SBC WHITE PAPER. The Critical Component
|
|
|
- Milton Palmer
- 10 years ago
- Views:
Transcription
1 SBC WHITE PAPER The Critical Component
2 Table of Contents of your VoIP Infrastructure... 3 Enter the SBC... 4 Functions... 5 Security... 5 Denial of Service... 5 Toll Fraud... 6 Encryption... 6 Policy... 6 Call Routing... 6 SIP Interoperability... 7 Media Transcoding... 7 DTMF Detection/Generation... 8 Scalability... 8 Virtual SBC... 8 Enterprise Use Cases... 9 SIP Trunking... 9 Remote Worker... 9 Hosted PBX Lync SBC Load Balancer Conclusion
3 Table of Diagrams Figure 1: Typical SBC Deployment...5 Figure 2: The ITSP and corporate networks are each protected by an SBC...10 Figure 4: One SBC protects service provider, another protects the corporate customer...11 Figure 3: Remote workers with access to network, protected by SBC...11 Figure 5: SBC translates MS-SIP (TCP) to standard UDP SIP...11 Figure 7: SBC protects VoIP network and provides load balancing across SIP trunks...12 Figure 6: SBC built into Lync Express appliance
4 of your VoIP Infrastructure Voice over internet protocol (VoIP) offers many operational cost, feature and flexibility advantages over the incumbent telephone system, and is rapidly replacing the public switched telephone network (PSTN). As the compelling advantages of VoIP drive an increasing number of businesses and organizations to switch over to state-of-the-art telephony technology, the complexities and pitfalls of VoIP must be addressed. Several issues arise when managing a VoIP system: Security Remote worker applications Challenges of a complicated network SIP interoperability/multi-vendor/bring your own device The existing security features of a network can make the enabling of media and signal flow between communication endpoints technically challenging. Special measures are required to overcome the obstacles of network security features. Corporate networks are becoming ever more complicated, due to security issues and by the variety of interoperating devices. Telecommuter applications require remote access, further complicating security issues. Meanwhile, the rise of UC (Unified Communications) means a greater variety of media, including a growing use of video and other rich communication media. But new systems have new and sometimes unfamiliar or unknown vulnerabilities. Traditional communications via PRI lines may be limited, but they are remarkably reliable and fairly secure in most parts of the world. When a business switches to VoIP and unified communications, a very high degree of security and reliability is expected. These systems however, are not inherently as secure as their TDM counter parts. Additional network elements are required to achieve the expected characteristics. While it is true that networks are getting more complicated, it is also true that the equipment to manage the network is getting more sophisticated. This is good news for organizations that care about both their ability to manage the network, and the security of their data and communications systems. ENTER THE SBC The Session Border Controller (SBC) provides a number of services that make a VoIP/UC system more secure and better able to integrate SIP-based equipment from a variety of vendors. Let s first look at what session border controller means. The session border controller manages both media and signalling streams. Each session consists of the collection of signalling and media streams that connect one party to another. A session works in only one direction, so two sessions are required for a two-way phone conversation 1. 4
5 Figure 1: Typical SBC Deployment For example, a two way telephone conversation would consist of two sessions, each containing a signaling channel and a voice channel. A video session may consist of a signalling channel, an audio channel and a video channel. The situation for conferences may be more complicated, depending on how the conference is set up. The border is the demarcation point between two networks, such as LAN and Internet, or sections of a network, such as segments in a very large and segregated corporate network. A controller is required to manage routing, taking into account the topology of the network, traversing firewalls, and managing Quality of Service (QoS). The routing equipment controls how traffic flows through the network. If properly configured, routers will use the ToS/DSCP/DiffServ fields in the IP header to make routing decisions. It is up to the SBC to properly set these fields for each packet. An SBC can also manage multiple SIP trunks, including load balancing, congestion avoidance and fail-over. 1 Technically, a two-way conversation requires two sessions. However, most SBC specifications use the term session and call interchangeably. 5
