SIP Trunking Configuration with

Size: px
Start display at page:

Download "SIP Trunking Configuration with"

Transcription

1 SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise

2 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND. Dell, the DELL logo, the DELL badge, PowerEdge, PowerVault, and Dell EqualLogic are trademarks of Dell, Inc.; Microsoft is a registered trademark of Microsoft Corporation in the United States and/or other countries. Sipera is a registered trademark of Sipera Systems. Wireshark is a registered trademark of the Wireshark Foundation. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims proprietary interest in the marks and names of others Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the express written permission of Dell Inc. is strictly forbidden. For more information, contact Dell.

3 CONTENTS INTRODUCTION... 4 SIP TRUNKING REQUIREMENTS... 5 OCS R2 TELEPHONY/VOICE ROUTING INFRASTRUCTURE... 5 SECURITY AND PERIMETER NETWORK COMPONENTS... 5 SIP TRUNK SERVICE PROVIDER... 7 END-TO-END CONSIDERATIONS... 8 SIP TRUNKING CONFIGURATION EXAMPLE WITH OCS 2007 R EDGE DEVICE COMMUNICATION... 9 MEDIATION SERVER SETUP END-TO-END COMMUNICATION TESTING THE CONFIGURATION OUTBOUND CALL VERIFICATION INBOUND CALL VERIFICATION CONCLUSION... 17

4 Introduction Microsoft Office Communication Server 2007 Release 2 (OCS R2) introduces many new features and server roles to Unified Communication (UC) enterprise users. One of the new features provides enterprises with direct connectivity to PSTN and Voice-over-IP (VoIP) network without deploying PBX and IP-PSTN gateways in their environments. The connectivity to the PSTN users and external VoIP users is provided by Internet Telephony Service Providers (ITSP) using Session Initiation Protocol (SIP) Trunking technology. This enables internal and external calling to public telephone numbers and reduces the complexity of the end to end deployment. SIP Trunking technology offers a cost-effective means of voice communication by offloading the Time Division Multiplexing (TDM) integration requirements of PSTN to a SIP service provider without a loss of end-user functionality when compared with traditional TDM-based deployment. OCS 2007 R2 is configured with dial plans that achieve the desired level of internal and external routing. It uses a defined set of transport protocols for SIP signaling and media traffic. For such a deployment, the SIP trunk service provider selected should be able to support the same protocols or should have a very minimal number of intermediate components for interoperability requirements. Traffic routing and security, component integration, and consideration of ports between the service provider and the OCS infrastructure play important roles in SIP trunking deployment and successful communication. This white paper defines the SIP trunking deployment and configuration requirements with OCS 2007 R2 infrastructure. It also briefly steps through an example of testing deployment to provide an understanding of the procedures involved in a basic setup. Sip trunk service providers that are certified to operate with OCS R2 are listed here (

5 SIP Trunking Requirements SIP Trunking setup requirements vary depending on the types of protocols involved and the communication methods provisioned by the SIP trunk service provider. Usually, service providers follow a standard format of SIP trunking that is widely accepted in the VoIP and telecom industry. The underlying transport protocols may be different based on their provisioning and deployment methodologies. OCS R2 also uses a defined set of protocols for internal SIP communication. When provisioning a SIP trunking solution for an OCS 2007 R2 environment, you must ensure that the underlying protocols and ports are accepted by both parties and that security mechanisms are in place. The interoperability factors and security concerns between OCS R2 and service provider may lead to additional components in the deployment path. Therefore, the SIP trunking requirements for an OCS R2 deployment can be categorized into three segments: OCS 2007 R2 telephony infrastructure, SIP trunk service provider, and Interface components to provide security and interoperability. OCS R2 telephony/voice Routing Infrastructure In addition to instant messaging, live-meeting, and conferencing components, OCS R2 contains enterprise voicerouting functionality that you can configure to provide connectivity between internal-uc and external-telephony devices. The Front-End Communication Server pool in OCS 2007 R2 takes much of the responsibility for defining and processing inbound and outbound rules, similar to a PBX deployment. The Mediation Server provides gating functionality and isolates the OCS infrastructure within an external telecom environment. It also translates SIP signals and RTP media between the communication server and SIP trunk setup. In SIP trunking topology, when an enterprise voice user initiates a call from an Office Communicator client to an external SIP or PSTN user, the appropriate rules are invoked and phone normalization occurs. The call is then forwarded through the Mediation Server to SIP trunk connectivity for completion. As mentioned earlier, the routing functionality for Enterprise Voice is configured through rules and policies defined in the Global Voice Configuration. These rules are set up with the following administrative parameters: Location Profiles: These profiles specify how OCS 2007 R2 front-end servers route calls that are dialed by the user. They include normalization rules that convert the number dialed in OCS to E.164 format. Policy: A policy specifies the calling privileges that apply to users. Default policy can be setup that enables simultaneous ringing, meaning that incoming calls are simultaneously routed to a user s internal desk phone and Communicator devices. Policies are also used to implement class of service to control what number ranges users are allowed to dial. Routes: A route allows defined location profile users with outside dialing privileges to call external phones and pass through defined mediation servers and an SIP trunk service provider. This configuration allows internal users to call phone numbers outside of the organization. Security and Perimeter Network Components Using the Internet for telephony drives cost savings in terms of both operating and capital expenditures. However, the deployment of SIP trunks means that voice is sent and received over TCP/IP as packets instead of routing through traditional circuit-switched networks. This configuration creates new security concerns, since the

