DUNDi!"# $. %!%&" ' &" 2008

Size: px
Start display at page:

Download "DUNDi!"# $. %!%&" ' &" 2008"

Transcription

1 DUNDi!"# $ %!%&" '&" 2008

2 , : 10/06/2008!"# $"# " ""# %&'('!"# $"# " ""# %&'('!"# $"# " ""# %&'(' ) 2008

3 ' *& '%!" +&, %&(,' -+& ' ' &$(/ " 0'"'' '% '"% Distributed Universal Number Discovery (DUNDi) #' '' ' &++ &' '!+ Voice over Internet Protocol (VoIP) "1#/ " &' &"( '" %!&*' & + ' " '-* '!&'# '% VoIP ' '' % "%1, %&(,' ' &"(!"'&'"( '/ '$/ Asterisk, / &"/ '/ 0''/ " '/ ' +' +"'(&'& " '& '/ &/, &' 0 '' +($' &" "'(+ %!& '$ Asterisk " '/ ' +' ' &%!, %&(,' &"/ '/ '%+/ '% '"% DUNDi %'"', +($' +" ' +',' &/ &!0 " &/ " &"/ &%+/ % "'*' &' '" ' &%!, '*&&' 10 '/ / '' ' '" '& #&'!% '%! " '-* 0* " % ' ',% ' '', +($'!'"'" '% 0"'*% '!& 1" + ' "'& ' '"# ' & + ' &/, " " / ""/,!% &'"/ $/ + ' 0& '% '"% DUNDi 2'&, %&(,' ' '"( 00 ' "'+(3 " 10+ (%& / '%/ &/,!' &'" " '" (%& ' &''&'"# '&(' "1#/ "' &"( &%(&' ' '%' '' '*&&%,' ' &$(/ " -&'/ & &!& ' + '" -'(,' 00,' ' &'%'"''/, "''/ " &'&/ '%'''/ &' '" DUNDi / &%,'*' 0* ' &"( ' -&'/ %!% "'+$! & &' '" DUNDi!"# $"# " ""# %&'('

4 ABSTRACT In this dissertation is presented the evaluation of security parameters and the efficiency of the protocol Distributed Universal Number Discovery (DUNDi) The first section is an introduction in the Voice over Internet Protocol (VoIP) technology and to the basic VoIP protocols that are being used for the communication of VoIP entities In the following section, are presented the main attributes of the Asterisk PBX and the way that it is installed and configured Furthermore, we outline the basic directories that are being used after the Asterisk activation In the next section, we focus on the protocol DUNDi There is an analytical examination on the way that the DUNDi protocol, dynamically discover how to reach users throughout the VoIP network Moreover, there is an extended description on the configuration of DUNDi files and the process that is used for the communication of two DUNDi `s entities In the following section, we set out the architecture of the network that was used for the research The network was relatively small but we got very important results for the efficiency of the DUNDi protocol In this section are presented the results of the research and the methodology that was used for analyzing them Furthermore, is given a quantitative and a qualitative analysis of the statistical results and finally the main conclusions The final section is focused on security and reliability issues of the DUNDi protocol There is an examination about the issues deal with the confidentiality, the integrity and the authentication services of the DUNDi protocol Finally are presented some reliability problems that are committed to date, about the DUNDi protocol PETROS G PISSAS Information and Communication Systems Engineering UNIVERSITY OF THE AEGEAN

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

6 1VoIP 1 11 &++ &' VoIP 1 12 '" VoIP SIP IAX2 8 2 Asterisk Asterisk Installation ' &/ %&' '/ "'(&'& ' '' "' "'(&'& Asterisk "'(&'& & Ubuntu 6x "'(&'& & Fedora Core '(+ %!&*' ' Asterisk ""& '% Asterisk 23 3 DUNDi &++ ' DUNDi '%+ % '"% %+/ % '"% DUNDi "/ $!"& "(%3!0 &/ ' ' EID (Entity IDentifier) ' # %+# "' $& % '"% DUNDi ! dundiconf ! iaxconf $& '%!% extensionsconf " ' 44 4!" # $" $& "'*% "'& ' & */ ' & ' &/ (%& '&(' * % ' 67 5 %$ &!"! '!! (" ' ' &$(/ General Peer Agreement (GPA) %1'"& " "'' RSA Advanced Encryption Standard (AES) DUNDi, AES " RSA Peer-to-Peer vs Clients Server (DNS) ' ' -&'/ ("'& " &/ '(%& " 89 6 )& 92

7 1 VoIP (Voice over Internet Protocol) VoIP 11 VoIP VoIP [REF1] () Internet Protocol (IP)! " #, IP! # $ ",, VoIP " % VoIP 1 VoIP VoIP 1

8 1 VoIP VoIP : & ' %, ' VoIP : " IP, VoIP % VoIP 2

9 ( # " ( VoIP " ( 100, 166 ) ) VoIP spamming 12 VoIP H323 [REF2] ITU " IP % H323 realtime audio, video,!, video H323 4 H323, " H323, gateways, gatekeepers multipoint control units (MCUs) 2 : 3

10 2 H323 % (, voice mail, video cameras ) MS Netmeeting!323 % / video gateways ", ISDN, PSTN H323 * gateways ) gateway SIP H323 % gatekeepers "!323 gatekeepers 4

11 +, ) " gatekeeper Petros % gatekeepers, gatekeeper!323, MCUs " # H323 ", ad-hoc % back-end server (BES) "!323 * BES,,, gatekeepers gateways 122 SIP % SIP [REF3] IP UDP ( 5060) SIP SIP SIP video & " SIP video, " SIP, IP " 5

12 PSTN SIP -, Proxy Servers User Agents $ " - VoIP ", SIP " IP (') SIP " IETF,!323 " ITU "! SIP RFC 2543 RFC 3261 SIP HTTP " human readable " /, - % SIP,,!323 - SIP!323 3 " SIP: 6

13 3 SIP * SIP, SIP $ % DUNDi ENUM SIP & SIP & SIP - SIP SIP " Peer-to-Peer (P2P) SIP 7

14 123 IAX2 IAX2 [REF4], Inter Asterisk exchange, +$( - Asterisk, +$(, " +$(, Asterisk (interfaces) IAX Asterisk IAX2, - UDP ( 4569)! in-band (, ), (firewall) 8

15 3 IAX % IAX2 " * (firewalls)! # IAX2 UDP &, 9

16 2 Asterisk Asterisk [REF5], (hardware), (middleware) (software) - Asterisk,,, Asterisk *, Unix/Linux DOS,, /, Asterisk, -, 0 " /, Asterisk PBX - PBX 1 VoIP $ Linux $ OpenBSD, FreeBSD, MacOSX, Sun Solaris MS-Windows -, Linux " Asterisk VoIP $ SIP!323, Inter- Asterisk Exchange (IAX) Asterisk, 10

17 21 Asterisk Installation " Asterisk Asterisk Linux Asterisk, Ubuntu 610 Fedora FC6 $ Linux, Asterisk $ Asterisk & " Asterisk : - Asterisk; : $ 211! Asterisk 1213 " Asterisk, Zaptel PRI (libpri) " VoIP " Asterisk % Zaptel " # VoIP! libpri 11

18 * asterisksounds -` Asterisk, " ", Asterisk gcc ( 3x ) / bison ncurses CLI! Asterisk OpenSSL " Zaptel " / " libpri Asterisk Zaptel linnewt zttool usb-uhci ztdummy / PRI Zaptel " libpri 22 Asterisk, Asterisk Ubuntu 6x Fedora Core 221 Ubuntu 6x Asterisk [REF6] 12

19 : asterisk-1213targz, asterisk-addons-125targz asterisk-sounds-121targz /usr/src/ 2 root # : # cd /usr/src/ # tar zxvf asterisk-1213targz # tar zxvf asterisk-sounds-121targz # tar zxvf asterisk-addons-125targz & : /usr/src/asterisk-1213/ /usr/src/asterisk-sounds-121/ /usr/src/asterisk-addons-125/ Asterisk 2 : # sudo apt-get install gcc build-essential # sudo apt-get install libncurses-dev # sudo apt-get install openssl linssl-dev # sudo apt-get install zlib1g-dev 13

20 $, Asterisk % : # cd /usr/src/asterisk-1213/ # make clean # make # make install # make samples # make progdocs! make clean «"» (binaries) $ / make samples! Asterisk Asterisk $ /etc/asterisk/, make samples old ) extensionsconf extensionsconfold -,, make samples # samples configs/ Asterisk! make progdocs doxygen / doxygen 14

21 $ 3, asterisk-sounds-121 -, / : #cd /usr/asterisk-sounds-121 #make install asterisk-addons-121, CDRs (Call Detail Records) MySQL MP3 / Perl " Asterisk 222 Fedora Core ) Asterisk Linux fedora core Ubuntu 4 libpri Zaptel Asterisk Meetme mp3 music hold on $ (kernel)! : # uname a : Linux luser _EL #1 Wen Aug 15 11:32:12 ED 2007 i686 i686 i368 GNU/Linux 15

