VoIP Security regarding the Open Source Software Asterisk
|
|
|
- Winfred Mills
- 9 years ago
- Views:
Transcription
1 VoIP Security regarding the Open Source Software Asterisk Prof. Dr. -Ing. Kai-Oliver DETKEN DECOIT GmbH, Fahrenheitstraße 9 D Bremen, Germany and Prof. Dr. -Ing. Evren EREN University of Applied Sciences Dortmund, Emil-Figge-Str. 42 D Dortmund, Germany ABSTRACT Enterprises and organizations improve their business processes and drop their infrastructure cost by using Voice-over-IP (VoIP) technology. However, security aspects are often neglected. With the increasing merge of application data and speech data within IP networks new challenges arise for overall network and system security. VoIP packets are being transmitted over a shared medium, i.e., via a network which is shared by numerous subscribers with different profiles and for different services. Under certain conditions attackers can sniff data on the communication path and record VoIP conversations. This article will demonstrate existing security risks regarding the VoIP technology and present viable solutions and concepts. In this context VoIP standards will be analyzed with respect to their security mechanisms. Because of its growing prevalence especially the open source VoIP solution Asterisk will be analyzed and evaluated against typical security requirements. Keywords: VoIP, VoIP Security, risks, attacks, Asterisk, H.323, SIP, RTP, SCCP, MGCP, MEGACO, IAX, SIMCO. 1. STATE-OF-THE-ART IP telephony behaves similar to classical telephony, i.e., the subscriber does not experience a difference. Like in conventional telephony, the telephone conversation comprises three processes: establishment of the connection, transmission of speech, and termination of the connection. However, in contrast to classical telephony VoIP is not connectionorientated. Speech data is transported within IP packets. Connection establishment and termination is often controlled by a protocol separate from speech communication. This is different in IAX2 the signaling protocol for Asterisk. A differentiation is given depending on the packet type. Also negotiation and exchange of parameters for speech transmission is dispatched by dedicated protocols. In an IP network the IP address of the caller device has to be known, however not necessarily the caller s. There are no fixed subscriber links as it is the case in Public Switched Telephone Network (PSTN). Caller reachability is provided, similar to cellular networks such as GSM and UMTS, by means of a preceding authentication of the caller and associated notification of his actual location (i.e., the IP address). A fixed assignment of telephone number and IP address is not possible since the subscriber could change his location or different subscribers could use a PC or a terminal, or due to dynamical addressing using Dynamic Host Configuration Protocol (DHCP). This problem is solved by using a registration service the subscriber notifies his actual IP address at. The calling entity (gateway, host or end device of the caller) retrieves the actual IP address of the communication partner via the user name and can establish the connection. If application and speech data use the same network, the latter is exposed to typical data network attacks. Though, speech data can be encrypted, only few users deploy encryption for specific reasons. E.g., some products do not support encryption, or some users do not know how to configure their equipment appropriately. But one should also consider that encrypting speech data can negatively affect speech quality, which for many users has a higher priority than security. A VoIP system can be deployed in different ways. There are competing protocols with specific advantages and disadvantages. Securing VoIP systems begins with securing connection establishment in order to guarantee authenticity of the subscriber and avoid/prevent redirecting or sniffing data traffic (media stream). Furthermore, the media stream has to be encrypted in order to avoid sniffing and manipulation. Authentication and encryption requires solid key management. Interfaces for device configuration should be secured as well, e.g. by means of HTTPS. Additionally, it has to be assured that the arising fees (calls between a VoIP network and a classical telephone network such as ISDN) can be captured properly and that they cannot be manipulated. Another important issue is the protection of the network against attacks (hacking) and malware (viruses, worms, Trojan horses, etc.), which can be managed with suitable firewalls, intrusion detection systems (IDS), and virus scanners. Furthermore, attention should be paid to defective implementation in VoIP applications software (code), which is responsible for numerous security holes and vulnerabilities.
