Recommendations for Provisioning Security
|
|
|
- Berenice Norris
- 10 years ago
- Views:
Transcription
1 Internet Telephony Services Providers Association Recommendations for Provisioning Security Version 1 July ITSPA. All Rights Reserved Contact: [email protected]
2 Contents About ITSPA... 2 Summary... 3 Introduction... 3 Background... 3 Risks... 4 What to do:... 5 What not to do:... 5 HTTPS with client certificate authentication... 5 Requirements for using HTTPS client certificate authentication... 5 Advantages of client certificates... 5 Downsides... 6 Softphone Considerations... 6 Wider Security... 6 Local PBXs... 7 Notes... 8 Acknowledgements... 8 About ITSPA Founded in 2004, ITSPA is a membership-led organisation that represents predominantly network operators, service providers and other businesses involved with the supply of VoIP and unified communication services to business and residential consumers within the United Kingdom. ITSPA helps act as the voice for the sector to key stakeholders; ensures that standards created by or imposed on industry are fair; leads on developments of best practice; campaigns on key issues that members face, promotes competition and self-regulation and serves as the leading networking forum for the UK VoIP industry with events throughout the year (including the annual industry awards Members also receive complimentary subscription to the dispute resolution scheme CISAS; summaries of Ofcom (and other) consultation papers; regulatory briefing documents; Government monitoring and intelligence reports; updates from legal professionals; anti-fraud information; and the opportunity to collaborate with peers to promote career development. 2
3 Summary Remote Provisioning delivers substantial benefits for ITSPs & End Users, but Provisioning Servers must be secured. Be very aware that Provisioning Servers are a prime target for attack. Authenticate Provisioning requests, ideally using HTTPS client certificates. Delete SIP passwords from SIP servers as soon as provisioned, if possible. Do not use TFTP for remote provisioning. Introduction The ability for ITSPs to remotely provision phones & other SIP devices greatly improves service delivery and customer experience, however, remote provisioning can also enable serious security breaches if not handled carefully, as a provisioning server is a prime target for attacks to steal SIP credentials which are then used to make fraudulent calls. By Provision we mean fully automated remote configuration and subsequent management, of SIP phones. When we say phone, we re referring to any SIP User Agent, including Handsets, Gateways, ATAs or Softphones. The aim of the document is to share Best Common Practices among ITSPA members and these recommendations should be considered a starting point rather than a complete solution. Background Most SIP phones have a mechanism for fully automatic remote configuration / provisioning, which is sometimes referred to as Zero Touch Provisioning (ZTP). Service providers are able to register phones in a redirection server run by the phone manufacturer. The phone then Calls Home to the redirection server and will then regularly contact a provisioning server to receive configuration and firmware updates. Remote Provisioning is supported by most SIP phones used by many ITSPs in the UK to Provision and maintain their phones in the field. There are also some distribution companies who offer phone Provisioning and management as a hosted online service. Phones can be Provisioned using a variety of communications protocols, each with different levels of security: 3
4 Protocol Comments Security Rating 1-5 TFTP Use only on a secure LAN 1 HTTP FTP HTTPS with manufacturer or ITSP certificates Usernames & Passwords pass in plain text Usernames and passwords pass in plain text General release certificates can be compromised HTTPS with unique client / device certificates Each phone is uniquely identified 5 Provisioning Communications Protocols There is a strong commercial advantage to be able to ship phones from the manufacturer or distributor directly to the customer without opening the box, as besides avoiding double delivery costs, the phones are configured correctly and consistently without end user intervention. Risks When implemented correctly, Remote Provisioning benefits ITSPs, Resellers and End Users. When implemented badly, SIP usernames and passwords risk being exposed to the world as it's easy for an attacker to predict the MAC addresses of phones and scan servers. It's also possible to follow the redirections from manufacturer s redirection servers to onwardly scan the actual provisioning servers. Unfortunately some ITSPs have been found to be placing provisioning files on open webservers with no authentication, and have been surprised when their customers SIP credentials were harvested and used to make fraudulent calls. The good news is that when Remote Provisioning is sensibly secured the risks are minimal to all concerned. 4
