Broadvox SIP Trunking. Frequently Asked Questions (FAQs)

Size: px
Start display at page:

Download "Broadvox SIP Trunking. Frequently Asked Questions (FAQs)"

Transcription

1 Broadvox SIP Trunking Frequently Asked Questions (FAQs)

2 Table of Contents Can a Call Center with an automated dialer use Broadvox services? 3 Can I connect to Broadvox services if I have a dynamic IP address? 3 Can I keep my current phone number(s) if I switch to Broadvox services?... 3 Can I send a number in the caller ID that is not provided by Broadvox?... 3 Can I send a 7-digit number for local calling?... 3 Does Broadvox provide a SLA?... 3 Does Broadvox support Caller ID (CID)?... 4 Does Broadvox support Caller Name (CNAM)?... 4 Does Broadvox support E911?... 4 Does Broadvox support faxing?... 4 Does Broadvox support Microsoft OCS 2007?... 4 Does Broadvox support point-to-point connectivity from our network to the Broadvox data center?... 4 Does Broadvox support QoS?... 4 Does Broadvox support registration?... 5 Does Broadvox support SIP over TCP?... 6 Does Broadvox support SIP over TLS?... 6 Does Broadvox support SRTP?... 6 Does Broadvox support VPN connectivity?... 6 How are local calling areas determined?... 6 How does local calling work?... 6 I am using dual/triple/quad T1s for my Internet connection. What protocol should I use to bond them?... 7 Confidential and Proprietary 1

3 If I forward a call to a number that is local to the calling party, will it be treated as a local call?... 7 If I purchase a GO!Local trunk for my centralized PBX in New York City and an Enhanced Local Number in Chicago at a branch location, can I send a call to Chicago from New York City and have it considered a local call or vice-versa?... 7 Is faxing over VoIP reliable?... 7 Is it possible for someone to spoof caller ID information?... 7 My PBX is behind a NAT, can I still use Broadvox services?... 8 What codecs does Broadvox support?... 8 What PBX/router/switch/IAD/gateway/ISP does Broadvox recommend?... 8 What type of redundancy options do Broadvox SIP Trunks support? 8 What type of security features do Broadvox SIP trunks offer?... 9 When using Broadvox GO!Local, how do we pass a call in a way that indicates it is long distance as opposed to local? Will calls ever traverse the public Internet? Confidential and Proprietary 2

4 Can a Call Center with an automated dialer use Broadvox services? It depends on the dialer. a. If the dialer generates numbers at random, then no. b. If the dialer uses a list of pre-screened numbers to place calls then yes, with certain limits on how quickly a customer tries to set up calls. In general, if the call center is a legitimate business that (for example) performs collections for several different entities and knows that the dialed numbers are associated with specific people, then it is not a problem. If the call center is a company that uses a dialer to generate a list of numbers that might not be associated with a person, then Broadvox services may not be used. Can I connect to Broadvox services if I have a dynamic IP address? Yes, customers can connect to Broadvox services with a dynamic IP address by using registration. Can I keep my current phone number(s) if I switch to Broadvox services? In most cases, yes, Broadvox supports Local Number Portability (LNP). A Broadvox sales associate can determine whether specific numbers are portable. Can I send a number in the caller ID that is not provided by Broadvox? Yes, Broadvox allows customers to send whatever 10-digit number in the caller ID they would like to send. Bear in mind that if a customer sends a 10-digit number that does not represent their business, it may be illegal and a breach of the Broadvox acceptable terms of use. This functionality is primarily for call forwarding applications where it is desirable to know the true calling party. Can I send a 7-digit number for local calling? No. Broadvox supports only 10-digit, 1+10-digit, and 011+CC+TN international dialing. To enable 7-digit dialing, Broadvox recommends that customers add their area code to the outbound dialed number before it leaves their PBX. Does Broadvox provide a SLA? Yes, Broadvox does provide a Service Level Agreement (SLA). A Broadvox sales associate can provide a copy. Confidential and Proprietary 3

5 Does Broadvox support Caller ID (CID)? Yes, Broadvox supports passing caller ID in the From, Remote-Party-ID, and P- Asserted-Identity headers. The caller ID should be a 10-digit number. Does Broadvox support Caller Name (CNAM)? Yes, Broadvox supports CNAM on both the outbound and inbound directions on the customer s Billing Telephone Number (BTN). Customers must contact the Broadvox LNP department to have their outbound CNAM set to their desired name. Inbound CNAM on their BTN should work automatically. The name will be contained in the Display Name portion of the From header in the SIP signaling. Does Broadvox support E911? Yes. Broadvox supports E911 on customers BTN and Broadvox Enhanced Local Numbers (ELNs). Customers must make sure they send the correct BTN or ELN on any call to 911; otherwise the call center will receive the wrong address because addresses are registered against the calling number. There is a $50 per-call charge for any call to 911 from a calling number that is not a BTN or ELN. Does Broadvox support faxing? Broadvox supports T.38 for faxing, as well as faxing over G.711 µ-law. Does Broadvox support Microsoft OCS 2007? Yes, Broadvox supports Microsoft OCS Broadvox will continue to support Microsoft OCS 2007 when Release 2 becomes available in However, if customers do not wish to wait for Release 2, they may use OCS 2007 with Broadvox today. Does Broadvox support point-to-point connectivity from our network to the Broadvox data center? Yes, Broadvox can provide point-to-point connectivity options. A Broadvox sales associate can provide a quote. Does Broadvox support QoS? Short Answer: This question stems from a misunderstanding of QoS (Quality of Service) and is not really a valid question. See the long answer. Long Answer: QoS is typically deployed on a homogeneous network. A homogeneous network is a network under the control of one entity and designed and deployed using a single policy for packet classification and prioritization. Any time a packet crosses a network boundary, it might flow under a different policy Confidential and Proprietary 4

