5 Security Firewall

vENUM achieves network security using the Linux firewall provided by the Oracle Linux distribution. This serves as the platform for vENUM software. vENUM configures firewall rules in the Linux firewall on each server to allow only essential network traffic. The VENUM software is composed of various components each providing unique services, each component is responsible to configure the firewall rules to allow the network traffic destined to and originated from the provided services.

This feature brings flexibility and capability in vENUM to dynamically determine and customize the Linux firewall on each vENUM-MP server in the vENUM node. This allows only the essential network traffic pertaining to the active configuration.

The in-bound signaling traffic is accepted by the vENUM application over the configured DNS Connections only. By monitoring the connections and allowed connections list, this feature determines the incoming packets to be processed. It then configures the Linux Firewall on the vENUM-MP servers to allow the network traffic for those connections only and completely denies the non-signaling network traffic. Thus, providing added security to the signaling networks.

Note:

The non-signaling traffic is traffic from internal services, such as SSH, FTP, HTTP, HTTPS, and so on.