6 enterprise network is now exposed to VoIP threats from the Internet. VoIP technology is susceptible to viruses, Denial of Service (DoS) attacks, spoofing, eavesdropping, VoIP spam, session hijacking, and many other issues just like any other Internet-packet communication. Traditional firewalls only ensure protection against standard security and Quality of Service (QoS) threats from the Internet. For VoIP-specific threats, SIP-aware security measures are required in the perimeter network joining the Mediation Server to the SIP trunk circuit. If the SIP trunk service provider can provision the same transport protocols used by the Mediation Server and is capable of communicating SIP signals over TLS or TCP and media packets with RTP or SRTP, then a Virtual Private network (VPN) connection between the enterprise edge site and the service provider is sufficient to fulfill security requirements. In such a deployment, the Session Border Controller (SBC) at the service provider and the Mediation server at the enterprise site manage the VoIP sessions, as shown in Figure-1. Figure 1 SIP trunking with OCS 2007 R2 using a VPN connection between routers at both sites If the service provider does not use TLS or TCP transport in other words, UDP is the only option for SIP communication then some additional edge device(s) may be required at the enterprise perimeter site for protocol handling and SBC functions. Most service providers address security requirements for SIP signaling using IPSec (Secure Internet protocol) or secure tunnels. One or more additional edge device(s) may be required at the enterprise site to perform the following functions: Secure link/tunnel termination SBC functions for SIP session management and termination Secure UC access NAT (Network Address Translation) traversal and signal/media encryption (if still required) Transport protocol translation from UDP to TCP or TLS E.164 format conversion applicable if the service provider is using a non-e.164 format; note that Mediation Server in OCS 2007 R2 is also capable of providing the E.164 format conversion

7 There are devices available from SIP security vendors that provide all of the requirements (listed above) built into one box. These functions must comply with enterprise policies and should be performed efficiently without impairing QoS. Figure-2 shows a SIP trunking implementation that uses an IPSec tunnel for signaling between the ITSP and the UC enterprise. Additional edge devices in the demilitarized zone (DMZ) are required, depending upon the protocols and methods provisioned by the service provider. Figure 2 SIP trunking with OCS 2007 R2 using IPSec tunnel and additional Edge device at Enterprise site In addition to setup, signaling and media ports for listening and transmission are enabled on device interfaces for proper relay of messages. The media ports are usually configured with a large range which allows random allocation of ports for each call thereby adding another level of security for RTP traffic. SIP Trunk Service Provider The SIP trunk service provider consists of a Session Border Controller (SBC), IP-PSTN gateways, and other intermediary components. The SBC provides SIP services across NAT and firewall devices located at the enterprise site. It communicates with the enterprise edge device or Mediation Server to manage all VoIP sessions. The PSTN gateways and switches are responsible for handling calls that are eventually routed to the PSTN network.

8 The SIP trunk customer supplies the provider with the number of users allowed external phone connectivity in the OCS R2 infrastructure and rerouted through the SIP trunk. The service provider leases the required number of unique Direct Inward Dialing (DID) phone numbers for that OCS setup. Typically the ITSP can provide DID numbers from a number of regions/countries via one SIP Trunk. End-to-End Considerations Important considerations that should be planned for when implementing end-to-end communication of SIP trunking are: 1. The signaling and media ports on the interfaces of sending and receiving devices in the communication path should match or coordinate. Any mismatch or restrictions on receiving ports will block traffic from the sending device. 2. The firewalls on enterprise and service-provider premises should allow only the specific IP addresses, SIP signaling, and media ports of edge devices or routers, as agreed by both parties in the communication. 3. The IP addresses on the external edge of terminal routers should be publicly routable. 4. If the service provider is capable of provisioning TLS protocol in complete end- to-end communication, then the process requires installation of authentication certificates on the devices involved in the setup. Such a scenario may not require deployment of edge security devices on the enterprise side, as shown in Figure If the Service provider is provisioning a secure tunnel like IPSec for SIP signaling then extra security considerations are required for media traffic that is routed outside the IPSec tunnel. One reason a service provider may not use IPSec for RTP traffic is to avoid overloading the channel. In such a scenario, SRTP should be used for media security.

