Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Introduction

...

...

ITIL (Information Technology Infrastructure Library) is a set of practices for IT Service Management that focuses on aligning IT services with the needs of business. The ITIL processes all interwork, providing IT management with an end-to-end view of the technology and services being provided, maximizing uptime and providing a high quality experience for end-users.
VSM is based on delivering seven of the ITIL disciplines:

  • Configuration Management
  • Capacity Management
  • Availability Management
  • Change Management
  • Release Management
  • Continuity Management
  • Security Management

...

...

Avaya Session Border Controller (ASBC)

...


Managing SBC in real-world environments

VSM's Security Manager is essential in protecting organizations from cyber attack.
SIP based communication needs counter-measures to prevent hacker intrusion, bandwidth abuse, toll fraud, service hijacking and denial of service attacks.
These threats cannot be mitigated by the session border controller (SBC) alone. Relying solely on the SBC is like having good locks and catches on your doors and windows at home, but having no security system to alert you if these are being tested, or worse still, breached.

...


The ASBC Dashlet depicts threats in real time and can be found in VSM's Service Desk > Dashboard > System Health > Avaya Session Border Controller (ASBC).
Anchor_Hlk50985743_Hlk50985743

It gives you a picture of threats in real time. Ensure your platform continues to separate trusted from untrusted networks. If your SBC rules are being tested, be informed and take mitigating actions BEFORE a breach occurs. 
Security Reports are available in VSM's Security Manager under Security Manager > Reports.

...

...

VSM and ASBC System Health

VSM collects and stores configuration, capacity and availability information relating to the consumption of all essential SBC resources. This data is mined at all levels, from infrastructure through to the SBC application layers. It stores this information for reporting, trending and analytical purposes. VSM specifically targets critical areas in SBC that indicate business-impacting issues.

...

Items monitored include not only server processor, but also essential aspects of the configuration which have their own specific requirements and capacity limitations. This information is presented by way of several different dashboards within Service Desk.
The purpose of the dashboards is three-fold:

  • To enable IT teams to proactively identify potential issues and prevent outages.
  • To provide a real time view of overall SM health at a glance without having to rely on end-users reporting problems.
  • In the event of a service-impacting incident to significantly reduce Mean Time to Repair (MTTR) and therefore to reduce the impact on business operations by quickly identifying the root cause.

...

...

Network Interface

Best practice "secure by design" strategy separates management, trusted and untrusted networks

...

...

Services

...

...


...

Application Status

Shows the application name, if it is running and how long that application has been running for.

  • SS
  • sems

...

...


SIP Protocol

See current volumes for:

  • Invites
  • 1xx Response
  • 2xx Response
  • 4/6xx Response

...

SIP Calls

View Total Calls broken down by Active Calls, Active SRTP Calls, TCP Registrations, LCP Registrations, TLS Registrations, Call Received and Call Allowed.

...

...

Security Violations

VSM tracks the number of SIP Calls that are Blocked, Failed or Denied for a multitude of typical problems:

...


SIP Drops are also tracked for Registrations dropped, Invites dropped and Sessions
dropped. Typical problems include:

  • Registrations dropped due to missing policy
  • SIP Invites dropped due to missing policy
  • SIP Sessions dropped due to maximum concurrent sessions thresholds breach


In typical deployments a certain "normal" level can be expected. Alerts will highlight when there are changes in the last 3 minutes.
In addition, Thresholds can be used to alert if normal levels are exceeded. Are there alarms?

Anchor_Toc51071225
_Toc51071225Figure 1 – Security Violation panel with Alerts and drill down page

Anchor_Toc51071226_Toc51071226Figure 2 – Avaya SBC dashlet
This dashlet gives you a picture of threats in real time. Ensure your platform continues to separate trusted from untrusted networks. If your SBC rules are being tested, be informed and take mitigating actions BEFORE a breach occurs. 

Anchor_Toc51071227_Toc51071227Figure 3 – Network Interface drill down page