5 What to do: 1. ITSPs who deploy Remote Provisioning Servers must consider security as an integral part of the design. 2. Authenticate phones using HTTPS client certificates. 3. Don t leave SIP passwords on the provisioning server: a. Delete the passwords once they have provisioned, if the handsets support configuration files without passwords. b. Where a configuration has been created but the phone has not accessed the configuration for longer than a pre-defined period of time (e.g. 2 weeks), the configuration should be pre-emptively removed from the server until the phone is ready to be provisioned. 4. Choose phone vendors who have a documented and audited authentication system for provisioning. 5. Keep provisioning server software up to date 6. Firewall your provisioning server with rate limits - review the logs for suspicious activity. 7. Regularly review security procedures and practices What not to do: 1. Deploy a Provisioning Server that uses TFTP 2. Hand generate provisioning files 3. Have a directory listing on the server HTTPS with client certificate authentication HTTPS client certificates provide an excellent way to authenticate provisioning as the Provisioning server can cryptographically know which phone it is talking to. This is the ITSPA recommended way to authenticate provisioning requests. Requirements for using HTTPS client certificate authentication 1. Certificate and key pair securely inserted into phone at the factory 2. Key cannot be extracted from the phone 3. Phone serial number or MAC address embedded in certificate a. So a unique certificate for each phone b. Server side software can read the MAC address from the certificate 4. Phone verifies the server certificate (like a normal HTTPS transaction) 5. Server software checks the MAC/Serial number in the certificate (do not trust URL parameters) 6. Public CA certificate for the provisioning server to validate the phone s certificates 7. Some documentation from the phone manufacturer about how this works, that will pass muster by ITSPs Advantages of client certificates 1. No pre setup needed to by ITSP 2. Tried and tested method 3. Standard tools on the server side - apache, openssl etc. 5
6 Downsides 1. You have to trust your phone vendor to a. Keep their CA secure b. securely insert the keys Softphone Considerations Softphones can be difficult to provision securely because most require SIP credentials to be entered manually or to use the manufacturers provisioning server. ITSPs should consider how they intend to handle and communicate account information for softphone users. Ideally, avoiding as a delivery mechanism and instead providing a "reveal" mechanism from a web page secured by login. Wider Security Although the primary focus of these guidelines is on provisioning of handsets, this is only one facet of a much wider topic. This section provides some topics for discussion and consideration by Service Providers with respect to the wider security of their service. This section is neither intended to be exhaustive nor normative. Security is often mistakenly considered as an afterthought and not part of the core or initial design of the service. There is significant literature on this topic and how to include security as part of the inherent design of the platform, however it is generally accepted that security bolted on after the fact is a poor substitute. The recommendations in this section assume that the service provider is controlling the configuration of the devices in question. There are many device configuration best practices which can be enforced by a provisioning server In general, apply the principle that if a feature is not specifically requested or used it should be disabled. This may apply to management and monitoring tools as well as the primary functions. Most physical SIP devices provide an embedded management interface typically over HTTP or HTTPS. If the device is configured remotely and configured to call home on a regular basis, then these interfaces have extremely limited use. Service providers may wish to consider enabling the web interface on install if they perform attended installations or enabling the web interface only for diagnostic purposes. Call control functions may be more suitably handled through the service provider s own web interface than the device interface where bugfixes and security can more easily be applied. Regardless of whether the interface is enabled on the device, a suitably secure password should protect all access. Where possible, if end users are permitted access to the web interface, only those functions absolutely necessary should be 6