2 Most common signaling protocols for VoIP are: Session Initiation Protocol (SIP), IETF RFC-3261 Session Description Protocol (SDP), IETF RFC-4566 H.323 Packet-based multimedia communications systems, ITU-T-Standard Inter-Asterisk exchange Protocol (IAX) ISDN over IP ISDN/CAPI-based protocol MGCP and Megaco Media Gateway Control Protocol H.248, common specification of ITU-T and IETF MiNET from Mitel Skinny Client Control Protocol from Cisco (BRI, PRI, E1 or T1) by means of relatively low priced hardware. Asterisk has been developed by Mark Spencer from Digium 1. However, important extensions and applications originate also from other developers. The Asterisk software has been published under the GNU General Public License, which pushes its rapid worldwide development and distribution. That means many manufacturer of VoIP software PBX systems use Asterisk today and do not invest more time into own development. Figure 2 illustrates the modules and protocols implemented in Asterisk. Usually, all end devices send speech data directly via the network to the IP address of the communication partner. These data do not traverse the server of a VoIP provider. They are exchanged directly between subscriber end devices. Real-time data are transported via RTP (Real-Time Transport Protocol) and controlled by RTCP (Real-Time Control Protocol). For transmission RTP normally uses UDP (User Datagram Protocol), because it is a minimal, connectionless network protocol, which does not (unlike TCP (Transmission Control Protocol) provides reliability. This means, that the reception of speech packets is not acknowledged; there is no guarantee for delivery of packets. Compared to TCP, UDP has less packet latency, since erroneous or lost packets are not retransmitted and the sender does not wait for any acknowledgement of receipt leading to a continuous data flow without delays. A total error free transmission is not necessary because speech has a high redundancy and today s codecs are able to compensate a certain number of errors. For a continues conversation low latency is of higher importance. Figure 1 depicts the VoIP protocol stack giving a rough orientation according to the ISO-OSI layer model. The focus of this figure is the use of ITU-T signaling protocol standard H.323. Figure 1: VoIP protocol stack [DEER06] Data networks and IP telephony networks have different requirements. In addition to data bandwidth (approx. 64 kbps for an uncompressed speech data stream), quality of service (QoS) parameters such as latency, jitter, and packet loss impose considerable impact on speech quality. Through prioritization and suitable network scaling, it is possible to control QoS. 2. ASTERISK Asterisk [ASTE07] is an open source software product, which provides all functions of a conventional PBX. It runs on Linux, BSD, Windows (emulated) and OS X. It supports different VoIP protocols and can be interconnected with PSTN, ISDN Figure 2: Asterisk modules and protocols [KESS06] Some of the basic functions of Asterisk are: Dial plan, which can be individually configured and extended by additional applications. Herewith, it is possible to decide how an incoming call is handled. Interactive Voice Response (IVR) menu guiding the caller. Time, accounting, and billing for each subscriber / number. Voic with a complete caller response system by password access and forwarding of the call records via . Conferencing for support caller groups, to establish a telephone call between more than one participant. Call forwarding if unreachable or busy. Blacklists to block undesired callers (provided that the subscriber number is transmitted). Furthermore, Asterisk supports packet based protocols such as IAX/IAX2, H.323, SIP, MGCP, and SCCP. Since not only packet based systems shall be interconnected, conventional telephony protocols such as E-DSS1 (Euro-ISDN), National ISDN2, DMS100, BRI (ISDN4Linux), and 4ESS are also supported. Hence, all packet based protocols have to be analyzed with respect to security. [KESS06] For interconnection with digital and analog telephony equipment, Asterisk supports a number of hardware devices. Other vendors' cards than from Digium can be used for BRI 1
3 (ISDN2) or quad- and octo- port BRI based upon CAPI compatible cards or HFC chipset cards. The native protocol of Asterisk is the Inter-Asterisk exchange (IAX) protocol, which is also supported by a number of other soft-switches and PBXs. It is used to enable VoIP connections between servers as well as client-server communication. IAX now most commonly refers to IAX2, the second version of the IAX protocol, because of no available security mechanisms. IAX2 is able to carries signaling and data on the same path. The commands and parameters are sent binary and any extension has to have a new numeric code allocated. IAX2 uses a single UDP data stream (usually on port 4569 for IAX2, 5036 for IAX) to communicate between endpoints, both for signaling and data. The voice traffic is transmitted in-band. That makes it for IAX2 easier to get through firewalls and other security equipments by using a single port. Additionally the work behind network address translation (NAT) will be better supported. This is in contrast to