SlideShare a Scribd company logo
1 of 25
Avaya Aura™
Session Border Controller
PacketBase, Inc.
www.packetbase.com
2
Why do you need an SBC?2
Avaya Aura SBC Overview3
Avaya Aura™
Session Border Controller
Positioning and Packaging1
Avaya Aura SBC Differentiation4
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
3For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
Avaya Aura™
SBC: Now available
on Avaya Aura System Platform
 Avaya Aura Session Border Controller (SBC)
– A virtualized application resident on Avaya Aura System Platform
– Just like Communication Manager, Application Enablement Services,
etc.
 Powered by Acme Packet
– OEM from SBC market leader
 Designed for midsized enterprises, branch offices, and small contact centers
– Supports up to 750 SBC sessions
 Suitable for SIP trunking and remote worker/agent applications
– Supports voice, video, presence, and IM chat applications
 Complements Acme Packet Net-Net SBC solutions available from Avaya
– Acme Packet Net-Net 3800 / 4500
Where Avaya Aura™
SBC fits in the
high-level Avaya Aura architecture
Unified Communications Contact Center
Collaboration
Solutions
Interaction
Solutions
Performance
Analytics
System
Manager
Session Manager
Communication
Manager
Application
Enablement
Presence
Services
Service
Provider
Network
Deskphones Clients Video
Endpoints
SBC
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
5
MX
Application Platform
Where Avaya Aura™
SBC
fits in the customer network
App
3rd
Party
endpoints
Avaya CM
(branch or
standalone)
Remote workers via
Internet
Application Platform
3rd
Party PBXs
App
Avaya one-X®
endpoints
PSTN trunking
providers, hosted
services, federated
partners
System
Manager
App MM
VP
CM
Avaya Aura SBC or
Acme Packet SBC
Media
Servers
Access
Connection
Application
Avaya Aura™
Session
Manager Avaya Aura™
SBC
SIP Trunks
SIP
Internet
SIP Trunks
or
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
6
Avaya Aura™
SBC Role in
UC & CC architectures
 Completes Avaya’s cost-effective
end-to-end SIP architecture
– SIP trunking and border interworking
– Remote site & worker connectivity
 Provides best-in-class VoIP &
UC security
– Integrated with Avaya Session Manager,
Communication Manager, and Voice
Portal
 Assures quality and high availability
– Disaster recovery and survivability
 Helps achieve regulatory compliance
– Emergency calls, privacy, recording
Redundant data centers
Contact center,
audio/video conferencing,
emergency services, etc.
To PSTN
SIP
Tele-
worker
Nomadic/
mobile user
SIP
Remote
site
1. SIP trunking border 2. Hosted services border
3. Internet border
HQ/
campus
Remote
site
CCUC
H.323
Regional
site
Federated
partners
InternetPrivate network
ASM
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
7
Positioning and Packaging1
Avaya Aura SBC Overview3
Avaya Aura™
Session Border Controller
Why do you need an SBC?2
Avaya Aura SBC Differentiation4
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
8
What is a Session Border Controller?
 Session = real-time, interactive
communications
– Voice, video & multimedia
– SIP or H.323
 Border = IP-IP network borders
– SIP trunks to service providers
– Remote worker access
– Intra- & extra-enterprise
 Control
– Security & SLA assurance
– Revenue & cost optimization
– Regulatory compliance
Redundant data centers
Contact center,
audio/video conferencing,
emergency services, etc.
To PSTN
SIP
Tele-
worker
Nomadic/
mobile user
SIP
Remote
site
1. SIP trunking border 2. Hosted services border
3. Internet border
HQ/
campus
Remote
site
CCUC
H.323
Regional
site
Federated
partners
InternetPrivate network
ASM
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
9
Why use an SBC?