6 for classification and prioritization which no longer matches the policy of the network that it left. When such policy changes occur, the QoS tag on the packet might be altered from its original state. This is re-classification. Re-classification can occur at any network boundary and depends on the policies of both networks. Thus, any QoS tag placed on packets before they leave a network might never reach the Broadvox network. In addition, any QoS tag Broadvox places on the packet might never reach the destination network. QoS is only useful if there is a bottleneck between the source and destination endpoints and more than one type of traffic traverses that bottleneck. In a case like that, the QoS policy is meant to prioritize one type of traffic over another. Typically, a primary distinction exists between voice/video and data. There are other types, such as network control traffic, but for this discussion, only voice or data traffic is included. Thus, if there is a separate Internet connection for voice (no data is sent over that connection), deploying QoS on that connection will serve no purpose. It makes no sense to try to prioritize one voice connection over another, and more than likely, no routers or switches exist that are capable of doing so. The Broadvox network runs 99.99% voice traffic. Broadvox does not have the capability to prioritize one voice stream over another. While the Broadvox network marks packets accordingly and implements QoS policies, it makes little difference in the flow of packets across the network. Broadvox also keeps adequate available bandwidth on all links to ensure they never become congested. QoS is of benefit if both data and voice traffic use the same Internet connection. In this case, traffic should be classified accordingly and packets prioritized before they go out over the Internet connection. In addition, the ISP should be contacted to classify and prioritize packets before they send traffic back over the Internet connection. A customer s Internet connection is likely the largest (and possibly the only) bottleneck between the customer s PBX and the Broadvox Session Border Controller (SBC) they signal to. Therefore, it is the primary point where QoS should be enabled. Enabling QoS at that point will help reduce or eliminate packet loss of voice traffic, reduce jitter for voice traffic, and reduce latency for voice traffic. All of these affect call quality. In addition, customers should determine the total bits per second of traffic they have allocated to voice after enacting their QoS policy and ensure that it is large enough to accommodate the number of simultaneous calls they anticipate, given the bandwidth requirements of their particular codec. Remember, customers must also count any headers on the codec (RTP, IP, UDP, Ethernet/Frame Relay/MLPPP, etc). For G.711, they should plan for 88 Kbps per call. For G.729, they should plan for 38 Kbps per call. In addition, they should ensure that it is not possible to set up more calls than the allotted voice bandwidth can handle. Does Broadvox support registration? Yes, Broadvox supports registration on Version N SIP trunks. Confidential and Proprietary 5

7 Does Broadvox support SIP over TCP? Yes, Broadvox supports SIP over TCP (Transmission Control Protocol) on Version N trunks. Does Broadvox support SIP over TLS? No, Broadvox does not support SIP over TLS. The third generation of SIP Trunks (Version O) may support SIP over TLS. At this time, Broadvox does not have an estimated release date for the third generation of SIP Trunking. Does Broadvox support SRTP? No, Broadvox does not support SRTP. At this time it is cost prohibitive. Does Broadvox support VPN connectivity? No, Broadvox does not support VPN connectivity at this time. How are local calling areas determined? Local calling areas are determined by comparing the rate center of the calling party number (CGPN) to the rate center of the called party number (CDPN). Broadvox typically follows the rate center relationships defined by the ILEC servicing the customer s area. Thus, in almost all cases, if the ILEC in the customer s area has defined that two rate centers are local to each other, all calls that fit that relationship definition will be rated as local calls. If a customer needs to know whether specific calls will be treated as local, they may submit a request to the Broadvox Customer Service Department to have their particular calling patterns verified. How does local calling work? Local calling is based on both the called and calling party numbers. Here are the rules, in the order they are applied: 1. If the called party number is local to the calling party number and the calling party number is either a BTN or ELN, then the call is rated as local. 2. If the called party number is not local to the calling party number and the calling party number is either a BTN or ELN, then the call is rated as long distance. Confidential and Proprietary 6

8 I am using dual/triple/quad T1s for my Internet connection. What protocol should I use to bond them? Broadvox recommends Multilink PPP. MLPPP fragments the packets on the transmitting side and un-fragments the packets on the receiving side. This preserves packet ordering which is very important for VoIP call quality. If I forward a call to a number that is local to the calling party, will it be treated as a local call? No, because the calling party number is not a BTN or ELN. If a customer forwards a call to a number that is local to the BTN or an ELN and they send that BTN or ELN as the calling party number, then yes, the forwarded call is rated as local. Also see How does local calling work? If I purchase a GO!Local trunk for my centralized PBX in New York City and an Enhanced Local Number in Chicago at a branch location, can I send a call to Chicago from New York City and have it considered a local call or vice-versa? Possibly; it depends on how it is done. If a customer sends the Chicago ELN as the calling party number when calling Chicago or the New York BTN as the calling party number when calling New York, the answer is yes. Also see How does local calling work? Is faxing over VoIP reliable? Broadvox has experienced average fax success rates exceeding 95% for customers on both T.38 and G.711. Many customers have seen success rates over 99% for both protocols. Faxing over VoIP has come a long way in the past ten years, and most modern devices have no trouble performing fax over VoIP. However, there are still several devices on the market that have poor VoIP faxing implementations. If a customer is having difficulty faxing over VoIP, they may wish to try an alternate faxing platform. Broadvox device certification plans include testing fax over both T.38 and G.711 for both inbound and outbound directions. Is it possible for someone to spoof caller ID information? Someone who uses a VoIP connection, regardless of whether the phone number is from a PSTN, cellular, satellite or VoIP provider, can spoof phone numbers. Anyone who uses a VoIP connection has the capability of sending a caller ID (CID the calling party phone number that appears on the recipient s phone) that does not belong to them, as long as their service provider does not screen CIDs. In addition, if they send a CID on their outbound call to a recipient who receives calling name service (CNAM), that recipient will see the registered name as the calling name. The reason is simple: when the called party s local exchange carrier (LEC) receives the call, the called party s LEC will dip the CID and lookup Confidential and Proprietary 7

