMBC - SECURITY GUIDELINES Product Security Documentation Security controls and features for specific applications and how to enable them are discussed in various documents within the product documentation suite which includes product administration, management, deployment, installation guides and security related documents. The product Security Guidelines summarize all of the product’s security controls and features in one document and provides the Administrator with security recommendations. The product Security Guidelines also refers the Administrator to the appropriate sections of product documents for further details on specific controls. The product’s Personal Data Protection and Privacy Controls document identifies the personal data collected, processed or transferred by the product. The Personal Data Protection and Privacy Controls document also provides the Administrator with recommendations on how to secure the personal data and refers the Administrator to the appropriate product documents for further details. Additional product security information and recommendations may be found in Technical Papers, White Papers and FAQs which are located on Mitel’s Document Center. The following section provides an overview of the type of information that will be found in the Security Guidelines and the Personal Data Protection and Privacy Controls document. Product Security Guidelines The product security guidelines are to be used in conjunction with the product’s documentation suite to ensure the product is securely deployed and maintained. The product security guidelines provide detailed information and recommendations on the following topics: • • • • • • • • The product’s architecture. An overview of the product’s security controls and features. How the administration interfaces are secured. Certificate management. Access controls and authentication controls. Audit trails and logs. LAN and WAN communications security. VoIP security Product Personal Data Protection and Privacy Controls documents The Personal Data Protection and Privacy Controls documents are to be used in conjunction with the product’s documentation suite to assist the customer with their data security regulations compliance initiatives. The Personal Data Protection and Privacy Controls documents provide detailed information on the following: • • • 5 Identification of personal data that is collected, processed, or transferred. How the product security features relate to data security regulations. Where the security feature is documented. MIVB ON SMBC - SECURITY GUIDELINES MiVB on SMBC - Security Documentation To ensure that the MiVB on SMBC is securely deployed, operated and maintained, the Administrator should be familiar with the information and the recommendations provided in the security documents that are listed in this section. MiVoice Business • • • • Mitel MiVoice Business – Security Guidelines. Mitel MiVoice Business – Personal Data Protection and Privacy Controls. MiVoice Business Secure Voice Communications. MiVoice Business Security FAQ. IP Phones and MiVoice Business Console • • • • • • Mitel MiVoice 6900 Series IP Phones (MiNET) Personal Data Protection and Privacy Controls Version. Mitel 6800/6900 Series SIP Phones - Personal Data Protection and Privacy Controls. Mitel IP Sets Engineering Guidelines, refer to the section on Security. MiVoice Business Console Personal Data Protection and Privacy Controls. Mitel 6800/6900/6900w Series SIP Phones Administrator Guide. SIP-DECT Security Guidelines. MiVoice Border Gateway • • • MiVoice Border Gateway Personal Data Protection and Privacy Controls. MiVoice Border Gateway Engineering Guidelines. Security and the Mitel Teleworker Application Whitepaper. Mitel Performance Analytics • • Mitel Performance Analytics Security Summary. Mitel Performance Analytics Best Practices. CloudLink Gateway • • • CloudLink Security. CloudLink Chat Security. CloudLink Security FAQ. Mitel Standard Linux • • 6 Mitel Standard Linux Security Technical Paper. MSL Installation and Administration Guide. MIVB ON SMBC - SECURITY GUIDELINES Product Architecture The following diagram shows architecture of the MiVB on SMBC solution, how the applications are integrated and how the solution connects to networks and external devices. As shown in the above diagram, the MiVoice Business on SMBC solution consists of the following applications: MiVoice Business: MiVoice Business is a Mitel call control / IP-PBX application that runs on several hardware platforms including the SMB Controller platform. MiVoice Border Gateway: The MiVoice Border Gateway (MBG) is a Session Border Controller (SBC) for SIP trunks and SIP phones, as well as for Mitel proprietary IP phones and applications. The MBG also provides a web and application proxy service to enable services to be securely accessed from a remote location. CloudLink Gateway: CloudLink Gateway is a technology that enables secure communication between the on-premise MiVoice Business PBX and cloud-based applications. 