6 Functions The session border controller fills a number of important rolls in delivering VoIP services to a local network, including: Security Encryption Policy Call routing SIP interoperability Media transcoding DTMF detection/generation Scalability Each of the above points is discussed in greater detail below. SECURITY One of the roles of an SBC is to provide a layer of security to prevent the VoIP system from becoming a point of entry for hackers or toll fraudsters. It must also smoothly route calls through existing security systems on the network. The SBC terminates each call on one side of the network and re-originates the call on the other side. This approach allows the SBC to maintain complete control over every call, and to dynamically manage security. This hides network topology and presents a brick wall for would-be hackers intent on entering the network. VoIP does not present a security risk when properly managed by an SBC. As SIP messages work their way through the network, each node adds its own via field to every packet. Packets will probably pass through a PBX for example. By the time the SIP packet leaves the network, a series of via fields shows the route the SIP message has taken. This reveals the structure of the network behind the firewall to the outside world. Such information can help hackers break a network. The SBC removes all accumulated via fields from each packet, and replaces them with a single via field from the SBC, making outside SIP messages appear to have originated from the SBC. This hides the network structure from the outside world. NAT transversal functions are used to navigate the NAT firewalls that protect typical corporate networks. The SBC opens a pinhole (single port) in the firewall for the duration of the call and performs port remapping to transfer signalling and media packets between the corporate network and internet. As BYOD (Bring Your Own Device) becomes more popular, the security flaws that can come with BYOD grow. Smart phones may have apps installed which present a security threat. For example, the owner may download a game, which is really a Trojan horse designed to steal bandwidth from the network. By analysing typical traffic versus rogue VoIP traffic, the damage from such Trojans can be controlled. Denial of Service A denial of service (DoS) attack is a common way for hackers to attempt to disrupt service. DoS can be detected by measuring the traffic volume from each source, and blocking unusual patterns at the kernel level. This approach reduces the load on the SBC so that the network can operate normally during an attack. 6
7 Malformed packet attack (fuzzing) is an alternate form of DoS attack. The assailant attempts to bring down the service by sending malformed packets to the VoIP system in an attempt to break the SIP stack. The SBC detects malformed packets and blocks them. The IT manager can also configure the SBC to block any IP address that generates malformed packets. The SBC can deploy other security features as well. Call access control limits the number of concurrent calls each customer can have. SIP registration security detects when too many wrong passwords are attempted within a given time. Known hacker user agents can be blocked. Toll Fraud Toll fraud on VoIP networks is a growing problem. Toll fraud has shifted from an activity individuals undertake to make free long distance calls across the conventional phone network, to an activity carried out by more organized groups who steal minutes from unsecured corporate VoIP networks and resell them to their customers. Even the smallest PBX can be hacked and used to rack up bills of tens of thousands of dollars for unauthorized calls in a single month. ENCRYPTION Encrypted voice channels are required to prevent eavesdropping as voice packets travel public networks. It also serves the purpose of authenticating endpoints. The standard approach is to use Transport Layer Security (TLS) and Secure Real-Time Transport Protocol (SRTP) to protect signalling and voice channels respectively. Sangoma uses a hardware-based transcoding system to apply encryption. This frees the server to handle an increased call volume, allowing economical use of the SBC server for high call volumes while still providing voice encryption. POLICY Unauthorized use of the company VoIP services can be controlled by putting appropriate policies in place. These are managed by the SBC. Only allowing calls between known SIP endpoints allows remote workers to access the VoIP system with a SIP phone, but prevents hackers from gaining access with an unregistered SIP phone or user agent. An integrated security library looks for patterns, such as excessive long distance calls when the office is closed. CALL ROUTING Basic call routing directs each phone call so that it arrives at the intended endpoint. The flexibility of an XML-based routing file and the ability to query an internal or external database adds additional flexibility and capabilities. Routing rules are applied to each SIP message, based on variables such as time of day; any of the variables found in the SIP header, including originating number and destination number; and SS7 parameters, if encapsulated in the SIP message. For organizations that are using multiple SIP providers, the SBC can provide least cost routing and load balancing across trunks. 7