9 the CNAM information. Since the CID is a valid CID, that dip will return the registered CNAM information. This capability is also present from various TDM service providers, so it has been around and has been a possible threat for far longer than VoIP services have been around. VoIP has simply lowered the cost of entry for this particular type of malicious act. On June 27, 2007, the United States Senate Committee on Commerce, Science and Transportation approved the Truth in Caller ID Act of 2007 which outlaws this practice, both over traditional phone services and over VoIP. As of December 11, 2008, it was not signed into law. My PBX is behind a NAT, can I still use Broadvox services? Yes, unlike some providers who require that customers perform Network Address Translation (NAT) traversal (NAT-T) on their end, the Broadvox Version N SIP Trunks offer provider-side NAT-T. The customer s trunk must be deployed using registration. What codecs does Broadvox support? Broadvox supports G.711 µ-law and G.729 Annex A for voice; RFC 2833, inaudio DTMF, and SIP INFO for DTMF methods; and T.38 or in-audio tone-based signaling over G.711 µ-law for faxing. What PBX/router/switch/IAD/gateway/ISP does Broadvox recommend? Broadvox is not in the practice of recommending 3 rd party equipment or services, with the exception that we do recommend that customers choose their PBX, IAD, or gateway from one of the Broadvox-certified PBX, IAD or gateway vendors. What type of redundancy options do Broadvox SIP Trunks support? Broadvox Version S SIP Trunks provide: Two gateways in two separate cities to signal to/receive traffic from Ability to load balance traffic to multiple IP addresses on customer end Ability to provide a primary/secondary configuration for the customer end The customer must provide a public, static IP address to signal to. Broadvox Version N SIP Trunks provide: One virtual IP address that resides on a single cluster in the Dallas location to signal to/receive traffic from Ability to load balance traffic to multiple IP addresses on customer end o Concurrent call sessions (per trunk) must be split between IP addresses Ability to provide a primary/secondary configuration for the customer end Confidential and Proprietary 8

10 Ability to perform fallback call forwarding to a PSTN number in the event the customer trunk is not reachable o Fallback forwarding can be performed on a per-trunk basis o Fallback forwarding can also be performed on a per-did basis o Per-DID forwarding is first precedence o Per-trunk forwarding is second precedence o Per-DID and per-trunk can co-exist simultaneously SIP over TCP support (good for Microsoft OCS 2007) The customer may use a public, static IP address or perform REGISTRATION with a dynamic or NAT IP address. What type of security features do Broadvox SIP trunks offer? Short Answer: Broadvox supports VPN connectivity to Broadvox data centers or direct Point-to-Point connectivity. Medium Answer: VoIP is more difficult to intercept or spoof than a PSTN or cellular phone connection. To intercept or spoof a PSTN phone connection, the only requirements are a small amount of Telco knowledge and access to either the PSTN phone box on the building or one of the junction boxes in the neighborhood that the calls pass through. Gaining access to these boxes usually requires nothing more than a screwdriver, torx bit or bolt cutter. To intercept or spoof a cellular call only requires capturing the unique phone identification number of the cellular phone used for placing or receiving the calls. This allows cloning the phone and then calls can be intercepted and placed as if they were from the original phone. With VoIP, in depth technical knowledge is required as well as hacking into one or more networks that have been deployed with ample security precautions. This is considerably more difficult than either of the methods for PSTN or cellular interception. Long Answer: When talking about security features for a SIP Trunk, there are generally two topics of interest. 1. First there is authentication. Authentication makes sure that the calls are sent to Broadvox and that Broadvox sends calls to the customer. This prevents an outside party from sending calls to Broadvox pretending to be the customer and prevents Broadvox from sending calls to the outside party because they were tricked into thinking the calls were being sent to the customer. Circumventing authentication is referred to as a man-in-the-middle attack. On static SIP trunks, Broadvox authenticates based on IP address. Each call has an audio stream in both directions, and signaling must also pass in both directions in order to establish the call. The IP address is statically configured at Broadvox and should be statically configured on the customer side. If someone sends an INVITE to Broadvox from a spoofed IP address (the Confidential and Proprietary 9

