VOIP. Technology, Security Threats & Countermeasures. Jaydip Sen. Innovation Lab Tata Consultancy Services, Kolkata

Size: px
Start display at page:

Download "VOIP. Technology, Security Threats & Countermeasures. Jaydip Sen. Innovation Lab Tata Consultancy Services, Kolkata"

Transcription

1 VOIP Technology, Security Threats & Countermeasures Jaydip Sen Innovation Lab Tata Consultancy Services, Kolkata

2 Migration to the Integrated World Mobile Voice Fixed Voice Converged Voice End-to-end Solutions (IP) Data Communications Time

3 What is IP (Internet Protocol)? IP is the language that computers use to communicate over the Internet IP is the transmission mode that is expected to be used in the future for both voice and data IP enables today s services to be implemented over the same access (e.g. telephony and Internet access) IP enables multiple services to share the one network

4 Broadband (IP) Telephony Broadband telephony is speech/voice that is packaged and transmitted partly or entirely over IP-based networks The concept of broadband telephony is the sum of: Voice Over IP Internet telephony Related value-added services Full-featured broadband telephony uses IP technology both for voice transmission and for value-added services Broadband telephony is in the first place a follow-on product of data communications solutions Broadband telephony requires a broadband connection

5 Evolution of Voice Telephony Products Fixed access IP Broadband telephony Digital AXE IP GPRS IP 3G Analog AGF Analog NMT Digital GSM Mobile access

6 Convergence of Fixed and Mobile Voice POTS = access line VOIP = SIP server account Mobile = HLR account VOIP Mobile SIP- client = SIM card IP coverage Radio coverage All devices can or will be wireless

7 Prerequisites, Business Model, Time Frame Prerequisites Broadband penetration Established standards Customer needs Business model IP will generate a new logic over time Start from where you are convergence may be the best of both worlds Time frame It may be a long time before IP takes over completely

8 Broadband vs. Conventional Telephony Reliability Prioritization of voice packets Combining different networks Power dependency Broadband telephony doesn t work if the power is off at the customer Ability to reach alarm numbers Position information Standards Terminals Services/networks

9 Business People Needs Integrated Services Communicate with other people Telephone Voic , sms, mms Plan and organize your work Telephone Calendar Contacts Do business Telephone E-business CRM Supply Chain mgmt Stay informed Telephone Web search News, Collaborate with other people Telephone meeting Video meeting e-meeting Project management tools

10 The VOIP Funnel Business Customers Business case Standards Lab Branch office (where to start) Network management QoS Full scale Scale up to corporate level First full implementations First pilots TRENDS Classic Centrex Classic PBX IP Centrex IP PBX

11 Individual Customer Needs Connectivity with control Need to be in touch Voice is still the killer application Need to control accessibility Want to be reachable but need to control access based on user situations Need to stay informed Need to know what is going on around them E.g. after 9/11, increased need for security Greater capabilities for: Personal telephony Communications Mobility

12 Broadband Telephony SIP (Session Initiation Protocol) A standard that is establishing itself Other parties can provide services Functionality Telephony as software in a PC Simple to download Adapter or separate phone required to talk via receiver Personal phone number SIP address @telia.com which can be an address Capabilities Call control Availability information Chat Video calls

13 What is VoIP? A suite of IP-based communications services Provides multimedia communications over IP networks Based on open IETF and ITU standards Operates over any IP network (not just the Internet) Utilizes separate paths for signaling and media Low-cost alternative to PSTN calling

14 Cost Toll bypass for on-net calling Reduced network costs Lower move/add/delete (MAD) costs Reduced site preparation time Network convergence Functionality Enterprise directory integration Unified Messaging Call center applications Interactive Voice Response (IVR) IP Video Instant Messaging The Business Value of VoIP Mobility Location services (Find-Me/Follow-Me routing) Wider array of service providers Ubiquitous access