7 enabled for the end user. Service provider engineers may have access to additional functions. Given the ease of programmatically changing the configuration, consideration should be given to one-time passwords for engineer or administrative access. Most devices will allow call control functions or call features (e.g. call forwarding) to be configured via the web interface. Where possible, these should be disabled to prevent a would-be attacker from using these as an attack vector. Service providers are eager to ensure quality of service across their network and this extends to testing new firmware prior to deployment. Whilst this is commendable, consideration should be given to using the latest firmware and ensuring that security notifications from the provider are passed on to appropriately technical staff for evaluation. Firmware/software upgrades should be centrally controlled and enforced. Service providers should make use of the User-Agent string to provide a monitoring mechanism to ensure that software has been upgraded correctly. End customers should be encouraged where possible to ensure that SIP traffic from devices is only permitted to known, trusted destinations. SME and larger customers will be able to implement SPI on LAN firewalls etc. to ensure that only traffic to/from the service provider is permitted. All devices should be configured to only accept SIP requests from the registrar. Some phones store Passwords. Check that it is not possible to extract a SIP password from a phone. Only use for a password should be for digest authentication to a SIP server. You shouldn t be able to save a backup of the settings from the phone that includes the SIP Username & password. Network equipment frequently have SIP-specific proxies or ALGs that may assist in providing security to the LAN and the devices. Historically, however, such ALGs have proved to be problematic and so service providers and end customers may wish to consider a specific Session Border Controller instead. Auto-generated SIP credentials can be much stronger than those used by users, particularly where the SIP credentials are decoupled from any login credentials the user requires. Local PBXs Many SIP PBX systems include a provisioning server as part of the system. Installers should check carefully that this is available only to the portion of the network where it is required and protected from attack from the Internet. Again, security should be considered as part of the design and ensured at every stage of deployment since an attacker with local network access could still pose a threat where SIP credentials are easily accessible. As a best practice, we recommend that the same principles detailed in 7
8 this document should apply to both service providers and PBXs only serving internal users. Finally, PBXs themselves offer management facilities and typically require manual provisioning where a SIP trunk is configured to the service provider. Authentication based on the IP address is insufficient and SIP authentication challenges should be required as part of both the initial registration as well as each subsequent call. Care should be taken to ensure that the PBX management interfaces are well protected from would-be attackers and that attempted intrusions are reported appropriately. Notes This paper was prepared by members of the ITSPA Operations Group and the ITSPA Secretariat. This guide has been prepared by the authors (who hereby assert their moral rights) on an as is basis and is not intended to constitute advice on regulatory or any other matters, whether general or specific, and accordingly the authors disclaim all liability, however arising, from any reliance placed on this guide. Acknowledgements The following provided suggestions, advice or inspiration while creating this document. Tim Bray, Provu Communications David Cargill, RealCalls Peter Cox, UM Labs Aled Treharne, Siphon Networks Dan Winfield, Voxhub Cal Leeming 2014 ITSPA. All Rights Reserved 8
Configuration Guide for connecting the Eircom Advantage 4800/1500/1200 PBXs to the Eircom SIP Voice platform.
Configuration Guide for connecting the Eircom Advantage 4800/1500/1200 PBXs to the Eircom SIP Voice platform. 1 Contents Introduction.... 3 Installing the Applications Module... 4 Ordering a Licence for
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
SIP Print Administrator Guide
Version 1.25 Published 2/6/09 Table of Contents Unpack, Install and Power Up SIP Print...3 Port Mirroring Discussion...4 Connect SIP Print to the Network...6 Main Screen...7 Manage User Access...8 Manage
PBX Security in the VoIP environment
PBX Security in the VoIP environment Defending against telephony fraud Executive Summary In today s communications environment a voice network is just as likely to come under attack as a data network.
