Secure SIP: Do It Yourself

Size: px
Start display at page:

Download "Secure SIP: Do It Yourself"

Transcription

1 Secure SIP: Do It Yourself Rick van Rein, OpenFortress 11 maart 2008 SIP is the only digital telephony protocol that is likely to reach the same global span as POTS. But digital media are prone to undetected wiretapping, and cannot in general do with security/privacy measures. The lesson learnt below is that if we want such security, we should do it ourselves. OpenFortress* is active in areas of digital infrastructure, such as digital signing and encryption. SIP 1, being an important part of tomorrow s infrastructure has recently been a focal point for OpenFortress. 1 Why SIP? Progress. There are numerous reasons why SIP is a good development for telephony, the most notable one being that POTS 2 development has come to a grinding halt about the moment the first phone was plugged in. The phone system is hardly changing, while so many possibilities open up when going digital. How long have we seen predictions of video calling over POTS or ISDN 3? And how quickly did digital phone systems add it? Implementing new features for POTS is expensive, especially when more signals (voltage/frequency bursts) have to be incorporated into the system in a backward-compliant manner. A good example is the supposedly most demanded feature, which is to configure the number of seconds (or rings) before voice mail answers a call. This cannot be set because (in the Netherlands) KPN has supplied most subscribers with a device that flashes a light after four rings on an unanswered line, as an indication that there might be a voice mail in your box. These devices cannot tolerate any change in the number of rings before voice mail picks up. It s the classical problem of backward compatibility on analog signalling lines. In comparison, the digital voice mail system works much more intuitively; phones subscribe to voice mail notifications, and hear when there are changes to the number of voice mails waiting. The phone shows this by flashing a special light or on a display. Multiple phones can signal the same voice mail box, and when the owner catches up with it, all those phones are updated so they can stop signalling the availability of voice mail. Such a system could not be designed in a backward-compliant manner with analog signals, but it is easy in SIP: just define a new method or a new header in an RFC 4 that extends the SIP RFC and you re done. Interoperability. Interoperability is the main feature that makes POTS useful. When a phone is plugged into a wall socket, it can immediately reach all other phones in the world. Of all the digital systems, SIP is the only one that stands a chance of being as interoperable as POTS. The ITU-designed H.323 protocol does not seem to catch on as SIP does, and other 1 SIP=Session Initiation Protocol, an Internet standard for setting up media connections. 2 POTS=Plain Old Telephone System, a nickname for PSTN=PublicSwitched Telephone Network. 3 ISDN=Integrated Services Digital Network, often nicknamed ISDN=It Still Does Nothing. 4 RFC=Request For Comments, or in practice: Internet standard

2 protocols are either proprietary (Skype) or they are SIP-in-a-jacket (MSN 5, Jingle 6 ). SIP is designed to be interoperable in much the same way as the system is interoperable: new addresses and server nodes can be added by just about anyone. SIP also is not interoperable like ISDN which is implemented in devices which add features that only work with devices from the same manufacturer. ISDN held great promise, but never delivered on them. SIP on the other hand is delivering today. Special features are added through the public RFC process of IETF 7 and manufacturers of SIP-devices actually make an effort to support interoperable use of their hardware. This leads to configuration kludges such as device-bug-compensating options, but at least interoperability is happening. SIP is different from POTS in that the phones are a lot smarter, and a lot of the functionality that is located in POTS switches now ends up in phones. To connect to another phone, the basic need is an interoperable manner of communicating and locating others. Nothing the Internet can t handle. In addition, a publicly advertised contact address must be serviced, for which a multitude of solutions exist today. Quality. Speech quality of a 100% digital call is superb given a quality codec such as A-law or µ-law and a phone that cancels its own echo. Since the phone can know or learn its own acoustics, it can do just the right thing to avoid that its speaker output that lands in the microphone is sent out again. Echo cancellation is also done in good-quality analog phones, albeit in an analog way. The longer voice delays caused by buffering and travelling over the Internet are acceptable for voice communication, but the other end must not bounce back part of the voice data like a cheap analog phone does, because that can annoy the speaker, who hears himself back. It can be a burden of mixed digital/analog telephony to hear the (lack of) quality of a phone on the analog end. This is in part due to the longer transit times, because our brains stop to ignore echo after about a tenth of a second. Reliability. Another aspect of POTS calling is its robustness. The system hardly ever suffers from problems. Rolling digital endpoints into homes is not helping that, but this robustness is definately something to match. SIP can do that, using multiple servers to cover for one domain. Just like we are replacing mainframes with clustered PCs, we can also replace POTS with a redundant set of SIP servers. Mobility. An advantage of SIP is that I can take my phone with me wherever I go. It is possible to answer on a beach on the Bahama s. It d better not be a videochat though... Also, multiple SIP phones can connect to the same line (or phone number, or SIP account). These phones need not be all located in the same place. Routing gets much more flexible if it is taken care of by the Internet, rather than by a POTS operator! Cost. VoIP is often marketed as a cheaper way of calling. Sure, there is less infrastructure to maintain for the telco 8, but in practice it is still used as a mechanism to connect to the rigid bureaucracy of POTS. As a gentle form of customer lock-in, telco s often provide free calls between others who use the same product, but there usually is no interoperability with other digital networks. Even though we usually prepay our Internet bandwidth, even though voice traffic is not nearly as bulky as our daily downloads, telco s still force us through POTS to connect to 5 MicroSoft Network, a popular chatprotocol outside professional circles. 6 Jingle is the protocol of GoogleTalk. 7 IETF=Internet Engineering Task Force, the Internet standards body. 8 telco=telecom operator, with which we mean one that is working under POTS.