22 $ kernel (kernel sources) ) # rpm -q kernel-devel / kernel sources yum ) : # yum install kernel-devel / yum install kernel sources " $ : # rpm -q bison # rpm -q bison-devel # rpm -q ncurses # rpm -q ncurses-devel # rpm -q zlib # rpm -q zlib-devel # rpm -q openssl # rpm -q openssl-devel # rpm -q gnutls-devel # rpm -q gcc # rpm -q gcc-c++ 16

23 $ yum : # yum install bison # yum install bison-devel # yum install ncurses # yum install ncurses-devel # yum install zlib # yum install zlib-devel # yum install openssl # yum install openssl-devel # yum install gnutls-devel # yum install gcc # yum install gcc-c++ yum " PBone ( $, : # rpm -i PACKAGErpm # rpm -Uvh PACKAGErpm Fedora kernel sources /usr/src/linuc Makefile Zaptel Asterisk ) ` /usr/src link " 'linux' kernel sources (% default /usr/src/kernels) " " " : # tar -vxzf PACKAGEtargz 17

24 $, : Libpri: # cd /path/to/source/libpri # make # make install Zaptel: # cd /usr/src/asterisk/zaptel # make ( 24 ) # make linux26 ( 26 ) # make install Asterisk: # cd /usr/src/asterisk/asterisk # make mpg123! mp3 music on hold ) Asterisk : # make # make install # make samples! 1213 Asterisk " Fedora " chan_phone ) Makefile /asterisk/channels/ chan_phone chan_phonec #include compilerh 18

25 23 Asterisk Asterisk [REF7] % asteriskconf! " voice mail recordings, (voice promts) /etc/asterisk/ Asterisk /usr/lib/asterisk/modules/ % (modules) Asterisk /,, Asterisk / Asterisk / modulesconf, " Asterisk Asterisk /var/lib/asterisk/ $ astdb astdb Asterisk, Microsoft Windows! Asterisk v1 Berkeley % /var/lib/asterisk/ : 19

26 agi-bin/ $, Asterisk Asterisk Getway Interface (AGI) firmware/ $ - (firmware) Asterisk / iax/ images/ / ", ", 5, " keys/ Asterisk / RSA # $ keys/, " ( IAX2 ) $, pub key keys/ 20

27 sounds/ 4 Asterisk, Asterisk, soundstxt sounds-extratxt, ( asterisk-sounds-121) var/spool/asterisk/ %, outgoing/, qcall/, tmp/ voic / Asterisk outgoing qcall % tmp/ " # # $ " # 4 (voic ) voic / var/run/ % process id (pid), Asterisk ( " asteriskconf) $ var/run/ ` 21

28 var/log/asterisk/ % Asterisk & " loggerconf /etc/asterisk " $ loggerconf: ; Logging Configuration ; [general] ; ' ;! ISO 8601 yyyy-mm-dd HH:MM:SS ;dateformat=%f %T ; host ;appendhostname = yes ; " ;(! yes) ;queue_log = no ; " ;(! yes) ;event_log = no ;) " ;) ; Asterisk v ( ) ;-d ( ) [logfiles] ;! 22

29 ; : ; debug ; notice ; warning ; error ; verbose ; dtmf ; "console" ;debug => debug console => notice,warning,error messages => notice,warning,error ;full => notice,warning,error,debug,verbose 24 Asterisk! Asterisk /usr/sbin/ & asterisk (daemon) ) asterisk h : #cd /usr/sbin/ #asterisk h : -c : (console) / Asterisk CLI -v: (verbosity) $ CLI -g: (core dump) $ asterisk (crash), core gdb 23

30 -r: (remote) $ Asterisk -x : (execute) ( r CLI, CLI $ ) Asterisk CLI (verbosity) 3, : #asterisk cvvv $ Asterisk, : #asterisk vvvr petros-deskop:~ # asterisk -cvvv Asterisk already running on /var/run/asteriskctl Use 'asterisk -r' to connect petros-desktop:~ # asterisk -vvvr Asterisk 1213, Copyright (C) Digium Written by Mark Spencer <markster@digiumcom> ======================================================== Connected to Asterisk 1213 currently running on Petros-desktop (pid = 7450) -- Remote UNIX connection Verbosity is at least 3 Petros-desktop*CLI> ) CLI ( script), x r : #asterisk rx restart now 24

31 , : #asterisk vvvvvvvvvc tee/tmp/debuglog 25

32 3! DUNDi DUNDi [REF8] DUNDi 31 DUNDi & DUNDi VoIP Public Switched Network (PSTN) % DUNDi (wwwdundicom) : DUNDi Peer-to-Peer (P2P) $ ( ENUM), DUNDi DUNDi " " DUNDi " (SIP, IAX, H323) DUNDi " 6 bytes $ Ethernet MAC Address DUNDi " (dialplans) - ) # 26

33 " (context) private % /164[REF9] ) DUNDi E164 General Peering Agreement (GPA) [REF10] ) DUNDi " " $ -, 4 DUNDi, ) Advanced Encryption Standard (AES) [REF11] RSA[REF12], " / General Peering Agreement (GPA) [REF10] 27

34 32 "! $ DUNDi,, [REF8], ( " ) - DUNDi : 4 # 4 $ B ' 6 $ ) $, 6, ) ' " $ $ 1234 $ " " 6 ' " 28

35 $ 6 ' " ( ) $ " ) ) $ 1234 $" $ ( ) $ ' ) 33! DUNDi & [REF8] DUNDi & " 16 bit, % "! 0 1 bit F (Final) 1 (incoming sequence number) (outgoing sequence number) 8 bit 0 1 (ACK) " 29

36 331 DUNDi 10 $ DUNDi REGREQ REGRESPONSE % REGREQ ( ) REGRESPONSE / EXPIRATION REGRESPONSE & 333 $ % % DPDISCOVER DPRESPONSE #! DPDISCOVER $ ( ) (ACK) DPRESPONSE " 4 DPDISCOVER DPRESPONSE milliseconds TTL

37 2000 & DPDISCOVER CANCEL milliseconds DPDISCOVER DPRESPONSE DPDISCOVER / DPDISCOVER DPDISCOVER : 1 2 TTL 1 DPDISCOVER TTL " DPREQUEST / DPDISCOVER DPRESPONSE: 1 DPRESPONSE / 31

38 2 / TTL 1 flag TTLEXPIRED 3! UNAFFECTED 1 DPDISCOVER ( EID_DIRECT) 4! DONTASK 1 " " 334 EID (Entity IDentifier) % EIDQUERY EIDRESPONSE * EIDQUERY / EIDRESPONSE " bit F 1 % EID DPDISCOVER DPRESPONSE 335 % & ' ' DUNDi 1 Si, So, Ts, Td F bit 32

39 % 1: request/response # # REGREQ (So=0, Si=0, Ts=1234, Td=0, F=0) > < REGRESPONSE (So=0, Si=1, Ts=5678, Td=1234, F=1) ACK (So=1, Si=1, Ts=1234, Td=5678, F=1) > % 2: $ % # # DPDISCOVER (So=0, Si=0, Ts=2345, Td=0, F=0) > < ACK (So=0, Si=1, Ts=6789, Td=2345, F=0) < DPRESPONSE (So=0, Si=1, Ts=6789, Td=2345, F=1) ACK (So=1, Si=1, Ts=2345, Td=6789, F=1) > % 3: EID # # EIDQUERY (So=0, Si=0, Ts=3456, Td=0, F=0) > < ACK (So=0, Si=1, Ts=6789, Td=3456, F=0) < EIDRESPONSE (So=0, Si=1, Ts=6789, Td=2346, F=1) ACK (So=1, Si=1, Ts=3456, Td=6789, F=1) > 33

40 34 (! [REF8] DUNDi UDP 4520 % 6 bytes & MAC address! DUNDi : Source Transaction Destination Transaction ISeqno OSeqno F R CmdResp CmdFlags Information Elements Source Transaction: % Destination Transaction: % ISeqno: % 34

41 OSeqno: % F: bit / 1 R: bit / 0 1 CmdResp:! CmdFlags: / Information Elements: 35 (! DUNDi ) DUNDi $ dundiconf, extensionsconf iaxconf * iaxconf, DUNDi * sipconf, h323conf mgcpconf 351 dundiconf dundiconf " $ " " 35

42 /, " - dundiconf Asterisk: ; DUNDi configuration file ; ; [general] ; ; "general" ; client server ; ; ;, ; ; ;department=your Department ;organization=your Company, Inc ;locality=your City ;stateprov=st ;country=us ; =your@ com ;phone= ; ; ; IP, ; 4520 ; ;bindaddr=0000 ;port=4520 ; 36