 Real-time IP communications is different than TDM and other IP flows
– Sessions initiated from inside or outside of firewall
– Continuous stream vs. traffic bursts, 2-way flows
– Interoperability problems between multivendor solutions will occur
 Security is paramount
– Multi-protocol and real-time nature of IP telephony and Unified
Communications traffic demands sophisticated stateful defense strategy
– Signaling attacks are simplest to launch
 Today’s data-focused security solutions are not enough
– Lack ability to dynamically correct VoIP connectivity issues
– Unable to perform VoIP signaling/media deep packet inspection
– Cannot solve protocol interoperability problems
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
10
Enterprise and contact center
security threats
 Denial of Service
– Call/registration overload
– Malformed messages (fuzzing)
 Configuration errors
– Mis-configured devices
– Operator and application errors
 Theft of service
– Unauthorized users
– Unauthorized media types
 Viruses & SPIT
– Viruses via SIP messages
– Malware via IM sessions
– SPIT – unwanted traffic
Source: Nemertes Research
Enterprise Adoption of
Collaboration Tools
Increased usage of collaboration tools
means security threats are more of a concern
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
11
How are SBCs different from firewalls?
 Traditional firewalls cannot:
– Prevent SIP-specific overload conditions and malicious attacks
– Open / close RTP media ports in sync with SIP signaling
– Track session state and provide uninterrupted service
– Perform interworking or security on encrypted sessions
– Scale to handle thousands of real-time sessions
– Provide carrier-class availability
– Solve multi-vendor SIP interoperability problems
 InfoSec best practice = deploy defense-in-depth model with application-level
security proxies for email and web applications
– This means firewalls alone are not sufficient
– Same model applies for IP telephony, UC and CC applications
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
12
SBC vs. Firewall with ALG
 Terminates, re-initiates and initiates
signaling & SDP
 Two sessions - one on each side of
system
 Layer 2-7 state aware
 Inspects and modifies any
application layer header info (SIP,
SDP, etc.)
 Static & dynamic ACLs
 Unable to terminate, initiate, re-
initiate signaling & SDP
 Single session dialog across
system
 Layer 2-4 state aware
 Inspects and modifies only
application layer addresses (SIP,
SDP, etc.)
 Static ACLs only
SBC
SIP trunk
IP PBX
UC server
Data center
SIP trunk
IP PBX
UC server
Data center
FW with ALG
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
13
SBC vs. other approaches
Function & feature examples
Avaya
AuraTM
SBC
Acme
Packet
Net-Net
SBC
Firewall
with SIP
ALG
IP PBX +
Session
Manager Router
Other
UC
security
element
DoS/DDoS protection √ √ - - - limited
Access control - dynamic & static √ √ static only - static only -
Topology hiding √ √ - - - -
Encryption – signaling & media √ √ IPSec only TLS only IPsec only limited
Malware & SPIT mitigation √ √ - - - √
Remote NAT traversal √ √ - - - -
VPN bridging √ √ - - L3 only -
Header manipulation rules for interop √ √ - - - -
SIP / H.323 interworking √ √ - - - -
Overlapping dial plan translations √ √ - √ - -
Advanced session admission controls √ √ - √ - -
Load balancing & advanced routing √ √ - √ - -
Signaling overload control √ √ - √ - -
QoS marking and reporting √ √ - - minimal -
Embedded in Avaya Aura System Platform √ - - √ - -
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
14
Why do you need an SBC?2
Positioning & Packaging1
Avaya Aura™
Session Border Controller
Avaya Aura SBC Overview3
Avaya Aura SBC Differentiation4
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
15
Reliability and Scale
 Active/standby redundancy
 Scales to 750 sessions
 Redundant SIP connectivity to service
providers and Session Manager /
Communication Manager possible
Avaya Aura™
SBC Key Features
Applications
 SIP trunking to PSTN providers
 SIP trunking to hosted service providers
(i.e. conferencing, contact center, etc.)