3 other telco s. Why? Simply because we ve grown up thinking of phone calls as being charged per minute. And so there is a profit to be made. In the end of March, ENUM 9 is introduced in the Netherlands, but it is not likely that telco s will support this attack on their revenue. Telco s do not even offer an incoming digital access point, with the exception of xs4all and BudgetPhone. In addition, it is unlikely that telco s will be offering ENUM-bypasses to the POTS-calls that make them so much profit. This is so annoying that OpenFortress is working on an easy-to-use setup that will enable home users to make increasing use of digital bypasses by simply using their home phones. To avoid an underground look&feel and to ensure longevity, we will be charging for digital connection buildup, but never any cost per minute. What we are hoping to achieve is to become such a commonplace alternative that telco s will see themselves forced to build in public-access SIP interfaces and to use ENUM for outgoing traffic. SIP was never intended to be confined! Visit 0cpm.nl for details. 2 Why Secure SIP? Is advocation of Secure SIP a helping hand to terrorists? Nah, terrorists are evil, so they probably use a much more evil OS than anything UNIX-based, so they wouldn t appear on NLUUG. More seriously though, it is common knowledge (and common sense) that it is straightforward to conceal one s footprints. An example technique can be found on Privacy. We ve all seen James Bond movies, where bald crooks switch on the scramble mode on their phones while they stroke a fluffy cat. With SIP, this is all possible. Since world leaders resort to things like phone tapping to give an impression that they re on top of terrorists, privacy is increasingly becoming a concern that we should deal with ourselves. In the Netherlands, every telco must register with OPTA 10 and support undetectable wire tapping for the ministry of Justice even if they only run a publicly usable SIP server. Another situation where privacy becomes a concern is when making a phone call from the network of a (prospective) customer. It is possible to discuss what discounts that customer can get, and be tapped by the network admin who informs his boss how far he can go in subsequent negotiations. We may like that telephony is moving into our digital realm, but it also moves into the realm of improper conduct. Aside from that, if we wish to provide good service to customers, we could do them the service of encrypted phone calls. An international customer in, say, the banking business may not be inclined to accept our country s wire tapping facilities when he wants to discuss site security. Or, to a lesser extent, when trade secrets are being exchanged. Authenticity. Another matter of concern is knowing the remote party is the proper party. A caller wants to know that his call ends up with the intended contact, and the called party wants to know if the caller ID popping up in the display is reliable. In this respect, POTS is much more reliable than SIP without added security: anyone can claim any phone number with SIP, while POTS uses its hierarchical structure to control where caller ID values may be injected on the network. 9 ENUM=Mapping from international phone numbers to contact info. 10 OPTA is the Dutch guardian angel of a free postal/telecom market.

