Technical Bulletin 25751
|
|
|
- Damon Jennings
- 10 years ago
- Views:
Transcription
1 25751 Secure Real-Time Transport Protocol on SoundPoint IP Phones This technical bulletin provides detailed information on how the SIP application has been enhanced to support Secure Real-Time Transport Protocol (SRTP). This information applies to SoundPoint IP phones running SIP application version or later, except for SoundPoint IP 300 and 500 phones. Introduction Secure Real-Time Transport Protocol (SRTP) provides means of encrypting the audio stream(s) of VoIP phone calls to avoid interception and eavesdropping on phone calls. Both RTP and RTCP signaling may be encrypted using an AES algorithm as described in RFC3711. When this feature is enabled, phones will negotiate with the other end-point whether and what type of encryption or authentication to utilize for the session. This negotiation process is compliant with RFC4568 (Session Description Protocol (SDP) Security Descriptions for Media Streams). Authentication proves to the phone receiving the RTP/RTCP stream that the packets are from the expected source and have not been tampered with. Encryption modifies the data in the RTP/RTCP streams so that, if the data is captured or intercepted, it cannot be understood it sounds like noise. Only the receiver knows the key to restore the data. A number of configuration parameters have been added to allow you to turn off authentication and encryption for RTP and RTCP streams. This is done mainly to allow the system administrator to reduce the CPU usage on legacy Polycom phones in certain deployment scenarios (for example, if three-way local conferencing is required). The SoundPoint IP 301, 501, 600 and 601 are collectively referred to a legacy platforms in this document. Note When SRTP is enabled on Polycom's legacy platforms, they may exceed their CPU capacity if local conference bridging is attempted using authentication and encryption of the media stream. Local Conference Bridging on SoundPoint IP 301, 501, 600 and 601 phones should be disabled when SRTP is utilized using G.711 codecs. If the call is completely secure (RTP authentication and encryption and RTCP authentication and RTCP encryption are enabled), then the user sees a padlock symbol appearing in the last frame of the connected context animation (two arrow moving towards each other). <December, 2007> /B
2 In SIP 2.2, the SRTP feature has been implemented in a very configurable manner. The reasons for this are: To allow deployment in a mixed environment where some elements of the solution are SRTP capable and some are not To allow for partial security and controlled CPU usage by Polycom legacy devices (SoundPoint IP 301, 501, 600, and 601) which do not have sufficient processor power to run full SRTP in a three-way conference with G.711 as the codec. The subsequent sections of this technical bulletin outline possible deployment scenarios for the feature. Terminology Before you read this document, it is important to understand certain terminology and become familiar with the authentication/encryption configuration as described in the RFC 3711 and RFC 4568 (listed in the References on page 10). Note In the sip.cfg configuration file, parameters for legacy phones are denoted by leg. SIP 2.2 Secure Real-Time Transport Protocol Implementation Overview In this scenario a local media server is used for functions such as call recording and voice mail operations. This media server is SRTP capable. A PSTN gateway is deployed that is not SRTP capable. The various connections possible are depicted in the figure below. As a result the phones need to be capable of one of the following: Connecting using SRTP when connecting to the media server or one another Connecting using regular RTP when connecting directly to the gateway Note The figures in the following sections show the audio connection paths with SIP server and signalling paths. The following sections describe three SRTP scenarios. Configuration file parameters are described in Configuration File Changes on page 7. 2
3 Scenario One: Mixed SRTP and Non-SRTP Endpoints In this scenario, the following assumptions are made: Legacy phones are used, including a SoundPoint IP 601 with full SRTP for point-to-point calls. The system administrator disables local conferencing on the legacy phones. The following sip.cfg configuration file changes are suggested: sec.srtp.enable="1" sec.srtp.leg.enable="1" sec.srtp.offer="1" sec.srtp.leg.allowlocalconf="0" 3
