Understanding SAFE IP Telephony Network Designs
The next sections discuss the deployment considerations for IP telephony in each of the SAFE network blueprints: the small, medium-sized, and enterprise networks. In each of these blueprints, adding IP telephony into the network infrastructure required some modification of devices that provide an interface between modules in the blueprint. Not all modules were affected by the incorporation of IP telephony into the network infrastructure; therefore, those modules were omitted from the discussion.
Branch Versus Headend Considerations
You can use the designs in small and medium-sized network configurations in one of two ways. In the first configuration, the design is acting as a branch of a larger enterprise. In the second configuration, the larger network design is considered the headend of the organization's network, and the smaller network designs can be considered the branch or satellite offices.
IP Telephony Deployment Models
Three general models primarily exist for the deployment of IP telephony services throughout a network. The following deployment models are influenced by both the size and the distribution of the network (multiple branches, private networks, and so on):
- Single-site campus
This model is the most basic deployment model. All the IP telephony devices reside in a single, physically contiguous campus - WAN centralized call-processing
In this model, multiple sites deploy IP telephony. These sites might be connected to a central campus over a private WAN or through the use of VPNs. The headend site, or campus, contains the only call-processing manager cluster; however, remote sites can have local voice services, such as voice mail. - WAN distributed call-processing
This is the most complex design of the three models. In this model, multiple sites are connected through either a private WAN or over a VPN, and one or more of the sites contains a call-processing manager cluster. Many, although not all, of the sites have local voice services, such as voice mail. Some of the sites rely on others for their voice-mail services.
Small IP Telephony Network Design
The small IP telephony network design is based on the SAFE small network blueprint. This design is shown in Figure 19-2 and includes several minor modifications to the small blueprint design.
Figure 19-2. Small IP Telephony Network Design
[View full size image]

Corporate Internet Module
The Corporate Internet module provides connectivity to the Internet for the small SAFE blueprint. The key device here is the voice-enabled edge firewall/router, which provides protection of network resources, stateful filtering, and voice services. The firewall/router mitigates toll fraud by limiting only known telephony devices from communicating with one another, as well as other attacks such as unauthorized access, DoS attacks, and IP spoofing attacks.The voice-enabled firewall/router provides not just the typical security services, such as NAT, VPN, stateful firewall inspection of traffic, and IDS, but also voice services, including VLAN segmentation. In one VLAN reside the call-processing manager, the proxy server, and the IP phones. The user, management, and voice-mail/e-mail systems reside in the other VLAN.
Campus Module
The Campus module contains the end-user systems and the corporate servers, such as voice-mail servers, e-mail servers, management servers, IP phones, and the Layer 2 infrastructure. VLANs are enabled on the Layer 2 switch to provide segmentation between the voice and data traffic. Host IDS (HIDS) is deployed across all critical servers. The role of HIDS is more important in this design because of the lack of a Layer 3 router within the Campus module to provide access control between the VLANs.
Design Alternatives for the Small IP Telephony Network
One alternative design is to provide two completely separate VLANs, with a Layer 3 access device providing traffic filtering between the VLANs. Another alternative is to place the voice-mail/e-mail server in the voice segment; however, this design is not recommended because the voice-mail/e-mail server is running additional services that are required in the data segment.
Medium-Sized IP Telephony Network Design
The medium-sized IP telephony network design shown in Figure 19-3 is based on the SAFE medium-sized network blueprint. No changes have been made except to the Campus module to support IP phones, PC-based IP phones, voice services, proxy services, PSTN for WAN backup and local calls, and VLANs for voice and data segmentation.
Figure 19-3. Medium-Sized IP Telephony Network Design
[View full size image]

Campus Module
The key IP telephony devices in the campus module are provided in Table 19-3.
Key Device | Functions |
---|---|
Layer 3 switch | Routes and switches voice and data traffic within the module. |
Layer 2 switch (with VLAN support) | Provides network connectivity to endpoint user workstations and IP phones. |
Corporate servers | Provide e-mail and voice-mail services to internal users, and file, print, and DNS resolution to workstations. |
User workstation | Provides data services and voice services (through PC-based IP phones) to end users. |
NIDS appliance | Provides Layer 4 to Layer 7 packet inspection. |
IP phones | Provides voice services to end users. |
Call-processing manager | Provides voice services to IP telephony devices in the module. |
Proxy server | Provides data services to IP phones. |
Stateful firewall | Provides network-level filtering for the call-processing manager and the proxy server. |
Design Alternatives for the Medium-Sized IP Telephony Network
One possible alternative is to redesign the IP telephony network to take advantage of high-availability capabilities. This redesign would require the addition of another call-processing manager and another firewall in the Campus module, to provide resiliency. Another possibility is to move the voice-mail system off an additional demilitarized zone (DMZ) segment on the stateful firewall.
Large IP Telephony Network Design
The large IP telephony network design is based on the SAFE Enterprise network blueprint. This design already took IP telephony requirements into account. However, certain changes were made to this design in the "SAFE: IP Telephony Security in Depth" whitepaper. These changes include the following additions:
- PC-based IP phones
- Voice segment for the voice-mail system
- PSTN for local calls at the Edge Distribution module
- HIDS on all voice-related servers
- Call-processing manager and stateful firewall to provide resiliency in the design
This section focuses on the Building and Server modules, where the preceding changes were made.
Building Module
The Building and Building Distribution modules of the SAFE enterprise design are shown in Figure 19-4. The Building module provides switching functions for data and voice traffic, while at the same time enforcing segmentation between the two. This is done through stateless Layer 3 filtering and VLANs.
Figure 19-4. Large IP Telephony Building and Building Distribution Modules
[View full size image]

Key Device | Functions |
---|---|
Layer 2 switch (with VLAN support) | Provides network connectivity to endpoint user workstations and IP phones. |
User workstation | Provides data services and voice services (through PC-based IP phones) to end users. |
IP phones | Provide voice services to end users. |
Server Module
The primary function of the Server module, shown in Figure 19-5, is to provide voice and data services throughout the design to end users and devices.
Figure 19-5. Large IP Telephony Network Design
[View full size image]

Key Device | Functions |
---|---|
Layer 3 switch | Routes and switches voice and data traffic within the module. |
Corporate servers | Provide e-mail and voice-mail services to internal users, and provide file, print, and DNS resolution to workstations. |
Call-processing manager | Provides voice services to IP telephony devices in the module. |
Proxy server | Provides data services to IP phones. |
Stateful firewall | Provides network-level filtering for the call-processing manager and the proxy server. |
Design Alternative for the Large IP Telephony Network
As in the medium-sized network design, you can place the voice-mail server on an additional DMZ interface off the firewall, to further isolate this server and stateful inspection and the filtering of the traffic between the IP telephony devices and the voice-mail server. However, this increases the complexity of the design.