43 ;! ( MAC ; " eth, ; MAC ;!) ; ;entityid=00:07:e9:3b:76:60 ; ; # DUNDi ( ; ) ; ttl=32 ; ; $ ACK DPREQUEST 2000ms, autokill ; yes, ( ; ) ;% & ; ; host $ «yes» ;«no» ; autokill=yes ; ;' pbx_dundi «secret», ; ; «secretpath» " ;dundi ( ; dundi/secret); ;secretpath=dundi [mappings] ; ;' «mappings» DUNDi 37

44 ; ;Asterisk ; DUNDi ; DUNDi General Peering Agreement (GPA) ; ; dundi_context => local_context,weight,tech,dest[,options]] ; ;' dundi_context ;' local_context ; ;' tech (IAX, SIP, H323) ;' dest ( ; ${NUMBER} ; ;! (options) : ;nounsolicited: # ; ;nocomunsolicit: # ;residential: % ;commercial: % ;mobile: % ;nopartial: ) (partial) ; DUNDi ;, ; ;e164 => dundi-e164-38

45 comunsolicit,nopartial ;e164 => dundi-e164- ;e164 => munsolicit,nopartial ;digexten => ;asdf => ; ; ; ' ; ' name ; ; ; ;inkey: * ;outkey: ;host: host ;order: (order) * ;(primary), (secondary), (tertiary) (quartiary) ;include: ; ( «all» host) 39

46 ;noinclude: ) ; ( «all» host) ;permit: $ &( DUNDi ; ( «all» host ) ;deny: % &( DUNDi ; ( «all» host ) ;model: $ (inbound), ( (outbound), (symmetric) ;, ;! * ; ; Sample Primary e164 DUNDi peer ; [00:50:8B:F3:75:BB] model = symmetric host = inkey = digium outkey = misery include = e164 permit = e164 qualify = yes ; ; Sample Secondary e164 DUNDi peer ; ;[00:A0:C9:96:92:84] ;model = symmetric 40

47 ;host = miserydigiumcom ;inkey = misery ;outkey = ourkey ;include = e164 ;permit = e164 ;qualify = yes ;order = secondary ;[*] ; 52 iaxconf " Asterisk " [priv] type=user dbsecret=dundi/secret context=dundi-priv-incoming disallow=all allow=ulaw allow=g ( extensionsconf extensionsconf " ; Macro Block [macro-stdexten] ; standard extension macro exten => s,1,answer 41

48 exten => s,2,dial(sip/${arg1},25,t) exten => s,3,goto(s-${dialstatus},1) exten => s-noanswer,1,voic (u${arg1}) exten => s-noanswer,2,hangup exten => s-busy,1,voic (b${arg1}) exten => s-busy,2,hangup exten => _s,1,goto(s-noanswer,1) exten => a,1,voic main(${arg1}) [macro-dundi-lookup] exten => s,1,goto(${arg1},1) include => dundi-priv-lookup ;Directory Service Contexts [dundi-test-canonical] exten => ,1,Goto(pstn-in,s,1) exten => ,1,Goto(pstn2-in,s,1) exten => ,1,Goto(pstn2-in,s,1) ;$ DUNDi 0 ;% [dundi-test-local] include => dundi-test-canonical include => dundi-pstn-local ;E ;dundi-test, ( [dundi-test-lookup] switch => DUNDi/dundi-test ;$ (, ; " switch &( 42

49 ; [dundi-pstn-local] exten => _1416NXXXXXX,1,SetGroup(PSTN-OUTBOUND) ; increase PSTN- OUTBOUND +1 exten => _1416NXXXXXX,2,CheckGroup(2) ; check if <=1, else n+101 exten => _1416NXXXXXX,3,Dial(${LOCALTRUNK}/${EXTEN:1}) exten => _1416NXXXXXX,103,Wait(1) ; too many callers, drop exten => _1416NXXXXXX,104,Playback(goodbye) exten => _1905NXXXXXX,1,SetGroup(PSTN-OUTBOUND) exten => _1905NXXXXXX,2,CheckGroup(2) exten => _1905NXXXXXX,3,Dial(${LOCALTRUNK}/${EXTEN:1}) exten => _1905NXXXXXX,103,Wait(1) exten => _1905NXXXXXX,104,Playback(goodbye) ;$ , ; 2 [dundi-priv-local] exten => _1XXX,1,Macro(stdexten,${EXTEN}) ; > 1999 [dundi-priv-lookup] switch => DUNDi/priv ;+(,( ;'priv' dundi [dundi-priv-incoming] include => dundi-priv-local 43

50 ;-, ; ;Outgoing Calls Contexts [local] exten => _[1-2]XXX,1,Macro(dundi-lookup,${EXTEN}) ; > 2999 ; dundi-lookup 36 ) # DUNDi! Asterisk DUNDi ` 2 " (((( * 7, DUNDi [REF12] +$( (" DUNDi VoIP) 2 iaxconf DUNDi " 44

51 iaxconf : [priv] type=user dbsecret=dundi/secret context=dundi-priv-local & " priv Asterisk % priv dundi-priv-local / " dbsecret dundiconf dundi-priv-local $ " [mappings] - priv=>dundi-priv-canonical,0,iax2,priv:${secret}@{ipaddr} /${NUMBER},nopartial priv => dundi-priv-via-pstn,100,iax2,priv:${secret}@{ipaddr} /${NUMBER},nopartial priv => dundi-priv- customers,400,iax2,priv:${secret}@{ipaddr} /${NUMBER},nopartial 6 0, & ", 45

52 0 " & {IPADDR} )` extensionsconf " Asterisk /, " - extensionsconf DUNDi $" ) " ;private DUNDi network [dundi-priv-canonical] ;Direct numbers [dundi-priv-customers] ; ; ITSP [dundi-priv-via-pstn] ; ; 46

53 [dundi-priv-local] include => dundi-priv-canonical include => dundi-priv-customers include => dundi-priv-via-pstn [dundi-priv-switch] ; # switch => DUNDi/priv [dundi-priv-lookup] include => dundi-priv-local include => dundi-priv-switch [macro-dundi-priv] exten => s,1,goto(${arg1},1) include => dundi-priv-lookup [trydundi] exten => _,1,Macro(dundi-priv,${EXTEN}) exten => _,2,Congestion " script /asterisk- 1213/var/lib/asterisk/keys & astgenkey " hostname Asterisk ) hostname ), server " box1 domain domaincom hostname box1domaincom, box1 /, n 47

54 " Asterisk - " hostname petros1 # cd /var/lib/asterisk/keys # astgenkey n petros1 This script generates an RSA private and public key pair in PEM format for use by Asterisk You will be asked to enter a passcode for your key multiple times Please enter the same code each time The resulting files will need to be moved to /var/lib/asterisk/keys if you want to use them, and any private keys (key files) will need to be initialized at runtime either by running Asterisk with the '-i' option, or with the 'init keys' command once Asterisk is running Press ENTER to continue or ^C to cancel Generating SSL key 'petros1': Generating RSA private key, 1024 bit long modulus e is (0x10001) writing RSA key Key creation successful Public key: petros1pub Private key: petros1key petros1:/var/lib/asterisk/keys # 4 script " petros1pub 48

55 petro1key $ /var/lib/asterisk/keys web server " & text! - " : petros1pub: -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADiQKBgQC45BoYojLegRQOLOunRlX WOiGu O5iMbVhyuDipF/fY+qY9vQDacAT6xBTuIJteJewQ8BclLiRtmJLx+2/ZAXv37pW8 mtqpho2l69ppruckei52dvylz11hfsyql3fppahxgug//oe59rubccqi3+nuacb F qidzpq3e1bo7q6yxlqidaqab -----END PUBLIC KEY----- petros1key: -----BEGIN RSA PRIVATE KEY----- MIICXwIBAAKBgQC45BoYojLegRQOLOunRlXWOiGuO5iMbVhyuDipF/fY+qY9vQDa cat6xbtuijtejewq8bcllirtmjlx+2/zaxv37pw8mtqpho2l69ppruckei52dvyl Z11HfsyQl3fPpAhXGUG//oe59RUbCCqI3+NuaCbFqIdzPQ3E1BO7q6YXlQIDAQAB AoGBAJcJd6wB7G5JobmGxqcqVPqhGFx9wLuOo79rcJXpx4VQFLfAi07mTZsQzUxO BL3fWr3nc/Dihc2l4vycex0aEkruR9McTAu2yXjuqTFcEC1MpnDPMhDh6xvrUkEM btdupl/gfq8yd+9cl9wc+cneuzkwfjstv8dmx1pzhdqy9yehakea59b6wulct4j+ FA/dnFVsB3UVryJ7qr1aAgPvAwiSpVjnZZGL1FQvm6108cLArY6wywrrnSzILC/V pcprlzwl2qjbamwuwzkyozujlbj0zqc2xf8letrnl4v0yj06kzyes+bykxuyxur7 49