9 SIP Trunking Configuration Example with OCS 2007 R2 This section briefly provides the configuration steps for an example deployment of SIP trunking with OCS 2007 R2. The setup for this test environment is shown in Figure-3. The SIP service provider in this example provisions SIP over UDP using an IPSec connection that is terminated at the enterprise side on a terminal router. This can be any basic router capable of handling layer-3 services and IPSec termination. An edge device behind the router acts as an SBC, providing NAT traversal, security, and protocol interoperability with OCS 2007 R2 Mediation Server setup. Figure 3 Dell Test environment of SIP trunking with OCS 2007 R2 using IPSec tunnel Edge Device Communication This setup uses a Sipera IPCS 310 as a sample edge device that lies in the DMZ and is configured to receive SIP/RTP traffic from the router and send it to the Mediation Server after processing. Figures 4 through 9 show basic configuration steps for a Sipera device (using its management console). 1. The interfaces of the Sipera device linking the internal side to the Mediation Server and the external side to the trunk service provider are configured with respective domain IP addresses along with the transport protocol and listening ports. In this setup, the SIP signaling from the service provider is received on UDP transport and repackaged on TCP for the Mediation Server side.

10 Figure 4 Screenshot showing the SIP signaling interfaces and ports of Sipera device 2. The media ports range for RTP traffic are also defined on these interfaces. Figure 5 Screenshot showing the Media interfaces and ports

11 3. The routing profile is configured for SIP packet routing with next-hop IP location. It basically ensures that the packets originating from the SIP trunk provider will be relayed to the Mediation server and vice versa. Figure 6 Screenshot showing the next-hop routing location and transport 4. Server configuration defines the virtual entities assigned to the internal and external interfaces that are responsible for executing routing profiles. Figure 7 Screenshot showing the Server Configuration entity for Mediation side

12 Figure 8 Screenshot showing the Server Configuration for Service provider side 5. Some rules can also be applied to server interworking to define the phone number patterns that are allowed to pass. Converting phone numbers into E.164 format also occurs in this step. Figure 9 Screenshot showing the Server interworking and phone pattern policy

13 Note that the steps defined above are for basic configurations only. For more advanced configurations including security settings refer to the Sipera IPCS deployment guides. Mediation Server Setup The Mediation Server acts as the gateway for the OCS infrastructure. Microsoft highly recommends having two Ethernet interfaces on a Mediation Server for complete network isolation: The external edge interface to communicate with the Sipera device and the internal edge interface to link to OCS internal infrastructure. You can configure the Mediation Server and activate it using the OCS 2007 R2 administration console. 1. The General tab in Mediation Server properties is configured with the internal edge interface IP address and external edge IP address, along with the SIP listening port. The location profile is part of the Enterprise Voice configuration defined in the Global Voice Configuration. For a detailed configuration of location profile and OCS R2 telephony routing, refer to the Microsoft OCS R2 Deployment Guide. The media ports range is defined for RTP/SRTP traffic. Figure 10 Screenshot showing the General setting on Mediation Server properties 2. The Next Hop Connections tab is configured with the OCS R2 Front-End Server/pool address and PSTN gateway address (which is Sipera IPCS in this case), along with the SIP port. The Mediation Server can be configured to use either TLS or TCP transport with Sipera. Usually the connection between SIpera and

14 Mediation is secure and dedicated, therefore extra security with TLS may not be required. But if TLS option is considered, the security certificates are required on both devices for mutual handshake and authentication process. With TLS based option, the encryption level can also be defined for media packets to use SRTP. Figure 11 Screenshot showing the Next hop Connections setting on Mediation Server properties End-to-End Communication As previously mentioned, OCS R2 Enterprise Voice routing is configured with a location profile and policies that use DID phone numbers assigned by the service provider. Defined outbound routing traffic is sent to the Mediation Server, which communicates with the Sipera edge device in the DMZ. In turn, the edge device communicates with the terminal router, which relays traffic through the external firewall to the service provider. The process happens in reverse for inbound traffic routed from the PSTN user to the enterprise site user. In case of inbound communication failure from the service provider to the enterprise site, you can troubleshoot the problem by first verifying the connection between the firewalls and terminal routers at both ends. If you determine that the IPSec (or VPN) termination points are pinging and required ports are open, then you should analyze the SIP traffic logs on the terminal router, edge device, Mediation server and OCS R2 internal receiving point. If the reports show that SIP signals are successfully received on these devices, then you should analyze media traffic along the same path for errors. Use the same troubleshooting steps in reverse order for outbound calls originating from the OCS R2 enterprise user to the PSTN user.