8 The SBC can also route around network congestion by rerouting calls when the message returned by a SIP invite indicates that the message cannot be processed. SIP INTEROPERABILITY Although SIP is considered a standard, it is an extremely flexible protocol leading to tremendous variation. One SIP-enabled device does not necessarily interoperate correctly with another. One of the major benefits of an SBC is that it allows different devices with varied codecs and SIP protocol flavours to interconnect. This enables multi-vendor systems to operate smoothly and leaves the door open for future equipment to work seamlessly with the current infrastructure. SIP headers can be modified by the SBC to ensure compatibility between disparate devices. In some cases, equipment such as a phone may add certain SIP headers that other equipment, such as a softswitch, cannot recognize. The SBC can remove these headers to avoid confusing incompatible hardware. SIP header modification can also be used to add extensibility, enabling custom features such as accounting, integration with a specific PBX application, call recording and more. MEDIA TRANSCODING Transcoding is necessary to allow incompatible media types to cross the barrier between disparate devices, and to allow optimal use of available network bandwidth. For example, if bandwidth is not an issue and high quality is desired, G is a good audio codec option. On the other hand, if bandwidth is constrained or expensive, G.729 is a better choice. In a conference scenario there may be a mixture of codecs, depending on endpoint equipment and individual connections. Transcoding allows a mix of codecs to work together seamlessly. A variety of approaches are available to undertake media transcoding. Each approach has its pros and cons. The approach taken by different manufacturers varies according to their philosophy. Transcoding can be done entirely in software. This is flexible and can reduce capital costs, but it is CPU-intensive, leading to a lower call-handling capacity on the SBC. A hardware-based transcoding approach can be used, with the transcoding hardware installed in the server. If located in the server, the footprint is reduced, but limited space in the server may restrain the number of concurrent calls the SBC can handle. A third approach is to use externally located transcoding hardware, situated on the network at nearby or distant locations. This is more expandable than when installed in the server cabinet, but requires a bigger footprint and additional expense for enclosures, rack space, power supplies, etc. Sangoma is the only manufacturer to offer the choice of any of these three approaches. The most appropriate configuration can be chosen depending on specific needs, and can be changed as additional capacity is required. For example, additional transcoding hardware can be purchased and added to the network as required. No matter which approach is chosen, the solution benefits from Sangoma s long history as a transcoding hardware manufacturer. 8
9 DTMF DETECTION/GENERATION DTMF stands for Dual Tone Multi Frequency. Each key pad button on a phone is represented by a pair of sinusoidal frequencies. This 1960 s era in-band signalling system is still in wide use today, both for legacy phone handsets, and for interactive voice response (IVR) systems. The entrenchment of IVR systems insures that DTMF will remain an important part of corporate telephone systems for the indefinite future. The challenge with DTMF signalling on a VoIP network is that some codecs do not reliably transmit DTMF tones due to the use of lossy bandwidth compression algorithms which are optimized for voice. While these compression algorithms can transmit voice that is intelligible to human ears, the audio processed by some codecs may remove some audio information so that DTMF tones cannot reliably be detected at the distant-end. In these cases, it is necessary to detect DTMF tones on the close-end gateway, convert the audio into data, and forward data packets representing the digits to the distant-end gateway. The distant-end gateway regenerates the DTMF tones for the end-point to hear. RFC2833 tone relay is the standard method for handling this. SCALABILITY As the number of users and voice traffic grows, whether planned or not, the network infrastructure must grow to accommodate greater capacity. Transcoding, protocol interworking and the basics of the SBC itself must scale to manage an increased workload. There are several approaches to this. One way might be to add additional SBCs to the network, and then loadbalance