SIP, H.323 and Media Gateway Control Protocol (MGCP) which are using an out-of-band RTP stream to deliver information. IAX2 supports trunking, which means multiplexing channels over a single link. That is necessary by the use of one single port for communication. If trunking is used, data from multiple calls will be merged into a single set of packets by the use of a 15 bit call number. That means that one IP datagram can deliver information for more than one call. As a positive result, the IP overhead is smaller than by other signaling protocols and no additional latency will produce. Figure 3 shows a Full Frame of an IAX message. The Full Frame can be used to send signaling, audio, or video information reliably. Full Frames are the only frame type which can be transmitted reliably. F Source Call Number R Destination Call Number Timestamp OSeqno ISeqno Frame Type C Subclass OSeqno (8 bit): This outbound stream sequence number always begins with 0 and increases monotonically. OSeqno is used by the recipient to track the ordering of media frames. ISeqno (8 bit): ISeqno is similar to OSeqno, except that it is used to track the ordering of inbound media frames. Specifically, ISeqno is the next expected inbound stream sequence number for the incoming media frames. Frame Type (8 bit): Frame Type identifies the class of message as defined in Table 1. C (1 bit): The C bit determines how the subclass value should be interpreted. Subclass (7 bit): If C is set to 1, the subclass value is interpreted as a power of two. If C is set to 0, subclass is interpreted as a simple 7-bit unsigned integer value. Type 0x01 0x02 0x03 0x04 0x05 0x06 0x07 0x08 0x09 Description DTMF Voice Data Video Control Null IAX Control Text Image HTML Table 1: IAX2 Full Frame Types [SPMI05] Figure 4 describes how a call set-up works by IAX. At first the IP Phone 1 starts to send the message NEW to the second IP Phone. The receiver confirms this call with ACCEPT to allow further setup procedures. After the messages ACK and RINGING the sender also confirms with an ACK message the telephone call. If the participant of IP Phone 2 starts the phone call a last ANSWER and ACK message will be sent. After all acknowledgements a full-duplex phone call can be used. IP Phone 1 IP Phone 2 Figure 3: IAX full frame header [SPMI05] There are several basic frame types define for IAX2 to transport voice, control frames, or information frames. Each of these frame types are described in the Internet draft [SPMI05] in detail. Here we describe only the Full Frame which consists of: F (1 bit): An F bit is used in indicate whether a frame is a Full Frame or not. Source Call Number (15 bit): A call number is a 15-bit unsigned integer that is used to track a media stream endpoint on a host. The value zero is a special call number that indicates the call number is unknown. R (1 bit): The R bit shows if the frame is being retransmitted. Retransmission occurs after some timeout period and retransmissions are retried several times, depending on the context. Destination Call Number (15 bit): A phone call actually has two call numbers associated with it, one for either direction. Timestamp (32 bit): A Timestamp can be a full 32- or an abridged 16-bit value. In the case of a 16-bit field, the value is actually the lower 16 bits of a full 32-bit timestamp that is maintained by the endpoint host. NEW ACCEPT ACK RINGING ACK ANSWER ACK Figure 4: Call setup via IAX protocol [KESS06] The current release versions of Asterisk are , and beta9 (State: May 2008).
4 3. PROTOCOL RISKS Because speech data is transmitted via standardized and open data networks, various threats exist. Moreover, VoIP systems are composed of numerous components and each component is a complex system with potential weaknesses. The magnitude of threats at the peerings between networks depends on the protocols used. RTP is used almost exclusively for media streams (speech data), whereas H.323, SIP, MGCP, and MEGACO are for signaling. Depending on the infrastructure and scenario, proprietary protocols can be used as well. H.323 Most essential attacks against the H.323 protocol suite are identity forgery on the caller side and message manipulation by means of Man-in-the-Middle attacks. If a subscriber succeeds in establishing a connection via a gateway with a forged identity, not only toll fraud would be possible. The caller can be identified by means of the IP address, the H.323 identification, or the caller s number. Often, only one of these criteria namely H.323 identification is used for authentication in combination with a password. Data is being transmitted in an unencrypted way. An attacker only has to sniff the signaling stream in order to access the data. Subsequently he can decode the binary data stream using a usual ASN.1 parser (e.g., with the tool Wireshark). Furthermore, it is possible to manipulate addresses of media streams during connection establishment. This allows an attacker to forward streams to any IP address, recording and modification and further forwarding. These threats affect both devices and gateways. SESSION INITIATION PROTOCOL (SIP) Session Initiation Protocol (SIP) secures messages by means of cryptographic hashes and