 SIP trunking to federated businesses
 Remote worker connectivity via Internet
 Voice, video, presence & IM chat ready
Security
 Acme Packet’s proven SBC security
framework for DoS/DDOS protection
 TLS & SRTP encryption
Service Provider Interoperability
 Same SBC technology used by majority
of Service Providers
 Flexible controls to solve interop
problems
 SIP/H.323 IWF for legacy network apps
 Proven configuration templates
 Tested with SPs through DevConnect
Evolution
 Deployable on Avaya Aura System
Platform
 Easily add SBC to existing installations
 Flexible feature set for new applications
SM
SP
CM
SBC
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
16
Avaya Aura™
Session Border Controller
+ Avaya Aura System Platform
 Avaya Aura SBC runs as an embedded virtualized application on System
Platform
 Same approach used for other Avaya virtualized applications
Avaya Aura System Platform
HDDS8800
Linux
Console
Domain
XEN Hypervisor
DOM-0
SBC
Linux
RAM NIC CPU
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
17
Avaya Aura™
SBC &
Acme Packet Net-Net SBCs
Small to Medium Enterprise & CC Large Enterprise & CC
Location = Data Center / Branch Office Data Center
Data Center
(requiring transcoding)
# of lines (UC) = 25 – 2400 750 – 10,000 5,000 – 80,000 20,000 – 360,000
# of agents (CC) = 25 – 100 75 – 2,000 500 – 8,000 2,000 – 36,000
# of SBC sessions1
= 1 – 750 150 – 8,000 1,000 – 16,000 4,000 – 72,000
Available Features2
SIP / H.323 / IWF √ √ √ √
Full SBC Feature Set √ √ √ √
Call Recorder Interface √ √ √ √
Transcoding √ √
Embedded GUI/EMS Embedded GUI EMS EMS EMS
Acme Packet
Net-Net 9200
Acme Packet
Net-Net 3800
Acme Packet
Net-Net 4500
Avaya Aura
SBC
Notes:
1. SBC session capacity is controlled through licensing; capacity can vary by signaling protocol, call flow, codec, configuration, feature usage and SPU and NPU options
2. Some features are included in the base license and others are available as options (consult price book for details)
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
SBC Comparison Table – At a Glance
Function & features
Avaya AuraTM
SBC
Acme Packet
Net-Net SBC 3800 / 4500
Security Features - -
DoS/DDoS Protection, Access Control, Topology Hiding √ √
Encryption – Signaling & Media (TLS & SRTP) √ √
Malware & SPIT mitigation √ √
Additional US Government DoD Features & Certifications √
Interop Features - -
SIP / H.323 Interworking √ √
Header Manipulation Rules (HMR) for Interop Mediation √ √
Media Transcoding √
Session Control Features - -
Advanced Session Admission Controls √ √
Load Balancing & Advanced Routing √ √
QoS Marking and Reporting √ √
Management Features - -
Element Management Embedded GUI + SIP trunking wizard CLI or Acme Packet EMS
Accounting with QoS Reporting & CDRs √ √
Session Replication for Recording √ √
Embedded Call Troubleshooting Tool √
Host Platform Details Avaya Aura System Platform & S8800 Acme Packet Hardware
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
19
Avaya Aura™
SBC Security Framework
 SBC DoS/DDoS protection
– Protect against DoS/DDoS attacks
– Access control & VPN separation
– Dynamic, session-aware access
control for signaling & media
 Topology hiding & privacy
 Viruses, malware & SPIT mitigation
– Deep packet inspection
 Encryption and Authentication
– TLS, SRTP, IPSec
 Monitoring and reporting
– Record attacks & attackers
– Provide audit trails
SBC DoS
protection
Fraud
prevention
Access
control
Topology hiding
& privacy
Service
infrastructure
DoS
prevention
Viruses
malware
& SPIT
mitigation
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
20
Why do you need an SBC?2
Positioning & Packaging1
Avaya Aura™
Session Border Controller
Avaya Aura SBC Differentiation4
Avaya Aura SBC Overview3
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
21
Avaya Aura™
SBC = Security and more...