7 MIVB ON SMBC - SECURITY GUIDELINES Mitel Performance Analytics: Mitel Performance Analytics (MPA) is an optional blade that enables communication with the Mitel Performance Analytics Cloud Service that is hosted on Amazon Web Services (AWS) to provide users with real-time alerts, detailed reporting and secure remote access. Mitel Standard Linux: Mitel Standard Linux (MSL) is an operating system that provides a base for a suite of managed services and applications. Server-Manager: Server Manager is a web-based administrator portal that provides the Administrator with the means to manage the MSL Server and the installed applications. Mitel Embedded Linux: Mitel Embedded Linux is a customized version of the Linux operating system that is specifically designed and optimized for the SMB Controller. It is lightweight, easy to use and maintain. Controller Manager: Controller Manager is a web-based UI for configuring the SMB Controller. 8 MIVB ON SMBC - SECURITY GUIDELINES Networking Guidelines This section discusses networking guidelines that are specific to the MiVB on SMBC, additional networking information and guidelines can be found in the product documentation for the SMBC applications. SMBC Ethernet Ports The MiVB on SMBC has three Gigabit Ethernet interfaces (Ethernet Ports 0, 1 and 2) which are accessible via three RJ45 connectors located on the front panel of the SMBC. The three Gigabit Ethernet Ports are labeled on the front panel as Eth0, Eth1 and Eth2. The SMBC currently uses Ethernet Port 0 and Ethernet Port 1 only. Ethernet Port 2 is not used at time, but may be used in a future release of MiVB on SMBC. Warning: The SMBC must never be directly connected to the Internet. To access the Internet, SMBC Ethernet Port 1 must always connect to a firewall, which in-turn connects to the Internet. Warning: Ethernet Port 2, is not currently activated and it should never be connected to any network or any device. A description of the SMBC Ethernet ports follows, for detailed information refer to the MiVoice Business System Manual for Mitel SMB Controller. Ethernet Port 0 (Eth0) Ethernet Port 0 is always used to connect the SMBC to the customer’s LAN. Ethernet Port 0 provides connectivity to the following virtual interfaces using three statically programmed internal IP addresses on the same subnet. • • • 9 MSL Server Manager and MiVoice Business including Embedded System Management (ESM). Mitel Border Gateway’s LAN Port. SMB Controller Manager. MIVB ON SMBC - SECURITY GUIDELINES Quality of Service (QoS) The SMB Controller does not transmit VLAN tagged traffic, so Layer 2 (L2) Ethernet priority on outgoing packets cannot be set. However, the SMB Controller does use DSCP to provide L3 priority information on transmitted packets. To ensure that L2 priority is utilized throughout the network, Ethernet Port 0 must be connected to a L2 Ethernet switch that is VLAN capable, and Ethernet L2 priority information and VLAN assignment must be applied at the L2 Ethernet switch port that SMBC Ethernet Port 0 is connected to. For ensuring voice and video quality across a network, Mitel recommends that specific DSCP (L3) and IEEE 802.1p (L2) Quality of Service (QoS) settings be used so that the networking equipment treats voice, video and signaling packets with higher priorities than less critical traffic. Following the QoS recommendations will help make voice, video and signaling traffic more resistant to a Denial of Service (DoS) attack. Mitel’s recommended QoS values for L2 and L3 are shown in the following table. For additional information related to QoS refer to the MiVoice Business Engineering Guidelines, the Mitel IP Sets Engineering Guidelines and Network Engineering for IP Telephony. Mitel Service Class Telephony (Voice Media) Signaling (MiNET) Multimedia Conferencing Standard Recommended L2 Values 6 3 4 0 Recommended L3 Values 46 (EF) 24 (CS3) 34 (AF41) 0 (DF) (BE) Ethernet Port 1 (Eth1) The Mitel Border Gateway WAN port is routed from within the SMBC to Ethernet Port 1. To provide the MBG WAN port with access to the Internet, Ethernet Port 1 must be connected to a firewall, which in-turn connects to the Internet. Warning: Ethernet Port 1 must never be directly connected to the Internet. Ethernet Port 1 provides connectivity to the Mitel Border Gateway’s WAN port which requires one static IP address from the ISP. Ethernet Port 2 (Eth2) Ethernet Port 2 is not used and must not be connected Network Deployment Rules Network deployment rules and networking scenarios specific to the MiVB on SMBC are discussed in the MiVoice Business System Manual for Mitel SMB Controller. 10 MIVB ON SMBC - SECURITY GUIDELINES Management Tools - Security Mitel Standard Linux and Server Manager Mitel Standard Linux (MSL) is an operating system and server solution that provides a base for a suite of managed services and applications delivered from the Mitel Applications Management Center (AMC). Server Manager is a web-based control panel for performing MSL administrative tasks such as installing applications, configuring the server and its optional features, and managing available services. Server Manager is used to install and upgrade the blade applications, including: • MiVoice Business (MiVB). • MiVoice Border Gateway (MBG). • CloudLink Gateway (CLGW). • Mitel Performance Analytics (MPA) Probe. Server Manager – Administrative Access The Administrator password (or System password) is used to access the Server Manager and the server console as the "admin" user and the Linux shell as the "root" user. • Choose a secure, non-trivial password