encryption, allowing a reliable authentication and integrity check of signaling messages. However, not all message headers can be covered by hashing. Thus, manipulation of sender information is still possible. In case SIP messages are not secured by hashes it is even possible to apply H.323 specific attacks with easier means, since messages are coded with ASCII, i.e. plaintext. A short script is sufficient to modify and forward certain message headers. This can affect end devices and gateways. The prevalent SIP protocol can not be regarded as secure. Though it has security mechanisms such as Caller-IDs based on hashes, it is vulnerable for DoS attacks. In addition, phreaking could have a revival. Here, signaling (for instance via SIP) is decoupled from speech data (payload, e.g. RTP). Two specifically primed clients establish a call via the SIP proxy and obey standards. After connection establishment the SIP proxy receives a connection termination signal. Thus, the SIP proxy interprets the session as terminated. Only the RTP data stream is still maintained by the clients. The communication partners keep their conversation at no charge. REAL-TIME TRANSPORT PROTOCOL (RTP) Real-time Transport Protocol (RTP) serves to transmit media streams of real-time applications. For this, necessary information is transmitted in each data packet in order to reconstruct the data. This includes in particular sequence number, time stamp, media type (audio/video), and RTP header length. With these information, a high number of data packets of a connection can be decoded in correct order with the appropriate codec and can be played at the output device, without any access to the signaling information of the connection. This easy decoding mechanism enables an attacker to eavesdrop and manipulate speech data stream as soon as he has gained access to the data. In this scenario the order of received data packets is negligible. Even in the case of lost data packets, both ends will remain synchronized. MGCP and MEGACO Also the protocols MGCP and MEGACO do not directly stipulate security mechanisms. A potential attacker can eavesdrop, decode, and manipulate data streams. In case that data is encoded with ASN.1 or ASCII, he solely needs an ASN.1 parser. These protocols are only applied between VoIP servers and gateways or as an inter-gateway protocol. Thus, only gateways are affected by such manipulations. SKINNY CLIENT CONTROL PROTOCOL (SCCP) Skinny Client Control Protocol (SCCP) is a proprietary communication protocol which is used for communication control between IP phones and a gatekeeper (e.g. the Cisco Call Manager). There is no public documentation available and the protocol can be modified by the manufacturer at any time. The workflow of the protocol is simple. Link control is managed by a single TCP connection, in which binary coded, parameterized commands are transmitted. In older protocol versions which are still in use in many end devices, only the MAC address is transmitted as authentication parameter. This communication can be easily reproduced (approx. 300 lines of Perl code is needed) in order to feign an IP phone (rogue phone). By this, identity spoofing and hence toll fraud, but also denial-of-service-attacks against VoIP servers are possible. New versions of SCCP-based IP phones use SCCPS for authentication by means of X.509 certificates and encrypt TCP signaling stream through TLS. 2 This prevents identity spoofing and decoding of data on the connection path between IP phones and the gatekeeper. INTERASTERISK EXCHANGE PROTOCOL (IAX) InterAsterisk exchange Protocol (IAX) is an open source product. It is suitable for interconnecting Asterisk servers and also a means for end device communication (transmission of media such as audio, video, text, and image). Main features of the IAX protocol can be shortly summarized as follows: It is proprietary, but open. Signaling and media transport are dispatched via a single Port (IAX2: UDP 4569). Thus, IAX2 can be easily transported in NAT environments and firewall rules are less complex. It is a lean protocol due to its binary coding and small protocol overhead. It has only four bytes. It is eligible for communications in private networks using NAT (Network Address Translation) and also through firewalls. Bundling of multiple IAX connections between two Asterisk servers into one trunk. The original IAX protocol has no built-in security mechanisms. These have been added in IAX2. Furthermore, IAX end devices do not have a high market penetration so that this protocol is only relevant in scenarios with Asterisk servers. [DEER07a] 2 Note: Similar to HTTPS (port 443) TCP port 2443 is used. SCCP uses TCP port 2000.