 Legacy data security infrastructure is not enough
– SBCs provide all necessary defense-in-depth security capabilities for UC
and CC applications
– Alternative solutions (including UC-centric solutions) are not sufficient
 SBCs can help in the area of
– Signalling protocol interworking
– QoS / Accounting
– Session replication for recording
– High availability
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
22
Avaya Aura™
SBC
value propositions & benefits
 Avaya Aura SBCs augment Avaya solutions for UC and CC
– Defend SIP signaling elements against security threats, overloads
– Eliminate signaling and many other interoperability issues
– Preserve session quality under load and adverse conditions
– Extend Avaya application reach across IP network borders
– Support regulatory compliance
 Key Benefits
– Faster Avaya solutions deployment at lower risk and cost
• Easier integration of Avaya with third-party applications and services
– Safe use of cost-effective SIP trunks
– High-quality session delivery to workers across the enterprise
– Improves customer’s options for customizing their networks
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
23
Avaya and Acme Packet Relationship
 Strategic alliance contract completed
 Reference architectures agreed and tested
– Avaya only connects to SIP Trunks through the SBC
– The preferred SBC vendor recommended for Avaya AuraTM
– Three-way certification program with SIP Trunk providers
 Extensive integration testing completed
– Communication Manager, Session Manager, ICR, Voice Portal
– Nortel CS1000, CS2100, BCM
 Joint go-to-market for product delivery and support
– Two-tier sales via Distribution for Avaya Aura SBC
– Direct channel for Acme Packet Net-Net 3800 / 4500
 Education, marketing, consulting programs
 Better solutions than anything Cisco can provide
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
24
Summary
 Avaya AuraTM
SBCs = optimal security solution for UC and CC applications
 Provides features required SIP trunking & remote worker applications
– Interworking, call recording, QoS measurement, NAT traversal
– Designed for voice, video, presence and IM chat applications
 Based on market-leading and widely-deployed technology from Acme Packet
– 1,000+ customers in over 100 countries
– 48 of top 50, 90 of the top 100 service providers
– 11 of top Fortune 25 enterprise, 200+ total enterprise customers
For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
Avaya Aura™
Session Border Controller
PacketBase, Inc.
www.packetbase.com

More Related Content

Recently uploaded

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Avaya Aura SBC by PacketBase

  • 1. Avaya Aura™ Session Border Controller PacketBase, Inc. www.packetbase.com
  • 2. 2 Why do you need an SBC?2 Avaya Aura SBC Overview3 Avaya Aura™ Session Border Controller Positioning and Packaging1 Avaya Aura SBC Differentiation4 For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 3. 3For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re Avaya Aura™ SBC: Now available on Avaya Aura System Platform  Avaya Aura Session Border Controller (SBC) – A virtualized application resident on Avaya Aura System Platform – Just like Communication Manager, Application Enablement Services, etc.  Powered by Acme Packet – OEM from SBC market leader  Designed for midsized enterprises, branch offices, and small contact centers – Supports up to 750 SBC sessions  Suitable for SIP trunking and remote worker/agent applications – Supports voice, video, presence, and IM chat applications  Complements Acme Packet Net-Net SBC solutions available from Avaya – Acme Packet Net-Net 3800 / 4500