that is at least eight digits in length and contains a mix of numbers, upper and lower case letters, and punctuation characters. • After you have entered and confirmed the password, the MSL software examines the password for strength. If it is found to be weak, you are offered the chance to change it. • It is recommended that passwords be changed on a regular basis. • Server Manager login is protected from brute force password attacks. By default, six consecutive failed login attempts within a 10-minute period locks out the source IP address of the client for 30 minutes. Warning The MSL admin account is separate from the SMB Controller Manager admin account. Changes to the "admin" password in MSL are not reflected in SMB Controller Manager (and vice versa). It is the responsibility of the customer to manually maintain the passwords, and to ensure that the passwords are updated as per their organizational policies. Server Manager – Network Security 11 • By default, Server Manager is accessible only from the local area network (LAN). To extend access privileges to other networks, you must program them, for instructions refer to the Mitel Standard Linux Installation and Administration Guide. • Access to Server Manager is only possible via an encrypted connection, using SSL (https). • Access to Server Manager must be permitted and it is recommended that access be restricted to designated management IP address(es), and not from the public network (Internet). For details regarding access from remote networks, refer to the MiVoice Business System Manual for Mitel SMB Controller and the Mitel Standard Linux Installation and Administration Guide. MIVB ON SMBC - SECURITY GUIDELINES • If remote access to Server Manager has been used to install MSL, then once MSL has been successfully installed on the SMBC and Server Manager is accessible via the MSL IP address – then to ensure security it is recommended that SSH access be disabled. MSL – Additional Information Refer to the Mitel Standard Linux Security Technical Paper for details on the following: • • • • • • • • Administrative access. Remote access. Secure shell settings. Password rules. Audit trails. MSL Hardening. Encryption of data in transit and data at rest. Certificates. Mitel Performance Analytics The Mitel Performance Analytics (MPA) probe is installed and initially managed on the SMBC with Server Manager. Communications are secured via Server Manager’s security controls. For details, refer to: • The Mitel Performance Analytics Probe Installation and Configuration Guide. • The MiVoice Business – System manual for SMB Controller. Once installed, MPA is managed via its own management interface. Refer to the Mitel Performance Analytics Security Summary for information related to: 12 • Data storage. • Audit logs. • Two-factor authentication. • Security for Remote access connections. • Amazon Web Services security practices. • Mend scans of MPA. MIVB ON SMBC - SECURITY GUIDELINES Mitel Border Gateway Mitel Border Gateway (MBG) is installed and managed on the SMBC with Server Manager, and MBG management access and communications are secured via Server Manager’s security controls. The MBG is always installed in the dual network interface configuration on SMBC (AKA Server-Gateway mode). For details refer to the Mitel Border Gateway Installation and Maintenance Guide and the MiVoice Business – System manual for SMB Controller. Mitel Border Gateway – Additional Information Refer to the Mitel Border Gateway Installation and Maintenance Guide and Engineering Guidelines for details on the following security features: • • • • Firewall requirements. Remote proxy services. Certificates. Audit logs. CloudLink Gateway The CloudLink Gateway is installed and managed on the SMBC with Server Manager, and communications are secured via Server Manager’s security controls. For details refer to the MiVoice Business – CloudLink Integration with MiVoice Business Deployment Guide and the MiVoice Business – System manual for SMB Controller. CloudLink Gateway – Additional Information The following CloudLink Gateway documents cover security information: 13 • CloudLink Accounts: o Managing accounts. o Managing users. o User roles and privileges. o Logs and call traces. • CloudLink Gateway: o Administrative and Customer accounts. o Best practices for site deployments. o Networking information. o IP Port tables. • CloudLink Security: o Access Control. o Incident management. o Encryption. MIVB ON SMBC - SECURITY GUIDELINES MiVoice Business MiVoice Business is installed on the SMBC with Server Manager, and initial management access and communications are secured via Server Manager’s security controls. The MiVoice Business is isolated from the Internet by the customers firewall and the MBG. For details refer to the MiVoice Business – System manual for SMB Controller. Once MiVoice Business has been installed on the SMBC, management and administration of MiVoice Business is performed via the MiVoice Business Embedded System Management (ESM) tool. Embedded System Management (ESM) - Security To ensure privacy and maintain system integrity, access to the MiVoice Business is restricted by a login password to those users that can be identified and authenticated. Users logging in to the System Administration Tool for the