5 4. ASSESSMENT AND IMPACTS Compared to conventional telephony VoIP basically offers a broader attack spectrum since open network protocols are used in an unsecured way and due to shared usage of speech and data in a single network. However, the weaknesses have to be assessed depending on the VoIP scenario and implementation profile: Campus VoIP: In a campus VoIP environment an IP based PBX (Private Branch exchange) is used. IP phones and/or softphones are connected with this PBX. Connection to the public telephone network is established via gateways. It can be realized both by software (server system with VoIP software) or hardware (extended PBX with VoIP interface). Both options are hard to attack since telephone conversations are not routed via the Internet or other unsecured networks. Potential attacks have to be initiated mainly from the intranet or from outside through the firewall. IP Centrex / Hosted IP: This option consists of a virtual, IP based PBX which is provided by a VoIP provider. Through this, he is able to provide his own speech services without the need of client-side gateways or PBX systems. The user simply requires an adequate internet access and has to acquire IP phones and/or soft phones. Attacks against the VoIP system can only take place from the Intranet or via the internet (from the provider network). VoIP-Trunks: VoIP trunk connections increasingly replace connection-orientated telephone links because of the growing convergence of networks and resulting cost savings. Furthermore, companies gain flexibility when T1 or PRI interfaces do not have to be used any longer. However, the probability for attacks increases if data is transmitted via unsecured networks. Specifically attacks from the internet jeopardize corporate networks. To seal off insecure internet connections a Campus VoIP solution should be used for Asterisk (Figure 5). The VoIP system is protected since the corporate network is safeguarded against outbound attacks. In addition, quality-of-service (QoS) for keeping speech quality on a high level is possible. In this scenario VoIP is conceived as a further IP service having high requirements on network and security. VoIP networks comprise many different components such as IP phones, gateways, server (gatekeeper or SIP proxy), router, etc., having specific requirements with regards to security. In this context both the network and application part have to be considered. On the network side this includes classical network security, virtual LAN (VLAN), encryption, authentication, firewalling, intrusion detection / intrusion prevention (IDS/IPS), network address translation (NAT) and Simple Traversal of UDP through NAT (STUN), softphones and hardphones, network equipment, operating systems, QoS, remote management, and patch management. Here, we do not further focus on network security issues, as they have to be adressed by elementary security mechanisms anyway. This is different for signaling protocols. As we focus on Asterisk, protocols with security extensions are relevant. These are SRTP, IAX2, and security mechanisms for SIP. SRTP SRTP encrypts the media stream. For this purpose, key exchange has to take place. Because of the encryption method AES it is guaranteed that the content (speech data) of a conversation can not be recorded. Communication partners are authenticated by means of SHA-1 hashing. However, the key used for data encryption is transmitted via SIP (using signaling path keying), which is exposed to sniffing attacks in case that SIP is not sufficiently secured 3. ZRTP ZRTP is a protocol for the media path session key exchange based on Diffie-Hellman, and parameters for establishing SRTP sessions. The ZRTP protocol is multiplexed on the same port as RTP and does not require support in the signaling protocol. A key advantage of ZRTP is, that it does not assume a Public Key Infrastructure (PKI) or certificates in end devices. The Zfone Project [ZFON08] allows ZRTP support for Asterisk so that SIP/RTP calls in Asterisk can be encrypted. To add support for ZRTP, the libzrtp SDK is needed together with the Asterisk patch file for ZRTP support. A patch is mandatory since an unmodified (unpatched) Asterisk would cause problems because of P2P key negotiation and encryption. It would reject ZRTP protocol packets. SIP SIP has been extended with TLS, HTTP Digest, IPsec with IKE, and S/MIME. Also end-to-end-security and hop-by-hopcommunications are optionally available 4. However, as Asterisk deploys SIP signaling over UDP, TLS protection is not possible since it requires TCP. Although, there have been efforts to implement other security mechanisms for SIP, Asterisk only provides SIP Digest authentication with MD5. Missing security features for SIP shall be implemented in the next generation of the SIP channels (Version 3) 5, which have been under development in the Pineapple project. [PINE07] Because of the stronger impact on the Asterisk architecture, there will be no backwards compatibility. Figure 5: VoIP scenario with Asterisk 3 The key is transmitted within the SIP body via SDP parameters 4 For Hop-by-Hop security TLS and IPsec are used. End-to-end security are realized by SIP Digest authentication, and S/MIME. In RFC-3261 S/MIME is optional. 5 The current version is still version 1. Version 2 had ony patch level status and development efforts have been postponed.