15 Testing the Configuration This section discusses two basic testing scenarios for the sample deployment outlined in the previous section. These scenarios verify inbound and outbound call flows as routed through the deployment path. Outbound Call Verification The outbound call test involves initiating a phone or communicator call from the OCS 2007 R2 infrastructure to an external (PSTN) phone number. When the call is initiated from an OCS R2 registered end-point, the call is normalized through the applied location profile and routed to the next-hop (if the user is allowed to use that route) the OCS location profile verifies that it is destined for an outbound route. The SIP signal verifies the path by establishing a session through the Mediation Server to the Sipera device, which performs the transport transformation. The signal is then routed outside of the corporate network through the firewall, and received at the service provider site. The service provider processes the signal and initiates a discovery on the destination to determine whether the signal should be routed through the PSTN gateway or to the Internet for VoIP and SIP users. When the service provider completes the discovery, it sends an acknowledgement signal back to the OCS user and establishes a session. Media traffic then flows, using RTP packets. Figure-12 shows the SIP and RTP trace (captured using the Wireshark network protocol analyzer) between the Sipera edge device and the service provider for an outbound call. The SBC-SIP IP and SBC-RTP IP represents the separate IP addresses for SIP and RTP traffic used by the service provider in this configuration. The SIP listening port is 5103 on the service provider side and 5060 on the Sipera side (as shown in the following figure). Figure 12 Screenshot showing the Outbound Call sequence

16 Inbound Call Verification The inbound call test involves initiating a phone call from and external (PSTN) phone number to the OCS 2007 R2 user. The service provider routes the SIP signal through its SBC and router to the enterprise site, where the Sipera edge device receives the session after passing though the terminal router. The edge device then routes the SIP signal on TCP or TLS to the Mediation Server and then to the OCS R2 internal infrastructure. The SIP session is established between OCS R2 user and PSTN user after verification and media traffic is allowed to flow. Figure-13 shows SIP and RTP traces (captured using Wireshark) between the Sipera edge device and the service provider for an inbound call. Figure 13 Screenshot showing the Inbound Call sequence

17 Conclusion SIP trunking deployment provides a cost-effective solution with OCS 2007 R2. The configuration requires careful planning and consideration with the types of transport protocols and communication methods supported by the SIP trunk service provider. You should also take the security factors into account to avoid any VoIP threats from the Internet. In addition to SIP trunking configuration support, the OCS 2007 R2 infrastructure offers a complete set of unified communications with advanced features such as enhanced instant messaging, A/V conferencing, Live Meeting, and much more. PowerEdge servers and Dell PowerVault, Dell EqualLogic, and Dell/EMC storage provide suitable platforms for deploying the OCS 2007 R2 infrastructure. Dell offers Microsoft SQL Server solutions for hosting OCS 2007 R2 back-end databases and also offers complementary Microsoft Exchange Server solutions for hosting e- mail. These solutions provide a comprehensive platform for implementing an OCS 2007 R2 infrastructure with required availability features. Dell Services include assessment, design, and implementation tailored to UC and messaging deployments. More information about Dell Unified Communications is available at

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Load Balancing for Microsoft Office Communication Server 2007 Release 2 Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Application Notes for Configuring Microsoft Office Communications Server 2007 R2 and Avaya IP Office PSTN Call Routing - Issue 1.0

Application Notes for Configuring Microsoft Office Communications Server 2007 R2 and Avaya IP Office PSTN Call Routing - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Microsoft Office Communications Server 2007 R2 and Avaya IP Office PSTN Call Routing - Issue 1.0 Abstract These Application

More information

Quick Setup Guide. Integration of Aastra MX-ONE / Aastra 700 and Microsoft Lync Server 2010

Quick Setup Guide. Integration of Aastra MX-ONE / Aastra 700 and Microsoft Lync Server 2010 Quick Setup Guide Integration of Aastra MX-ONE / Aastra 700 and Microsoft Lync Server 2010 Aastra MX-ONE TM and Aastra 700 running Telephony Server software V.4.1 SP3 and later Aastra Telecom Sweden AB

More information

SIP Trunking: Deployment Considerations at the Network Edge

SIP Trunking: Deployment Considerations at the Network Edge Small Logo SIP Trunking: Deployment Considerations at the Network Edge at the Network Edge Executive Summary The move to Voice over IP (VoIP) and Fax over IP (FoIP) in the enterprise has, until relatively

More information

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice

More information

OpenScape Business V2

OpenScape Business V2 OpenScape Business V2 Tutorial System Device@Home Configuration Version 1.1 Table of Contents 1. Configuration Overview 4 1.1. Network Scenario Description: 4 1.2. Configuration Steps 5 1.2.1. Overview

More information

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be

More information

Enabling Users for Lync services

Enabling Users for Lync services Enabling Users for Lync services 1) Login to collaborate.widevoice Server as admin user 2) Open Lync Server control Panel as Run As Administrator 3) Click on Users option and click Enable Users option

More information

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security Patton Electronics Co. www.patton.com 7622 Rickenbacker Drive, Gaithersburg, MD 20879, USA tel: +1 301-975-10001000 fax: +1 301-869-9293 Application Note Patton SmartNode in combination with a CheckPoint

More information

Voice Over IP and Firewalls

Voice Over IP and Firewalls Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Use of Voice Over IP (VoIP) in enterprises is becoming more and more

More information

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and

More information

SBC 1000 / SBC 2000 Series Configuration Guide (For Microsoft Lync Server 2013)