4 3 What forms of Secure SIP? There is a wide range of secure extensions to SIP, but they are all difficult in practice, as well as unappealing for a SIP service provider. In practice, you will end up doing it yourself if you want to employ Secure SIP. SIP and RTP. SIP is most often used to initiate RTP 11 sessions. As an alternative, SRTP 12 sessions can be setup, using AES 13. But to get the two end points in line, they must exchange an AES key beforehand. This is usually done through SIP, while setting up the RTP-session. Login. When trying to register a phone or to initiate a call, it is common to reject the attempt with a challenge. After that, a second attempt is made, this time adding a response to the challenge. This challenge/response scheme verifies if the initiator of the request has the right to make the call. This form of login is a pragmatic attempt to shield off very crude attacks, but it is not good enough to thwart men in the middle who modify the message to suit their needs. Since money is involved, this means that more security is no luxury. That being said, at least the password itself is well enough protected under RFC 3261 to travel safely in unencrypted packets. That is, replay attacks and account hijacking are not very likely. TLS. Most SIP URLs 14 look like sip:bakker@orvelte.nep and are connected through one of UDP or TCP. The secure alternative is sips:bakker@orvelte.nep, with the great advantage of visible security. Unfortunately, the constraints are not very stringent. The sips: protocol implies TLS-encryption between hops, at least to the domain name being addressed. What happens behind that domain name s SIP server is the responsibility of the recipient, and may actually not be encrypted. The idea is that LAN-routing could perhaps be considered secure enough, and if the receiving server resides on the same LAN as the eventual phone it would be possible to receive secure calls on a phone that does not support such calls. The trick however, is hop-to-hop links being encrypted by TLS. Although the authentication is two-way, it will rely on lists of trusted root certificates, which may vary from domain to domain. Furthermore, the authentication is not based on end-user credentials, so the reliability waters down when the message hops up- or downstream. Most notably, the security of sips: URLs does not imply security of the user at the other end, as its format intuitively suggests (to me at least). It validates servers and domains, not users. So a URL like sips: @budgetphone.nl does not add any security. S/MIME. It is possible to establish end-to-end security by encrypting the attachment that describes the upcoming connection, including SRTP keys. This works through S/MIME attachments instead of plain SDP attachments. In an ideal world, proxies between the end points should only need the SIP headers. In a more pragmatic world such as ours, proxies tend to help out with NAT 15 problems and may need to investigate SDP as well. This may lead to voice connection problems when calling securely from behind a NAT that needs such help. (The aforementioned ideal world would run IPv6 and would have gotten rid of NAT altogether.) 11 RTP=RealTime Protocol, a mechanism to exchange time-critical data such as interactive voice. 12 SRTP=Secure RealTime Protocol, an encrypted form of RTP. 13 AES=Advanced Encryption Standard, the generally advised symmetric encryption algorithm. 14 URL=Uniform Resource Locator. SIP locates rather than names, so URL is the most specific subclass of URI and is proper to use here. 15 NAT=Network Address Translation, a crude hack to allow a LAN to have one external IP-number.

5 4 Public Support for Secure SIP It is highly unlikely that public parties (such as commercial SIP-providers) are going to embrace Secure SIP. And it is unlikely that you would be interested, given the motivations for Secure SIP in the foregoing. TLS. First off, Dutch telecom laws do not mind about encryption, as long as it is removed before a tap(p)ed conversation is shipped to the ministry of Justice. Other countries probably have similar laws. Luckily, the law doesn t go so far overboard as to demand key escrow, but the telco has no way of hiding from its responsibilities. This means that sips: encryption does not really help privacy forward. As discussed before, it does not do much for authenticity either. TLS is also a much heavier protocol than plain SIP which does not even run on TCP, but on UDP. In spite of sending several packages of a few kb for every signalling change, the use of UDP makes SIP a very efficient protocol. TLS takes a lot more traffic, and a lot more computing power. Some optimisation is possible with caching, or by sharing connections in one SCTP-over-TLS connection, but it is still a futile attampt at privacy. Having said that, sips: is not an optional part of RFC 3261: Proxy servers, redirect servers, and registrars MUST implement TLS, and MUST support both mutual and one-way authentication. It is strongly RECOMMENDED that UAs be capable initiating TLS; UAs MAY also be capable of acting as a TLS server. Proxy servers, redirect servers, and registrars SHOULD possess a site certificate whose subject corresponds to their canonical hostname. UAs MAY have certificates of their own for mutual authentication with TLS, but no provisions are set forth in this document for their use. All SIP elements that support TLS MUST have a mechanism for validating certificates received during TLS negotiation; this entails possession of one or more root certificates issued by certificate authorities (preferably well-known distributors of site certificates comparable to those that issue root certificates for web browsers). S/MIME. A pressing concern for use of S/MIME is that many proxies between end points tend to constrain the length of a SIP message to a fairly tight maximum. This maxium does not always leave a lot of spare room, certainly not for bulky attachments in S/MIME. This means that all sorts of things can start to fall down when using this approach. Direct connections between end points would circumvent such light-headed intermediates, at the expense of the advantages that intermediate proxies bring in terms of flexibility, NATsupport and so on. But when setting up a direct connection, it is perhaps much simpler just to use a sips: URL. DNS. An important concern to take into with Secure SIP is DNS. As wel all know, this system can easily be spoofed on a local scale. DNSsec would be the solution, and as SIDN 16 tells us, they only need to roll out the final form of an experimental setup for NLnetlabs that has worked well in the past. This must be a good argument, because SIDN has been using it for years. SIP uses SRV records to point to a server, so there is a layer of dynamicity to get to a server. Dynamicity over an easy-to-spoof protocol spells disaster, so this is definately a place where DNSsec would aid in getting some security. 16 SIDN=Stichting Internet DomainNamen, sidn.nl.