4 A SoundPoint IP phone configured as above will send the following media descriptions in its SDP: m=audio 2230 RTP/SAVP a=sendrecv a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:nl326xlshguixlmkyqo+exm5gpbz+mlbwmzotrri a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:18 G729/8000 a=rtpmap:101 telephone-event/8000 m=audio 2230 RTP/AVP a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:18 G729/8000 a=rtpmap:101 telephone-event/8000 Scenario Two: Full Security In this scenario, the following assumptions are made: All elements of the solution are SRTP-capable so security is mandated. 4
5 The following sip.cfg configuration file changes are suggested: sec.srtp.enable="1" sec.srtp.leg.enable="1" sec.srtp.offer="1" sec.srtp.require="1" A SoundPoint IP phone configured as above will send the following media descriptions in its SDP: m=audio 2222 RTP/SAVP a=sendrecv a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:w1agu0fjvjv0avrw8jgztcoe6b2dbayilxcdqh7w a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:18 G729/8000 a=rtpmap:101 telephone-event/8000 Scenario Three: SoundPoint IP 601 Endpoint In this scenario, the following assumptions are made: The SoundPoint IP 601 is configured with full SRTP on, but encryption only. The SoundPoint IP 601 will not accept authentication (calls ignored if offered) and all other phones will not offer authentication. 5
6 The following sip.cfg configuration file settings are suggested: sec.srtp.enable="1" sec.srtp.leg.enable="1" sec.srtp.offer="1" ms.noauth.offer="1" ms.leg.noauth.offer="1" ms.leg.noauth.require="1" ms.ip_4000.noauth.offer="1" A SoundPoint IP phone configured as above will send the following media descriptions in its SDP: m=audio 2224 RTP/SAVP a=sendrecv a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:app9lqvxicbkc18r6p+obnerrm5jwa3kmhn84idw UNAUTHENTICATED_SRTP a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:18 G729/8000 a=rtpmap:101 telephone-event/8000 m=audio 2224 RTP/AVP a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:18 G729/8000 a=rtpmap:101 telephone-event/8000 Recommended Practices for Secure Real-Time Transport Protocol When secure media communications is required, the following practices are recommended: 1. All elements of the communication should be SRTP capable. 2. Transport Layer Security (TLS) should be used when SRTP is used. If TLS is not used, the initial encryption keys will be passed in the clear such that an eavesdropper can intercept them and potentially use them to decrypt the media streams. 3. Media encryption places an increased CPU loading onto devices and Polycom recommends that only SoundPoint IP 330/320, 430, 550, and 650 desktop phones are utilized. 4. The use of encrypted signalling and media will make it more difficult to diagnose any deployment issues that may arise. Careful thought should be given to how system level issues will be investigated as part of the system design, for example, provide a mechanism to turn off SRTP during testing. 6
7 Configuration File Changes Configuration changes can performed centrally at the boot server: Central (boot server) Configuration File: sip.cfg Specify the parameters to enable and disable SRTP. For more information, refer to the following section, Security in Application Configuration File. Security in Application Configuration File Note As per RFC 3711, you cannot turn off authentication of RTCP. This configuration attribute is defined as follows: Note For SoundPoint IP 301, 501, 600, and 601 legacy phones, use leg tagged session parameters. For example, use ms.leg.noauth.offer. For SoundStation IP 4000 phone, use IP_4000 tagged session parameters. For example, use ms.ip_4000.noauth.offer. For all other phones, use untagged session parameters. For example, use ms.noauth.offer. Attribute Permitted Values Default Interpretation. sec.srtp.enable 0, 1 Null If set to 1, the phone accepts SRTP offers. If set to 0 or Null, the phone always declines SRTP offers. sec.srtp.leg.allowloca lconf 0, 1 Null The error Service unavailable" is displayed if the user tried to create a conference with sec.srtp.leg.allowlocalconf set to 0 and without voipprot.sip.conference.address set. If voipprot.sip.conference.address is set, the value of sec.srtp.leg.allowlocalconf is irrelevant. If sec.srtp.leg.enable is set to 0 or Null, then the value of sec.srtp.leg.allowlocalconf is irrelevant, as the local conference is allowed. sec.srtp.leg.enable 0, 1 Null If set to 1, the phone always declines SRTP offers. If set to 0 or Null, the phone accepts SRTP offers. sec.srtp.offer 0, 1 Null If set to 1, the phone includes a secure media stream description along with the usual non-secure media description in the SDP of a SIP INVITE. This is for the phone initiating (offering) a phone call. If set to 0 or Null, no secure media stream is included in SDP of a SIP invite. 7