56 +5IYxA90yr4xYLMOOdImohNTj6m+WeAt/h0CQQCSzzx+ENY45AK27+lYldzJyEQI W11Yn3y+ZAFduXMuFmTNtWSJ/xr7i9nRNpbSE9kxbeQT8YWAPncd8cWCZBDZAkEA syqo7mmfdhr3mapvnenweqfqjq+2ptu0ke3m+rezgwc91wgrv9tfudmlmztmo2zo 2DZPfpzv882LbwPdkd5J8QJBAMSQeBIh3IlxoAURsLmISBxC1R9cjCxdcMWpN46l cte3/+fv6p6kr3stwik3z6whncd879fvjsayrmzsn7ymrje= -----END RSA PRIVATE KEY----- $ CLI Asterisk show keys : *CLI> show keys Key Name Type Status Sum switch-1n2netnet PUBLIC [Loaded] 58197ca5bae eef petros1 PUBLIC [Loaded] 34bae63322c802fcd90fae d9 petros1 PRIVATE [Loaded] 4cc788941a ebeb b17d freeworlddialup PUBLIC [Loaded] 5efd552d73309f a75f3c701e samos PUBLIC [Loaded] f9c6003c32d8969a80a2e234b6374b3c iaxtel PUBLIC [Loaded] d919b3ef03eb4dc54c8fee86bfeeada1 6 known RSA keys / res_cryptoso pbx_dundiso Asterisk dundiconf *CLI> reload res_cryptoso -- Reloading module 'res_cryptoso' (Cryptographic Digital Signatures) -- Loaded PRIVATE key 'petros1' -- Loaded PUBLIC key ' petros1' 50

57 *CLI> reload pbx_dundiso -- Reloading module 'pbx_dundiso' (Distributed Universal Number Discovery (DUNDi)) == Parsing '/etc/asterisk/dundiconf': Found $ ", 4 DUNDi MAC (Media Access Control) " ) MAC Linux: # ifconfig eth0 eth0 Link encap:ethernet HWaddr 00:02:AA:12:A2:32 inet addr: Bcast: Mask: UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:0 (00 b) TX bytes:0 (00 b) Interrupt:9 Base address:0x5000! MAC ) CLI Asterisk : pbx*cli> dundi show entityid Global EID for this system is 00:02:AA:12:A2:32 51

58 & MAC, dundiconf # ) hostname petros1domaincom petros-desktopdomaincom ", # : petros1domaincomkey / petros1domaincompub petros-desktopdomaincompub / petros-desktopdomaincomkey MAC : petros1domaincom petros-desktopdomaincom 00:02:AA:12:A2:32 00:01:A2:6/:92:$6 $ dundiconf : petros1domaincom ; Primary e164 DUNDi peer ; [00:02:AA:12:A2:32] model = symmetric host = inkey = petros-desktopdomaincompub outkey = petros1domaincompub include = e164 52

59 permit = e164 qualify = yes petros-desktopdomaincom ; Primary e164 DUNDi peer ; [00:01:A2:6/:92:$6] model = symmetric host = inkey = petros1domaincompub outkey = petros-desktopdomaincompub include = e164 permit = e164 qualify = yes $ dundiconf Asterisk # $ CLI Asterisk dundi show peers : *CLI> dundi show peers EID Host Model AvgTime Status 00:01:A2:6/:92:$ (S) Symmetric Unavail OK (273 ms) 1 dundi peers [1 online, 0 offline, 0 unmonitored] $ & dundi show peer CLI Asterisk 53

60 *CLI> dundi show peer 00:01:A2:6/:92:$6 Peer: 00:01:A2:6/:92:$6 Model: Symmetric Host: Dynamic: no KeyPend: no Reg: No In Key: petros1domaincompub Out Key: petros-desktopdomaincompub Include logic: -- include dundi-priv Query logic: -- permit dundi-priv $ extensionconf " * DUNDi ", DUNDi ) "! extensionsconf ) " # [dundi-priv-customers] $ " # 2 : exten => _2XXX,1,Goto(ext-local,${EXTEN},1) 54

61 & DUNDi 2100 $ dundi lookup CL+ Asterisk *CLI> dundi lookup IAX2/dundi: 34bae63322c802fcd90fae d9@ petros1domaincom /2100 (EXISTS NOUNSLCTD NOCOMUNSLTS) from 00:01:A2:6/:92:$6, expires in 787 s DUNDi lookup completed in 331 ms " : *CLI> dundi lookup 7100 DUNDi lookup returned no results DUNDi lookup completed in 1006 ms 55

62 4 * % DUNDi $ DUNDi 41 ( ( ) % RAM 512 &6, Intel Pentium 2,8 MHz 80 GB Linux Ubuntu 610 Fedora FC6 % 512 &6 RAM, 1,6 &!z Intel Celeron 60 GB % RAM 1GB, Intel Pentium 2,4 &!z 200 GB Linux Ubuntu 610 Asterisk 1213 (/3) $ Asterisk - " hostname MAC, +, ( ) " 56

63 PC1 hostname: petros-desktop MAC: 00:01:02:DE:27:2E IP: NUMBER: PC2 hostname: petros1 MAC: 00:0D:9D:D1:5E:92 IP: NUMBER: PC3 hostname: gkamb1 MAC: 00:16:17:C4:62:44 IP: NUMBER: PC4 hostname: petros2 MAC: 00:50:04:44:53:96 IP: NUMBER: PC5 hostname: petros23 MAC: 00:01:02:DE:27:A3 IP : NUMBER: ) $ 57

64 , NFS SMB shared-keys : # sudo mkdir /home/petros/desktop/shared-keys $ $ shared $ IP, mount $ : # sudo mount :/home/petros/Desktop/shared-keys /home/gkamb1/desktop/shared-keys $ DUNDi petrosdesktoppub, petros1pub, petros2pub, gkamb1pub petros23pub 58

65 5 DUNDi: 5 % # 59

66 5 " (PC1, PC2, PC3, PC4, PC5) & " DUNDi % 4 DUNDi $, " ( 1000) '" VoIP $ DUNDi ) 1000: *CLI> dundi lookup IAX2/dundi: 34bae63322c802fcd90fae d9@karlovasigr/1000 (EXISTS NOUNSLCTD NOCOMUNSLTS) from 00:0F:FE:0A:7E:97, expires in 787 s DUNDi lookup completed in 731 ms 60

67 42 * - [REF13] )` script, script ( 1 : result1txt), test $ Linux : $ /test % script : clear for ( ( i=100; i<=599 ; i++ ) ) do asterisk rx dundi lookup 1$i@priv >> resultx done script «"» for " $i " # 500 script asterisk rx CLI asterisk! " 1XXX DUNDi priv % 1((( " ' " 1100, " 61

68 " resultx ( # & 500 " % $ 43! * # hops " % " " hop 6 hop 6 «1» 62

69 hop 7 hop 7 «2» hop 8 hop 8 «3» 63

70 hop 9 hop 9 «4» hops, "! " 10 * & & '& 64

71 10 «5» hop result1 $ ', result2, result3, result4 result5 " DUNDi! 65

72 44 * &: / script, " ': script " '#: % $, (# ) /, cache!/ &: % 11 % 2007! () $ : (txt) Excel 66

73 441 Excel,, [REF13] $ " max( x),min( x) * hop & $, Excel, AVERAGE x x x x x i i1 4, # ) - & /(() ( ) VAR Excel 67

74 s x i ( x i ) i1 i1 2 % STDEV (standard deviation) Excel s 2 s " 11: ( ' #1 68

75 12: ( ' #2 13: ( ' #3 69

76 14: ( ' #4 15: ( ' #5 70

77 #1 #2 #3 #4 #5 / (ms) & (ms) & 41, , , , ,16291 ' 6, , , , , $ 2, , , , , * #1: 1 HOP #2: 2 HOPs #3: 3 HOPs #4: 4 HOPs #5: 4 HOPs 1: 71

78 $ 2 2,6 milliseconds $ 2 2,6 (milliseconds) 41, ,22807 * 2,07747 ms &" 5,17% 43, ,26316 * 2,03509 ms $ 4,7% ) 45, ,15894 * 1,9 ms &" 4,2% - & & $ - $ - $ - #1 #2 #2 #3 #3 #4 5,17% 4,7% 4,7% 2: # ) #5 " DUNDi 72

79 #4 $ DUNDi * #4, #5 & " : 16: *# * #5 & [REF14] " y(x) = 1707x y " x hops DUNDi 73

80 ! DUNDi hop DUNDi 2 millisecond %, 74

81 5 +, " DUNDi -" ", " * VoIP,,2, [REF12] DNS server [REF13] DUNDi , DUNDi " VoIP,,2, &, " DNS DUNDi ", ' ( #, # ) &, & DUNDi 75