  • 4. Where Avaya Aura™ SBC fits in the high-level Avaya Aura architecture Unified Communications Contact Center Collaboration Solutions Interaction Solutions Performance Analytics System Manager Session Manager Communication Manager Application Enablement Presence Services Service Provider Network Deskphones Clients Video Endpoints SBC For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 5. 5 MX Application Platform Where Avaya Aura™ SBC fits in the customer network App 3rd Party endpoints Avaya CM (branch or standalone) Remote workers via Internet Application Platform 3rd Party PBXs App Avaya one-X® endpoints PSTN trunking providers, hosted services, federated partners System Manager App MM VP CM Avaya Aura SBC or Acme Packet SBC Media Servers Access Connection Application Avaya Aura™ Session Manager Avaya Aura™ SBC SIP Trunks SIP Internet SIP Trunks or For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 6. 6 Avaya Aura™ SBC Role in UC & CC architectures  Completes Avaya’s cost-effective end-to-end SIP architecture – SIP trunking and border interworking – Remote site & worker connectivity  Provides best-in-class VoIP & UC security – Integrated with Avaya Session Manager, Communication Manager, and Voice Portal  Assures quality and high availability – Disaster recovery and survivability  Helps achieve regulatory compliance – Emergency calls, privacy, recording Redundant data centers Contact center, audio/video conferencing, emergency services, etc. To PSTN SIP Tele- worker Nomadic/ mobile user SIP Remote site 1. SIP trunking border 2. Hosted services border 3. Internet border HQ/ campus Remote site CCUC H.323 Regional site Federated partners InternetPrivate network ASM For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 7. 7 Positioning and Packaging1 Avaya Aura SBC Overview3 Avaya Aura™ Session Border Controller Why do you need an SBC?2 Avaya Aura SBC Differentiation4 For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 8. 8 What is a Session Border Controller?  Session = real-time, interactive communications – Voice, video & multimedia – SIP or H.323  Border = IP-IP network borders – SIP trunks to service providers – Remote worker access – Intra- & extra-enterprise  Control – Security & SLA assurance – Revenue & cost optimization – Regulatory compliance Redundant data centers Contact center, audio/video conferencing, emergency services, etc. To PSTN SIP Tele- worker Nomadic/ mobile user SIP Remote site 1. SIP trunking border 2. Hosted services border 3. Internet border HQ/ campus Remote site CCUC H.323 Regional site Federated partners InternetPrivate network ASM For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 9. 9 Why use an SBC?  Real-time IP communications is different than TDM and other IP flows – Sessions initiated from inside or outside of firewall – Continuous stream vs. traffic bursts, 2-way flows – Interoperability problems between multivendor solutions will occur  Security is paramount – Multi-protocol and real-time nature of IP telephony and Unified Communications traffic demands sophisticated stateful defense strategy – Signaling attacks are simplest to launch  Today’s data-focused security solutions are not enough – Lack ability to dynamically correct VoIP connectivity issues – Unable to perform VoIP signaling/media deep packet inspection – Cannot solve protocol interoperability problems For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 10. 10 Enterprise and contact center security threats  Denial of Service – Call/registration overload – Malformed messages (fuzzing)  Configuration errors – Mis-configured devices – Operator and application errors  Theft of service – Unauthorized users – Unauthorized media types  Viruses & SPIT – Viruses via SIP messages – Malware via IM sessions – SPIT – unwanted traffic Source: Nemertes Research Enterprise Adoption of Collaboration Tools Increased usage of collaboration tools means security threats are more of a concern For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 11. 11 How are SBCs different from firewalls?  Traditional firewalls cannot: – Prevent SIP-specific overload conditions and malicious attacks – Open / close RTP media ports in sync with SIP signaling – Track session state and provide uninterrupted service – Perform interworking or security on encrypted sessions – Scale to handle thousands of real-time sessions – Provide carrier-class availability – Solve multi-vendor SIP interoperability problems  InfoSec best practice = deploy defense-in-depth model with application-level security proxies for email and web applications – This means firewalls alone are not sufficient – Same model applies for IP telephony, UC and CC applications For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 12. 