8 Attribute Permitted Values Default Interpretation sec.srtp.require 0, 1 Null If set to 1, the phone is only allowed to use secure media streams. Any offered SIP INVITEs must include a secure media description in the SDP or the call will be rejected. For outgoing calls, only a secure media stream description is include in the SDP of the SIP INVITE, meaning that the non-secure media description is not included. If sec.srtp.require is set to 1, sec.srtp.offer is logically set to 1 no matter what the value in the configuration file. If set to 0 or Null, secure media streams are not required. sec.srtp.offer.hmac_ SHA1_80 sec.srtp.offer.hmac_ SHA1_32 0, 1 Null If set to 1 or Null, a crypto line with the AES_CM_128_HMAC_SHA1_80 crypto-suite will be included in offered SDP. If set to 0, the crypto line is not included. Note: This attribute was added in SIP , 1 Null If set to 1, a crypto line with the AES_CM_128_HMAC_SHA1_32 crypto-suite will be included in offered SDP. If set to 0 or Null, the crypto line is not included. Note: This attribute was added in SIP sec.srtp.key.lifetime 0, positive integer minimum 1024 Null The master key lifetime used for the cryptographic attribute in the SDP. The value specified is the number of SRTP packets. If set to 0 or Null, the master key lifetime is not set. If set to 1 or greater, master key lifetime is set. The default setting should be suitable for most installations. When the lifetime is set greater than 0, a re-invite with a new key will be sent when the number of SRTP packets sent for an outgoing call exceeds half the value of the master key lifetime. Note: Setting this parameter to a non-zero value may affect performance of the phone. sec.srtp.mki.enabled 0, 1 Null The master key identifier (MKI) is an optional parameter for the cryptographic attribute in the SDP that uniquely identifies the SRTP stream within an SRTP session. MKI is expressed as a pair of decimal numbers in the form: mki:mki_length where mki is the MKI value and mki_length its length in bytes. If set to 1, a four-byte MKI parameter is sent within the SDP message of the SIP INVITE / 200 OK. If set to 0 or Null, the MKI parameter is not sent. 8
9 Attribute ms.noauth.offer ms.leg.noauth.offer ms.ip_4000.noauth.of fer ms.noauth.require ms.leg.noauth.require ms.ip_4000.noauth.r equire ms.noencryprtcp.off er ms.leg.noencryprtc P.offer ms.ip_4000.noencryp RTCP.offer ms.noencryprtcp.re quire ms.leg.noencryprtc P.require ms.ip_4000.noencryp RTCP.require Permitted Values Default Interpretation 0, 1 Null If set to 1, no authentication of RTP is offered. A session description that includes the UNAUTHENTICATED_SRTP session parameter is sent when initiating a call. If set to 0 or Null, authentication is offered. 0, 1 Null If set to 1, no authentication of RTP is required. A call placed to a phone configured with noauth.require must offer the UNAUTHENTICATED_SRTP session parameter in its SDP. If ms.noauth.require is set to 1, ms.noauth.offer is logically set to 1 no matter what the value in the configuration file. If set to 0 or Null, authentication is required. 0, 1 Null If set to 1, no encryption of RTCP is offered. A session description that includes the UNENCRYPTED_SRTCP session parameter is sent when initiating a call. If set to 0, or Null, encryption of RTCP is offered. 0, 1 Null If set to 1, no encryption of RTCP is required. A call placed to a phone configured with noauth.require must offer the UNENCRYPTED_SRTCP session parameter in its SDP. If ms.noencryptrtcp.require is set to 1, ms.noencryptrtcp.offer is logically set to 1 no matter what the value in the configuration file. If set to 0 or Null, encryption of RTCP is required. 9