82 !, " DUNDi, " E164 [REF9] " e164 ) " e164 # General Peer Agreement (GPA) [REF10], GPA 2, ", GPA, ", 511 General Peer Agreement (GPA) GPA, " E164 e164 & " %, " GPA " $" DUNDi, GPA, " E164, #, E164 76

83 GPA DUNDi VoIP ) e164, " e164,, " *, " " P2P e " (DUNDi, E164, Peering System, Propagate, Participant, Weight ) ",, ", " / &, - # &! GPA forum, 77

84 , " 2, % /,2,, %, % GPA % " ) DUNDi 1,!, % % " # 78

85 , " " / " & GPA " - # % site DUNDi ( $ # DUNDi, AES RES RSA 5121 RSA % RSA [REF17] 1978 (Rivest, Shamir, Adleman) $ RSA RSA " ( - ) " % 79

86 ) " RSA " * f(n)=(p-1)(q-1), p q n $ Euler n e, f(n), e f(n) 1, " d, e modulo f(n), d=e -1 mod f(n) O e d " 1 $ 6 $ $ 6 $ C=M e mod n C $ B, &=C d mod n, % RSA! ", ", # 80

87 % " n! ",, " " -, 2048 bit 5122 Advanced Encryption Standard (AES) % AES [REF18] &, 2002 AES AES 128 bit, 192 bit 256 bit 128 bit, 192 bit 256 bit ",, # $ «Rijndael key schedule» - % : ByteSub, ShiftRow, MixColumn, AddRoundKey - AES 81

88 % ByteSub bytes [ 17] 17: ByteSub ShiftRow byte, [ 18] 18: ShiftRow 82

89 MixColumn " c(x) [ 19] 19: MixColumn AddRoundKey byte " byte XOR () [ 20] 20: AddRoundKey 83

90 % (side channel attacks) AES 128 bit, " AES 5123 DUNDi, AES RSA 4 DUNDi RSA AES RSA 1024 bit AES 128 bit RSA 6 AES $ # DUNDi, " ( 36) " RSA! " RSA # DUNDi PKI!, web site DUNDi " web site dundiconf /, 84

91 RSA " $ DUNDi DUNDi : Information Element Notes EID KEYCRC32 CRC AES, RSA SHAREDKEY AES, ENCDATA AES 6, $ CRC-32 [REF19] AES & " % SHAREDKEY KEYCRC32 $ ", 85

92 SHAREDKEY AES REGREQ " $ ENCDATA % REGRESPONSE #, AES! DUNDi,, " 513 Peer-to-Peer vs Client Server (DNS) VoIP ENUM [REF23] DUNDi [REF8], " ENUM, DUNDi, (client - server) [REF20], Domain Name System (DNS) [REF16], " E164 ENUM DNS # E164 DNS ), Nameserver (NS) Naming Authority Pointer (NAPTR), DNS & ENUM 86

93 DNS 4 DNS &,, $, DNS % Denial of Service (DoS) [REF22] Pharming [REF21] % DoS DNS, (Distributed DoS [REF22]), DNS,, DNS, % Pharming % DNS, & # % Pharming 4, DUNDi ENUM " P2P DUNDi "!, GPA DUNDi *, " 87

94 DNS, DUNDi $" DUNDi 52 +, DUNDi [REF25] 521, DUNDi, ) " -, DUNDi " () DUNDi,, " " $ DUNDi, % DUNDi ",! " 21 88

95 21: ( DUNDi # 521 $ $ D!, ( ), lookup " ( ) " 522 # "! ", DUNDi, /, 89

96 , $ ) $ 4 5, 7 8, , 4, 1, 2, 5, 8, 9, 17, 13, 16 $, " 1 2 ', ( 4) * 7 16 " 90

97 22: % # # DUNDi / 91

98 6, DUNDi $, Asterisk, DUNDi! Asterisk, VoIP DUNDi Asterisk DUNDi,!, DUNDi Asterisk,, / DUNDi # $" " DUNDi " $,, % DUNDi, ',, /, $ ( 4), hop 2 ms - DUNDi ( ) " 92

99 /, " " DUNDi *, ENUM % DNS, P2P DUNDi & AES RSA, DUNDi DUNDi, DUNDi GPA, " & DUNDi, GPA ", DUNDi ", " " " ENUM $ # DUNDi, " 93

100 $ [REF] H323 Protocol Overview: Paul E Jones (October 2007) 3 SIP Protocol Overview: RADVISION Team 4 IAX: Inter-Asterisk exchange Version 2: M Spencer 5 Asterisk: A Non-Technical Overview: Nasser K Manesh Asterisk: The Future of Telephony: Leif Madsen, Jared Smith 8 Distributed Universal Number Discovery (DUNDi)draft-mspencer-dundi-01: M Spencer Internet-Draft Digium, Inc October 13, RFC 2916 E164 number and DNS September DIGIUM GENERAL PEERING AGREEMENT (TM)Version 100: Sept $ ' 1: )",, ' )" 12 Practical VoIP Security: Thomas Porter, Jan Kanclirz, Andy Zmolek, Antonio Rosela, Michael Cross, Larry Chaffin, Brian Baskin, Choon Shim 13 & : ) ', 6 ( ( 14 : ) ' 15 An Overview of Peer-to-Peer: Sami Rollins 16 RFC 883 DOMAIN NAMES - IMPLEMENTATION and SPECIFICATION ADVANCED ENCRYPTION STANDARD (AES) Federal Information Processing Standards Publication The Future of Asterisk: Kevin P Fleming 21 Routing Security: Steven M Bellovin 94

101 22 Spoof Detection for Preventing DoS Attacks against DNS Servers: Fanglu Guo Jiawu Chen Tzi-cker Chiueh 23 "Security and Privacy issues towards ENUM", Proceedings of the ISSPIT 05 5th IEEE International Symposium on Signal Processing and Information Technology, pp , December 2005, Athens, Greece, IEEE Press 24 G Kambourakis, D Geneiatakis, S Gritzalis, T Dagiuklas, C Lambrinoudakis Call Route Discovery with Asterisk / DUNDi: Andre Wangler, September

Introduction. What is DUNDi? Configuring Asterisk for use with DUNDi

Introduction. What is DUNDi? Configuring Asterisk for use with DUNDi Introduction This paper will explore how to configure and setup the DUNDi directory service on your Asterisk PBX system. DUNDi is not very hard to configure in Asterisk, however at the time of this writing,

More information

DUNDi, So Easy A Caveman Could Do It!

DUNDi, So Easy A Caveman Could Do It! DUNDi, So Easy A Caveman Could Do It! General Description JR Richardson Engineering for the Masses [email protected] DUNDi is a peer-to-peer system for locating Internet gateways to telephony services.

More information

Using DUNDi with a Cluster of Asterisk Servers! General Description and Scope

Using DUNDi with a Cluster of Asterisk Servers! General Description and Scope Using DUNDi with a Cluster of Asterisk Servers! General Description and Scope DUNDi is a peer-to-peer system for locating Internet gateways to telephony services. Unlike traditional centralized services

More information

Table of Contents. Overview... 1. Features... 1. Applications... 1. Hardware requirement... 1. Card dimensions... 1. Software Installation...

Table of Contents. Overview... 1. Features... 1. Applications... 1. Hardware requirement... 1. Card dimensions... 1. Software Installation... Table of Contents Overview... 1 Features... 1 Applications... 1 Hardware requirement... 1 Card dimensions... 1 Software Installation... 1 Software Configuration... 4 E1/T1/MFCR2 mode settings... 4 E1 Mode...