amongst them. While such measures may be required in some situations, a more granular control over capacity is desirable so that issues with transcoding or interworking can be addressed separately, according to which subsystem is approaching capacity. Sangoma systems decouple transcoding and interworking from other SBC systems. While it is possible to house these services in the same physical enclosure as the SBC, it is also possible to have external Sangoma interworking and transcoding appliances to manage scaling. Transcoding can be handled in increments of simultaneous calls with the addition of D150 units. These transcoders are simply plugged into the network via Ethernet connection, adding more simultaneous call capacity to the network. The SBC function can be scaled by virtualizing the software. For organizations with a solid virtual server infrastructure, this approach is very appealing. Resources to a specific VM can be expanded and VoIP load increases or additional VM-based SBCs can be installed. 9
10 Virtual SBC In the appliance version of a session border controller, customers buy a pre-packaged unit, including server, software, and hardware-assisted transcoding. Sangoma offers the NetBorder SBC, suitable for 400 to 4,000 concurrent sessions, and 75 calls per second (CPS) for the carrier version. If less volume is required, the 10 CPS enterprise version may be more cost effective. The virtual machine (VM) version is ideal in applications where a lower call rate (calls per second) is required and the organization already has a VM infrastructure in place. In these cases, a VM installation can offer significant savings in hardware capital and operating expenses, while providing the same fail-safe operation that is built into the existing VM installation. There is also a software version of the product, primarily intended for integration into other products on an OEM basis. Enterprise Use Cases SIP TRUNKING Figure 2: The ITSP and corporate networks are each protected by an SBC. The SBC provides a defined demarcation point between the internet telephone service provider, and the corporate network. It reduces interoperating issues between the ITSP (Internet Telephone Service Provider) and their clients, saving core resources from attempting to handle interoperation. It can also handle transcoding as needed. Each business also has an SBC for security and to reduce interoperating issues within their network. 10
11 REMOTE WORKER Allow access to authorized endpoints on remote worker premises. Eliminate interoperation and firewall issues on corporate and remote worker networks, maintain security. HOSTED PBX Figure 3: Remote workers with access to network, protected by SBC. Figure 4: One SBC protects service provider, another protects the corporate customer. The NetBorder SBC protects the internet telephone service provider s network. It provides a defined demarcation point, and reduces interoperability issues with the core. Transcoding can be provided if required. The business also has an SBC to reduce interoperability issues and enhance network security. LYNC SBC Deployed in existing Lync environment: Figure 5: SBC translates MS-SIP (TCP) to standard UDP SIP. 11
12 Add SBC and Lync functions with Sangoma Lync Express: Figure 6: SBC built into Lync Express appliance. MS SIP is not compatible with non-microsoft devices. Microsoft Lync uses a different transport protocol (TCP instead of UDP). An SBC normalizes SIP protocol and translates transport protocol for compatibility between endpoints. The first illustration shows how an SBC can be deployed in an existing Lync environment. The second illustration shows how a Sangoma Lync Express appliance can be used to provide SBC functionality and key Lync components. LOAD BALANCER Figure 7: SBC protects VoIP network and provides load balancing across SIP trunks. Balance call load across multiple SIP trunk providers. Reroute calls in case a trunk fails or becomes congested. 12
13 Conclusion When an organization makes the switch from conventional phone lines to VoIP and SIP trunks, a session border controller is highly recommended to allow VoIP calls to pass through the firewall, route VoIP traffic properly across the network, and to enhance network security. The SBC ensures that VoIP does not become a security issue in the network. The SBC also protects the network from potential security threats that BYOD (bring your own device) policies could expose. The SBC allows disparate devices to interwork seamlessly, even when those devices use different implementations of SIP. The SBC can perform load balancing and fail over functions between SIP trunks. This allows an organization to have multiple SIP trunk suppliers and increase the reliability of their phone service. Meanwhile, VoIP service providers require an SBC to protect their network and correct SIP headers which may not have been properly adjusted