6 Device support. Not all devices support Secure SIP. Some professional phones do (Cisco/Linksys, Mitel) but not all (Innovaphone, GrandStream, Siemens, Aastra, Polycom) and consumer devices certainly don t (SMC, Tiptel, GrandStream). 5 How to get Secure SIP Getting Secure SIP is not as easy as it would seem. But everything changes when you start doing it yourself. The first thing to do is to ask SIDN about DNSsec, and as soon as it is implemented, to add it to your domain. For now you will have to settle for an insecure SRV record pointing to your server(s) from sips. tls under your domain, and possibly also for sip. tcp and sip. udp. With SIDN hard at work on DNSsec, setup a server with SER from iptel.org or its fork OpenSER from openser.org. The reason why these two forked is a bit of a mystery. It is not because of licences such as we normally see, merely a matter of splitting who controls the code. But at the same time the code is kept fairly consistent between the two. SER/OpenSER is a proxy, meaning a relay station for SIP messages. In doing its work, it can pass information from/to protocols. SER/OpenSER supports all of the UDP, TCP and TLS transports. So if you want to link to Asterisk (which only supports SIP over UDP), you could use SER to translate traffic to UDP. Doing this as local as possible is all it takes. A basic setup for SER would suffice all it needs to support is registrations from phones and passing incoming calls to those phones. Example scripts are provided as part of the package. Just beware that SER assumes you understand SIP and its routing implications. If your phone can handle TLS-traffic directly, and you open up a hole in any NAT from the outside to your phone (for RTP, and possibly also for SIP), you could even bypass the SER proxy server and have the DNS SRV record point directly to your phone s external location. Finally, you will need to install a certificate for your domain name. Get one for free from CAcert or purchase one elsewhere. You should install it in your SER proxy, or with a directly connected phone, in the phone itself. 6 Conclusion Secure SIP is going to be just like secure DNS and secure whatever: Everybody needs it, but users are clueless about the risks they run, so nobody is asking for it, and nobody is selling it. Given telecom laws such as the Dutch, Secure SIP cannot even be sold as a hosted service, but it is possible for any company to hire a contractor for a dedicated setup. As so often with privacy and security matters, we will have to take care of it ourselves, or accept the situation as it is. Offering a Secure SIP address is not difficult. Aside from a domain-named certificate you only need a DNS SRV record pointing to a registration server that can translate traffic between TLS and TCP/UDP protocols.

Secure SIP? Do It Yourself! OpenFortress* digital signatures

Secure SIP? Do It Yourself! OpenFortress* digital signatures Secure SIP? Do It Yourself! OpenFortress digital signatures why divert from pots? Slow to accept change: Immobile numbers Switch to voicemail after N rings Caller-ID limitations Limited lingo: Voltage/frequency

More information

SIP and VoIP 1 / 44. SIP and VoIP

SIP and VoIP 1 / 44. SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

White paper. SIP An introduction

White paper. SIP An introduction White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary

More information

AV@ANZA Formación en Tecnologías Avanzadas

AV@ANZA Formación en Tecnologías Avanzadas SISTEMAS DE SEÑALIZACION SIP I & II (@-SIP1&2) Contenido 1. Why SIP? Gain an understanding of why SIP is a valuable protocol despite competing technologies like ISDN, SS7, H.323, MEGACO, SGCP, MGCP, and

More information

SIP Trunking and Voice over IP

SIP Trunking and Voice over IP SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential

More information

SIP A Technology Deep Dive

SIP A Technology Deep Dive SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing

More information

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005 Voice over IP VoIP (In) Security Presented by Darren Bilby NZISF 14 July 2005 Security-Assessment.com Who We Are NZ s only pure-play security firm Largest team of security professionals in NZ Offices in

More information

SIP Security Controllers. Product Overview

SIP Security Controllers. Product Overview SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running

More information

SIP Trunking Manual 05.15. Technical Support Web Site: http://ws1.necii.com (registration is required)

SIP Trunking Manual 05.15. Technical Support Web Site: http://ws1.necii.com (registration is required) SIP Trunking Manual 05.15 Technical Support Web Site: http://ws1.necii.com (registration is required) This manual has been developed by NEC Unified Solutions, Inc. It is intended for the use of its customers

More information

Global Network. Whitepaper. September 2014. Page 1 of 9

Global Network. Whitepaper. September 2014. Page 1 of 9 Global Network Whitepaper September 2014 Page 1 of 9 Contents 1. Overview...2 2. Global Connectivity, Quality of Service and Reliability...2 2.1 Exceptional Quality...3 2.2 Resilience and Reliability...3

More information

Basic Vulnerability Issues for SIP Security

Basic Vulnerability Issues for SIP Security Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future

More information

VIDEOCONFERENCING. Video class

VIDEOCONFERENCING. Video class VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes

More information

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany

More information

nexvortex SIP Trunking Implementation & Planning Guide V1.5

nexvortex SIP Trunking Implementation & Planning Guide V1.5 nexvortex SIP Trunking Implementation & Planning Guide V1.5 510 S PRING S TREET H ERNDON VA 20170 +1 855.639.8888 Introduction Welcome to nexvortex! This document is intended for nexvortex Customers and

More information

How to make free phone calls and influence people by the grugq

How to make free phone calls and influence people by the grugq VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth

More information

(Refer Slide Time: 6:17)

(Refer Slide Time: 6:17) Digital Video and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 39 Video Conferencing: SIP Protocol

More information

Configuration Notes 290

Configuration Notes 290 Configuring Mediatrix 41xx FXS Gateway with the Asterisk IP PBX System June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 About Mediatrix 41xx Series FXS Gateways...