11 customer s IP address), Broadvox sends responses back to the customer s IP address. The attacker would never be able to receive the responses unless they also had control of either the customer s ISP network or one of the Tier 1 Internet providers between the Broadvox network and the customer s ISP s network. If they had such control, the customer s entire Internet connection would be down. This issue can be prevented on a static trunk by utilizing either a VPN connection to Broadvox or a point-to-point connection to the Broadvox data center. In such a configuration, the customer s IP in the Broadvox SBC would be a private IP address on the customer s side of the VPN or point-to-point connection. Broadvox would utilize a static route pointing that IP address to the VPN or point-to-point connection. Such an attack would then only be possible if either the customer s network or the Broadvox network were directly compromised. For a dynamic trunk, Broadvox provides a username and password to use to authenticate customers. As long as the customer s username and password are not compromised, nobody can pretend to be the customer for either sending or receiving calls. If the customer s credentials are compromised and someone uses them to pretend to be the customer, it prevents the customer from making or receiving calls, and the customer will be on the phone with Broadvox in short order to get the issue resolved. The password is never passed in clear text over the connection. Instead, Digest authentication is used, which includes a challenge-handshake based on several MD5 hashes. (An MD5 hash is a 128-bit value used to uniquely identify a file.) 2. Secondly, there is interception of a call. Interception can only occur if the attacker has control of the Broadvox network, the customer s network, the customer s ISP s network or any of the Tier 1 providers between Broadvox and the customer s ISP. Obtaining the access required for such an interception is exceedingly difficult, but not unheard of. Once access has been obtained, the attacker must sift through probably millions of packets per second worth of traffic for a specific call, or they must have the knowledge and capability to redirect traffic from the customer s VoIP IP address(es) to a separate capture server. Assume the attacker is both experienced enough and determined enough and that they specifically want access to the customer s phone calls. In that case, they most likely have obtained the customer s VoIP IP address(es) through some other means and have the knowledge and resources to take the capture. If they have this experience, determination, desire to access the customer s specific phone calls, and the access and resources required to do it, they can most certainly record and replay any phone calls the customer makes. They would have access to the calling number, the called number and the actual conversation. This particular attack can be mitigated by utilizing a VPN or point-to-point connection from the customer s network to the Broadvox network. However, such an attacker would likely find some way into either the customer s network or the Broadvox network, despite implementation of the best security practices by either or both parties. It could be further mitigated by utilizing TLS for signaling information as it would prevent the attacker from obtaining the media ports involved in any particular Confidential and Proprietary 10

12 call; however Broadvox does not support SIP over TLS. It could also be mitigated much further by utilizing SRTP (secure real-time transport protocol) for the media streams; however Broadvox does not support this as it is too cost prohibitive to deploy at this time. (The extra complexity would reduce the maximum number of calls Broadvox can fit on any SBC by at least an order of magnitude, which would result in an order of magnitude increase in pricing to the customer.) In addition to these points, customers phone calls must pass through at least one other and potentially several other VoIP, PSTN, or cellular networks before the call reaches its intended recipient. Neither Broadvox nor customers have any control over the implementation or transport across those networks or the security measures they employ. The only secure VoIP product customers can purchase that allows them to make and receive normal phone calls is one that guarantees that every network in the call path does VoIP (right up to the end user) and utilizes both TLS and SRTP between every node. Calls across such a network would likely cost several orders of magnitude more than they do today. Nobody offers this kind of VoIP service. Aside from that, customers could do a direct business-to-customer VoIP call from their network to their customer s network using TLS and SRTP or a VPN. However, customers would need to create such connections to each and every one of their customers for this scheme to work. In general, customers are far less likely to be a victim of interception or spoofing by using a VoIP system than they are by using a PSTN or cellular phone system. They can lessen the risk by utilizing a VPN or point-to-point connection directly to the Broadvox network; however it does not provide total, end-to-end protection of their calls. All it does is eliminate their ISP and the Tier 1 providers between Broadvox and their ISP s network from the un-encrypted call path. When using Broadvox GO!Local, how do we pass a call in a way that indicates it is long distance as opposed to local? If a customer has a GO!Local trunk and no GO!Domestic trunk, they should just send all calls to Broadvox in the same way. Broadvox will rate local calls as local and long distance as long distance. See How does local calling work? for more details. If a customer has GO!Local and GO!Domestic, they should direct long distance calls to the GO!Domestic trunk and local calls to the GO!Local trunk. There are different methods to accomplish it. a. One popular method is to have users dial "1" in front of all long distance calls, and just the straight 10 digits on local calls. b. Another popular method is to match the NPANXX of dialed numbers to known local NPANXX codes and route to the appropriate trunk based on long distance status. This is typically referred to as "least cost routing." People who use this method typically refer to to determine the local calling areas. Confidential and Proprietary 11

13 Even if calls come in to Broadvox from the same IP address on the customer side, Broadvox can still separate the traffic between the trunks. When they have multiple trunks on one IP address on their side, Broadvox provides multiple IP addresses for them to signal to, one for each trunk. Thus, the traffic they send to Broadvox is separated into the different types of trunks based on which Broadvox IP address they sent the call to. If they send the long distance traffic to the trunk intended for local traffic or the local traffic to the trunk intended for the long distance traffic, it may result in substantial charges to their account as they will be paying long distance on all calls and a higher per-minute rate on long distance calls sent to the GO!Local trunk because it does not contain their bundle of minutes from the GO!Domestic trunk. Customers must make absolutely certain they send calls to the correct IP. Will calls ever traverse the public Internet? That depends on what is considered to be the "public Internet." In reality, there is no such thing as the "public Internet." The Internet is set of private networks that use public IP addresses to interconnect to each other. If customers have a public IP address, they can send traffic toward any other public IP address, and they can receive traffic from any other public IP address. This does not mean, however, that the general public has access to any of their traffic at any point while traversing the private networks that make up the Internet. Typically, when traffic is sent from one public IP address to another, the customer s traffic traverses the private network of their ISP, the private network of their ISP's ISP, and possibly several other private networks before it reaches their intended destination. The number of private networks that it traverses depends on whether they are connected to a Tier 1, Tier 2 or Tier 3 ISP. It also depends on whether the destination is connected to a Tier 1, Tier 2 or Tier 3 ISP. Broadvox connects directly to several Tier 1 ISPs in each city. If customers connect to a Tier 1 ISP, then their calls typically only traverse their network, their ISP's network, and Broadvox s ISP's network before arriving at the edge of the Broadvox network. If they happen to be using one of the same Tier 1 providers that Broadvox uses, then their call only traverses their network to get from their network to the Broadvox network. Even in the worst case of their ISP being a Tier 3 ISP, their traffic does not likely traverse more than four networks to get from their network to the Broadvox network. Once a call reaches the Broadvox network, Broadvox attempts to terminate it directly to the PSTN. If Broadvox does not have direct connectivity to the PSTN in the market of the destination party, they pass the call off to another carrier for termination to the PSTN. In many cases, this alternate carrier is a Regional Bell Operating Company (RBOC) that has direct control over the destination market. In some cases, the alternate carrier is another SIP carrier who passes the call off to another party. When Broadvox does not pass the call directly to the PSTN, they pass the call on to the next entity via SIP over the Internet. In some of those cases, the RBOC and the Broadvox Tier 1 ISP are the same entity, so the call travels from the Broadvox network to their network and then directly to the PSTN. Currently, it is cost prohibitive to purchase direct, point-to-point connectivity between the Broadvox network and the networks of all the carriers used to Confidential and Proprietary 12