More information

Overview of Asterisk (*) Jeff Gunther

Overview of Asterisk (*) Jeff Gunther Overview of Asterisk (*) Jeff Gunther Agenda Background Introduction to Asterisk and review the core components of it s architecture. Exploration of Asterisk s telephony and call features. Review some

More information

This manual contains product information for the GSM Series cards. The manual is organized in the following manner:

This manual contains product information for the GSM Series cards. The manual is organized in the following manner: Allo.com. 2012 All rights reserved. No part of this publication may be copied, distributed, transmitted, transcribed, stored in a retrieval system, or translated into any human or computer

More information

Asterisk: The Open Source PBX Solution Adam Olson Systems and network administrators typically deal with

Asterisk: The Open Source PBX Solution Adam Olson Systems and network administrators typically deal with 1 1 1 0 1 0 1 0 1 Asterisk: The Open Source PBX Solution Adam Olson Systems and network administrators typically deal with data and functionality such as email communications, Web and database applications,

More information

AXE1DL + EC32L. ATCOM Digital Card AXE1DL User Manual Version: 1.0 2013-07-03

AXE1DL + EC32L. ATCOM Digital Card AXE1DL User Manual Version: 1.0 2013-07-03 AXE1DL + EC32L ATCOM Digital Card AXE1DL User Manual Version: 1.0 2013-07-03 Content CHAPTER 1 THE INTRODUCTION OF AXE1DL...3 CHAPTER 2 HARDWARE INTRODUCTION... 5 CHAPTER 2 TEST ENVIRONMENT...8 CHAPTER

More information

Asterisk - The Basics

Asterisk - The Basics Asterisk - The Basics PacNOG 3 VoIP Workshop June 2007, Cook Islands Jonny Martin [email protected] What is Asterisk Asterisk, The Open Source PBX. www.asterisk.org A complete PBX in software Runs on

More information

AXE4DL + EC128L. ATCOM Digital Card AXE4DL User Manual Version: 1.0 2013-07-03

AXE4DL + EC128L. ATCOM Digital Card AXE4DL User Manual Version: 1.0 2013-07-03 AXE4DL + EC128L ATCOM Digital Card AXE4DL User Manual Version: 1.0 2013-07-03 Content CHAPTER 1 THE INTRODUCTION OF AXE4DL...3 CHAPTER 2 HARDWARE INTRODUCTION...5 CHAPTER 2 TEST ENVIRONMENT... 8 CHAPTER

More information

OpenVox DE210E/DE410E User Manual

OpenVox DE210E/DE410E User Manual 深 圳 开 源 通 信 有 限 公 司 OpenVox-Best Cost Effective Asterisk Cards OpenVox DE210E/DE410E User Manual Written by: James.zhu Email:[email protected],[email protected] Date:29/04/2008 Version: 0.01 OpenVox

More information

Mediatrix 3000 with Asterisk June 22, 2011

Mediatrix 3000 with Asterisk June 22, 2011 Mediatrix 3000 with Asterisk June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 Network Topology... 3 Equipment Detail... 3 Configuration of the Fax Extension... 4 Configuration

More information

Trunks User Guide. Schmooze Com Inc.

Trunks User Guide. Schmooze Com Inc. Schmooze Com Inc. Chapters Overview Logging In Adding a SIP Trunk Adding a DAHDi Trunk Adding an IAX2 Trunk Adding an ENUM Trunk Adding a DUNDi Trunk Adding a Custom Trunk Recap Examples Overview The Trunks

More information

Setup Guide: on the MyNetFone Service. Revision History

Setup Guide: on the MyNetFone Service. Revision History Setup Guide: on the MyNetFone Service Revision History Version Author Revision Description Release Date 1.0 Sampson So Initial Draft 02/01/2008 2.0 Sampson So Update 27/09/2011 1 Table of Contents Introduction...

More information

Asterisk: A Non-Technical Overview

Asterisk: A Non-Technical Overview Asterisk: A Non-Technical Overview Nasser K. Manesh [email protected] Millenigence, Inc. 5000 Birch St., Suite 8100 Newport Beach, CA 92660 June 2004, Revised December 2004 Executive Summary Asterisk

More information

Asterisk. http://www.asterisk.org. http://www.kismetwireless.net/presentations.shtml. Michael Kershaw <[email protected]>

Asterisk. http://www.asterisk.org. http://www.kismetwireless.net/presentations.shtml. Michael Kershaw <dragorn@kismetwireless.net> Asterisk * http://www.asterisk.org What Asterisk Can Do Voice Over IP (VOIP) Physical phone switch (PBX) Software phone switch Answering machine Call trees (Press 1 to...) VOIP Voice Over IP: Make telephone

More information

BASIC TCP/IP NETWORKING

BASIC TCP/IP NETWORKING ch01 11/19/99 4:20 PM Page 1 CHAPTER 1 BASIC TCP/IP NETWORKING When you communicate to someone or something else, you need to be able to speak a language that the listener understands. Networking requires

More information

How To Install Openstack On Ubuntu 14.04 (Amd64)

How To Install Openstack On Ubuntu 14.04 (Amd64) Getting Started with HP Helion OpenStack Using the Virtual Cloud Installation Method 1 What is OpenStack Cloud Software? A series of interrelated projects that control pools of compute, storage, and networking

More information

Avaya IP Office 8.1 Configuration Guide

Avaya IP Office 8.1 Configuration Guide Avaya IP Office 8.1 Configuration Guide Performed By tekvizion PVS, Inc. Contact: 214-242-5900 www.tekvizion.com Revision: 1.1 Date: 10/14/2013 Copyright 2013 by tekvizion PVS, Inc. All Rights Reserved.

More information

Micronet VoIP Solution with Asterisk

Micronet VoIP Solution with Asterisk Application Note Micronet VoIP Solution with Asterisk 1. Introduction This is the document for the applications between Micronet units and Asterisk IP PBX. It will show you some basic configurations in

More information

Software Based VoIP Lab A step by step guide to setting up and configuring an IP-PBX. Donal O Connor DNET 4 [email protected]

Software Based VoIP Lab A step by step guide to setting up and configuring an IP-PBX. Donal O Connor DNET 4 donaloconnor@gmail.com Software Based VoIP Lab A step by step guide to setting up and configuring an IP-PBX Donal O Connor DNET 4 [email protected] Introduction Traditionally, a company or individual would have to buy really

More information

Written by Saif ur Rab Monday, 07 December 2009 07:19 - Last Updated Monday, 27 December 2010 09:19

Written by Saif ur Rab Monday, 07 December 2009 07:19 - Last Updated Monday, 27 December 2010 09:19 I have been trying to learn Asterisk and as many of you know about that main Service Povider has blocked the voice ports in Pakistan. Therefore, we cannot connect to asterisk servers through xlite, 3cx

More information

OpenVox Communication Co. LTD.

OpenVox Communication Co. LTD. OpenVox Communication Co.Ltd D410E/DE410E on DAHDI User Manual Version: 2.2 OpenVox Communication Co. LTD. URL: www.openvox.cn OpenVox Communication Co.Ltd OpenVox-Best Cost Effective Asterisk Cards Address:

More information

LABORATORIUM 1 Setup and basic configuration of Asterisk BPX on Linux

LABORATORIUM 1 Setup and basic configuration of Asterisk BPX on Linux LABORATORIUM 1 Setup and basic configuration of Asterisk BPX on Linux 1. VM setup Please download Asterisk Virtual Machine from http://kt.agh.edu.pl/~rzym/lectures/ti- SSiZ/VMAsterisk.zip and extract archive.

More information

netkit lab single-host Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

netkit lab single-host Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab single-host Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani,

More information

Internet Technology Voice over IP

Internet Technology Voice over IP Internet Technology Voice over IP Peter Gradwell BT Advert from 1980s Page 2 http://www.youtube.com/v/o0h65_pag04 Welcome to Gradwell Gradwell provides technology for every line on your business card Every

More information

VoIP-PSTN Interoperability by Asterisk and SS7 Signalling

VoIP-PSTN Interoperability by Asterisk and SS7 Signalling VoIP-PSTN Interoperability by Asterisk and SS7 Signalling Jan Rudinsky CESNET, z. s. p. o. Zikova 4, 160 00 Praha 6, Czech Republic [email protected] Abstract. PSTN, the world's circuit-switched network,

More information

General Guidelines for SIP Trunking Installations

General Guidelines for SIP Trunking Installations SIP Trunking Installations General Guidelines for SIP Trunking Installations 1) How do I setup my SIP trunk for inbound/outbound calling? We authenticate IP-PBX SIP Trunking traffic by: IP Authentication

More information

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents First Steps... 3 Identifying your MAC Address... 3 Identifying your Dynamic IP Address...

More information

Following the general section, clients are defined, one per section. Sections are delineated by their name in brackets.

Following the general section, clients are defined, one per section. Sections are delineated by their name in brackets. Iax.conf Synopsis This file is used to configure clients connecting via the Inter-Asterisk Exchange protocol. IAX is primarily used for passing calls between Asterisk servers. Frequently Multiple Asterisk

More information

TEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY

TEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY TEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY DATE: 11/05/2014 ABSTRACT: Private Branch Exchange has multiple phones connected to it which are in the same

More information

Configuring the Cisco SPA8800 IP Telephony Gateway in an Asterisk Environment

Configuring the Cisco SPA8800 IP Telephony Gateway in an Asterisk Environment Application Note May 2009 Configuring the Cisco SPA8800 IP Telephony Gateway in an Asterisk Environment 2009 Cisco Systems, Inc. All rights reserved. Page 1 of 20 Contents Introduction 3 Audience 3 Scope

More information

Telephony with an Asterisk phone system

Telephony with an Asterisk phone system Telephony with an phone system TALKATIVE An old computer is all you need to build your own do-it-yourself personal phone server. BY MARTIN LOSCHWITZ Technology that supports the easy exchange of audio

More information

OpenVox Communication Co.Ltd. OpenVox-Best Cost Effective Asterisk Cards

OpenVox Communication Co.Ltd. OpenVox-Best Cost Effective Asterisk Cards OpenVox Communication Co.Ltd OpenVox-Best Cost Effective Asterisk Cards Address: F/3, Block No.127, Jindi Industrial Zone, Shazui Road, Futian District, Shenzhen, Guangdong 518048, China Tel:+86-755-82535461,