More information

A Comparative Study of Signalling Protocols Used In VoIP

A Comparative Study of Signalling Protocols Used In VoIP A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.

More information

How To Use A Pbx On A Network With A Ppl (Ipo) On A Pnet On A Microsoft Ip On A Pc Or Ip On An Ip On Ip On Pc Or Mac On A Cell Phone On A 2G

How To Use A Pbx On A Network With A Ppl (Ipo) On A Pnet On A Microsoft Ip On A Pc Or Ip On An Ip On Ip On Pc Or Mac On A Cell Phone On A 2G Technical Specification IP phone IP230 Interfaces Ethernet: Headset: 2 x RJ 45 interface 10/100-BASE-TX (auto negotiation) with internal 2 port switch and Power over LAN, Class 1 (IEEE 802.3af) RJ-45 interface

More information

P160S SIP Phone Quick User Guide

P160S SIP Phone Quick User Guide P160S SIP Phone Quick User Guide Version 2.2 TABLE OF CONTENTS 1.0 INTRODUCTION... 1 2.0 PACKAGE CONTENT... 1 3.0 LIST OF FIGURES... 2 4.0 SUMMARY OF KEY FUNCTIONS... 3 5.0 CONNECTING THE IP PHONE... 4

More information

NAT TCP SIP ALG Support

NAT TCP SIP ALG Support The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the

More information

VoIP Server Reference

VoIP Server Reference IceWarp Server VoIP Server Reference Version 10 Printed on 12 August, 2009 i Contents VoIP Service 1 Introduction... 1 V10 New Features... 3 SIP REFER... 3 SIP Call Transfer Agent Settings... 3 NAT traversal

More information

Best Practices for SIP Security

Best Practices for SIP Security Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting

More information

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be

More information

How To Use A Phone Over Ip (Phyto) For A Phone Call

How To Use A Phone Over Ip (Phyto) For A Phone Call SIP and VoIP Skype an example VoIP client 1 SIP / VoIP: what are these? Voice over IP (VoIP) Session Initiation Protocol (SIP) Control channel Known in telephone world as signaling channel Does call setup:

More information

Manual. ABTO Software

Manual. ABTO Software Manual July, 2011 Flash SIP SDK Manual ABTO Software TABLE OF CONTENTS INTRODUCTION... 3 TECHNICAL BACKGROUND... 6 QUICK START GUIDE... 7 FEATURES OF FLASH SIP SDK... 10 2 INTRODUCTION Trends indicate

More information

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya

More information

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,

More information

Online course syllabus. MAB: Voice over IP

Online course syllabus. MAB: Voice over IP Illuminating Technology Course aim: Online course syllabus MAB: Voice over IP This course introduces the principles and operation of telephony services that operate over Internet Protocol (IP) networks

More information

TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic

TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic TraceSim 3.0: Advanced Measurement Functionality for Secure VoIP Networks and Simulation of Video over IP No part of this brochure may be copied or published by means of printing, photocopying, microfilm

More information

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Session Initiation Protocol (SIP) The Emerging System in IP Telephony Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia

More information

VOICE OVER IP SECURITY

VOICE OVER IP SECURITY VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

VoIP Security regarding the Open Source Software Asterisk

VoIP Security regarding the Open Source Software Asterisk Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de

More information

Note: As of Feb 25, 2010 Priority Telecom has not completed FXS verification of fax capabilities. This will be updated as soon as verified.

Note: As of Feb 25, 2010 Priority Telecom has not completed FXS verification of fax capabilities. This will be updated as soon as verified. 1 SIP Carriers 1.1 Priority Telecom 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can

More information

Nokia E65 Internet calls

Nokia E65 Internet calls Nokia E65 Internet calls Nokia E65 Internet calls Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document

More information

CE 817 - Advanced Network Security VoIP Security

CE 817 - Advanced Network Security VoIP Security CE 817 - Advanced Network Security VoIP Security Lecture 25 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially

More information

CrossTalk is a VoIP (Voice over IP) softphone which lets you call anywhere in the world at nominal rates.

CrossTalk is a VoIP (Voice over IP) softphone which lets you call anywhere in the world at nominal rates. 1. Introduction CrossTalk is a VoIP (Voice over IP) softphone which lets you call anywhere in the world at nominal rates. 1.1 Purpose This document specifies the software requirements of CrossTalk v1.04

More information

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking 2012 Advanced American Telephones. All Rights Reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property licensed

More information

Broadvox SIP Trunking. Frequently Asked Questions (FAQs)

Broadvox SIP Trunking. Frequently Asked Questions (FAQs) Broadvox SIP Trunking Frequently Asked Questions (FAQs) Table of Contents Can a Call Center with an automated dialer use Broadvox services? 3 Can I connect to Broadvox services if I have a dynamic IP address?