first time after installation are required to change the default password. The password strength and the user session inactivity timer are both configurable. If a user fails to log in after a three consecutive attempts, the event is recorded in the maintenance log and the user is locked out of the system for 15 minutes. Transport Layer Security protocol (TLS) is used to encrypt the data on the connection between the Administrator’s computer and the ESM tool. Access to ESM should be limited to LAN networks. MiVoice Business – Additional Information For additional details regarding the MiVB’s extensive security controls, refer to the: 14 • MiVoice Business Security Guidelines. • MiVoice Business Personal Data Protection and Privacy Controls. • MiVoice Business System Administration Tool Help files. MIVB ON SMBC - SECURITY GUIDELINES SMB Controller Manager The SMB Controller Manager (CM) is a pre-installed web-based configuration tool available on the SMB Controller, independent of an installed call control application or other software applications. CM offers a simple, user-friendly interface and an online help for configuration and maintenance tasks, for details on using CM to configure the SMBC refer to the MiVoice Business – System manual for SMB Controller. Controller Manager - Communications Security All Controller Manager communications between the PC and the SMBC are encrypted with: • TLS 1.2 (HTTPS) • OpenSSH_8.2p1 (SSH) Controller Manager communicates via the following IP Ports. Link Type & Directionality Port and Protocol Initial data Sent from peer to peer Port Status HTTPS (Secure Transmission) PCSMBC 8443 (TCP) Open Used for Embedded Linux administration Find My SMBC (HTTP) PCSMBC 8888 (TCP) Open Used for discovering the SMBC on the same segment Service 15 Usage (Default Condition) MIVB ON SMBC - SECURITY GUIDELINES Controller Manager - User Accounts The SMB Controller Manager has two user accounts. One account is the Normal Mode account, it is used for initial access when the SMB Controller is first started up and runs in normal mode, this account is also used to install MSL. The other account is the Emergency Mode account and is used when, for any reason, the SMB Controller software is not running correctly, and the SMB Controller has to start up in Emergency Mode. Normal Mode User Account To access SMB Controller Manager the first time in Normal Mode: • • The default username is ‘admin’ The default password is ‘admin’ Warning: To prevent unauthorized access to Controller Manager, it is necessary to change the default username and password during the first login. Warning: The MSL admin account is separate from the SMB Controller Manager admin account. Changes to the "admin" password in MSL is not reflected in SMB Controller Manager (and vice versa). CAUTION: It is the responsibility of the customer to manually maintain the passwords. It is not possible to recover a forgotten SMB Controller Manager Admin Password. The only way to recover the SMB Controller is to put the system into Emergency Mode via CRTL Button and then login to the Controller Web UI using the root/root (username/password) and then initiate a Factory Reset. A factory reset removes all data including all installed blades and application. For further details, refer to the MiVoice Business System manual for SMB Controller. 16 MIVB ON SMBC - SECURITY GUIDELINES Controller Manager - Access and Identity Controls To ensure privacy and maintain system integrity, access to Controller Manager is restricted by a login password to users that can be identified and authenticated. The usernames and passwords are stored as a salted MD5 hash on the SMBC platform. If an administrative user login fails, the event is recorded in the SMB Controller Manager event log. There is no event log entry in the case of valid administrative user login, except if a parallel valid administrative user login takes place from another IP address. Password rules for the accounts are as follows: • • A password must consist of a minimum of 8 and a maximum of 255 characters. Unlike usernames, the passwords are case sensitive. • The password must contain at least one uppercase letter A – Z. • The password must contain at least one lowercase letter a – z. • The password must contain at least one digit 0 – 9. • The password must contain at least one of the following special characters: ?, /, <, >, -, +, *, #, =, full stop, comma, or space. • German umlauts (for example, ä, ö, ü) and other diacritical characters (for example, é, à, â) are not permitted. • The default password “password” is not permitted. • The password must not be the same as the username. Emergency Mode User Account For further information about Emergency Mode and why the Administrator would need to enable Emergency Mode, details, refer to the MiVoice Business System manual for SMB Controller. To access SMB Controller Manager in emergency mode: • • The username is ‘admin’ The password is ‘admin’ Important Warnings The default password for the Emergency Mode user account cannot be changed, and Controller Manager should never be shut down or disabled. Controller Manager must remain active at all times in case a situation arises: 17 • Where the SMB Controller software is not running correctly. In such a situation the SMBC has to