Recommendations for secure deployment of an IP-PBX
Internet Telephony Services Providers Association Recommendations for secure deployment of an IP-PBX Version 2 November 2013 Contact: [email protected] Contents Introduction... 3 Health Warning!... 3
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
ThinkTel ITSP with Registration Setup Quick Start Guide
January 13 ThinkTel ITSP with Registration Setup Quick Start Guide Author: Zultys Technical Support This configuration guide was created to assist knowledgeable vendors with configuring the Zultys MX Phone
VOIP-500 Series Phone CUCM 8.0.3a Integration Guide
I. Introduction This provides general instructions for integration of the VOIP-500 Series Phone with a Cisco Call Manager installation. It is recommended to read this instruction set completely before
IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online
1 IP PBX SD Card Slot FXO Ports PBX LAN port PBX WAN port FXO Ports LED, RED means online 2 Connect the IP PBX to Your LAN Internet PSTN Router Ethernet Switch FXO Ports 3 Access the PBX s WEB GUI The
3rd Party VoIP Phone Setup Guide (Panasonic 500-550b)
3rd Party VoIP Phone Setup Guide (Panasonic 500-550b) We are changing how we add 3rd party VoIP phones to accounts. Going forward, you can simply add a 3rd Party Softphone and use those credentials to
Quick Installation Guide
Quick Installation Guide MegaPBX Version 2.1 Quick Installation Guide v2.1 www.allo.com 2 Table of Contents Initial Setup of MegaPBX... 4 Notification LEDs (On the Front Panel of the Gateway)... 5 Create
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
The SIP School- 'Mitel Style'
The SIP School- 'Mitel Style' Course Objectives This course will take delegates through the basics of SIP into some very technical areas and is suited to people who will be installing and supporting SIP
Kerio Operator. Getting Started Guide
Kerio Operator Getting Started Guide 2011 Kerio Technologies. All rights reserved. 1 About Kerio Operator Kerio Operator is a PBX software for small and medium business customers. Kerio Operator is based
Configuring the CyberData VoIP 4-Port Zone Controller with Audio Out
NetVanta Unified Communications Technical Note Configuring the CyberData VoIP 4-Port Zone Controller with Audio Out Introduction The CyberData Voice over Internet Protocol (VoIP) zone controller enables
Fonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide
Fonality Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide Fonality Table of Contents 1. Overview 2. SIP Trunk Adaptor Set-up Instructions 3.
DHCP Option 66 Auto Provisioning Guide
Overview UniFi VoIP Phones can be configured using a Configuration File through TFTP or HTTP/HTTPS download. When a UniFi VoIP Phone boots up or reboots, it attempts to get the provisioning server URL
SARK500 Embedded VoIP/TDM PBX. Quick-start Installation Guide V3.1. SARK Version 3 Release 1 November 2010
SARK500 Embedded VoIP/TDM PBX Quick-start Installation Guide V3.1 SARK Version 3 Release 1 November 2010 Copyright Aelintra Telecom Limited 2005-2009 Copyright Aelintra Telecom Limited 2005-2009 Contents...1
Click-To-Talk. ZyXEL IP PBX License IP PBX LOGIN DETAILS. Edition 1, 07/2009. LAN IP: https://192.168.1.12 WAN IP: https://172.16.1.1.
Click-To-Talk ZyXEL IP PBX License Edition 1, 07/2009 IP PBX LOGIN DETAILS LAN IP: https://192.168.1.12 WAN IP: https://172.16.1.1 Username: admin Password: 1234 www.zyxel.com Copyright 2009 ZyXEL Communications
nexvortex Setup Template
nexvortex Setup Template ZULTYS, INC. April 2013 5 1 0 S P R I N G S T R E E T H E R N D O N V A 2 0 1 7 0 + 1 8 5 5. 6 3 9. 8 8 8 8 Introduction This document is intended only for nexvortex customers
How To Guide. SIP Trunking Configuration Using the SIP Trunk Page
How To Guide SIP Trunking Configuration Using the SIP Trunk Page For the Ingate SIParators and Firewalls using software release 4.9.2 or later. Updated to show features available from release 4.10.x May
3rd Party VoIP Phone Setup Guide (Panasonic UT113-123)
3rd Party VoIP Phone Setup Guide (Panasonic UT113-123) We are changing how we add 3rd party VoIP phones to accounts. Going forward, you can simply add a 3rd Party Softphone and use those credentials to
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
NICC ND 1438 V1.1.1 (2016-03)
NICC Document Voluntary Code of Practice Mitigating Theft of Service from End User Voice over IP Communications Systems Michael Faraday House, Six Hills Way, Stevenage SG1 2AY Tel.: +44(0) 20 7036 3636
Central Administration User Guide
User Guide Contents 1. Introduction... 2 Licensing... 2 Overview... 2 2. Configuring... 3 3. Using... 4 Computers screen all computers view... 4 Computers screen single computer view... 5 All Jobs screen...