10 Attribute ms.noencryprtp.offe r ms.noencryprtp.offe r ms.noencryprtp.offe r ms.noencryprtp.req uire ms.leg.noencryprtp.r equire ms.ip_4000.noencryp RTP.require Permitted Values Default Interpretation 0, 1 Null If set to 1, no encryption of RTP is offered. A session description that includes the UNENCRYPTED_SRTP session parameter is sent when initiating a call. If set to 0, or Null, encryption of RTP is offered. 0, 1 Null If set to 1, no encryption of RTP is required. A call placed to a phone configured with noauth.require must offer the UNENCRYPTED_SRTP session parameter in its SDP. If ms.noencryptrtp.require is set to 1, ms.noencryptrtp.offer is logically set to 1 no matter what the value in the configuration file. If set to 0 or Null, encryption of RTP is required. References 1. SIP 2.2 Administrator s Guide for the SoundPoint IP and SoundStation IP Phones, August Go to 2. RFC The Secure Real-time Transport Protocol (SRTP). Go to 3. RFC Session Description Protocol (SDP) Security Descriptions for Media Streams. Go to Trademark Information Polycom, SoundPoint, and the Polycom logo design are registered trademarks of Polycom, Inc. in the U.S. and various countries. All other trademarks are the property of their respective companies. 10
Configuring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
IP Office Technical Tip
IP Office Technical Tip Tip no: 200 Release Date: January 23, 2008 Region: GLOBAL IP Office Session Initiation Protocol (SIP) Configuration Primer There are many Internet Telephony Service Providers (ITSP)
Best Practices for SIP Security
Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting
Three-Way Calling using the Conferencing-URI
Three-Way Calling using the Conferencing-URI Introduction With the deployment of VoIP users expect to have the same functionality and features that are available with a landline phone service. This document
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco
Mobicents 2.0 The Open Source Communication Platform. DERUELLE Jean JBoss, by Red Hat 138
Mobicents 2.0 The Open Source Communication Platform DERUELLE Jean JBoss, by Red Hat 138 AGENDA > VoIP Introduction > VoIP Basics > Mobicents 2.0 Overview SIP Servlets Server JAIN SLEE Server Media Server
Grandstream Networks, Inc.
Grandstream Networks, Inc. GVC3200/GVC3200 Conferencing System for Android TM Application Note: Preliminary Interoperability Test between GVC3200/GVC3200 and Other Video Conference Systems Index INTRODUCTION...
TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic
TraceSim 3.0: Advanced Measurement Functionality for Secure VoIP Networks and Simulation of Video over IP No part of this brochure may be copied or published by means of printing, photocopying, microfilm
TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series
Page 1 of 6 TECHNICAL SUPPORT NOTE 3-Way Call Conferencing with Broadsoft - TA900 Series Introduction Three way calls are defined as having one active call and having the ability to add a third party into
Asterisk with Twilio Elastic SIP Trunking Interconnection Guide using Secure Trunking (SRTP/TLS)
Asterisk with Twilio Elastic SIP Trunking Interconnection Guide using Secure Trunking (SRTP/TLS) With the Introduction of Twilio Elastic SIP trunking this guide provides the configuration steps required
This specification this document to get an official version of this User Network Interface Specification
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
Alcatel OmniPCX Enterprise R11 Supported SIP RFCs
Alcatel OmniPCX Enterprise R11 Supported SIP RFCs Product & Offer Large & Medium Enterprise Ref: 8AL020033225TCASA ed3 ESD/ Mid & Large Enterprise Product Line Management October 2013 OmniPCX Enterprise
SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda. [email protected]
ENUM-Tag am 28. September in Frankfurt SIP Security Prof. Dr. Andreas Steffen [email protected] Andreas Steffen, 28.09.2004, ENUM_SIP.ppt 1 Agenda SIP The Session Initiation Protocol Securing the
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
NTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: [email protected] Date: 2006/05/02 1 Outline Introduction NTP VoIP
WebSOCKET based Real time text (RTT) WebRTC gateway For WebRTC and SIP interop. Version 2.5a. Projet Sécuritas
WebSOCKET based Real time text (RTT) WebRTC gateway For WebRTC and SIP interop Version 2.5a Projet Sécuritas Authors: Emmanuel Buu, Ivés. [email protected] www.ives.fr Gunnar Hellström, Omnitor. [email protected]
VegaStream Information Note T.38 protocol interactions
VegaStream Information Note T.38 protocol interactions Introduction. This document provides details of the signalling used for transmitting faxes across a VoIP link. With Vega products, all calls are initiated
Enabling Security Features in Firmware DGW v2.0 June 22, 2011
Enabling Security Features in Firmware DGW v2.0 June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Scope... 3 Acronyms and Definitions... 3 Setup Description... 3 Basics of Security Exchanges...
Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0
Application Note Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0 1 FIREWALL REQUIREMENTS FOR ONSIGHT MOBILE VIDEO COLLABORATION SYSTEM AND HOSTED
MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)
MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment) N.B. Goto MyIC Preferences in the System Toolbar. Description: this may be any appropriate description of the
Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.0 Abstract These Application
Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options
Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options Document Summary This document provides information on several integration scenarios
Master Kurs Rechnernetze Computer Networks IN2097
Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle, Dr. Fuhrmann Master Kurs Rechnernetze Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Dr. Thomas Fuhrmann
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Avaya Meeting Exchange Enterprise Edition 5.2 and Avaya Aura Messaging 6.2 using Transport Layer Security and Secure Real-time Transport
VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009
VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
IP Office 4.2 SIP Trunking Configuration Guide AT&T Flexible Reach and AT&T Flexible Reach with Business in a Box (SM)
IP Office 4.2 SIP Trunking Configuration Guide AT&T Flexible Reach and AT&T Flexible Reach with Business in a Box (SM) Issue 1.0 (8 th October 2008) 2008 Avaya Inc. All Rights Reserved. Notice While reasonable
Aastra BluStar TM 8000i Desktop Media Phone / Aastra BluStar TM for Conference Room. 4.3.0 SIP Call Server Release Notes. Draft
Aastra BluStar TM 8000i Desktop Media Phone / Aastra BluStar TM for Conference Room 4.3.0 SIP Call Server Release Notes 1 41-001468-03 REVRC2 09.2013 Draft Content SIP Call Server Release Notes 4.3.0.......................................
Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling
Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling Jethro Beekman Christopher Thompson Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2013-18
Session Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
Application Note. Onsight Connect Network Requirements V6.1
Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network
Technical Bulletin 43565 Using Polycom SoundPoint IP and Polycom SoundStation IP Phones with Asterisk
Technical Bulletin 43565 Using Polycom SoundPoint IP and Polycom SoundStation IP Phones with Asterisk Introduction This document provides introductory information on how to use Polycom SoundPoint IP phones
Dialogic 4000 Media Gateway Series
The Dialogic 4000 Media Gateways (DMG4000 Gateways) are integrated systems that can provide both local PSTN and voice endpoint connectivity at a branch office premise as well as base-level voice service
Release Notes for NeoGate TE100 16.18.0.X
Release Notes for NeoGate TE100 16.18.0.X ===Firmware Version: V16.18.0.2==== Applicable Model: NeoGate TE100 Release Date: October 25th, 2014 http://www.yeastar.com 1/6 1. New Features 1. Added support
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, 2005. Dennis Baron, January 5, 2005 Page 1. np119
SIP Basics CSG VoIP Workshop Dennis Baron January 5, 2005 Page 1 Outline What is SIP SIP system components SIP messages and responses SIP call flows SDP basics/codecs SIP standards Questions and answers
Secured Communications using Linphone & Flexisip
Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
SIP ALG - Session Initiated Protocol Applications- Level Gateway
SIP ALG is a parameter that is generally enabled on most commercial router because it helps to resolve NAT related problems. However, this parameter can be very harmful and can actually stop SIP Trunks
Interactive Intelligence CIC 2015 R4 Patch1 Configuration Guide
Interactive Intelligence CIC 2015 R4 Patch1 Configuration Guide Performed By tekvizion PVS, Inc. Contact: 214-242-5900 www.tekvizion.com Copyright 2015 by tekvizion PVS, Inc. All Rights Reserved. Confidential
Deployment Guide for the Polycom SoundStructure VoIP Interface for Cisco Unified Communications Manager (SIP)
Deployment Guide for the Polycom SoundStructure VoIP Interface for Cisco Unified Communications Manager (SIP) UC Software 4.0.1 December 2011 1725-33223-001 Rev. A Trademark Information POLYCOM, the Polycom
159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)
Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives
SIP 2.0 Administrator s Guide SoundPoint /SoundStation IP SIP
SIP 2.0 Administrator s Guide SoundPoint /SoundStation IP SIP Version 2.0.3B Addendum Version 2.1 Addendum January 2007 Copyright 2007 Polycom, Inc. All rights reserved. Notices 1. Specifications subject
Technical Bulletin 5844
SIP Server Fallback Enhancements on Polycom SoundPoint IP, SoundStation IP, and VVX Phones This technical bulletin provides detailed information on how the SIP software has been enhanced to support SIP
SIP: Session Initiation Protocol. Copyright 2005 2008 by Elliot Eichen. All rights reserved.