15 PSTN vs VoIP Public Switched Telephone Network (PSTN) SS7 signaling protocol Circuit-switched network (ATM/Frame Relay) Expensive infrastructure Reliable quality Voice Over IP (VoIP) SIP, H.323, SCCP, MGCP, or MegaCo signaling protocol RTP media protocol Packet switched network Converged infrastructure Unreliable quality

16 VoIP Protocols SIP RFC 3261 The Session Initiation Protocol (SIP) is an application-layer control (signaling) protocol for creating, modifying and terminating sessions with one or more participants. Text based messaging Modeled on HTTP Uses URI to address call flow components INVITE SIP/2.0 Via: SIP/2.0/UDP pc33.atlanta.com;branch=z9hg4bk776asdhds Max-Forwards: 70 To: Bob From: Alice Call-ID: CSeq: INVITE Contact: Content-Type: application/sdp Content-Length: 142 Versatile and open with many applications Voice Video Gaming Instant Messages Presence Call-Control

17 SIP Methods INVITE: create a session BYE: terminates a session ACK: acknowledges a final response for an INVITE request CANCEL: cancels an INVITE request REGISTER: binds a public SIP URI to a Contact address OPTIONS: queries a server for capabilities SUBSCRIBE: installs a subscription for a resource NOTIFY: informs about changes in the state of the resource MESSAGE: delivers an Instant Message REFER: used for call transfer, call diversion, etc. PRACK: acknowledges a provisional response for an INVITE request UPDATE: changes the media description (e.g. SDP) in an existing session INFO: used to transport mid-session information PUBLISH: publication of presence information

18 SIP Components User Agents Clients Make requests Servers Accept requests Server types Redirect Server Proxy Server Registrar Server Location Server Gateways

19 Session Description Protocol (SDP) SDP IETF RFC 2327 SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation. SDP includes: The type of media (video, audio, etc.) The transport protocol (RTP/UDP/IP, H.320, etc.) The format of the media (H.261 video, MPEG video, etc.) Information to receive those media (addresses, ports, formats, etc) Crypto keys v=0 o=mhandley IN IP s=sdp Seminar i=a Seminar on the session description protocol u= (Mark Handley) c=in IP /127 t= a=recvonly m=audio RTP/AVP 0 m=video RTP/AVP 31 m=application udp wb a=orient:portrait

20 Media Protocols RTP Real-time Transport Protocol RFC 3550 Standardized packet format for delivering audio and video over IP Frequently used in streaming media systems CODECs GIPS Enhanced G.711 8kHz sampling rate Voice Activity Detection Variable bit rate G.711 8kHz sampling rate 64kbps G.729 8kHz sampling rate 8kbps Voice Activity Detection

21 SIP Call Flow Outbound Proxy Inbound Proxy BYE INVITE BYE INVITE 180 Ringing 100 Trying 200 OK 100 Trying 200 OK 180 Ringing BYE INVITE 200 OK 180 Ringing ACK Alice Alice Calls Bob Is Bob there? RTP Voice Bob Hello. No. I need Bob. Thanks. Bye. Steve answers Bob s phone Sorry, no, can I help you

22 SIP Standards A sampling of SIP RFCs RFC3261 Core SIP specification obsoletes RFC2543 RFC2327 SDP Session Description Protocol RFC1889 RTP - Real-time Transport Protocol RFC2326 RTSP - Real-Time Streaming Protocol RFC3262 SIP PRACK method reliability for 1XX messages RFC3263 Locating SIP servers SRV and NAPTR RFC3264 Offer/answer model for SDP use with SIP RFC3265 SIP event notification SUBSCRIBE and NOTIFY RFC3266 IPv6 support in SDP RFC3311 SIP UPDATE method eg. changing media RFC3325 Asserted identity in trusted networks RFC3361 Locating outbound SIP proxy with DHCP RFC3428 SIP extensions for Instant Messaging RFC3515 SIP REFER method eg. call transfer

