SCCP Security Rules
You can configure security rules that allow SCCP calls through the gateway. After the Rule Base is configured, all SCCP communication is fully secured by Inspection Settings.
- SCCP has a centralized call-control architecture. The CallManager manages SCCP clients, VoIP endpoints, which can be IP phones or Cisco ATA analog phone adapters. The CallManager controls all the features of the endpoints. The CallManager requests data (such as station capabilities) and sends data (such as the button template and the date/time) to the VoIP endpoints.
- The CallManagers are defined in SmartConsole, as Host objects. The networks containing directly-managed IP phones are also defined in SmartConsole. It is not usually necessary to define network objects for individual phones. Cisco ATA devices that are managed by a CallManager must be defined in SmartConsole, but the connected analog phones are not defined.
- To allow VoIP calls, you must create rules that let VoIP control signals pass through the gateway. It is not necessary to define a media rule that specifies which ports to open and which endpoints can talk. The gateway gets this information from the signaling. For a given VoIP signaling rule, the gateway automatically opens ports for the endpoint-to-endpoint RTP/RTCP media stream.
- Make sure to check or the firewall drops your connection every time you .
- Double-click your gateway.
The window shows.
- From.
Note - Rematch connections is selected by default.
Best practice - Configure anti-spoofing on the Check Point gateway interfaces.
SCCP-Specific Services
These predefined SCCP services are available:
Service
|
Purpose
|
TCP:SCCP
|
Used for SCCP over TCP
|
Other:high_udp_for_secure_SCCP
|
Used for media from Secure SCCP phones
|
Securing Encrypted SCCP
To secure encrypted SCCP, use these services in the Security Rule Base:
To create the rule TCP: Secure_SCCP:
- Open .
- The window opens.
- Set the to: .
- Set the port to: 2443.
- Click .
- The window opens.
- Set the to: .
- Other:
high_udp_for_secure_SCCP
When an SCCP phone is turned on and identified as Secure SCCP, the phone's IP address is added to the database of secure SCCP phones.
When RTP traffic arrives at the gateway, it is allowed only if the source or destination is in the database of secure SCCP phones.
- From SmartConsole, in the tab, go to > , select .
The window opens.
- From the , in the search window, enter .
A list of options shows.
- Double-click the setting that you want to configure.
- Make your changes and click .
Configuring SCCP Security Rules
VoIP rule for this scenario:
Source
|
Destination
|
Services & Applications
|
Action
|
Comments
|
Net_A
Net_B
Call_Manager
|
Net_A
Net_B
Call_Manager
|
SCCP
|
Accept
|
Incoming and Outgoing calls
|
To configure the Rule Base for secure SCCP-based VoIP:
- Define network objects (nodes or networks) for SCCP endpoints (Cisco ATA devices or IP phones) controlled by the CallManagers.
- Define a Host object for the CallManager.
- Define the SCCP VoIP rules.
- Define other rules for SCCP and the other VoIP protocols. (SCCP interoperates with other VoIP protocols.)
This rule lets all phones in Net_A and Net_B make calls to each other:
- To secure encrypted SCCP over TCP connections:
- Create an identical rule
- In the cell, add only:
- TCP:
Secure_SCCP
- Other:
high_udp_for_secure_SCCP
.
- Install policy.
When you configure a security rule, if you do not want in-progress calls to be dropped, make this change:
- From the tab, in the search box at the top right of the screen, enter the service.
- Double-click the service and a window opens.
- Select > .
- Check the box .
Note - Even if the new policy does not allow calls like those in-progress, in-progress calls will not be dropped during Install Policy.