SIP: Session Initiation Protocol Signaling Protocol Review H323: ITU peer:peer protocol. ISDN (Q.931) signaling stuffed into packets. Can be TCP or UDP. H225: Q931 for call control, RAS to resolve endpoints
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
Alkit Reflex RTP reflector/mixer
Alkit Reflex RTP reflector/mixer Mathias Johanson, Ph.D. Alkit Communications Introduction Real time audio and video communication over IP networks is attracting a lot of interest for applications like
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Best Practices for Role Based Video Streams (RBVS) in SIP. IMTC SIP Parity Group. Version 33. July 13, 2011
Best Practices for Role Based Video Streams (RBVS) in SIP IMTC SIP Parity Group Version 33 July 13, 2011 Table of Contents 1. Overview... 3 2. Role Based Video Stream (RBVS) Best Practices Profile... 4
Technical Bulletin 18292
Adding a Custom Idle Display Logo to Polycom SoundPoint IP and SoundStation IP Phones This technical bulletin provides end users, system administrators, and service providers with step-by-step instructions
OSSIR, November 2010 [email protected] 1/45
OSSIR, November 2010 [email protected] 1/45 Real-time Communication Applications OSSIR, November 2010 [email protected] 2/45 Protocols sip & xmpp OSSIR, November 2010 [email protected]
NAT and Firewall Traversal. VoIP and MultiMedia 2011 [email protected] 1/77
and Firewall Traversal VoIP and MultiMedia 2011 [email protected] 1/77 Introduction Does anyone remember why we started working on IPv6? ICAN says IPv4 addresses will run out by 2011 XXXX says the same
Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks
Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks Document Overview This document provides an overview of how to effectively and securely provide IP-based videoconferencing
Media Gateway Controller RTP
1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran
Overview of VoIP Systems
2 Overview of VoIP Systems In their simplest form, Voice over IP protocols simply enable two (or more) devices to transmit and receive real-time audio traffic that allows their respective users to communicate.
Avaya IP Office 4.0 Customer Configuration Guide SIP Trunking Configuration For Use with Cbeyond s BeyondVoice with SIPconnect Service
Avaya IP Office 4.0 Customer Configuration Guide SIP Trunking Configuration For Use with Cbeyond s BeyondVoice with SIPconnect Service Issue 2.2 06/25/2007 Page 1 of 41 Table of contents 1 Introduction...8
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Application Notes for Configuring SIP Trunking between Metaswitch MetaSphere CFS and Avaya IP Office Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between Metaswitch MetaSphere CFS and Avaya IP Office Issue 1.0 Abstract These Application Notes describe the steps
Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明
Spirent Abacus SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 1 1. TLS Interview (Transport Layer Security Protocol) (1) TLS Feature Introduction: 1. TLS is a successor of Secure Sockets Layer (SSL), a cryptographic
High Definition PoE IP Phone
High Definition IP Phone Highlights Key Features Supports SIP 2.0 (RFC3261) Supports 1 SIP voice line IEEE 802.3af Power over Ethernet compliant Supports HD voice LDAP / TR-069 / SNMP Cost-effective, High-performance
How To Use A Microsoft Vc.Net (Networking) On A Microsatellite (Netnet) On An Ipod Or Ipod (Netcom) On Your Computer Or Ipad (Net) (Netbook) On The
14: Signalling Protocols Mark Handley H.323 ITU protocol suite for audio/video conferencing over networks that do not provide guaranteed quality of service. H.225.0 layer Source: microsoft.com 1 H.323
Internet Engineering Task Force (IETF) Request for Comments: 7088 Category: Informational February 2014 ISSN: 2070-1721
Internet Engineering Task Force (IETF) D. Worley Request for Comments: 7088 Ariadne Category: Informational February 2014 ISSN: 2070-1721 Abstract Session Initiation Protocol Service Example -- Music on
Release Notes. Version 6.0
Release Notes Version 6.0 Document #: LTRT-69017 February 2010 SIP Release Notes Contents Table of Contents 1 What's New in Release 6.0... 9 1.1 Supported Hardware Platforms... 9 1.1.1 New Models and