23 Complexities of VOIP Architecture Copied from NSA Security Guidance for Deploying IP Telephony Systems, Report Number: I R-2005

24 VOIP Security Threats Robert Wood

25 Most Common VOIP Security Mistakes 1. Treating VOIP security the same way as Network security 2. Not treating VOIP security the same way as Network Security How it s the Same How it s Different Uses mostly the same protocols Uses mostly the same Operating Systems Many of the same threats What we Commonly See Some unique protocols Traditional Security devices (IDS/Firewalls can disrupt service) People treat it like the old phone system! Segmentation without monitoring Improperly configured systems Little device hardening Little understanding of privacy threats No regular security assessments ON the VOIP segment

26 VOIP Threat Taxonomy Social Threats Misrepresentation Identity Authority Rights Content Theft of Services VoIP Threats Unwanted Contact Harassment Extortion Unwanted Lawful Content (spam and other offensive material) Eavesdropping Call Pattern Tracking Traffic Capture Number Harvesting Call Reconstruction (voice, video, fax, text, voic )

27 VoIP Threats VOIP Threat Taxonomy Interception and Modification Call Black Holing Call Rerouting Fax Alteration Conversation Alteration Conversation Degradation Conversation Impersonation and Hikacking False Caller Identification Service Abuse Denial of Service VoIP Specific DoS Request Flooding Malformed Requests and Messages QoS Abuse Spoofed Messages Call Hijacking Network Services DoS Underlying Operating System/Firmware DoS Distributed DoS (DDoS) Physical Intrusion

28 VoIP Threats VOIP Threat Taxonomy Other Disruptions of Service Loss of Power Resource Exhaustion Performance Latency and Metrics

29 Summary of VOIP Risks? Service Disruption or Denial of Service Theft of Service or Data Infrastructure Attacks Voice SPAM (Vishing, Mailbox Stuffing, Unsolicited Calling) Call Hijacking and Spoofing Call Eavesdropping or recording Voic Hacking Every other network and system vulnerability not unique to VOIP!

30 Threat Model for VOIP Systems Voice Mail VOIP Environment VOIP Network Gateway VOIP Application Layer Supporting Applications Layer Configuration Databases IP Phones Firewall Fax SBC Call Manager Servers HW Platform, OS VOIP Protocol Layer Signaling and Transfer Protocols Facility/Infrastructure

31 What are the Threat Vectors? OS Exploits Signaling Attacks Endpoint Admin Privilege Exploits Proxy Impersonation Real Time Protocol (RTP) Attacks VoIP Wiretapping VoWiFi Attacks DoS Attacks Spam for Internet Telephony (SPIT) IP PBX and Telephony Server Exploits Vishing (VoIP Phishing)

32 Who are You Protecting Against? Malicious Attack Unintentional Exposure Intentional Exposure Risk is Irrelevant of Intent

33 Specialized Hacking Tools SIPScan - enumerate SIP interfaces TFTPBrute - TFTP directory attacking UDP and RTP Flooder - DoS tools hping2 TCP session flooding Registration Hijacker - tool to take over H.323 session SIVUS - SIP authentication and registration auditor Vomit - RTP Playback VOIP HOPPER IP Phone mimicing tool LDAPMiner - collect ldap directory information Dsniff - various utilitarian tools (macof and arpspoof) Wireshark (Ethereal) / tcpdump - packet capture and protocol analysis

34 Hardware Can be Gussed "Your call is being answered by Audix. [USER'S NAME] {is not available... to leave a message wait for the tone, is busy... to leave a message wait for the tone}." "[USER'S NAME] {is on the phone, is unavailable} Please leave your message after the tone. When done, hang up or press the pound key." "Record your message at the tone. When you are finished, hang up or hold for more options."