for proper routing at the client end. The Session Border Controller is the critical component necessary to safely and effectively utilize SIP and SIP trunks. ABOUT SANGOMA TECHNOLOGIES Sangoma is a leading provider of hardware and software components that enable or enhance IP Communications Systems for both telecom and datacom applications. Enterprises, SMBs and Carriers in over 150 countries rely on Sangoma s technology as part of their mission critical infrastructures. Through its worldwide network of Distribution Partners, Sangoma delivers the industry s best engineered, highest quality products, some of which carry the industry s first lifetime warranty. The product line in data and telecom boards for media and signal processing, as well as gateway appliances and software. Founded in 1984, Sangoma Technologies Corporation is publicly traded on the TSX Venture Exchange (TSX VENTURE: STC). Additional information on Sangoma can be found at 13
SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma [email protected]
SangomaSBCs Keeping Your VoIP Network Secure Simon Horton Sangoma [email protected] Inside this Deck About Sangoma/ProVu SIP Market SBCs Demystified Business Applications and Use Cases Portfolio of SBCs
The Basics of TDM to VoIP Interconnection. Jeff Dworkin Director of Marketing [email protected]
The Basics of TDM to VoIP Interconnection Jeff Dworkin Director of Marketing [email protected] Attendee Dashboard Control Panel Click plus [+] icon to expand menus Click minus [-] icon to collapse menus
White Paper. avaya.com 1. Table of Contents. Starting Points
White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting
Using DNS SRV to Provide High Availability Scenarios
AN-SBC-100 Sangoma Session Border Controllers Using DNS SRV to Provide High Availability Scenarios Contents 1. Sangoma Session Border Controllers - High Availability Solution...1 2. What is DNS SRV?...1
PETER CUTLER SCOTT PAGE. November 15, 2011
Future of Fax: SIP Trunking PETER CUTLER SCOTT PAGE November 15, 2011 QUESTIONS AND ANSWERS TODAY S SPEAKERS Peter Cutler Vice President of Sales Instant InfoSystems Scott Page Subject Matter Expert Dialogic
Ingate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
What is an E-SBC? WHITE PAPER
Executive Summary Enterprise communications is in a state of transformation. Businesses are replacing conventional PBX systems with VoIP and Unified Communications (UC) solutions and cloud-based services
SIP Trunking and the Role of the Enterprise SBC
SIP Trunking and the Role of the Enterprise SBC a Tango Networks ebriefing SIP trunks offer companies of all sizes the opportunity to improve and simplify their communications network while reducing costs.
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios
An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice
SIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
How To Make A Phone System More Reliable And Reliable
WHITE PAPER Enterprise Applications, Features and Benefits of Sangoma Vega Media Gateways Table of Contents Overview...3 Applications...4 Branch Offices...4 SIP Trunk Termination...6 PSTN Trunking Termination...7
How To Support An Ip Trunking Service
Small Logo SIP Trunking: Deployment Considerations at the Network Edge at the Network Edge Executive Summary The move to Voice over IP (VoIP) and Fax over IP (FoIP) in the enterprise has, until relatively
Session Border Controllers in Enterprise
A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Dialogic. BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge
Dialogic BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge Versatile Dialogic BorderNet Products Handle Network Transitions for Today s Critical Services and Solutions
How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation
How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation Introduction Enterprises are continuing to convert and
An Oracle White Paper August 2013. What Is an Enterprise Session Border Controller?
An Oracle White Paper August 2013 What Is an Enterprise Session Border Controller? Introduction... 1 Redefining Enterprise Communications... 2 E-SBCs Protect and Control IP Communications... 3 E-SBCs Do
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Dialogic BorderNet Session Border Controller Solutions
Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controllers Transform, Connect and Secure Today s Networks and Services Dialogic BorderNet Session Border Controller
OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border
Siemens Enterprise Communications Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border April 2011 Agenda 1 Industry Trends 2 Customer Initiatives
SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There
SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There Q&A Session Date: Wednesday, April 13, 2011 Q: You have to partner with a provider in order to do SIP trunking, correct?