be started up with Controller Manager via the Emergency Mode account. • Where the SMBC applications and operating system need to be reinstalled. In such a situation the Administrator will need to use Controller Manager via the Normal Mode account. MIVB ON SMBC - SECURITY GUIDELINES For further details regarding Controller Manager accounts, refer to the MiVoice Business – System manual for SMB Controller. Important Security Recommendations To minimize any security risks associated with Control Manager, the Administrator should comply with the following recommendations: 18 • For management purposes, the Administrator should create a secure management network, meaning a network that is accessible only to authorized administrative users. • The Administrator must ensure that Controller Manager is only accessible from the secure management network within the customer’s LAN. • That Controller Manager should never be made accessible via a remote network. MIVB ON SMBC - SECURITY GUIDELINES MiVoice Business Console The MiVoice Business Console provides security-related features that allow customers to secure user data and telecommunications data and to prevent unauthorized access to the user's data. Refer to the MiVoice Business Console Personal Data Protection and Privacy Controls document for details on the following security features: • • • • System access and authorization controls. Password controls and password encryption. Communications protection for voice streaming and user messaging. Data protection For communications security, the voice (media) and signaling paths between the MiVoice Business Console (MiVoice Business-C) and the MiVoice Business should be encrypted. To ensure that the communication paths between the MiVoice Business-C and the MiVoice Business are secured, the administrator will need to run the MiVoice Business-C Configuration Wizard when the MiVoice Business-C is first installed or when an upgrade is taking place, for details refer to the MiVoice Business-C Installation Guide, and the MiVoice Business Security Guidelines. For a list of the security controls available for the MiVoice Business Console, refer to the MiVoice Business Console Personal Data Protection and Privacy Controls and the IP Sets Engineering Guidelines. 19 MIVB ON SMBC - SECURITY GUIDELINES Local Area Network (LAN) Security The MiVoice Business on SMBC solution, the IP phones, and associated networking infrastructure communicate using the customer’s Local Area Network (LAN). Network Access Security It is recommended that the Ethernet LAN switches used to provide IP phones with LAN connectivity be managed, enterprise-grade switches that include integrated access control measures. It is also recommended that the system administrator ensure that the switch access control measures are properly configured and maintained. Wireless networks should also employ access control measures and user authentication mechanisms with a minimum of WPA2 encryption and a separate SSID for voice applications. SSID to VLAN mapping is recommended. For additional information refer to the IP sets Engineering Guidelines. Using VLANs to Assist with Security To make eavesdropping attacks or Denial of Service attacks more difficult, or less effective, traffic on the LAN should be grouped according to traffic types and trust levels. This can be achieved with the use of Virtual LANs. VLANs can be used to segregate controller-to-controller signaling, controller-to-phone signaling, and voice traffic. When VLANs are used to provide isolation between traffic types, it will make the solution more robust against virus-based attacks and network flooding attacks. In particular, if Voice over Internet Protocol (VoIP) traffic is grouped into a single VLAN, and the nodes on this VLAN are strongly protected, a wormbased attack causing network overload that originated on a node located on another VLAN might only marginally affect the VoIP LAN. As an example, traffic types could be segregated as follows: 1. One VLAN grouping all of the call control engines together, MiVoice Business and 3300 ICPs 2. One or several VLANs grouping all of the IP phones together 3. One or several VLANs for supporting the data traffic When the traffic types have been segregated by VLAN, hosts or devices belonging to different VLANs can communicate only through a Layer 3 switch or router that connects the two VLANs. This means that broadcast traffic is blocked across VLANs, preventing broadcast storms from propagating network wide. Additionally, many modern routers offer Intrusion Detection/Prevention Systems (IDS/IPS), which are able to detect and/or block more advanced types of attacks. . 