6 IAX2 In contrast to SIP, IAX2 is a binary protocol and not text based. Originally, the IAX protocol has been developed in order to realize a communication between Asterisk servers. However, IAX allows to initialize conversations and to transmit speech data. For this, some security mechanisms are provided. Asterisk servers are able to authenticate each other using a public key infrastructure (PKI) based on a RSA or alternatively Diffie- Hellman key exchange. Messages are encrypted using AES with 128 bit keys. Since IAX2 only uses one port (UDP port 4569) for connection establishment only this port has to be opened in a firewall to pass IAX2 traffic through. Since very few IP end devices support IAX2, SIP security features or SRTP have to be implemented respectively. IAX2 should be used for interconnecting Asterisk servers between different locations. Besides increased security, improvements in speech quality and better exploitation of bandwidth argue for IAX2. Regarding security we can summarize the following key aspects: IAX2 supports authentication via Public Key Infrastructure (PKI), e.g. between two Asterisk servers using RSA key pairs. IAX2 allows user authentication via RSA or MD5. However, with MD5 the peers have plaintext access to the secret key whereas RSA restricts the access in one direction via the public/private key pairs. Thus, it is recommended to secure the private key using 3DESencryption. Also, IAX2 offers mutual peer registration with address and credentials, so that caller can reach the peer. The respective registration protocol can be deployed in parts. One of the strengths of the design of IAX2 constitutes a potential security problem. Using a single well-known port alleviates Denial-of-Service (DoS) attacks, which have significant impacts of real-time applications such as VoIP as they are extremely sensible to. Furthermore, the IAX2 URI scheme (iax2:) does not provide any security mechanism such as the SIPS URI scheme within the SIP protocol. SIMCO A further way to secure Asterisk (for the VoIP trunk scenario ) is via the SIMCO (SImple Middlebox COnfiguration, RFC- 4540) protocol. SIMCO is fully compliant to the MIDCOM protocol (MIDdlebox COMmunication, RFC-3303 and RFC- 3304). End of January 2006 Digium Partner Ranch Networks provided the developer community with the source code. This is developed under the Asterisk-Netsec development branch. Through the implementation of these protocols into Asterisk through a software library called libcom 6, firewall ports (in particular for RTP) are dynamically 7 controlled by Policy Rule Control Messages. Communication between the Asterisk server and the middlebox device 8 is secured by means of OpenSSL. Although, this is a generic method, it is only supported by Ranch Networks devices. Segmentation and VLAN Furthermore, a separation of data and VoIP segments is mandatory in order to avoid collisions and bottlenecks. The 6 Only available for Asterisk 1.2 and not yet available for Only if during a call 8 E.g. NAT device, firewall, Ranch Network device or combinations VoIP segment should be isolated by a firewall which provides additional protection. Also IP phones should be positioned in different subnets or network segments. This enables a better network partitioning and efficient deployment of prioritization (Q-Tag, DiffServ). Also a separation of networks at layer 2 can be realized with VLANs, so that data and speech can be separated logically while the same physical network is used. [DEER07b] Current information about security risks in Asterisk can be found in the security advisories in [ASTE08] and Asterisk security discussion from Digium. [DIGI08] 5. CONCLUSIONS At present, secure VoIP should be operated using the Campus scenario which establishes calls via ISDN. VoIP should be regarded as a further IP service which is separated from the remaining networks. In the future an interconnection to public VoIP providers or operators can be realized if signaling standards have reached a sufficient and comprehensive security level. Authentication and encryption have to be implemented by the providers. This is an essential prerequisite. 6. REFERENCES [ASTE07] [ASTE08] [DEER07a] Kai-Oliver Detken, Evren Eren: Voice-over- IP Security Mechanisms - State-of-the-art, risks assessment, concepts and recommendations. 8th International Symposium on Communications Interworking, Santiago de Chile 2007 [DEER07b] Detken, Eren: VoIP Security - Konzepte und Lösungen für sichere VoIP-Kommunikation; 310 Seiten; Hardcover; hanser Verlag; ISBN: ; München 2007 [DIGI08] lists.digium.com/mailman/listinfo/asterisksecurity [KESS06] Lars Kessner: VoIP-Standards und Migration verschiedener Unternehmensszenarien. Diplomarbeit, Hochschule Bremen, Studiengang: Technische Informatik, Bremen Januar 2006 [PINE07] Pineapple-Projekt: [RSC+02] Rosenberg, Schulzrinne, Camarillo, Johnston, Peterson, Sparks, Handley, Schooler: SIP Session Initiation Protocol. RFC Network Working Group. Category: Standards Track. IETF 2002 [SMS+02] Swale, Mart, Sijben, Brim, Shore: Middlebox Communications (midcom) Proto-col Requirements. RFC Network Working Group. Category: Informa-tional. IETF 2002 [SPMI05] M. Spencer, F. Miller: Inter-Asterisk EXchange (IAX) Version 2. Internet-Draft, Network Working Group, IETF 2005 [SQC06] Stiemerling, Quittek, Cadar: NEC's Simple Middlebox Configuration (SIMCO) Protocol Version 3.0. RFC Network Working Group. Category: Experi-mental. IETF 2006 [ZFON08]
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)
Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.
ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. API: An application programming interface (API) is a source
Voice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Voice over IP Fundamentals
Voice over IP Fundamentals Duration: 5 Days Course Code: GK3277 Overview: The aim of this course is for delegates to gain essential data networking and Voice over IP (VoIP) knowledge in a single, week-long
Voice over IP (VoIP) Basics for IT Technicians
Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Overview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
Curso de Telefonía IP para el MTC. Sesión 1 Introducción. Mg. Antonio Ocampo Zúñiga
Curso de Telefonía IP para el MTC Sesión 1 Introducción Mg. Antonio Ocampo Zúñiga Conceptos Generales VoIP Essentials Family of technologies Carries voice calls over an IP network VoIP services convert
Indepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
Master Kurs Rechnernetze Computer Networks IN2097
Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle, Dr. Fuhrmann Master Kurs Rechnernetze Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Dr. Thomas Fuhrmann
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
Crash Course in Asterisk
Crash Course in Asterisk Despite its name, Asterisk is no mere footnote to the IP-PBX market. The open source product is one of the most disruptive technologies in the industry. Here s what you need to
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
An Investigation into the Effect of Security on Performance in a VoIP Network
Abstract An Investigation into the Effect of Security on Performance in a VoIP Network Muhammad Tayyab Ashraf, John N. Davies and Vic Grout Centre for Applied Internet Research (CAIR) Glyndŵr University,
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
Integrate VoIP with your existing network
Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A
Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS
Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address
IP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
AV@ANZA Formación en Tecnologías Avanzadas
SISTEMAS DE SEÑALIZACION SIP I & II (@-SIP1&2) Contenido 1. Why SIP? Gain an understanding of why SIP is a valuable protocol despite competing technologies like ISDN, SS7, H.323, MEGACO, SGCP, MGCP, and
IP Office Technical Tip
IP Office Technical Tip Tip no: 195 Release Date: October 26, 2007 Region: GLOBAL Using Packet Capture Software To Verify IP Network VoIP Quality Of Service (QoS) Operation Converged networks can experience
IP Telephony v1.0 Scope and Sequence. Cisco Networking Academy Program
IP Telephony v1.0 Scope and Sequence Cisco Networking Academy Program Table of Content COURSE OVERVIEW...4 Course Description...4 Course Objectives...4 Target Audience...5 Prerequisites...5 Lab Requirements...5
VoIP. Overview. Jakob Aleksander Libak [email protected]. Introduction Pros and cons Protocols Services Conclusion
VoIP Jakob Aleksander Libak [email protected] 1 Overview Introduction Pros and cons Protocols Services Conclusion 2 1 Introduction Voice over IP is routing of voice conversations over the internet or
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19
4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software
Implementing Cisco Voice Communications and QoS
Implementing Cisco Voice Communications and QoS Course CVOICE v8.0; 5 Days, Instructor-led Course Description Implementing Cisco Voice Communications and QoS (CVOICE) v8.0 teaches learners about voice
R&S IP-GATE IP gateway for R&S MKS9680 encryption devices
Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the encryption device. Used with the, the R&S IP-GATE
VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS
VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS Master of Science in Networking and Data Communications THESIS Thesis Title Voice over IP (VoIP) to Enterprise Users Dissertation submitted
Need for Signaling and Call Control
Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice
TSIN02 - Internetworking
TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
Secure VoIP Transmission through VPN Utilization
Secure VoIP Transmission through VPN Utilization Prashant Khobragade Department of Computer Science & Engineering RGCER Nagpur, India [email protected] Disha Gupta Department of Computer Science
Voice over IP. Presentation Outline. Objectives
Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester
Multimedia Communications Voice over IP
Multimedia Communications Voice over IP Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India Voice over IP (Real time protocols) Internet Telephony
Implementing SIP and H.323 Signalling as Web Services
Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de
Best Practices for Role Based Video Streams (RBVS) in SIP. IMTC SIP Parity Group. Version 33. July 13, 2011
Best Practices for Role Based Video Streams (RBVS) in SIP IMTC SIP Parity Group Version 33 July 13, 2011 Table of Contents 1. Overview... 3 2. Role Based Video Stream (RBVS) Best Practices Profile... 4
SIP (Session Initiation Protocol) Technical Overview. Presentation by: Kevin M. Johnson VP Engineering & Ops
SIP (Session Initiation Protocol) Technical Overview Presentation by: Kevin M. Johnson VP Engineering & Ops Page 1 Who are we? Page 2 Who are we? Workforce Automation Software Developer Page 3 Who are
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
Troubleshooting Voice Over IP with WireShark
Hands-On Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services are maintaining the quality of the voice service
Combining Voice over IP with Policy-Based Quality of Service
TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is
SIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
VoIP Bandwidth Considerations - design decisions
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
SIP Trunking Manual 05.15. Technical Support Web Site: http://ws1.necii.com (registration is required)
SIP Trunking Manual 05.15 Technical Support Web Site: http://ws1.necii.com (registration is required) This manual has been developed by NEC Unified Solutions, Inc. It is intended for the use of its customers
Internet Technology Voice over IP
Internet Technology Voice over IP Peter Gradwell BT Advert from 1980s Page 2 http://www.youtube.com/v/o0h65_pag04 Welcome to Gradwell Gradwell provides technology for every line on your business card Every
ShoreTel & AMTELCO Infinity Console via SIP Trunking (Native)
Product: ShoreTel AMTELCO Infinity Console I n n o v a t i o n N e t w o r k A p p N o t e IN-15063 Date : October, 2015 System version: ShoreTel 14.2 ShoreTel & AMTELCO Infinity Console via SIP Trunking
Integrating Voice over IP services in IPv4 and IPv6 networks
ARTICLE Integrating Voice over IP services in IPv4 and IPv6 networks Lambros Lambrinos Dept.of Communication and Internet studies Cyprus University of Technology Limassol 3603, Cyprus [email protected]
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
nexvortex SIP Trunking
nexvortex SIP Trunking January 2015 510 SPRING STREET HERNDON VA 20170 +1 855.639.8888 Copyright nexvortex 2014 This document is the exclusive property of nexvortex, Inc. and no part may be disclosed,
IP Telephony - Future investment or risk assessment?
