Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems
نویسندگان
چکیده
It is common today to have H.323 and SIP videoconferencing equipment deployed behind firewalls/NATs in campus and enterprise networks. A major challenge faced by network planners is to configure firewalls and gatekeeper proxies to allow voice-and-video traffic in-and-out of the internal-network’s ports while limiting malicious access of internal-network data by intruders through the same open ports. In this paper, we first describe the strategies used with gatekeeper proxies to solve the firewall traversal challenges in securing distributed videoconferencing systems. Next, we empirically evaluate the load-handling of gatekeeper proxies for firewall traversal under low, medium and high cross-traffic loads using subjective and objective measurements. Following this, we describe the signalling-and-multimedia flow architectures and identify caveats that arise due to heterogeneous adoption of these strategies. Lastly, based on our empirical results, caveats identification and vast operations experience, we list best-practices for deploying gatekeeper proxies in small-to-large scale secure videoconferencing systems.
منابع مشابه
Advanced HIP-based Firewall Traversal
Hannes Tschofenig, Vesa Torvinen, Pasi Eronen Abstract This paper investigates the possibility to establish security associations between the data sender and one (or more) intermediate middleboxes to address some open issues for standard path-coupled NAT/Firewall traversal. We provide some thoughts on mobility handling and address the aspect of data origin authentication and an even more secure...
متن کاملA Transport-Level Proxy for Secure Multimedia Streams
service, firewalls need more than static packet filtering and application-level proxies. SOCKS is an application-independent transport-level proxy that offers user-level authentication and data encryption. An extended SOCKS UDP binding model with appropriate socket calls is proposed to provide complete support for UDP-based, multimedia streaming applications. T he increasing popularity of multi...
متن کاملEvaluation of Three Approaches for CORBA Firewall/NAT Traversal
Applications that use CORBA as communication layer often have some restrictions for multi-domain deployment. This is particularly true when they have to face firewall/NAT traversal. Furthermore, nowadays there isn’t a well-accepted unique or standardized solution adopted by all ORBs, compelling applications using this middleware to use proprietary solutions that sometimes do not address the env...
متن کاملAdvanced Security Proxies: An Architecture and Implementation for High- Performance Network Firewalls
The TIS Labs Advanced Security Proxies (ASP) project is investigating software architectures for highperformance firewalls to enable the secure use of next generation networks. The project objective is to demonstrate an architecture and implementation in which protocol-specific proxies control when data transmission is allowed across the firewall, but which allows the proxy a range of options i...
متن کاملTrading Off Strength and Performance in Network Authentication: Experience with the ACSA Project
The NAI Labs Advanced Security Proxies (ASP) project is investigating software architectures for high-performance firewalls to enable the secure use of next generation networks. The project objective is to demonstrate an architecture and implementation in which protocol-specific proxies control when data transmission is allowed across the firewall, but which allows the proxy a range of options ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJIPT
دوره 5 شماره
صفحات -
تاریخ انتشار 2010