14 terminate calls. To do so, Broadvox would be required to significantly increase rates, at which point VoIP would no longer be cost-competitive with the Plain Old Telephone System (POTS). Typically, customers who ask this question are either concerned about call interception. If that is the case, see "What type of security features do your trunks offer?", or they are concerned about Quality of Service (QoS). For QoS questions, see "Do you support QoS?" If the customer is asking for some other reason, they should feel free to contact Broadvox with their specific questions. Confidential and Proprietary 13

Frequently Asked Questions about Integrated Access

Frequently Asked Questions about Integrated Access Frequently Asked Questions about Integrated Access Phone Service How are local, long distance, and international calls defined? Local access transport areas (LATAs) are geographical boundaries set by the

More information

EarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide

EarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide EarthLink Business SIP Trunking NEC SV8300 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 May 18, 2012 CHANGE HISTORY Version Date Change Details Changed By 1.0 5/18/2012

More information

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking 2012 Advanced American Telephones. All Rights Reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property licensed

More information

EarthLink Business SIP Trunking. NEC SV8100 IP PBX Customer Configuration Guide

EarthLink Business SIP Trunking. NEC SV8100 IP PBX Customer Configuration Guide EarthLink Business SIP Trunking NEC SV8100 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011

More information

nexvortex SIP Trunking Implementation & Planning Guide V1.5

nexvortex SIP Trunking Implementation & Planning Guide V1.5 nexvortex SIP Trunking Implementation & Planning Guide V1.5 510 S PRING S TREET H ERNDON VA 20170 +1 855.639.8888 Introduction Welcome to nexvortex! This document is intended for nexvortex Customers and

More information

SIP Security Controllers. Product Overview

SIP Security Controllers. Product Overview SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

Switchvox. Technical Application Notes

Switchvox. Technical Application Notes Switchvox Technical Application Notes Table of Contents About Broadvox... 1 About Switchvox... 1 Purpose, Scope and Audience... 2 Switchvox Deployment Information... 3 Switchvox External IP Address...

More information

Table of Contents. Confidential and Proprietary

Table of Contents. Confidential and Proprietary Table of Contents About Toshiba Strata CIX and Broadvox SIP Trunking... 1 Requirements... 2 Purpose, Scope and Audience... 3 What is SIP Trunking?... 4 Business Advantages of SIP Trunking... 4 Technical

More information

EarthLink Business SIP Trunking. Toshiba IPedge Customer Configuration Guide

EarthLink Business SIP Trunking. Toshiba IPedge Customer Configuration Guide EarthLink Business SIP Trunking Toshiba IPedge Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

EarthLink Business SIP Trunking. ININ IC3 IP PBX Customer Configuration Guide

EarthLink Business SIP Trunking. ININ IC3 IP PBX Customer Configuration Guide EarthLink Business SIP Trunking ININ IC3 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011

More information

1.1.3 Versions Verified SIP Carrier status as of 18 Sep 2014 : validated on CIC 4.0 SU6.

1.1.3 Versions Verified SIP Carrier status as of 18 Sep 2014 : validated on CIC 4.0 SU6. 1 SIP Carriers 1.1 Telstra 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found

More information

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and

More information

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP

More information

VoIP Application Note:

VoIP Application Note: VoIP Application Note: Configure NEC UX5000 w/ BroadVox SIP Trunking Service P/N 0913226 Date: 8/12/09 Table of Contents: GOAL... 3 PREREQUISITES... 3 SIP TRUNKING INFORMATION PROVIDED BY BROADVOX:...

More information

SIP Trunking Quick Reference Document

SIP Trunking Quick Reference Document SIP Trunking Quick Reference Document Publication Information SAMSUNG TELECOMMUNICATIONS AMERICA reserves the right without prior notice to revise information in this publication for any reason. SAMSUNG

More information

AT&T IP Flex Reach/ IP Toll Free Configuration Guide IC 3.0 with Interaction SIP Proxy

AT&T IP Flex Reach/ IP Toll Free Configuration Guide IC 3.0 with Interaction SIP Proxy INTERACTIVE INTELLIGENCE AT&T IP Flex Reach/ IP Toll Free Configuration Guide IC 3.0 with Interaction SIP Proxy Version 1.7 9/2/2009 TABLE OF CONTENTS 1 AT&T... 5 1.1 Introduction... 5 1.2 Product Descriptions...