More information

AX400P User Manual. ATCOM Analog Card AX400P User Manual Version: 2.0 2013-06-03

AX400P User Manual. ATCOM Analog Card AX400P User Manual Version: 2.0 2013-06-03 AX400P User Manual ATCOM Analog Card AX400P User Manual Version: 2.0 2013-06-03 Release note Version Changed note Editor Date 1.0 First Release Robert 2.0 Release the User manual Deniel 2013-06-03 www.atcom.cn

More information

You da M.A.N. Voice, over IP, over stuff

You da M.A.N. Voice, over IP, over stuff You da M.A.N. Voice, over IP, over stuff Lawrence Stewart Warren Harrop [email protected] [email protected] Outline Network design & provisioning Network topology & hardware Network applications Security

More information

Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015

Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 IPv6 in practice with RPi Alvaro Vives - [email protected] Contents 1 Lab topology 2 IPv6 Configuration 2.1 Linux commands

More information

NOC Workshop VoIP in the NOC labs SANOG10

NOC Workshop VoIP in the NOC labs SANOG10 NOC Workshop VoIP in the NOC labs SANOG10 New Delhi, India August 29 - September 2, 2007 Page 1 of 10 Lab Summary NOC Workshop, SANOG10 - VoIP in the NOC We only have limited time for this portion of the

More information

3. The Domain Name Service

3. The Domain Name Service 3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records

More information

HIGH AVAILABILITY (HA) WITH OPENSIPS

HIGH AVAILABILITY (HA) WITH OPENSIPS HIGH AVAILABILITY (HA) WITH OPENSIPS Setting up the HA Environment Norm Brandinger SIP Transport SIP is able to be transmitted using Multiple Protocols such as: UDP, TCP, or TCP with TLS (SSL) encryption

More information

General Guidelines for SIP Trunking Installations

General Guidelines for SIP Trunking Installations General Guidelines for SIP Trunking Installations 1) How do I setup my SIP trunk for inbound/outbound calling? We authenticate IP-PBX SIP Trunking traffic by: IP Authentication (IP address) or Digest Authentication

More information

EZLoop IP-PBX Enterprise SIP Server

EZLoop IP-PBX Enterprise SIP Server EZLoop IP-PBX Enterprise SIP Server Copyright 2007 Teletronics International, Inc. 2 Choke Cherry Road, Rockville, MD 20850 [email protected] www.teletronics.com CH1. Overview...4 1.1 Specifications...4

More information

SIP Configuration Guide

SIP Configuration Guide SIP Configuration Guide for using Asterisk@Home with Mediant 1000, 2000 and MP-11x Published by AudioCodes Interoperability Laboratory July 2007 Document #: LTRT-82405 SIP Configuration Guide Contents

More information

1) How do I setup my SIP trunk for inbound/outbound calling? We authenticate IP-PBX SIP Trunking traffic by:

1) How do I setup my SIP trunk for inbound/outbound calling? We authenticate IP-PBX SIP Trunking traffic by: 1) How do I setup my SIP trunk for inbound/outbound calling? We authenticate IP-PBX SIP Trunking traffic by: IP Authentication (IP address) or Digest Authentication (account and SIP password) After you

More information

Asterisk Primer. Presented at Apricot, Bali, Feb 26 th 2007. Marc Blanchet Viagénie. [email protected] http://www.viagenie.

Asterisk Primer. Presented at Apricot, Bali, Feb 26 th 2007. Marc Blanchet Viagénie. Marc.Blanchet@viagenie.ca http://www.viagenie. Asterisk Primer Presented at Apricot, Bali, Feb 26 th 2007 Marc Blanchet Viagénie [email protected] http://www.viagenie.ca Credentials 20+ years in IP networking and Unix, with 10 years on IPv6...

More information

SIP Trunking using Optimum Business SIP Trunk Adaptor and the Cisco Call Manager Express Version 8.5

SIP Trunking using Optimum Business SIP Trunk Adaptor and the Cisco Call Manager Express Version 8.5 CISCO SIP Trunking using Optimum Business SIP Trunk Adaptor and the Cisco Call Manager Express Version 8.5 Goal The purpose of this configuration guide is to describe the steps needed to configure the

More information

SFLphone Documentation

SFLphone Documentation SFLphone Documentation Release 1.0 SFLphone Team August 18, 2014 Contents 1 Contents 3 1.1 Getting started.............................................. 4 1.2 Setup a secure environment with Asterisk................................

More information

VoIP Laboratory B How to re flash an IP04

VoIP Laboratory B How to re flash an IP04 VoIP Laboratory B How to re flash an IP04 (cc) Creative Commons Share Alike Non Commercial Attribution 3 This lab guides you through the process of re flashing an IP04. To re flash a unit is useful when

More information

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and

More information

VOIP with Asterisk & Perl

VOIP with Asterisk & Perl VOIP with Asterisk & Perl By: Mike Frager 11/2011 The Elements of PSTN - Public Switched Telephone Network, the pre-internet phone system: land-lines & cell-phones. DID - Direct

More information

VoIP Workshop PacNOG3

VoIP Workshop PacNOG3 VoIP Workshop PacNOG3 Rarotonga, Cook Islands June 2007 Labs 1-4, Asterisk Lab 5, INOC-DBA Lab 6-7, Cisco Voice Gateways Lab 8, CODECS Page 1 of 13 Lab Summary Server logins are as you have set up in previous

More information

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...

More information

TEL 500. Voice Communications. Week 1 Write Up. Session Initiation Protocol Lab. Submitted To: Prof Ronny Bull. By: Sai Sharan Korvi

TEL 500. Voice Communications. Week 1 Write Up. Session Initiation Protocol Lab. Submitted To: Prof Ronny Bull. By: Sai Sharan Korvi TEL 500 Voice Communications Week 1 Write Up Session Initiation Protocol Lab Submitted To: Prof Ronny Bull By: Sai Sharan Korvi Date: 09/10/2014 ABSTRACT: Softphone is usually a software which can be used

More information

Applications between Asotel VoIP and Asterisk

Applications between Asotel VoIP and Asterisk Applications between Asotel VoIP and Asterisk This document is describing the configuring manner of registering and communicating with Asterisk only. Please visit the official WEB of Asterisk http://www.asterisk,

More information

Fig. Setting up of a VoIP call. Fig. Experimental setup

Fig. Setting up of a VoIP call. Fig. Experimental setup Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Asterisk VoIP Private

More information

Asterisk. Technical Application Notes

Asterisk. Technical Application Notes Asterisk Technical Application Notes Table of Contents About Asterisk... 1 Purpose, Scope and Audience... 3 Asterisk Deployment Information... 4 Asterisk External IP Address... 4 Sending Calls to Broadvox...

More information

Building the NGN Switch (with Asterisk) David Zimmer, CEO and Founder

Building the NGN Switch (with Asterisk) David Zimmer, CEO and Founder Building the NGN Switch (with Asterisk) David Zimmer, CEO and Founder About teresto Formation Headquarter Shareholders Management Revenues Employess 1.1.2002 by integrating of Salink GmbH (part of Xlink/KPNQWest)

More information

Twin Peaks Software High Availability and Disaster Recovery Solution For Linux Email Server

Twin Peaks Software High Availability and Disaster Recovery Solution For Linux Email Server Twin Peaks Software High Availability and Disaster Recovery Solution For Linux Email Server Introduction Twin Peaks Softwares Replication Plus software is a real-time file replication tool, based on its

More information

System Admin Module User Guide. Schmooze Com Inc.

System Admin Module User Guide. Schmooze Com Inc. Schmooze Com Inc. Chapters Overview Using the Module DDNS DNS Email Setup FTP Server Intrusion Detection License Network Settings Notification Settings Port Management Power Options Storage Time Zone Updates

More information

Setting Up A High-Availability Load Balancer (With Failover and Session Support) With Perlbal/Heartbeat On Debian Etch

Setting Up A High-Availability Load Balancer (With Failover and Session Support) With Perlbal/Heartbeat On Debian Etch By Falko Timme Published: 2009-01-11 19:32 Setting Up A High-Availability Load Balancer (With Failover and Session Support) With Perlbal/Heartbeat On Debian Etch Version 1.0 Author: Falko Timme

More information

Asterisk Voice Exchange: An Alternative to Conventional EPBX

Asterisk Voice Exchange: An Alternative to Conventional EPBX 2008 International Conference on Computer and Electrical Engineering Asterisk Voice Exchange: An Alternative to Conventional EPBX Mohammed A Qadeer Department of Computer Engineering, Aligarh Muslim University,

More information

Configuration Notes 290

Configuration Notes 290 Configuring Mediatrix 41xx FXS Gateway with the Asterisk IP PBX System June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 About Mediatrix 41xx Series FXS Gateways...