20 MIVB ON SMBC - SECURITY GUIDELINES Securing Traffic For recommendations on how to secure LAN traffic, refer to the MiVB Security Guidelines, the Guidelines discuss the following topics in detail: • Securing controller to controller traffic. • Controller to controller authentication. • Streaming voice to a PSTN gateway. • Streaming voice to a TDM connection. • Streaming voice to voice mail, Record-A-Call and conferences. Securing IP Endpoints For recommendations on how to secure IP endpoints refer to the MiVB Security Guidelines and the IP Sets Engineering Guidelines, these documents discuss the following topics in detail: • Network access authentication (802.1X). • Phone authentication via call control. • Encryption of voice and call signaling streams. • Certificates • Wi-Fi security. • Embedded voice mail. Prevention of Toll Abuse Any communication system that has a combination of Direct Inward System Access (DISA), integrated auto attendant, Recorded Announcement Devices groups, an auto attendant or voice mail can be susceptible to toll abuse. Therefore, it is important to assign appropriate telephone privileges and restrictions to devices. In addition, publicly accessible telephones should be denied toll access unless authorized through an attendant. MiVoice Business provides comprehensive toll control as an integral part of the call control engine. Refer to the MiVoice Business Security Guidelines for further information on the prevention of toll abuse. 21 MIVB ON SMBC - SECURITY GUIDELINES Data Protection – General Recommendations The following section provides the Administrator with general recommendations for protecting customer data and privacy. Protection of Customer Data During operation the MiVB on SMBC solution records and stores customer data such as call data, personal contacts and voice messages. The Administrator should protect this data from unauthorized access by using restrictive access controls. • For remote management use SRM (Secure IP Remote Management) or set up the IP network in such a way that from outside the LAN only authorised persons have access to the IP addresses of the MiVoice Business on SMBC applications. • Restrict the number of user accounts to the minimum necessary and assign to the user accounts only those authorisation profiles that are actually required. • Instruct system Administrators to open the remote maintenance access to the communication server only for the amount of time needed for access. • Instruct users with access rights to change their passwords on a regular basis and mange the passwords in a secure manner. Protection of Communications Data The MiVoice Business on SMBC solution comprises features which allow calls to be monitored or recorded without the call parties noticing. Inform your customers that these features can only be used in compliance with national data protection provisions. Customers must be aware of local call recording legal requirements. Unencrypted phone calls made on the IP network can be recorded and played back by anyone with the right resources. To protect data communications: 22 • Use encrypted voice transmission whenever possible, and make encryption the default setting. • Use dedicated encrypted VPN, or private network connections, between different business locations on the same private network. This will ensure secure connections in addition to encryption on the end-devices, such as IP or SIP phones. • Use the MiVoice Border Gateway to connect Teleworker phones that are connected to the business via Internet. Teleworker phones include secure connection to and from MiVoice Border Gateway and do not require a separate VPN (allowing simple installation and mobility). MIVB ON SMBC - SECURITY GUIDELINES Software Patch Management Policy It is necessary for the administrator to ensure that the applications deployed on the MiVoice Business on SMBC solution are always updated and equipped with all critical patches to guarantee the highest level of security. Mitel has developed best practices for the management and installation of security patches released by the operating system vendors aiming to guarantee the highest level of security and the correct functioning of the system. 23 MIVB ON SMBC - SECURITY GUIDELINES Product Security Information Mitel Product Security Vulnerabilities The Product Security Policy discusses how Mitel assesses security risks, resolves confirmed security vulnerabilities, and how the reporting of security vulnerabilities is performed. Mitel's Product Security Policy is available at: https://www.mitel.com/support/security-advisories/mitelproduct-security-policy Mitel Product Security Advisories Mitel Product Security Advisories are available at: https://www.mitel.com/support/security-advisories Mitel Security Documentation Mitel security documentation includes product-specific Security Guidelines and Important Information for Customer GDPR Compliance Initiatives and Data Protection and Privacy Controls. Mitel also has Technical Papers and White papers that discuss network security and data centre security. Mitel Product Security Documentation is available at: https://www.mitel.com/en-ca/document-center 24 MIVB ON SMBC - SECURITY GUIDELINES Disclaimer THIS SOLUTIONS ENGINEERING DOCUMENT IS PROVIDED “AS IS” AND WITHOUT WARRANTY. IN NO EVENT WILL MITEL NETWORKS CORPORATION OR ITS AFFILIATES HAVE ANY LIABILITY WHATSOEVER ARISING FROM IN CONNECTION WITH THIS DOCUMENT. You acknowledge and agree that you are solely responsible to comply with any and all laws and regulations in association with your use of MiVoice Business and/or other Mitel products and solutions including without limitation, laws and regulations related to call recording and data privacy. The information contained in this document is not, and should not be construed as, legal advice. Should further analysis or explanation of the subject matter be required, please contact an attorney. 25