Oracle s SIP Network Consolidation Solutions. Using SIP to Reduce Expenditures and Improve Communications
Oracle s SIP Network Consolidation Solutions Using SIP to Reduce Expenditures and Improve Communications A typical large enterprise could enjoy 401 percent three-year ROI on the Net-Net Enterprise Session
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
Vega 100G and Vega 200G Gamma Config Guide
Vega 100G and Vega 200G Gamma Config Guide This document aims to go through the steps necessary to configure the Vega SBC to be used with a Gamma SIP Trunk. When a SIP trunk is provisioned by Gamma a list
SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240
SIP Trunking Christina Hattingh Darryl Sladden ATM Zakaria Swapan Cisco Press 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Contents Introduction xix Part I: From TDM Trunking to SIP Trunking
nexvortex SIP Trunking Implementation & Planning Guide V1.5
nexvortex SIP Trunking Implementation & Planning Guide V1.5 510 S PRING S TREET H ERNDON VA 20170 +1 855.639.8888 Introduction Welcome to nexvortex! This document is intended for nexvortex Customers and
Secure VoIP for optimal business communication
White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product
An Oracle White Paper July 2013. Enterprise IP Telephony and Unified Communications Interoperability
An Oracle White Paper July 2013 Enterprise IP Telephony and Unified Communications Interoperability Introduction Enterprises are deploying Internet Protocol (IP) telephony and unified communications (UC)
Whitepaper Best of Both Worlds. Making the most out of your Office 365 Licensing and Increase Productivity How to add Lync Enterprise Voice
Whitepaper Best of Both Worlds Making the most out of your Office 365 Licensing and Increase Productivity How to add Lync Enterprise Voice Table of Contents Getting the most out of your Office 365 Deployment...3
Oracle s Unified Communications Infrastructure Solution. Delivering Secure, Reliable, and Scalable Unified Communications Services
Oracle s Unified Communications Infrastructure Solution Delivering Secure, Reliable, and Scalable Unified Communications Services Oracle s UC infrastructure solution combines tightly coupled session management,
Brochure. Dialogic BorderNet Session Border Controller Solutions
Brochure Dialogic BorderNet Solutions Supercharge Connections between Networks, Services and Subscribers with Ease and Scale The BorderNet family of session border controllers (SBCs) from Dialogic helps
Product Information = = = www.anynode.de e-mail [email protected] phone +49 5363 8195-0
07 2015 2 Efficient communication anynode is a Session Border Controller that is entirely a software based solution. It works as an interface for any number of SIP UAs for example, SIP phones and SIP PBXs,
Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller
Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller Russell Bennett UC Insights www.ucinsights.com [email protected] Introduction Those familiar with unified communications
Building the Lync Security Eco System in the Cloud Fact Sheet.
Building the Lync Security Eco System in the Cloud Fact Sheet. [Type text] The need to secure all entries to the fastest growing Unified Communication application (UC) and allow for complete inter-operability
OpenScape UC Firewall and OpenScape Session Border Controller
UC Firewall and Session Border Controller Security within and beyond the boundaries Security within and beyond your network s boundaries Our connected world We are living and working in a new world that
SBC 1000 / SBC 2000 Series Configuration Guide (For Microsoft Lync Server 2013)
Configuration Guide SBC 1000 / SBC 2000 Series Configuration Guide (For Microsoft Lync Server 2013) For use with AT&T s IP Flexible Reach Enhanced Features Service on MIS, MPLS PNT or AT&T VPN Disclaimers
SIP Trunking and Voice over IP
SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential
EarthLink Business SIP Trunking. ININ IC3 IP PBX Customer Configuration Guide
EarthLink Business SIP Trunking ININ IC3 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
Allstream Converged IP Telephony
Allstream Converged IP Telephony SIP Trunking Solution An Allstream White Paper 1 Table of contents Introduction 1 Traditional trunking: a quick overview 1 SIP trunking: a quick overview 1 Why SIP trunking?
Securing Unified Communications for Healthcare
Securing Unified Communications for Healthcare Table of Contents Securing UC A Unique Process... 2 Fundamental Components of a Healthcare UC Security Architecture... 3 Making Unified Communications Secure
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Copyright and Trademark Statement
Contents VoIP Starts with SmartNode...3 Why SmartNode?...3 SmartNode Product Comparison...5 VoIP Appliance with Embedded Windows...7 Carrier-Grade TDM + VoIP SmartMedia Gateways...8 Enterprise Solutions...9
S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009
S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need
SIP Trunking Deployment Steps and Best Practices
WHITE PAPER IP Communications SIP Trunking Deployment Steps and Best Practices A practical guide for planning, evaluating, and deploying production service in your network Introduction Today s market conditions
Oracle s Session Initiation Protocol Trunking Solution. Increase Agility and Reduce Costs with Session Initiation Protocol Trunks
Oracle s Session Initiation Protocol Trunking Solution Increase Agility and Reduce Costs with Session Initiation Protocol Trunks Oracle s SIP trunking solution is designed to enable the hyperconnected
VoIP Trunking with Session Border Controllers
VoIP Trunking with Session Border Controllers By Chris Mackall Submitted to the Faculty of the Information Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science
AT&T IP Flex Reach/ IP Toll Free Configuration Guide IC 3.0 with Interaction SIP Proxy
INTERACTIVE INTELLIGENCE AT&T IP Flex Reach/ IP Toll Free Configuration Guide IC 3.0 with Interaction SIP Proxy Version 1.7 9/2/2009 TABLE OF CONTENTS 1 AT&T... 5 1.1 Introduction... 5 1.2 Product Descriptions...