More information

SIP Trunking Quick Reference Document

SIP Trunking Quick Reference Document SIP Trunking Quick Reference Document Publication Information SAMSUNG TELECOMMUNICATIONS AMERICA reserves the right without prior notice to revise information in this publication for any reason. SAMSUNG

More information

VoIP Security regarding the Open Source Software Asterisk

VoIP Security regarding the Open Source Software Asterisk Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de

More information

EarthLink Business SIP Trunking. Asterisk 11.2 IP PBX Customer Configuration Guide

EarthLink Business SIP Trunking. Asterisk 11.2 IP PBX Customer Configuration Guide EarthLink Business SIP Trunking Asterisk 11.2 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0

More information

Basic configuration of the GXW410x with Asterisk

Basic configuration of the GXW410x with Asterisk Basic configuration of the GXW410x with Asterisk Please note that due to the customizable nature of both the GXW410x and Asterisk and the vast deployment possibilities, these instructions should be taken

More information

VM-Series Firewall Deployment Tech Note PAN-OS 5.0

VM-Series Firewall Deployment Tech Note PAN-OS 5.0 VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5

More information

Unicorn60x0 IP ANALOG GATEWAY ASTERISK CONFIGURATION

Unicorn60x0 IP ANALOG GATEWAY ASTERISK CONFIGURATION Unicorn60x0 IP ANALOG GATEWAY ASTERISK CONFIGURATION BASIC CONFIGURATION OF THE Unicorn60x0 WITH ASTERISK Due to the various deployment possibilities of the Unicorn60x0 and Asterisk, this configuration

More information

Kerio Operator. Administrator s Guide. Kerio Technologies

Kerio Operator. Administrator s Guide. Kerio Technologies Kerio Operator Administrator s Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio Operator, version 1.0. All additional modifications

More information

ESI SIP Trunking Installation Guide

ESI SIP Trunking Installation Guide ESI SIP Trunking Installation Guide 0450-1227 Rev. B Copyright 2009 ESI (Estech Systems, Inc.). Information contained herein is subject to change without notice. ESI products are protected by various U.S.

More information

This howto is also a bit old now. But I thought of uploading it in the howtos section, as it still works.

This howto is also a bit old now. But I thought of uploading it in the howtos section, as it still works. Assalam-u-alaikum, This howto is also a bit old now. But I thought of uploading it in the howtos section, as it still works. Created : Mid 2007 Last updated: Mid 2007 The following link is very nice tutorial

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

NCS 416 Paul Brennan Mohammed Haque IAX2 Trunking

NCS 416 Paul Brennan Mohammed Haque IAX2 Trunking NCS 416 Paul Brennan Mohammed Haque IAX2 Trunking Abstract This project explores setting up a server to interface between the PSTN and multiple Asterisk PBX systems. The server interfaces with the PSTN

More information

A Comparative Study of Signalling Protocols Used In VoIP

A Comparative Study of Signalling Protocols Used In VoIP A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.

More information

Setup the Asterisk server with the Internet Gate

Setup the Asterisk server with the Internet Gate 1 (9) Setup the Asterisk server with the Internet Gate This guide presents ways to setup the Asterisk server together with the Intertex Internet Gate. Below two different setups are described. Also, please

More information

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3

More information

Crash Course in Asterisk

Crash Course in Asterisk Crash Course in Asterisk Despite its name, Asterisk is no mere footnote to the IP-PBX market. The open source product is one of the most disruptive technologies in the industry. Here s what you need to

More information

Implementation of a Fully Functional VoIP Server Inside of a Campus Network

Implementation of a Fully Functional VoIP Server Inside of a Campus Network Implementation of a Fully Functional VoIP Server Inside of a Campus Network Prepared for Ronny L. Bull Lecturer, Computer Science Department SUNY Institute of Technology By Matthew Lapinski Student, NCS416

More information

Mesh Potato Small Enterprise / Campus Network. User Guide

Mesh Potato Small Enterprise / Campus Network. User Guide Mesh Potato Small Enterprise / Campus Network User Guide SECN_UserGuideV1d7d 1 SECN User Guide by T L Gillett is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Based on

More information

Quick Provisioning Guide for Third-Party PBX

Quick Provisioning Guide for Third-Party PBX Quick Provisioning Guide for Third-Party PBX Table of Contents Quick Provisioning Guide Table of Contents Chapter 1: Overview...1 Chapter 2: Asterisk Configuration...2 Creating a Phone Extension on Asterisk...2

More information

OpenVox Communication Co. LTD.

OpenVox Communication Co. LTD. OpenVox Communication Co.Ltd D110P/D110E on DAHDI User Manual Version: 2.2 OpenVox Communication Co. LTD. URL: www.openvox.cn OpenVox Communication Co.Ltd OpenVox-Best Cost Effective Asterisk Cards Address:

More information

Virtual Systems with qemu

Virtual Systems with qemu Virtual Systems with qemu Version 0.1-2011-02-08 Christian Külker Inhaltsverzeichnis 1 Image Creation 2 1.1 Preparations.................................. 2 1.2 Creating a Disk Image.............................

More information

From the command line- a user can begin Asterisk (v1.6), and access the Asterisk CLI by typing:

From the command line- a user can begin Asterisk (v1.6), and access the Asterisk CLI by typing: Alta3 Research Asterisk v1.6 Commands (as tested on Ubuntu 10.04) 2012-03-07 Note: It is assumed that users have root privileges when working from the command line. If you do not, these commands will need

More information

Table of Contents. Confidential and Proprietary

Table of Contents. Confidential and Proprietary Table of Contents About Toshiba Strata CIX and Broadvox SIP Trunking... 1 Requirements... 2 Purpose, Scope and Audience... 3 What is SIP Trunking?... 4 Business Advantages of SIP Trunking... 4 Technical

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online

IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online 1 IP PBX SD Card Slot FXO Ports PBX LAN port PBX WAN port FXO Ports LED, RED means online 2 Connect the IP PBX to Your LAN Internet PSTN Router Ethernet Switch FXO Ports 3 Access the PBX s WEB GUI The

More information

Using the GS8 Modular Gateway with Asterisk

Using the GS8 Modular Gateway with Asterisk Zed-3 501 Valley Way Milpitas CA 95035 Using the GS8 Modular Gateway with Asterisk Application note, 96-90002-02, May 2008 USA Voice: +1-408-587-9333 Fax: +1-408-586-9038 www.zed-3.com This document is

More information

Practical Guide. How to setup VoIP Infrastructure using AsteriskNOW

Practical Guide. How to setup VoIP Infrastructure using AsteriskNOW Practical Guide How to setup VoIP Infrastructure using AsteriskNOW Table of Contents 1. Background...1 2. The VoIP scenarios...2 3. Before getting started...3 3.1 Training Kits...3 3.2 Software requirements...3

More information

IP Telephony with Asterisk. Sunday A. Folayan

IP Telephony with Asterisk. Sunday A. Folayan IP Telephony with Asterisk Sunday A. Folayan There lived the PSTN. A few years ago, everyone struggled to convert data (IP) into sound, and move it over the Public Switched Telephone Network (PSTN) infrastructure

More information

Connecting Your Enterprise With Asterisk: IAX to Carriers. Dayton Turner Voxter Communications

Connecting Your Enterprise With Asterisk: IAX to Carriers. Dayton Turner Voxter Communications Connecting Your Enterprise With Asterisk: IAX to Carriers Dayton Turner Voxter Communications What is IAX? Inter Asterisk exchange Developed by Digium and the Open Source Community Alternative to SIP,

More information

Telephony System Integrator s Guide for Alcatel OmniPCX Enterprise. Citrix EasyCall Gateway 2.1Q

Telephony System Integrator s Guide for Alcatel OmniPCX Enterprise. Citrix EasyCall Gateway 2.1Q Citrix EasyCall Gateway Telephony System Integrator s Guide for Alcatel OmniPCX Enterprise Citrix EasyCall Gateway 2.1Q Copyright and Trademark Notice Use of the product documented in this guide is subject

More information

Ciphermail Gateway Separate Front-end and Back-end Configuration Guide

Ciphermail Gateway Separate Front-end and Back-end Configuration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Separate Front-end and Back-end Configuration Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction

More information

Net/FSE Installation Guide v1.0.1, 1/21/2008

Net/FSE Installation Guide v1.0.1, 1/21/2008 1 Net/FSE Installation Guide v1.0.1, 1/21/2008 About This Gu i de This guide walks you through the installation of Net/FSE, the network forensic search engine. All support questions not answered in this

More information

Kerio Operator. Administrator s Guide. Kerio Technologies

Kerio Operator. Administrator s Guide. Kerio Technologies Kerio Operator Administrator s Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio Operator, version 1.1.1. All additional modifications

More information