More information

(Refer Slide Time: 4:45)

(Refer Slide Time: 4:45) Digital Voice and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 38 ISDN Video Conferencing Today we

More information

IP Ports and Protocols used by H.323 Devices

IP Ports and Protocols used by H.323 Devices IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential

More information

SIP Essentials Training

SIP Essentials Training SIP Essentials Training 5 Day Course Lecture & Labs COURSE DESCRIPTION Learn Session Initiation Protocol and important protocols related to SIP implementations. Thoroughly study the SIP protocol through

More information

VoIP telephony over internet

VoIP telephony over internet VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)

More information

Quick Start Guide v1.0

Quick Start Guide v1.0 Quick Start Guide v1.0 Table of contents : 01. Quick Start Guide...03 O2. Configuring your VoIPOffice appliance...14 03. Adding a VoIPtalk trunk...21 04. Configuring UADs for use with VoIPOffice...25 05.

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)

MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment) MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment) N.B. Goto MyIC Preferences in the System Toolbar. Description: this may be any appropriate description of the

More information

VOIP TELEPHONY: CURRENT SECURITY ISSUES

VOIP TELEPHONY: CURRENT SECURITY ISSUES VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the

More information

IP Office SIP Extension Support

IP Office SIP Extension Support SIP Extension Support - Issue 1b - (05 August 2009) 2009 AVAYA All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document was complete and accurate at

More information

Technical Configuration Notes

Technical Configuration Notes MITEL SIPCoE Technical Configuration Notes Configure Mitel UC360 SIP Phone and Mitel MCD for use with VidyoWay SIP CoE 13-4940-00228 NOTICE The information contained in this document is believed to be

More information

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents First Steps... 3 Identifying your MAC Address... 3 Identifying your Dynamic IP Address...

More information

Product Information = = = www.anynode.de e-mail sales@te-systems.de phone +49 5363 8195-0

Product Information = = = www.anynode.de e-mail sales@te-systems.de phone +49 5363 8195-0 07 2015 2 Efficient communication anynode is a Session Border Controller that is entirely a software based solution. It works as an interface for any number of SIP UAs for example, SIP phones and SIP PBXs,

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

Installation of the On Site Server (OSS)

Installation of the On Site Server (OSS) Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit

More information

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS Master of Science in Networking and Data Communications THESIS Thesis Title Voice over IP (VoIP) to Enterprise Users Dissertation submitted

More information

AT&T IP Flex Reach/ IP Toll Free Configuration Guide IC 3.0 with Interaction SIP Proxy

AT&T IP Flex Reach/ IP Toll Free Configuration Guide IC 3.0 with Interaction SIP Proxy INTERACTIVE INTELLIGENCE AT&T IP Flex Reach/ IP Toll Free Configuration Guide IC 3.0 with Interaction SIP Proxy Version 1.7 9/2/2009 TABLE OF CONTENTS 1 AT&T... 5 1.1 Introduction... 5 1.2 Product Descriptions...

More information

Skype Connect Requirements Guide

Skype Connect Requirements Guide Skype Connect Requirements Guide Version 4.0 Copyright Skype Limited 2011 Thinking about implementing Skype Connect? Read this guide first. Skype Connect provides connectivity between your business and

More information

Alcatel OmniPCX Enterprise R11 Supported SIP RFCs

Alcatel OmniPCX Enterprise R11 Supported SIP RFCs Alcatel OmniPCX Enterprise R11 Supported SIP RFCs Product & Offer Large & Medium Enterprise Ref: 8AL020033225TCASA ed3 ESD/ Mid & Large Enterprise Product Line Management October 2013 OmniPCX Enterprise

More information

1 SIP Carriers. 1.1.1 Warnings. 1.1.2 Vendor Contact Vendor Web Site : http://www.wind.it. 1.1.3 Versions Verified SIP Carrier status as of 9/11/2011

1 SIP Carriers. 1.1.1 Warnings. 1.1.2 Vendor Contact Vendor Web Site : http://www.wind.it. 1.1.3 Versions Verified SIP Carrier status as of 9/11/2011 1 SIP Carriers 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found in the SIP

More information

Technical Configuration Notes

Technical Configuration Notes MITEL SIPCoE Technical Configuration Notes Configure Inn-Phone SIP Phone for use with MCD SIP CoE NOTICE The information contained in this document is believed to be accurate in all respects but is not

More information

Voice Over IP Performance Assurance

Voice Over IP Performance Assurance Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance

More information

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX

More information

DPH-140S SIP Phone Quick User Guide

DPH-140S SIP Phone Quick User Guide DPH-140S SIP Phone Quick User Guide Version 1.0 TABLE OF CONTENTS 1.0 INTRODUCTION... 1 2.0 PACKAGE CONTENT... 1 3.0 LIST OF FIGURES... 2 4.0 SUMMARY OF KEY FUNCTIONS... 3 5.0 CONNECTING THE IP PHONE...