More information

Note: As of Feb 25, 2010 Priority Telecom has not completed FXS verification of fax capabilities. This will be updated as soon as verified.

Note: As of Feb 25, 2010 Priority Telecom has not completed FXS verification of fax capabilities. This will be updated as soon as verified. 1 SIP Carriers 1.1 Priority Telecom 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can

More information

1 SIP Carriers. 1.1.1 Warnings. 1.1.2 Vendor Contact Vendor Web Site : http://www.wind.it. 1.1.3 Versions Verified SIP Carrier status as of 9/11/2011

1 SIP Carriers. 1.1.1 Warnings. 1.1.2 Vendor Contact Vendor Web Site : http://www.wind.it. 1.1.3 Versions Verified SIP Carrier status as of 9/11/2011 1 SIP Carriers 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found in the SIP

More information

EarthLink Business SIP Trunking. Asterisk 11.2 IP PBX Customer Configuration Guide

EarthLink Business SIP Trunking. Asterisk 11.2 IP PBX Customer Configuration Guide EarthLink Business SIP Trunking Asterisk 11.2 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0

More information

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. API: An application programming interface (API) is a source

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

VoIP Security regarding the Open Source Software Asterisk

VoIP Security regarding the Open Source Software Asterisk Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de

More information

EarthLink Business SIP Trunking. Cisco Call Manager and Cisco CUBE Customer Configuration Guide

EarthLink Business SIP Trunking. Cisco Call Manager and Cisco CUBE Customer Configuration Guide EarthLink Business SIP Trunking Cisco Call Manager and Cisco CUBE Customer Configuration Guide Publication History First Release: Version 2.0 April 20, 2012 CHANGE HISTORY Version Date Change Details Changed

More information

Skype Connect Requirements Guide

Skype Connect Requirements Guide Skype Connect Requirements Guide Version 4.0 Copyright Skype Limited 2011 Thinking about implementing Skype Connect? Read this guide first. Skype Connect provides connectivity between your business and

More information

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt) Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption

More information

Basic Vulnerability Issues for SIP Security

Basic Vulnerability Issues for SIP Security Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future

More information

SIP and VoIP 1 / 44. SIP and VoIP

SIP and VoIP 1 / 44. SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies

More information

BROADSOFT PARTNER CONFIGURATION GUIDE VEGASTREAM VEGA 100

BROADSOFT PARTNER CONFIGURATION GUIDE VEGASTREAM VEGA 100 BROADSOFT PARTNER CONFIGURATION GUIDE VEGASTREAM VEGA 100 JULY 2005 Version 1.0 BroadWorks Guide Copyright Notice Copyright 2005 BroadSoft, Inc. All rights reserved. Any technical documentation that is

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

MITEL SIP CoE. Technical. Configuration Notes. Configure MCD 6.X for use with babytel SIP trunks. SIP CoE 13-4940-00266

MITEL SIP CoE. Technical. Configuration Notes. Configure MCD 6.X for use with babytel SIP trunks. SIP CoE 13-4940-00266 MITEL SIP CoE Technical Configuration Notes Configure MCD 6.X for use with babytel SIP trunks SIP CoE 13-4940-00266 NOTICE The information contained in this document is believed to be accurate in all respects

More information

Best Practices for Securing IP Telephony

Best Practices for Securing IP Telephony Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram

More information

ESI SIP Trunking Installation Guide

ESI SIP Trunking Installation Guide ESI SIP Trunking Installation Guide 0450-1227 Rev. B Copyright 2009 ESI (Estech Systems, Inc.). Information contained herein is subject to change without notice. ESI products are protected by various U.S.

More information

EarthLink Business SIP Trunking. Switchvox SMB 5.5 & Adtran SIP Proxy Implementation Guide

EarthLink Business SIP Trunking. Switchvox SMB 5.5 & Adtran SIP Proxy Implementation Guide EarthLink Business SIP Trunking Switchvox SMB 5.5 & Adtran SIP Proxy Implementation Guide Publication History First Release: Version 1.0 April 20, 2012 CHANGE HISTORY Version Date Change Details Changed

More information

Voice over IP Basics for IT Technicians

Voice over IP Basics for IT Technicians Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements

More information

SIP Trunking Application Notes V1.3

SIP Trunking Application Notes V1.3 SIP Trunking Application Notes V1.3 Publication Information SAMSUNG TELECOMMUNICATIONS AMERICA reserves the right without prior notice to revise information in this publication for any reason. SAMSUNG

More information

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,

More information

TELEPHONE MAN OF AMERICA. Earning Your Business Every Step of the Way!

TELEPHONE MAN OF AMERICA. Earning Your Business Every Step of the Way! TELEPHONE MAN OF AMERICA Earning Your Business Every Step of the Way! Specializing in Telecom Equipment of all Brands, Carrier Services, Technician Services, Maintenance Agreements & Purchasing Excess

More information

SIP Trunking Service Configuration Guide for Broadvox Fusion

SIP Trunking Service Configuration Guide for Broadvox Fusion Notice Note that when converting this document from its original format to a.pdf file, some minor font and format changes may occur. When viewing and printing this document, we cannot guarantee that your

More information

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011 Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 Solution Overview... 3 Network Topology... 4 Network Configuration...