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS ETERNITY PE/GE/ME/LE Date: 31 st January 2015 Version: V1R1 Author: Vishal Govindiya Security options available in ETERNITY on VoIP Network Security on VoIP in Site to Site Connectivity
SIP Trunk Configuration Guide. using
SIP Trunk Configuration Guide using www.cbeyond.com 1-877-441-9783 The information contained in this document is specific to setting up SIP connections between Telenium IP and Cbeyond. If you require assistance
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
SIP Trunking using Optimum Business Sip Trunk Adaptor and the Zultys MX250 IP PBX
SIP Trunking using Optimum Business Sip Trunk Adaptor and the Zultys MX250 IP PBX Table of Contents Goal 3 Prerequisites 3 Zultys MX250 Configuration 4 Network Settings 4 Phone Registration and Assignment
PIKA µfirewall Cloud Management Guide
Version 1.0 April 2015 Introduction... 2 Installation... 2 Configuring the Unit... 10 Changing Parameters... 10 Adding Blacklists and White lists... 12 Upgrading Firmware... 15 Disclaimer... 18 Frequently
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
SIP Trunking using the EdgeMarc Network Services Gateway and the Mitel 3300 ICP IP-PBX
June 26th, 2014 SIP Trunking using the EdgeMarc Network Services Gateway and the Mitel 3300 ICP IP-PBX Page 1 of 30 Table of Contents 1 Overview... 3 2 Prerequisites... 3 3 Network Topology... 4 4 Description
Matrix Technical Support Mailer 27 SIP to SIP & SIP to PSTN calling through SIP Registrar (ITSP)
Matrix Technical Support Mailer 27 SIP to SIP & SIP to PSTN calling through SIP Registrar (ITSP) 21/06/2011 Dear Friends, This Mailer Provides the Information Related to SIP to SIP Calling Through SIP
DEPLOYING VoIP SECURELY
DEPLOYING VoIP SECURELY Everyone knows that Voice-over-IP (VoIP) has been experiencing rapid growth. Even still, you might be surprised to learn that: 10% of all voice traffic is now transmitted with VoIP
ZyXEL IP PBX Support Note. ZyXEL IP PBX (X2002) VoIP. Support Notes
ZyXEL IP PBX (X2002) VoIP Support Notes Version 1.00 October 2008 1 Contents Overview ZyXEL IP PBX Support Note 1. How to manage and maintain your IPPBX?...3 1.1 Firmware Upgrade..3 1.2 Backing up your
FOR COMPANIES THAT WANT TO EXPAND AND IMPROVE THEIR TELEPHONE SYSTEM
IP PBX VH-500 FOR COMPANIES THAT WANT TO EXPAND AND IMPROVE THEIR TELEPHONE SYSTEM IP PBX VH-500 The Virtual IP PBX VH-500 is an unified communication system hosted in the cloud, and it's an excellent
Cisco 7940 How To. (c) 2003-2010 Bicom Systems
Cisco 7940 How To Cisco 7940 How To All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping,
Quick Start Guide v1.0
Quick Start Guide v1.0 Table of contents : 01. Quick Start Guide...03 O2. Configuring your VoIPOffice appliance...14 03. Adding a VoIPtalk trunk...21 04. Configuring UADs for use with VoIPOffice...25 05.