More information

LifeSize Transit Deployment Guide June 2011

LifeSize Transit Deployment Guide June 2011 LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address

More information

EZLoop IP-PBX Enterprise SIP Server

EZLoop IP-PBX Enterprise SIP Server EZLoop IP-PBX Enterprise SIP Server Copyright 2007 Teletronics International, Inc. 2 Choke Cherry Road, Rockville, MD 20850 sales@teletronics.com www.teletronics.com CH1. Overview...4 1.1 Specifications...4

More information

6.40A AudioCodes Mediant 800 MSBG

6.40A AudioCodes Mediant 800 MSBG AudioCodes Mediant 800 MSBG Page 1 of 66 6.40A AudioCodes Mediant 800 MSBG 1. Important Notes Check the SIP 3 rd Party Validation Website for current validation status. The SIP 3 rd party Validation Website

More information

Provisioning and configuring the SIP Spider

Provisioning and configuring the SIP Spider Provisioning and configuring the SIP Spider Administrator Guide Table of Contents 1. Introduction... 3 2. Manual Provisioning... 4 3. Automatic Provisioning... 5 3.1 Concept... 5 3.2 Preparing the configuration

More information

Application Note. Onsight Mobile Collaboration Video Endpoint Interoperability v5.0

Application Note. Onsight Mobile Collaboration Video Endpoint Interoperability v5.0 Application Note Onsight Mobile Collaboration Video Endpoint Interoperability v5. Onsight Mobile Collaboration Video Endpoint Interoperability... 3 Introduction... 3 Adding Onsight to a Video Conference

More information

Polycom Unified Communications Deployment Guide for Microsoft Environments

Polycom Unified Communications Deployment Guide for Microsoft Environments Polycom Unified Communications Deployment Guide for Microsoft Environments Wave 4 February 2011 3725-00000-003C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated

More information

MITEL SIP CoE. Technical. Configuration Notes. Configure MCD 6.X for use with babytel SIP trunks. SIP CoE 13-4940-00266

MITEL SIP CoE. Technical. Configuration Notes. Configure MCD 6.X for use with babytel SIP trunks. SIP CoE 13-4940-00266 MITEL SIP CoE Technical Configuration Notes Configure MCD 6.X for use with babytel SIP trunks SIP CoE 13-4940-00266 NOTICE The information contained in this document is believed to be accurate in all respects

More information

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and

More information

How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions

How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the Allworx 6x IP PBX to connect to Integra Telecom

More information

Integrating a Hitachi IP5000 Wireless IP Phone

Integrating a Hitachi IP5000 Wireless IP Phone November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition

More information

How To Configure Aastra Clearspan For Aastro (Turbos) And Bpb (Broadworks) On A Pc Or Macbook (Windows) On An Ipa (Windows Xp) On Pc Or Ipa/

How To Configure Aastra Clearspan For Aastro (Turbos) And Bpb (Broadworks) On A Pc Or Macbook (Windows) On An Ipa (Windows Xp) On Pc Or Ipa/ BroadSoft Partner Configuration Guide Aastra Clearspan TM April 2011 Document Version 1.4 2811 Internet Blvd. Frisco, TX 75034, U.S.A Tel: 469-365-3237 Fax: 469-365-3071 WWW.AASTRA.COM BroadWorks Guide

More information

Application Notes for Configuring Avaya IP Office 9.0 with HIPCOM SIP Trunk Issue 1.0

Application Notes for Configuring Avaya IP Office 9.0 with HIPCOM SIP Trunk Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Avaya IP Office 9.0 with HIPCOM SIP Trunk Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

SIP, Session Initiation Protocol used in VoIP

SIP, Session Initiation Protocol used in VoIP SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1

More information

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2) Overview Voice-over over-ip (VoIP) ENUM VoIP Introduction Basic PSTN Concepts and SS7 Old Private Telephony Solutions Internet Telephony and Services VoIP-PSTN Interoperability IP PBX Network Convergence

More information

QUICK START GUIDE MONDOPAD/WIN7 009-1488-01

QUICK START GUIDE MONDOPAD/WIN7 009-1488-01 QUICK START GUIDE MONDOPAD/WIN7 009-1488-01 CONTENTS Hardware Setup...3 Windows Setup and Registration Process...3 Microsoft Windows Setup...3 Mondopad Software Registration...4 Microsoft Office Activation...4

More information

Applications that Benefit from IPv6

Applications that Benefit from IPv6 Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,

More information

Technical Configuration Notes

Technical Configuration Notes MITEL SIP CoE Technical Configuration Notes Configure MCD for use with OpenIP SIP Trunking service SIP CoE 11-4940-00186 NOTICE The information contained in this document is believed to be accurate in

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

This document specifies the software requirements of CrossTalk+ A VoIP softphone. It describes the specifications of all components of CrossTalk.