More information

FortiVoice. Version 7.00 VoIP Configuration Guide

FortiVoice. Version 7.00 VoIP Configuration Guide FortiVoice Version 7.00 VoIP Configuration Guide FortiVoice Version 7.00 VoIP Configuration Guide Revision 2 14 October 2011 Copyright 2011 Fortinet, Inc. All rights reserved. Contents and terms are subject

More information

SIP Trunking and Voice over IP

SIP Trunking and Voice over IP SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential

More information

Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents

Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents Title Six Steps To Getting Your Network Ready For Voice Over IP Date January 2005 Overview This provides enterprise network managers with a six step methodology, including predeployment testing and network

More information

BroadSoft Partner Configuration Guide

BroadSoft Partner Configuration Guide BroadSoft Partner Configuration Guide Microsoft Lync 2010 SIP Trunking August 2012 Document Version 1.6 9737 Washingtonian Blvd Suite 350 Gaithersburg, MD USA 20878 Tel +1 301.977.9440 WWW.BROADSOFT.COM

More information

Voice Over IP Performance Assurance

Voice Over IP Performance Assurance Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya

More information

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice

More information

nexvortex SIP Trunking

nexvortex SIP Trunking nexvortex SIP Trunking January 2015 510 SPRING STREET HERNDON VA 20170 +1 855.639.8888 Copyright nexvortex 2014 This document is the exclusive property of nexvortex, Inc. and no part may be disclosed,

More information

Curso de Telefonía IP para el MTC. Sesión 1 Introducción. Mg. Antonio Ocampo Zúñiga

Curso de Telefonía IP para el MTC. Sesión 1 Introducción. Mg. Antonio Ocampo Zúñiga Curso de Telefonía IP para el MTC Sesión 1 Introducción Mg. Antonio Ocampo Zúñiga Conceptos Generales VoIP Essentials Family of technologies Carries voice calls over an IP network VoIP services convert

More information

Technical Configuration Notes

Technical Configuration Notes MITEL SIP CoE Technical Configuration Notes Configure MCD for use with OpenIP SIP Trunking service SIP CoE 11-4940-00186 NOTICE The information contained in this document is believed to be accurate in

More information

VoIP Network Configuration Guide

VoIP Network Configuration Guide The owner friendly phone system for small business VoIP Network Configuration Guide Release 7.10 Copyright 2011 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiGuard, FortiCare, FortiManager,

More information

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be

More information

SIP Trunking Service Configuration Guide for Time Warner Cable Business Class

SIP Trunking Service Configuration Guide for Time Warner Cable Business Class SIP Trunking Service Configuration Guide for Time Warner Cable Business Class NDA-31669 Issue 1.0 NEC Corporation of America reserves the right to change the specifications, functions, or features at

More information

nexvortex Setup Template

nexvortex Setup Template nexvortex Setup Template ZULTYS, INC. April 2013 5 1 0 S P R I N G S T R E E T H E R N D O N V A 2 0 1 7 0 + 1 8 5 5. 6 3 9. 8 8 8 8 Introduction This document is intended only for nexvortex customers

More information

Http://www.passcert.com

Http://www.passcert.com Http://www.passcert.com Exam : 70-337 Title : Enterprise Voice & Online Services with Microsoft Lync Server 2013 Version : DEMO 1 / 18 Topic 1, Litware, Inc Case A Overview Litware, Inc., is an international

More information

SIP Trunking. Service Guide. www.megapath.com. Learn More: Call us at 877.634.2728.

SIP Trunking. Service Guide. www.megapath.com. Learn More: Call us at 877.634.2728. Service Guide Learn More: Call us at 877.634.2728. www.megapath.com What is MegaPath SIP Trunking? SIP Trunking enables your business to reduce costs and simplify IT management by combining voice and Internet

More information

ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet.

ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet. KEY VOIP TERMS 1 ACD: Automatic Call Distribution is a system used to determine how incoming calls are routed. When the ACD system receives an incoming call it follows user-defined specifications as to

More information

SIP Trunking Manual 05.15. Technical Support Web Site: http://ws1.necii.com (registration is required)

SIP Trunking Manual 05.15. Technical Support Web Site: http://ws1.necii.com (registration is required) SIP Trunking Manual 05.15 Technical Support Web Site: http://ws1.necii.com (registration is required) This manual has been developed by NEC Unified Solutions, Inc. It is intended for the use of its customers

More information

Configuring SIP Trunking and Networking for the NetVanta 7000 Series

Configuring SIP Trunking and Networking for the NetVanta 7000 Series 61200796L1-29.4E July 2011 Configuration Guide Configuring for the NetVanta 7000 Series This configuration guide describes the configuration and implementation of Session Initiation Protocol (SIP) trunking

More information

Intelligent SIP trunking for experts. Service guide

Intelligent SIP trunking for experts. Service guide Intelligent SIP trunking for experts Service guide Last updated: June 3, 2015 Purpose This document outlines Flowroute SIP trunking services including features, functionality, technical specifications,

More information

VOIP NETWORK CONFIGURATION GUIDE RELEASE 6.10

VOIP NETWORK CONFIGURATION GUIDE RELEASE 6.10 TALKSWITCH DOCUMENTATION VOIP NETWORK CONFIGURATION GUIDE RELEASE 6.10 CT.TS005.002606 ANSWERS WITH INTELLIGENCE INTRODUCTION About this guide This guide will help you plan and configure a TalkSwitch system

More information

T.38 fax transmission over Internet Security FAQ

T.38 fax transmission over Internet Security FAQ August 17, 2011 T.38 fax transmission over Internet Security FAQ Give me a rundown on the basics of T.38 Fax over IP security. Real time faxing using T.38 SIP trunks is just as secure as sending faxes