SBC 1000/2000 Configuration Guide with Lync 2013 for Windstream/ LPAETEC SIP Trunk Deployments
SBC 1000/2000 Configuration Guide with Lync 2013 for Windstream/ LPAETEC SIP Trunk Deployments Application Notes Rev. 1.0 Last Updated: April 10, 2015 Revision Date Revised By Comments 0.1 12/03/2015 Roman
Benefits of Using a Demarcation Device When Integrating Legacy Voice, SIP Trunks and Microsoft OCS R2
TECHNICAL WHITE PAPER Benefits of Using a Demarcation Device When Integrating Legacy Voice, SIP Trunks and Microsoft OCS R2 2 SIP Trunking SIP Trunking INTRODUCTION The term trunking has been used in the
Hosted PBX Platform-asa-Service. Offering
Hosted PBX Platform-asa-Service Offering Hosted PBX Platform Overview VoIP Logic s Hosted PBX Platform-as-a-Service (PaaS) delivers cloud-based PBX functionality encompassing traditional PBX features as
1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4
Coral IP Solutions TABLE OF CONTENTS 1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 2.1 UGW 4 2.2 IPG 4 2.3 FLEXSET IP 5 2.4 FLEXIP SOFTPHONE 6 2.5 TELEPORT FXS/FXO GATEWAYS 7 2.6 CORAL SENTINEL 7 3 CORAL IP
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
SIP SECURITY JULY 2014
SIP SECURITY JULY 2014 Executive Overview As with any data or communication service, it s important that all enterprises understand potential security issues related to SIP Trunking. This paper provides
How to choose the right IP gateway for your VoIP migration strategy. Deployment note
How to choose the right IP gateway for your VoIP migration strategy Deployment note Introduction The purpose of this document is to understand the role a TDM to IP gateway has in providing a migration
November 2013. The Business Value of SIP Trunking
November 2013 S P E C I A L R E P O R T The Business Value of SIP Trunking Table of Contents Introduction... 3 What Is SIP Trunking?... 3 What Is the Demand for SIP Trunking?... 5 How Does SIP Trunking
Microsoft Lync and SIP trunking - Ensuring multi-vendor technology success with Prognosis
White Paper Microsoft Lync and SIP trunking - Ensuring multi-vendor technology success with Prognosis by Sue Bradshaw: Technology Writer, Integrated Research Ensuring new technology like Lync delivers
Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment
Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment Application Notes Rev 1.0 P/N 550-06690 Last Updated: October 26, 2015 Revision History Revision Date Revised
Telco Carrier xsps Solutions. www.first.gr
Telco Carrier xsps Solutions www.first.gr TELCO CORE INFRUSTRUCTURE There are some necessities in the Telco world...to own the best available infrastructure at the most affordable cost. First Telecom s
Quality of Service Testing in the VoIP Environment
Whitepaper Quality of Service Testing in the VoIP Environment Carrying voice traffic over the Internet rather than the traditional public telephone network has revolutionized communications. Initially,
Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise
Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling
The Business Value of SIP Trunking
July 2013 US$39.00 S P E C I A L R E P O R T The Business Value of SIP Trunking By Khali Henderson Editor-in-Chief, Channel Partners COMMUNICATIONS Table of Contents Introduction... 3 What Is SIP Trunking?...