12 SBC vs. Firewall with ALG  Terminates, re-initiates and initiates signaling & SDP  Two sessions - one on each side of system  Layer 2-7 state aware  Inspects and modifies any application layer header info (SIP, SDP, etc.)  Static & dynamic ACLs  Unable to terminate, initiate, re- initiate signaling & SDP  Single session dialog across system  Layer 2-4 state aware  Inspects and modifies only application layer addresses (SIP, SDP, etc.)  Static ACLs only SBC SIP trunk IP PBX UC server Data center SIP trunk IP PBX UC server Data center FW with ALG For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 13. 13 SBC vs. other approaches Function & feature examples Avaya AuraTM SBC Acme Packet Net-Net SBC Firewall with SIP ALG IP PBX + Session Manager Router Other UC security element DoS/DDoS protection √ √ - - - limited Access control - dynamic & static √ √ static only - static only - Topology hiding √ √ - - - - Encryption – signaling & media √ √ IPSec only TLS only IPsec only limited Malware & SPIT mitigation √ √ - - - √ Remote NAT traversal √ √ - - - - VPN bridging √ √ - - L3 only - Header manipulation rules for interop √ √ - - - - SIP / H.323 interworking √ √ - - - - Overlapping dial plan translations √ √ - √ - - Advanced session admission controls √ √ - √ - - Load balancing & advanced routing √ √ - √ - - Signaling overload control √ √ - √ - - QoS marking and reporting √ √ - - minimal - Embedded in Avaya Aura System Platform √ - - √ - - For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 14. 14 Why do you need an SBC?2 Positioning & Packaging1 Avaya Aura™ Session Border Controller Avaya Aura SBC Overview3 Avaya Aura SBC Differentiation4 For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 15. 15 Reliability and Scale  Active/standby redundancy  Scales to 750 sessions  Redundant SIP connectivity to service providers and Session Manager / Communication Manager possible Avaya Aura™ SBC Key Features Applications  SIP trunking to PSTN providers  SIP trunking to hosted service providers (i.e. conferencing, contact center, etc.)  SIP trunking to federated businesses  Remote worker connectivity via Internet  Voice, video, presence & IM chat ready Security  Acme Packet’s proven SBC security framework for DoS/DDOS protection  TLS & SRTP encryption Service Provider Interoperability  Same SBC technology used by majority of Service Providers  Flexible controls to solve interop problems  SIP/H.323 IWF for legacy network apps  Proven configuration templates  Tested with SPs through DevConnect Evolution  Deployable on Avaya Aura System Platform  Easily add SBC to existing installations  Flexible feature set for new applications SM SP CM SBC For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 16. 16 Avaya Aura™ Session Border Controller + Avaya Aura System Platform  Avaya Aura SBC runs as an embedded virtualized application on System Platform  Same approach used for other Avaya virtualized applications Avaya Aura System Platform HDDS8800 Linux Console Domain XEN Hypervisor DOM-0 SBC Linux RAM NIC CPU For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 17. 17 Avaya Aura™ SBC & Acme Packet Net-Net SBCs Small to Medium Enterprise & CC Large Enterprise & CC Location = Data Center / Branch Office Data Center Data Center (requiring transcoding) # of lines (UC) = 25 – 2400 750 – 10,000 5,000 – 80,000 20,000 – 360,000 # of agents (CC) = 25 – 100 75 – 2,000 500 – 8,000 2,000 – 36,000 # of SBC sessions1 = 1 – 750 150 – 8,000 1,000 – 16,000 4,000 – 72,000 Available Features2 SIP / H.323 / IWF √ √ √ √ Full SBC Feature Set √ √ √ √ Call Recorder Interface √ √ √ √ Transcoding √ √ Embedded GUI/EMS Embedded GUI EMS EMS EMS Acme Packet Net-Net 9200 Acme Packet Net-Net 3800 Acme Packet Net-Net 4500 Avaya Aura SBC Notes: 1. SBC session capacity is controlled through licensing; capacity can vary by signaling protocol, call flow, codec, configuration, feature usage and SPU and NPU options 2. Some features are included in the base license and others are available as options (consult price book for details) For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 18. SBC Comparison Table – At a Glance Function & features Avaya AuraTM SBC Acme Packet Net-Net SBC 3800 / 4500 Security Features - - DoS/DDoS Protection, Access Control, Topology