More information

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call

More information

Voice over IP (VoIP) Basics for IT Technicians

Voice over IP (VoIP) Basics for IT Technicians Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides

More information

nexvortex Setup Guide

nexvortex Setup Guide nexvortex Setup Guide CISCO UC500 March 2012 Introduction This document is intended only for nexvortex customers and resellers as an aid to setting up the Cisco PBX software to connect to the nexvortex

More information

SIP Trunking Service Configuration Guide for Skype

SIP Trunking Service Configuration Guide for Skype SIP Trunking Service Configuration Guide for Skype NDA-31154 Issue 1.0 NEC Corporation of America reserves the right to change the specifications, functions, or features at any time without notice. NEC

More information

SIP Trunking The Provider s Perspective

SIP Trunking The Provider s Perspective SIP Trunking The Provider s Perspective Presented by Pete Sandstrom, CTO BandTel Advanced SIP Session Overview 1. Open Systems Interconnection Model (OSI) is more than a model 2. Quality of Service (QoS)

More information

SIPSTATION User Guide. Schmooze Com Inc.

SIPSTATION User Guide. Schmooze Com Inc. Schmooze Com Inc. Chapters Overview Logging In & Adding a Key Account Settings Route & Trunk Configuration DID Configuration Recap Overview The SIPSTATION module, when combined with a SIPSTATION SIP Trunk

More information

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,

More information

Implementing VoIP support in a VSAT network based on SoftSwitch integration

Implementing VoIP support in a VSAT network based on SoftSwitch integration Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.

More information

SIP Trunking Service Configuration Guide for MegaPath

SIP Trunking Service Configuration Guide for MegaPath Notice Note that when converting this document from its original format to a.pdf file, some minor font and format changes may occur. When viewing and printing this document, we cannot guarantee that your

More information

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1 Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public

More information

Wave SIP Trunk Configuration Guide FOR BROADVOX

Wave SIP Trunk Configuration Guide FOR BROADVOX Wave SIP Trunk Configuration Guide FOR BROADVOX Last updated 1/7/2014 Contents Overview... 1 Special Notes... 1 Before you begin... 1 Required SIP trunk provisioning and configuration information... 1

More information

Voice Over IP and Firewalls

Voice Over IP and Firewalls Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Use of Voice Over IP (VoIP) in enterprises is becoming more and more

More information

EarthLink Business SIP Trunking. Avaya IPO IP PBX Customer Configuration Guide

EarthLink Business SIP Trunking. Avaya IPO IP PBX Customer Configuration Guide EarthLink Business SIP Trunking Avaya IPO IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011

More information

Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0

Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

Fonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide

Fonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide Fonality Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide Fonality Table of Contents 1. Overview 2. SIP Trunk Adaptor Set-up Instructions 3.

More information

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,

More information

SIP Trunking Service Configuration Guide for PAETEC (Broadsoft Platform)

SIP Trunking Service Configuration Guide for PAETEC (Broadsoft Platform) Notice Note that when converting this document from its original format to a.pdf file, some minor font and format changes may occur. When viewing and printing this document, we cannot guarantee that your

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

Vega 100G and Vega 200G Gamma Config Guide

Vega 100G and Vega 200G Gamma Config Guide Vega 100G and Vega 200G Gamma Config Guide This document aims to go through the steps necessary to configure the Vega SBC to be used with a Gamma SIP Trunk. When a SIP trunk is provisioned by Gamma a list

More information

LifeSize Transit Deployment Guide June 2011

LifeSize Transit Deployment Guide June 2011 LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address

More information

www.xo.com XO SIP Service Customer Configuration Guide for Interactive Intelligence Customer Interaction Center (CIC) with XO SIP

www.xo.com XO SIP Service Customer Configuration Guide for Interactive Intelligence Customer Interaction Center (CIC) with XO SIP www.xo.com XO SIP Service Customer Configuration Guide for Interactive Intelligence Customer Interaction Center (CIC) with XO SIP Table of Contents XO SIP Service 1 1 Introduction... 3 2 Executive Summary...

More information

Technical Configuration Notes

Technical Configuration Notes MITEL SIPCoE Technical Configuration Notes Configure Mitel UC360 SIP Phone and Mitel MCD for use with VidyoWay SIP CoE 13-4940-00228 NOTICE The information contained in this document is believed to be

More information

Implementing VoIP monitoring solutions. Deployment note

Implementing VoIP monitoring solutions. Deployment note Implementing VoIP monitoring solutions Deployment note Introduction With VoIP being an integral part of modern day business communications, enterprises are placing greater emphasis on the monitoring and

More information

VoIP / SIP Planning and Disclosure

VoIP / SIP Planning and Disclosure VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings

More information

VoIP Bandwidth Considerations - design decisions

VoIP Bandwidth Considerations - design decisions VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or

More information

Feature and Technical

Feature and Technical BlackBerry Mobile Voice System for SIP Gateways and the Avaya Aura Session Manager Version: 5.3 Feature and Technical Overview Published: 2013-06-19 SWD-20130619135120555 Contents 1 Overview...4 2 Features...5

More information

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Christina Hattingh Darryl Sladden ATM Zakaria Swapan Cisco Press 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Contents Introduction xix Part I: From TDM Trunking to SIP Trunking

More information

VegaStream Information Note Considerations for a VoIP installation

VegaStream Information Note Considerations for a VoIP installation VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS Master of Science in Networking and Data Communications THESIS Thesis Title Voice over IP (VoIP) to Enterprise Users Dissertation submitted

More information

Glossary of Telco Terms

Glossary of Telco Terms Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business

More information