SBC 1000 / SBC 2000 Series Configuration Guide (For Microsoft Lync Server 2013) Configuration Guide SBC 1000 / SBC 2000 Series Configuration Guide (For Microsoft Lync Server 2013) For use with AT&T s IP Flexible Reach Enhanced Features Service on MIS, MPLS PNT or AT&T VPN Disclaimers

More information

White Paper. avaya.com 1. Table of Contents. Starting Points

White Paper. avaya.com 1. Table of Contents. Starting Points White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting

More information

nexvortex Setup Template

nexvortex Setup Template nexvortex Setup Template ZULTYS, INC. April 2013 5 1 0 S P R I N G S T R E E T H E R N D O N V A 2 0 1 7 0 + 1 8 5 5. 6 3 9. 8 8 8 8 Introduction This document is intended only for nexvortex customers

More information

Siemens OpenScape Voice V7 SIP Connectivity with OpenScape SBC V7. to Integra SIP Service

Siemens OpenScape Voice V7 SIP Connectivity with OpenScape SBC V7. to Integra SIP Service Siemens OpenScape Voice V7 SIP Connectivity with OpenScape SBC V7 to Integra SIP Service February 2013 Page 1 of 47 Document History Date Version / Issue Modified by Section(s) Affected High-Level Description

More information

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

Configuring a Pure-IP SIP Trunk in Lync 2013

Configuring a Pure-IP SIP Trunk in Lync 2013 Configuring a Pure-IP SIP Trunk in Lync 2013 Contents Configuring a Pure-IP SIP Trunk in Lync 2013... 1 Introduction - Product version: Microsoft Lync Server 2013... 2 Pure-IP SIP Trunk configuration tasks...

More information

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya

More information

Wave SIP Trunk Configuration Guide FOR BROADVOX

Wave SIP Trunk Configuration Guide FOR BROADVOX Wave SIP Trunk Configuration Guide FOR BROADVOX Last updated 1/7/2014 Contents Overview... 1 Special Notes... 1 Before you begin... 1 Required SIP trunk provisioning and configuration information... 1

More information

What is an E-SBC? WHITE PAPER

What is an E-SBC? WHITE PAPER Executive Summary Enterprise communications is in a state of transformation. Businesses are replacing conventional PBX systems with VoIP and Unified Communications (UC) solutions and cloud-based services

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking 2012 Advanced American Telephones. All Rights Reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property licensed

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

Ingate Firewall/SIParator SIP Security for the Enterprise

Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...

More information

BrainDumps.3107.74Q.A

BrainDumps.3107.74Q.A BrainDumps.3107.74Q.A Number: Avaya 3107 Passing Score: 800 Time Limit: 120 min File Version: 4.7 http://www.gratisexam.com/ Avaya 3107 Avaya Session Border Controller Enterprise Implementation and Maintenance

More information

SIP Security Controllers. Product Overview

SIP Security Controllers. Product Overview SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running

More information

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP

More information

Secure VoIP for optimal business communication

Secure VoIP for optimal business communication White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product

More information

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice

More information

Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0

Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

Grandstream Networks, Inc. How to Integrate UCM6100 with Microsoft Lync Server

Grandstream Networks, Inc. How to Integrate UCM6100 with Microsoft Lync Server Grandstream Networks, Inc. How to Integrate UCM6100 with Microsoft Lync Server Index Table of Contents OVERVIEW... 3 UCM6100 CONFIGURATION... 4 STEP 1: CREATE SIP PEER TRUNK... 4 STEP 2: CONFIGURE OUTBOUND

More information

Building the Lync Security Eco System in the Cloud Fact Sheet.

Building the Lync Security Eco System in the Cloud Fact Sheet. Building the Lync Security Eco System in the Cloud Fact Sheet. [Type text] The need to secure all entries to the fastest growing Unified Communication application (UC) and allow for complete inter-operability

More information

An Oracle White Paper August 2013. What Is an Enterprise Session Border Controller?

An Oracle White Paper August 2013. What Is an Enterprise Session Border Controller? An Oracle White Paper August 2013 What Is an Enterprise Session Border Controller? Introduction... 1 Redefining Enterprise Communications... 2 E-SBCs Protect and Control IP Communications... 3 E-SBCs Do

More information

BroadSoft Partner Configuration Guide

BroadSoft Partner Configuration Guide BroadSoft Partner Configuration Guide Microsoft Lync 2010 SIP Trunking August 2012 Document Version 1.6 9737 Washingtonian Blvd Suite 350 Gaithersburg, MD USA 20878 Tel +1 301.977.9440 WWW.BROADSOFT.COM

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

Software-Powered VoIP

Software-Powered VoIP Software-Powered VoIP Ali Rohani Anthony Murphy Scott Stubberfield Unified Communications Architecture Core Scenarios UC endpoints QOE Monitoring Archiving CDR AOL Public IM Clouds Yahoo Remote Users MSN

More information

Best Practices for Securing IP Telephony

Best Practices for Securing IP Telephony Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram

More information

IP Ports and Protocols used by H.323 Devices

IP Ports and Protocols used by H.323 Devices IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential

More information

Voice over IP Basics for IT Technicians

Voice over IP Basics for IT Technicians Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements

More information

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications Oracle s Solution for Secure Remote Workers Providing Protected Access to Enterprise Communications Our forecast shows that the worldwide mobile worker population will increase to more than 1.3 billion

More information

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0 Abstract These Application Notes describe the steps for

More information

PETER CUTLER SCOTT PAGE. November 15, 2011

PETER CUTLER SCOTT PAGE. November 15, 2011 Future of Fax: SIP Trunking PETER CUTLER SCOTT PAGE November 15, 2011 QUESTIONS AND ANSWERS TODAY S SPEAKERS Peter Cutler Vice President of Sales Instant InfoSystems Scott Page Subject Matter Expert Dialogic

More information

APPLICATION NOTE. SIP Trunking Connectivity, Security and Deployment Scenarios. Introduction

APPLICATION NOTE. SIP Trunking Connectivity, Security and Deployment Scenarios. Introduction SIP Trunking Connectivity, Security and Deployment Scenarios Introduction Enterprises have traditionally based their voice communications on an in-premises telephony switch the PBX. Until recently, the

More information

Dialogic. BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge

Dialogic. BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge Dialogic BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge Versatile Dialogic BorderNet Products Handle Network Transitions for Today s Critical Services and Solutions

More information

Configuring an Etherspeak SIP Trunk in Microsoft Lync 2013

Configuring an Etherspeak SIP Trunk in Microsoft Lync 2013 Configuring an Etherspeak SIP Trunk in Microsoft Lync 2013 This is to cover the steps needed for basic functionality to communicate with Etherspeak s SIP trunking service. Many environments are different

More information

Enabling NAT and Routing in DGW v2.0 June 6, 2012

Enabling NAT and Routing in DGW v2.0 June 6, 2012 Enabling NAT and Routing in DGW v2.0 June 6, 2012 Proprietary 2012 Media5 Corporation Table of Contents Introduction... 3 Starting Services... 4 Distinguishing your WAN and LAN interfaces... 5 Configuring

More information

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE Microsoft Office Communications Server 2007 & Coyote Point Equalizer DEPLOYMENT GUIDE Table of Contents Unified Communications Application Delivery...2 General Requirements...6 Equalizer Configuration...7

More information

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures

More information

SBC 1000/2000 Configuration Guide with Lync 2013 for Windstream/ LPAETEC SIP Trunk Deployments

SBC 1000/2000 Configuration Guide with Lync 2013 for Windstream/ LPAETEC SIP Trunk Deployments SBC 1000/2000 Configuration Guide with Lync 2013 for Windstream/ LPAETEC SIP Trunk Deployments Application Notes Rev. 1.0 Last Updated: April 10, 2015 Revision Date Revised By Comments 0.1 12/03/2015 Roman

More information

Unified Communications in RealPresence Access Director System Environments

Unified Communications in RealPresence Access Director System Environments [Type the document title] 3.0 October 2013 3725-78704-001B1 Deploying Polycom Unified Communications in RealPresence Access Director System Environments Polycom Document Title 1 Trademark Information Polycom

More information

Enterprise Voice and Online Services with Microsoft Lync Server 2013

Enterprise Voice and Online Services with Microsoft Lync Server 2013 Course 20337B: Enterprise Voice and Online Services with Microsoft Lync Server 2013 Course Details Course Outline Module 1: Voice Architecture This module introduce Enterprise Voice features of Lync Server

More information

Basic Vulnerability Issues for SIP Security

Basic Vulnerability Issues for SIP Security Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future

More information

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ALCATEL-LUCENT OPENTOUCH SESSION BORDER CONTROLLER A SECURE SOLUTION FOR BORDERLESS CONVERSATIONS APPLICATION

More information

Benefits of Using a Demarcation Device When Integrating Legacy Voice, SIP Trunks and Microsoft OCS R2

Benefits of Using a Demarcation Device When Integrating Legacy Voice, SIP Trunks and Microsoft OCS R2 TECHNICAL WHITE PAPER Benefits of Using a Demarcation Device When Integrating Legacy Voice, SIP Trunks and Microsoft OCS R2 2 SIP Trunking SIP Trunking INTRODUCTION The term trunking has been used in the

More information

Voice over IP Security

Voice over IP Security Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with

More information

Building the Lync Security Eco System in the Cloud Fact Sheet.