Prepare your IP network for HD video conferencing
Prepare your IP network for HD video conferencing Bogdan Voaidas, Knut Bjørkli and Robin Støckert HERD Energy - Project: Sustainable Energy and Environment in the Western Balkans (SEE-WB) Target groups
Business Telephony Security
Business Telephony Security Toll Fraud - What is it? Toll Fraud or Phreaking is the process of illegal hacking of telecoms systems for the purpose of exploiting phone numbers to profit from premium rate
Using the NetVanta 7100 Series
MENU OK CANCEL 1 2 3 4 5 6 7 8 9 * 0 # MENU MENU OK CANCEL CANCEL 1 2 3 4 5 6 7 8 9 * 0 # MENU OK CANCEL CANCEL 1 2 3 4 5 6 7 8 9 * 0 # MENU OK CANCEL CANCEL 1 2 3 4 5 6 7 8 9 * 0 # MENU OK CANCEL 1 2
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment
Microsoft TMG Replacement How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment 1. Introduction This document gives an overview of FortiGate features
Com.X IP PBX The complete communications solution in a box
IP PBX Utilising VPN security when extending PBX services to remote users Virtual Private Network It is not uncommon for a single company to occupy more than one set of premises. Individual users on geographically
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
VoIPon www.voipon.co.uk [email protected] Tel: +44 (0)1245 808195 Fax: +44 (0)1245 808299
VoiceGear/3CX Integration Guide Ver.0.1 Page 2 1. OVERVIEW... 3 1.1 SETTING UP 3CX PBX...4 1.2 SETTING UP VOICEGEAR GATEWAY...5 2. VOICEGEAR-3CX SIP INTEGRATION... 6 2.1 3CX CONFIGURATION...7 2.2 VOICEGEAR
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX NOTE: This is an advisory document to be used as an aid to resellers and IT staff looking to use the Edgewater 4550 in conjunction with
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this
Hosted vs On-Site IP-PBX A Guide for SMEs
A Guide for SMEs 1 When switching to Voice over Internet Protocol (VoIP) telephony, the decision of whether to use a hosted or on-site phone system (IP-PBX) must be made. Both have fundamental differences
The following is a list of the features available with the managed Intersoft IP Telephony Services.
The following is a list of the features available with the managed Intersoft IP Telephony Services. Call Forwarding When you are not at your desk, be sure not to miss important calls. Forward call to another
Using Spectralink IP-DECT Server 400 and 6500 with Cisco Unified Communication Manager, 3 rd party SIP
Using Spectralink IP-DECT Server 400 and 6500 with Cisco Unified Communication Manager, 3 rd party SIP Technical Bulletin Page 1 Introduction This document provides introductory information on how to use
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3
SIP Trunking using Optimum Business SIP Trunk Adaptor and the Allworx 6x IP PBX 7.1.6.1
ALLWORX SIP Trunking using Optimum Business SIP Trunk Adaptor and the Allworx 6x IP PBX 7.1.6.1 Goal The purpose of this configuration guide is to describe the steps needed to configure the Allworx 6x
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
nexvortex SIP Trunking Implementation & Planning Guide V1.5
nexvortex SIP Trunking Implementation & Planning Guide V1.5 510 S PRING S TREET H ERNDON VA 20170 +1 855.639.8888 Introduction Welcome to nexvortex! This document is intended for nexvortex Customers and
Wave SIP Trunk Configuration Guide FOR BROADVOX
Wave SIP Trunk Configuration Guide FOR BROADVOX Last updated 1/7/2014 Contents Overview... 1 Special Notes... 1 Before you begin... 1 Required SIP trunk provisioning and configuration information... 1
LifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
PrintFleet Enterprise Security Overview
PrintFleet Inc. is committed to providing software products that are secure for use in all network environments. PrintFleet software products only collect the critical imaging device metrics necessary
How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib
NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application
Configuring CyberData VoIP Ceiling Speakers
NetVanta Unified Communications Technical Note Configuring CyberData VoIP Ceiling Speakers Introduction The CyberData Voice over IP (VoIP) ceiling speaker connects to existing local area networks (LANs)
Central Administration QuickStart Guide
Central Administration QuickStart Guide Contents 1. Overview... 2 Licensing... 2 Documentation... 2 2. Configuring Central Administration... 3 3. Using the Central Administration web console... 4 Managing