This document specifies the software requirements of CrossTalk+ A VoIP softphone. It describes the specifications of all components of CrossTalk. 1. Introduction CrossTalk+ is a VoIP (Voice over IP) softphone which lets you call anywhere in the world at nominal rates. CrossChat the chat component of CrossTalk enables you to chat with people speaking

More information

FortiVoice. Version 7.00 VoIP Configuration Guide

FortiVoice. Version 7.00 VoIP Configuration Guide FortiVoice Version 7.00 VoIP Configuration Guide FortiVoice Version 7.00 VoIP Configuration Guide Revision 2 14 October 2011 Copyright 2011 Fortinet, Inc. All rights reserved. Contents and terms are subject

More information

Internet Security. Prof. Anja Feldmann, Ph.D. anja@net.t-labs.tu-berlin.de http://www.net.t-labs.tu-berlin.de/

Internet Security. Prof. Anja Feldmann, Ph.D. anja@net.t-labs.tu-berlin.de http://www.net.t-labs.tu-berlin.de/ Internet Security Prof. Anja Feldmann, Ph.D. anja@net.t-labs.tu-berlin.de http://www.net.t-labs.tu-berlin.de/ Prof. Dr. Jean-Pierre Seifert jpseifert@sec.t-labs.tu-berlin.de http://www.sec.t-labs.tu-berlin.de/

More information

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,

More information

Internet Technology Voice over IP

Internet Technology Voice over IP Internet Technology Voice over IP Peter Gradwell BT Advert from 1980s Page 2 http://www.youtube.com/v/o0h65_pag04 Welcome to Gradwell Gradwell provides technology for every line on your business card Every

More information

1.1.3 Versions Verified SIP Carrier status as of 18 Sep 2014 : validated on CIC 4.0 SU6.

1.1.3 Versions Verified SIP Carrier status as of 18 Sep 2014 : validated on CIC 4.0 SU6. 1 SIP Carriers 1.1 Telstra 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found

More information

An outline of the security threats that face SIP based VoIP and other real-time applications

An outline of the security threats that face SIP based VoIP and other real-time applications A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

IP Office Technical Tip

IP Office Technical Tip IP Office Technical Tip Tip no: 188 Release Date: September 27, 2007 Region: GLOBAL Verifying IP Office SIP Trunk Operation IP Office back-to-back SIP Line testing IP Office Release 4.0 supports SIP trunking.

More information

Cisco SPA901 1-Line IP Phone Cisco Small Business IP Phone

Cisco SPA901 1-Line IP Phone Cisco Small Business IP Phone Cisco SPA901 1-Line IP Phone Cisco Small Business IP Phone Durable, Affordable, Feature-Rich IP Telephone for the Home Office and Business Small, affordable, single line business class IP Phone Connect

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

Release the full potential of your Cisco Call Manager with Ingate Systems

Release the full potential of your Cisco Call Manager with Ingate Systems Release the full potential of your Cisco Call Manager with Ingate Systems -Save cost with flexible connection to Service Providers. -Save mobile costs, give VoIP mobility to your workforce. -Setup an effective

More information

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars

More information

SIP Trunking Service Configuration Guide for Skype

SIP Trunking Service Configuration Guide for Skype SIP Trunking Service Configuration Guide for Skype NDA-31154 Issue 1.0 NEC Corporation of America reserves the right to change the specifications, functions, or features at any time without notice. NEC

More information

LifeSize Phone User Guide

LifeSize Phone User Guide LifeSize Phone User Guide April 2008 Copyright Notice 2005-2008 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure that the information

More information

Marratech Technology Whitepaper

Marratech Technology Whitepaper Marratech Technology Whitepaper Marratech s technology builds on many years of focused R&D and key reference deployments. It has evolved into a market leading platform for Real Time Collaboration (RTC)

More information

Week 9 / Paper 3. VoCCN: Voice Over Content-Centric Networks

Week 9 / Paper 3. VoCCN: Voice Over Content-Centric Networks Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass, P. Stewart, J. D. Thornton, R. L. Braynard ACM ReArch 2009 Main point Content-centric

More information

Sample Configuration for SIP Trunking between Avaya IP Office R8.0 and Cisco Unified Communications Manager 8.6.2 Issue 1.0

Sample Configuration for SIP Trunking between Avaya IP Office R8.0 and Cisco Unified Communications Manager 8.6.2 Issue 1.0 Avaya Solution & Interoperability Test Lab Sample Configuration for SIP Trunking between Avaya IP Office R8.0 and Cisco Unified Communications Manager 8.6.2 Issue 1.0 Abstract These Application Notes describe

More information