Building the Lync Security Eco System in the Cloud Fact Sheet. Building the Lync Security Eco System in the Cloud Fact Sheet. [Type text] The need to secure and deliver a compliant cloud solution to all transactions in and out of the fastest growing Universal Communication

More information

Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment

Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment Application Notes Rev 1.0 P/N 550-06690 Last Updated: October 26, 2015 Revision History Revision Date Revised

More information

Oracle s SIP Network Consolidation Solutions. Using SIP to Reduce Expenditures and Improve Communications

Oracle s SIP Network Consolidation Solutions. Using SIP to Reduce Expenditures and Improve Communications Oracle s SIP Network Consolidation Solutions Using SIP to Reduce Expenditures and Improve Communications A typical large enterprise could enjoy 401 percent three-year ROI on the Net-Net Enterprise Session

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

Enterprise Voice and Online Services with Microsoft Lync Server 2013

Enterprise Voice and Online Services with Microsoft Lync Server 2013 CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Enterprise Voice and Online Services with Microsoft Lync Server 2013 Course 20337B: Five days; Instructor-Led

More information

Voice over IP (VoIP) Basics for IT Technicians

Voice over IP (VoIP) Basics for IT Technicians Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides

More information

Http://www.passcert.com

Http://www.passcert.com Http://www.passcert.com Exam : 70-337 Title : Enterprise Voice & Online Services with Microsoft Lync Server 2013 Version : DEMO 1 / 18 Topic 1, Litware, Inc Case A Overview Litware, Inc., is an international

More information

Vega 100G and Vega 200G Gamma Config Guide

Vega 100G and Vega 200G Gamma Config Guide Vega 100G and Vega 200G Gamma Config Guide This document aims to go through the steps necessary to configure the Vega SBC to be used with a Gamma SIP Trunk. When a SIP trunk is provisioned by Gamma a list

More information

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011 Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 Solution Overview... 3 Network Topology... 4 Network Configuration...

More information

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Abstract Avaya IP Softphone R3 V2.1 now supports H.323 VoIP applications running over different

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

Allstream Converged IP Telephony

Allstream Converged IP Telephony Allstream Converged IP Telephony SIP Trunking Solution An Allstream White Paper 1 Table of contents Introduction 1 Traditional trunking: a quick overview 1 SIP trunking: a quick overview 1 Why SIP trunking?

More information

EarthLink Business SIP Trunking. NEC SV8100 IP PBX Customer Configuration Guide

EarthLink Business SIP Trunking. NEC SV8100 IP PBX Customer Configuration Guide EarthLink Business SIP Trunking NEC SV8100 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011

More information

EarthLink Business SIP Trunking. Toshiba IPedge Customer Configuration Guide

EarthLink Business SIP Trunking. Toshiba IPedge Customer Configuration Guide EarthLink Business SIP Trunking Toshiba IPedge Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011

More information

nexvortex Setup Guide

nexvortex Setup Guide nexvortex Setup Guide CUDATEL COMMUNICATION SERVER September 2012 510 S P R I N G S T R E E T H E R N D O N V A 2 0 1 7 0 + 1 8 5 5. 6 3 9. 8 8 8 8 Introduction This document is intended only for nexvortex

More information

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border Siemens Enterprise Communications Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border April 2011 Agenda 1 Industry Trends 2 Customer Initiatives

More information

Customer Guide. BT Business - BT SIP Trunks. BT SIP Trunks: Firewall and LAN Guide. Issued by: BT Business Date 14.02.2012. Issue: v1.

Customer Guide. BT Business - BT SIP Trunks. BT SIP Trunks: Firewall and LAN Guide. Issued by: BT Business Date 14.02.2012. Issue: v1. Customer Guide BT Business - BT SIP Trunks BT SIP Trunks: Firewall and LAN Guide Issue: v1.3 1 Contents 1 Overview 3 2 Firewalls 3 3 Recommendations 4 4 Ports 5 5 Warning & Disclaimer 5 Issue: v1.3 2 1

More information

Setup Reference Guide for KX-TDE/NCP to SBC SIP Trunking

Setup Reference Guide for KX-TDE/NCP to SBC SIP Trunking Setup Reference Guide for KX-TDE/NCP to SBC SIP Trunking Method of connection by "WAN Global IP address directly" (i.e. SBC is the Perimeter Router device.) Panasonic IP-PBX (KX-TDE/NCP Version6 series),

More information

ThinkTel ITSP with Registration Setup Quick Start Guide

ThinkTel ITSP with Registration Setup Quick Start Guide January 13 ThinkTel ITSP with Registration Setup Quick Start Guide Author: Zultys Technical Support This configuration guide was created to assist knowledgeable vendors with configuring the Zultys MX Phone

More information

An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision

An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision An Oracle White Paper February 2014 Centralized vs. Distributed SIP Trunking: Making an Informed Decision Executive Overview Businesses across the globe are migrating from TDM access services to SIP trunks

More information

Application Note - Using Tenor behind a Firewall/NAT

Application Note - Using Tenor behind a Firewall/NAT Application Note - Using Tenor behind a Firewall/NAT Introduction This document has been created to assist Quintum Technology customers who wish to install equipment behind a firewall and NAT (Network

More information

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Avaya Solution & Interoperability Test Lab Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Abstract These Application Notes describe the

More information

Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future

Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future White Paper Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future What You Will Learn The future of the Department of Defense s (DoD) networks focuses on the