Configuring the Dolby Conference Phone with Cisco Unified Communications Manager
Configuring the Dolby Conference Phone with Cisco Unified Communications Manager Version 1.2 December 10, 2015 This product is protected by one or more patents in the United States and elsewhere. For more
THINKTEL COMMUNICATIONS DIGIUM G100/G200 PRI OVER IP SIP TRUNKING
THINKTEL COMMUNICATIONS DIGIUM G100/G200 PRI OVER IP SIP TRUNKING TA B L E O F C O N T E N T S 1.1 NETWORK DIAGRAM... 3 1.2 COLLABORATION OF MONARQUE TELECOM... 3 1.3 CONNECTING TO THE DIGIUM G100... 4
Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures
IP PBX SH-500N WWW.HIPERPBX.COM
IP PBX SH-500N COMPANIES THAT WANT TO EXPAND AND IMPROVE THEIR TELEPHONE SYSTEM IP PBX SH-500N The IP PBX SH-500N is designed for companies that want to expand and improve their telephone system, and/or
CompleteSBC: Getting Started Guide
CompleteSBC: Getting Started Guide Default CompleteSBC Configuration CompleteSBC (SBC) is pre-configured to perform the following actions: registration caching limiting the number of concurrent calls via
HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION
HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION 01 INTRODUCTION Inclarity is the UK s leading provider of Hosted Telephony, Hosted UC and Hosted Video solutions. We help our customers to communicate
VoIP Intercom with Allworx 6x Server Setup Guide
VoIP Intercom with Allworx 6x Server Setup Guide CyberData Corporation 2555 Garden Road Monterey, CA 93940 T:831-373-2601 F: 831-373-4193 www.cyberdata.net 2 1.0 Setup Diagram Figure 1-1 is a setup diagram
MultiSite Manager. User Guide
MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.
OrecX Oreka Total Recorder Application Notes
NetVanta Unified Communications Technical Note OrecX Oreka Total Recorder Application Notes Introduction OrecX (www.orecx.com) Oreka Total Recorder (TR) is a call recording application designed to work
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Application Note Startup Tool - Getting Started Guide
Application Note Startup Tool - Getting Started Guide 1 April 2012 Startup Tool Table of Contents 1 INGATE STARTUP TOOL... 1 2 STARTUP TOOL INSTALLATION... 2 3 CONNECTING THE INGATE FIREWALL/SIPARATOR...
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation
How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation Introduction Enterprises are continuing to convert and
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Time Warner ITSP Setup Guide
October 14 Time Warner ITSP Setup Guide Author: Zultys Technical Support This configuration guide was created to assist knowledgeable vendors with configuring the Zultys MX Phone System with Time Warner
USG40HE Content Filter Customization
USG40HE Content Filter Customization This guide is designed to help with the setup of the ZyWALL s content filtering feature. Supported Devices USG40HE Firmware version 4.10(AALA.0) or later Overview Content
Setup Reference guide for PBX to SBC interconnection
Setup Reference guide for PBX to SBC interconnection Method of connection by "LAN interface only" i.e. SBC is placed behind the Perimeter Router / Fire-wall. Panasonic PBX (KX-TDE, NCP series), Media5
Allstream Converged IP Telephony
Allstream Converged IP Telephony SIP Trunking Solution An Allstream White Paper 1 Table of contents Introduction 1 Traditional trunking: a quick overview 1 SIP trunking: a quick overview 1 Why SIP trunking?
Whitepaper. The Top 10 Advantages of 3CX Phone System. Why your next phone system should be software based and by 3CX
Whitepaper The Top 10 Advantages of 3CX Phone System Why your next phone system should be software based and by 3CX This whitepaper outlines the top 10 advantages of choosing 3CX Phone System, a Windows
Aastra 55i How To. (c) 2003-2010 Bicom Systems
Aastra 55i How To Aastra 55i How To All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping,
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
User Manual. ALLO STM Appliance (astm) Version 2.0
User Manual ALLO STM Appliance (astm) Version 2.0 Table of Contents 1. Introduction... 1 1.1. Overview:... 1 1.2. STM Deployment Considerations... 3 2. Initial Setup & Configuration... 4 2.2. Default Configuration...
nexvortex Setup Guide
nexvortex Setup Guide CUDATEL COMMUNICATION SERVER September 2012 510 S P R I N G S T R E E T H E R N D O N V A 2 0 1 7 0 + 1 8 5 5. 6 3 9. 8 8 8 8 Introduction This document is intended only for nexvortex