Hiding √ √ Encryption – Signaling & Media (TLS & SRTP) √ √ Malware & SPIT mitigation √ √ Additional US Government DoD Features & Certifications √ Interop Features - - SIP / H.323 Interworking √ √ Header Manipulation Rules (HMR) for Interop Mediation √ √ Media Transcoding √ Session Control Features - - Advanced Session Admission Controls √ √ Load Balancing & Advanced Routing √ √ QoS Marking and Reporting √ √ Management Features - - Element Management Embedded GUI + SIP trunking wizard CLI or Acme Packet EMS Accounting with QoS Reporting & CDRs √ √ Session Replication for Recording √ √ Embedded Call Troubleshooting Tool √ Host Platform Details Avaya Aura System Platform & S8800 Acme Packet Hardware For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 19. 19 Avaya Aura™ SBC Security Framework  SBC DoS/DDoS protection – Protect against DoS/DDoS attacks – Access control & VPN separation – Dynamic, session-aware access control for signaling & media  Topology hiding & privacy  Viruses, malware & SPIT mitigation – Deep packet inspection  Encryption and Authentication – TLS, SRTP, IPSec  Monitoring and reporting – Record attacks & attackers – Provide audit trails SBC DoS protection Fraud prevention Access control Topology hiding & privacy Service infrastructure DoS prevention Viruses malware & SPIT mitigation For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 20. 20 Why do you need an SBC?2 Positioning & Packaging1 Avaya Aura™ Session Border Controller Avaya Aura SBC Differentiation4 Avaya Aura SBC Overview3 For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 21. 21 Avaya Aura™ SBC = Security and more...  Legacy data security infrastructure is not enough – SBCs provide all necessary defense-in-depth security capabilities for UC and CC applications – Alternative solutions (including UC-centric solutions) are not sufficient  SBCs can help in the area of – Signalling protocol interworking – QoS / Accounting – Session replication for recording – High availability For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 22. 22 Avaya Aura™ SBC value propositions & benefits  Avaya Aura SBCs augment Avaya solutions for UC and CC – Defend SIP signaling elements against security threats, overloads – Eliminate signaling and many other interoperability issues – Preserve session quality under load and adverse conditions – Extend Avaya application reach across IP network borders – Support regulatory compliance  Key Benefits – Faster Avaya solutions deployment at lower risk and cost • Easier integration of Avaya with third-party applications and services – Safe use of cost-effective SIP trunks – High-quality session delivery to workers across the enterprise – Improves customer’s options for customizing their networks For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 23. 23 Avaya and Acme Packet Relationship  Strategic alliance contract completed  Reference architectures agreed and tested – Avaya only connects to SIP Trunks through the SBC – The preferred SBC vendor recommended for Avaya AuraTM – Three-way certification program with SIP Trunk providers  Extensive integration testing completed – Communication Manager, Session Manager, ICR, Voice Portal – Nortel CS1000, CS2100, BCM  Joint go-to-market for product delivery and support – Two-tier sales via Distribution for Avaya Aura SBC – Direct channel for Acme Packet Net-Net 3800 / 4500  Education, marketing, consulting programs  Better solutions than anything Cisco can provide For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 24. 24 Summary  Avaya AuraTM SBCs = optimal security solution for UC and CC applications  Provides features required SIP trunking & remote worker applications – Interworking, call recording, QoS measurement, NAT traversal – Designed for voice, video, presence and IM chat applications  Based on market-leading and widely-deployed technology from Acme Packet – 1,000+ customers in over 100 countries – 48 of top 50, 90 of the top 100 service providers – 11 of top Fortune 25 enterprise, 200+ total enterprise customers For more information contact us at www.packetbase.com or 866.405.3992 - © 2010 Avaya Inc. All rights re
  • 25. Avaya Aura™ Session Border Controller PacketBase, Inc. www.packetbase.com