Master Thesis Computer Science Thesis no: MSC-2004-11 June 2004 IP Telephony - Future investment or risk assessment? Authors: Josephine Larsson Ida Waller School of Engineering Blekinge Institute of Technology
Introduction to VoIP Technology
Lesson 1 Abstract Introduction to VoIP Technology 2012. 01. 06. This first lesson of contains the basic knowledge about the terms and processes concerning the Voice over IP technology. The main goal of
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080
Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
OVERVIEW OF ALL VOIP SOLUTIONS
OVERVIEW OF ALL VOIP SOLUTIONS Kovács Gábor Parnaki Zsolt Gergı 13/03/2009 TABLE OF CONTENTS Introduction Overview of VoIP protocols Standard based implementations: H.323 SIP Proprietary solutions: Skype
Using Asterisk with Odin s OTX Boards
Using Asterisk with Odin s OTX Boards Table of Contents: Abstract...1 Overview...1 Features...2 Conclusion...5 About Odin TeleSystems Inc...5 HeadQuarters:...6 Abstract Odin TeleSystems supports corporate
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Secured Communications using Linphone & Flexisip
Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
A Review of Secure Real-Time Transport Protocol
SECURING REAL-TIME MULTIMEDIA: A BRIEF SURVEY Bradley Clayton, Barry Irwin, Alfredo Terzoli Computer Science Department Rhodes University Grahamstown [email protected], [email protected] [email protected]
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
The H.323 NAT/FW Traversal Solution
Open Community Specification The H.323 NAT/FW Traversal Solution January 2014 International Multimedia Communications Consortium Summary This document describes the NAT/FW traversal solution defined by
Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
CompTIA Convergence+ 2006 Examination Objectives
CompTIA Convergence+ 2006 Examination Objectives Introduction The CompTIA Convergence+ examination covering the 2006 objectives certifies that the successful candidate has the necessary knowledge to perform
MITEL SIP CoE. Technical. Configuration Notes. Configure MCD 6.X for use with babytel SIP trunks. SIP CoE 13-4940-00266
MITEL SIP CoE Technical Configuration Notes Configure MCD 6.X for use with babytel SIP trunks SIP CoE 13-4940-00266 NOTICE The information contained in this document is believed to be accurate in all respects
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and
Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005
15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars
The SIP School- 'Mitel Style'
The SIP School- 'Mitel Style' Course Objectives This course will take delegates through the basics of SIP into some very technical areas and is suited to people who will be installing and supporting SIP
A Scalable Multi-Server Cluster VoIP System
A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu [email protected] {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department
Performance evaluation of the Asterisk PBX
Performance evaluation of the Asterisk PBX Luís Sousa Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal [email protected] Abstract Currently PBX (Private Branch exchange)
R&S IP-GATE IP gateway for ISDN encryption devices
Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for ISDN encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the most recent models of the R&S MKS9680 and
Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions
1 Nortel - 920-803 Technology Standards and Protocol for IP Telephony Solutions QUESTION: 1 To achieve the QoS necessary to deliver voice between two points on a Frame Relay network, which two items are
SIP Trunking and Voice over IP
SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
"Charting the Course... Implementing Cisco IP Telephony & Video, Part 1 v1.0 ( CIPTV1 ) Course Summary
Description Course Summary Implementing Cisco IP Telephony & Video, Part 1 (CIPTV1) v1.0 is a five-day course that prepares the learner for implementing a Cisco Collaboration solution at a single-site
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Best Practices for SIP Security
Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
ilanga: A Next Generation VoIP-based, TDMenabled
ilanga: A Next Generation VoIP-based, TDMenabled PBX J. Penton, A. Terzoli Computer Science Department Rhodes University Grahamstown, 6140 Email: [email protected] Tel: (046) 603 8640; Fax: (046) 636 1915
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
SIP A Technology Deep Dive
SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack
DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