More information

Setup Reference Guide for KX-NS1000 to SBC SIP Trunking

Setup Reference Guide for KX-NS1000 to SBC SIP Trunking Setup Reference Guide for KX-NS1000 to SBC SIP Trunking Method of connection by "WAN Global IP address directly" (i.e. SBC is the Perimeter Router device.) Panasonic IP-PBX (KX-NS1000 Version2 series),

More information

Application Notes for configuring Avaya IP Office IP500 R7.0 with 2Ring NetFAX R3.0 Issue 1.0

Application Notes for configuring Avaya IP Office IP500 R7.0 with 2Ring NetFAX R3.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for configuring Avaya IP Office IP500 R7.0 with 2Ring NetFAX R3.0 Issue 1.0 Abstract These Application Notes describe the configuration steps

More information

SIP Trunking The Provider s Perspective

SIP Trunking The Provider s Perspective SIP Trunking The Provider s Perspective Presented by Pete Sandstrom, CTO BandTel Advanced SIP Session Overview 1. Open Systems Interconnection Model (OSI) is more than a model 2. Quality of Service (QoS)

More information

EarthLink Business SIP Trunking. Switchvox SMB 5.5 & Adtran SIP Proxy Implementation Guide

EarthLink Business SIP Trunking. Switchvox SMB 5.5 & Adtran SIP Proxy Implementation Guide EarthLink Business SIP Trunking Switchvox SMB 5.5 & Adtran SIP Proxy Implementation Guide Publication History First Release: Version 1.0 April 20, 2012 CHANGE HISTORY Version Date Change Details Changed

More information

Galileo International. Firewall & Proxy Specifications

Galileo International. Firewall & Proxy Specifications Galileo International Technical Support Documentation Firewall & Proxy Specifications For Focalpoint, Viewpoint & Focalpoint Print Manager (GALILEO and APOLLO PRODUCTION SYSTEMS) Copyright Copyright 2001

More information

Lync Express The Evolution of UC Frederic Dickey Director of Professional Services July 9, 2013

Lync Express The Evolution of UC Frederic Dickey Director of Professional Services July 9, 2013 Lync Express The Evolution of UC Frederic Dickey Director of Professional Services July 9, 2013 Live from WPC 2013! 2 Inside this Deck Unified Communications Defined Lync 2013 Demystified Lync Express

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

Table of Contents. Confidential and Proprietary

Table of Contents. Confidential and Proprietary Table of Contents About Toshiba Strata CIX and Broadvox SIP Trunking... 1 Requirements... 2 Purpose, Scope and Audience... 3 What is SIP Trunking?... 4 Business Advantages of SIP Trunking... 4 Technical

More information

nexvortex Setup Guide

nexvortex Setup Guide nexvortex Setup Guide CISCO UC500 March 2012 Introduction This document is intended only for nexvortex customers and resellers as an aid to setting up the Cisco PBX software to connect to the nexvortex

More information

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma shorton@sangoma.com

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma shorton@sangoma.com SangomaSBCs Keeping Your VoIP Network Secure Simon Horton Sangoma shorton@sangoma.com Inside this Deck About Sangoma/ProVu SIP Market SBCs Demystified Business Applications and Use Cases Portfolio of SBCs

More information

MITEL SIP CoE. Technical. Configuration Notes. Configure MCD 6.X for use with babytel SIP trunks. SIP CoE 13-4940-00266

MITEL SIP CoE. Technical. Configuration Notes. Configure MCD 6.X for use with babytel SIP trunks. SIP CoE 13-4940-00266 MITEL SIP CoE Technical Configuration Notes Configure MCD 6.X for use with babytel SIP trunks SIP CoE 13-4940-00266 NOTICE The information contained in this document is believed to be accurate in all respects

More information

Skype Connect Getting Started Guide

Skype Connect Getting Started Guide A P P N O T E TPP-10251 Date : September 2010 Product: ShoreTel Ingate Skype System version: ShoreTel 10.x Skype Connect Getting Started Guide SIP Trunking allows the use of Session Initiation Protocol

More information

MS 20337A: Enterprise Voice and Online Services with Microsoft Lync 2013

MS 20337A: Enterprise Voice and Online Services with Microsoft Lync 2013 MS 20337A: Enterprise Voice and Online Services with Microsoft Lync 2013 Description: This five-day instructor-led course teaches how to design and configure Enterprise Voice and Online Services in Microsoft

More information

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1 Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...

More information

VOICE OVER IP SECURITY

VOICE OVER IP SECURITY VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

Security Considerations

Security Considerations 112 SIP Trunking VoIP endpoints and call agents such as CUCM and CUCMExpress also have facilities to control and mark packets. These can be used directly if the enterprise markings are the same as the

More information

SIP SECURITY JULY 2014

SIP SECURITY JULY 2014 SIP SECURITY JULY 2014 Executive Overview As with any data or communication service, it s important that all enterprises understand potential security issues related to SIP Trunking. This paper provides

More information