Voice over IP (VoIP) Part 2
Kommunikationssysteme (KSy) - Block 5 Voice over IP (VoIP) Part 2 Dr. Andreas Steffen 1999-2001 A. Steffen, 10.12.2001, KSy_VoIP_2.ppt 1 H.323 Network Components Terminals, gatekeepers, gateways, multipoint
Intel NetStructure Host Media Processing Software Release 1.0 for the Windows * Operating System
Datasheet Intel NetStructure Host Media Processing Software Release 1.0 for the Windows * Operating System Media Processing Software That Can Be Used To Build Cost-Effective IP Media Servers Features Benefits
How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib
NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application
SIP Forum Fax Over IP Task Group Problem Statement
T.38: related to SIP/SDP Negotiation While the T.38 protocol, approved by the ITU-T in 1998, was designed to allow fax machines and computer-based fax to carry forward in a transitioning communications
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
VIDEOCONFERENCING. Video class
VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes
SIP: Protocol Overview
SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
CVOICE Exam Topics Cisco Voice over IP Exam #642-432 7/14/2005
CVOICE Exam Topics Cisco Voice over IP Exam #642-432 7/14/2005 From the Cisco CVOICE 642-432 Exam Topics Voice over IP Technologies Describe the similarities and differences between PSTN and VoIP including
IP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007.
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007. Intoduction (1990s) a need for standard protocol which define how computers should connect to one another so they can share media and
Sample Configuration for SIP Trunking between Avaya IP Office R8.0 and Cisco Unified Communications Manager 8.6.2 Issue 1.0
Avaya Solution & Interoperability Test Lab Sample Configuration for SIP Trunking between Avaya IP Office R8.0 and Cisco Unified Communications Manager 8.6.2 Issue 1.0 Abstract These Application Notes describe
LifeSize UVC Multipoint Deployment Guide
LifeSize UVC Multipoint Deployment Guide May 2014 LifeSize UVC Multipoint Deployment Guide 2 LifeSize UVC Multipoint LifeSize UVC Multipoint is a software MCU optimized for conferences that mix high definition
Acano solution. Third Party Call Control Guide. March 2015 76-1055-01-E
Acano solution Third Party Call Control Guide March 2015 76-1055-01-E Contents Contents 1 Introduction... 3 1.1 How to Use this Guide... 3 1.1.1 Commands... 4 2 Example of Configuring a SIP Trunk to CUCM...
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
CONNECTING TO LYNC/SKYPE FOR BUSINESS OVER THE INTERNET NETWORK PREP GUIDE
CONNECTING TO LYNC/SKYPE FOR BUSINESS OVER THE INTERNET NETWORK PREP GUIDE Engineering Version 1.3 June 3, 2015 Table of Contents Foreword... 3 Current Network... 4 Understanding Usage/Personas... 4 Modeling/Personas...
Aculab digital network access cards
Aculab digital network access cards Adding and Using IPv6 Capabilities Guide Revision 1.0.2 PROPRIETARY INFORMATION Aculab Plc makes every effort to ensure that the information in this document is correct
Introducing Cisco Voice and Unified Communications Administration Volume 1
Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your
MITEL SIP CoE. Technical. Configuration Notes. Configure MCD 4.1 for use with SKYPE SIP Trunking. SIP CoE 10-4940-00120
MITEL SIP CoE Technical Configuration Notes Configure MCD 4.1 for use with SKYPE SIP Trunking SIP CoE 10-4940-00120 NOTICE The information contained in this document is believed to be accurate in all respects
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Adaptation of TURN protocol to SIP protocol
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 2, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 78 Adaptation of TURN protocol to SIP protocol Mustapha GUEZOURI,
Request for Comments: 4579. August 2006
Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)
EarthLink Business SIP Trunking. ININ IC3 IP PBX Customer Configuration Guide
EarthLink Business SIP Trunking ININ IC3 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011