Designed For Market Requirements
Enterprise SIP Designed For Market Requirements Enterprises can combine XO Enterprise SIP with ANY MPLS IP-VPN or Data Network (even from another carrier) for an all-in-one, multi-site IP communications
Session Border Controller
Session Border Controller SBC OVERVIEW: Media Routes SBC is an advanced, comprehensive Policy enforcement point, Session Management and Service Orchestration engine deployed as a network border element
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
MITEL SIP CoE. Technical. Configuration Notes. Configure MCD 6.X for use with babytel SIP trunks. SIP CoE 13-4940-00266
MITEL SIP CoE Technical Configuration Notes Configure MCD 6.X for use with babytel SIP trunks SIP CoE 13-4940-00266 NOTICE The information contained in this document is believed to be accurate in all respects
Risk Free Migration to Lync Kevin Isacks, VP SBC & CA Development
Risk Free Migration to Lync Kevin Isacks, VP SBC & CA Development Why Lync MICROSOFT LYNC is an enterprise-ready UNIFIED COMMUNICATIONS PLATFORM LYNC CONNECTS PEOPLE everywhere, on Windows 8 and other
Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures
Extend the Life of Your Legacy PBX while Benefiting from SIP Trunks. December 5, 2013
Extend the Life of Your Legacy PBX while Benefiting from SIP Trunks December 5, 2013 Agenda About Sangoma VoIP Gateways Defined Sangoma Gateway Features Gateways Product Specifications Business Applications
IP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
Convergence: The Foundation for Unified Communications
Convergence: The Foundation for Unified Communications Authored by: Anthony Cimorelli, Senior Product Marketing Manager Onofrio Norm Schillaci, Principal Sales Engineer Michelle Soltesz, Director, Marketing
Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications
Oracle s Solution for Secure Remote Workers Providing Protected Access to Enterprise Communications Our forecast shows that the worldwide mobile worker population will increase to more than 1.3 billion
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision
An Oracle White Paper February 2014 Centralized vs. Distributed SIP Trunking: Making an Informed Decision Executive Overview Businesses across the globe are migrating from TDM access services to SIP trunks
Integrating VoIP Phones and IP PBX s with VidyoGateway
Integrating VoIP Phones and IP PBX s with VidyoGateway Updated February 2011 INDEX: I. ABSTRACT.1 II. III. IV. VIDYOGATEWAY OVERVIEW.. 1 NETWORK TOPOLOGIES AND DEFINITIONS...2 CONNECTING TO VIDYOCONFERENCES
Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security
Patton Electronics Co. www.patton.com 7622 Rickenbacker Drive, Gaithersburg, MD 20879, USA tel: +1 301-975-10001000 fax: +1 301-869-9293 Application Note Patton SmartNode in combination with a CheckPoint
Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.
Optimizing Converged Cisco Networks (ONT) reserved. Lesson 2.4: Calculating Bandwidth Requirements for VoIP reserved. Objectives Describe factors influencing encapsulation overhead and bandwidth requirements
Application Notes Rev. 1.0 Last Updated: January 9, 2015
SBC 1000/2000 Series Configuration Guide with Cisco Unified Call Manager v9.1 for Level 3 Voice Complete SM SIP Trunk Deployments Application Notes Rev. 1.0 Last Updated: January 9, 2015 Contents 1 Document
IP Telephony Deployment Models
CHAPTER 2 Sections in this chapter address the following topics: Single Site, page 2-1 Multisite Implementation with Distributed Call Processing, page 2-3 Design Considerations for Section 508 Conformance,
Welltel - Session Border Controller SBC 120
SBC 120 Appliance Welltel - Session Border Controller SBC 120 enhanced performance, increased security Welltel s Session Border Controllers (SBCs) help enterprises to reduce communications costs, enable
VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
EarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide
EarthLink Business SIP Trunking NEC SV8300 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 May 18, 2012 CHANGE HISTORY Version Date Change Details Changed By 1.0 5/18/2012
Best Practices for deploying unified communications together with SIP trunking connectivity
An Allstream White Paper Best Practices for deploying unified communications together with SIP trunking connectivity An Allstream White Paper 1 Table of contents Correct identification and maximization
Session Border Controllers and Videoconferencing
Session Border Controllers and Videoconferencing Using a Field-Proven Solution to Simplify and Improve Multi-Vendor Conferencing Environments August 2011 Study sponsored by: Table of Contents Introduction...
The MOST Affordable HD Video Conferencing. Conferencing for Enterprises, Conferencing for SMBs
The MOST Affordable HD Video Conferencing Video conferencing has become an increasingly popular service, being widely used by enterprises, organizations and individuals. Thanks to the enormous growth in
Integrate VoIP with your existing network
Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A