35 DDoS Attack? call

36 Toll Fraud Hacker sells your company calling information Your company gets the bill

37 Call Manager OS

38 Call Manager OS?

39 Call Forwarding/Spoofing? call

40 Expose Private Conversations! call

41 Block Certain Calls?

42 Log Call Activity call

43 Hijacking/Injection Attack call

44 Call Forwarding/Spoofing call

45 Call Forwarding/Spoofing call

46 Eavesdropping Outbound Proxy Inbound Proxy SIP Kevin Yak Alice RTP Bob Yak DTMF intercept IM snooping Call pattern analysis Number harvesting Network discovery Voice reconstruction Fax reconstruction Video reconstruction

47 Spoofing Outbound Proxy Inbound Proxy SIP BYE BYE Alice RTP Bob Hello? Yak Kevin Hello? Yak Kevin forges a BYE from Alice

48 Recording call

49 Interception Outbound Proxy Inbound Proxy 202 BYE Accepted SIP 202 Accepted INVITE BYE 200 REFER OK BYE 202 Accepted INVITE REFER Alice 200 OK RTP Bob Yak Kevin Hello? Yak Yak Kevin forges a REFER from Bob

50 Key Mitigation Strategies Create VOIP Specific Security Policies Segmentation as appropriate Restrict logical network access to critical servers and VoIP call processors Utilize separate VLANs for voice and data Device Hardening Do not use default passwords Turn off unnecessary services Apply vendor supplied patches in a timely manner Perform vendor installation security checklist to harden applications Perform Security Assessments on and against the VOIP infrastructure Apply Appropriate Encryption

51 Key Mitigation Strategies Utilize VoIP aware Firewalls, Intrusion Prevention Systems (IPS) and Session Border Controllers (SBC) when possible Utilize end-to-end QoS Continue to protect against traditional system attacks (Toll Fraud, Modem Security, Social Networking Attacks & etc.)

52 Security Solutions Robert Wood

53 Network Solutions: Security Policy Establish a corporate security policy Acceptable Use Policy Analog/Dial-in/ISDN Line Policy Anti-Virus Process Policy Automatic Forwarding Usage Retention Ethics Policy Password Protection Policy Patch Management Process Router Security Policy Server Security Policy Risk Assessment Policy VPN Security Policy Wireless Security Policy GISFI # 2, Allahabad, September 17, 2010

54 Security Solutions: Network Network Design by Cisco Systems

55 Security Solutions: DoS & DDoS Provide redundancy through: Mesh Corporate WAN design Utilizing multiple ISPs Fallback PSTN Gateway(s) Uninterruptible Power Supplies Negotiate QoS agreements

56 Security Solutions: Hacking Segment networks into separate VLANs Voice network Data network Monitoring and control network

57 Security Solutions: Hacking Maintain VoIP application server updates Call manager server(s) Voic server(s) Gateway server(s) Install current Operating System patches Install current application software patches

58 Security Solutions: Spoofing Eliminate unknown devices DHCP Snooping DAI: Dynamic Address Resolution Protocol Inspection IP Source Guard Eliminate unknown software Digital Signatures

59 Security Solutions: Threats Manage and prevent threats via: Stateful Firewalls Virus Filters Intrusion Detection (NIDS) Intrusion Prevention (HIPS) Filter unnecessary ports on: Routers Switches PCs IP Telephones Firewalls

60 Security Solutions: Complete

61 Network Diagram Legend

62 Summary of Countermeasures Authentication and Encryption Digest Authentication Used during UA registration Authenticates UA to SIP proxy Similar to HTTP digest from web browser to web server Cannot be used between proxies Transport Layer Security (TLS) Used to secure signaling path Authenticates each endpoint on a link Provides encrypted path between each link Non-transitive trust Can be used between proxies Requires X.509 certificates

63 Summary of Countermeasures Authentication and Encryption Secure RTP (SRTP) Used to secure the media path Provides end-to-end security Requires X.509 certificates Zphone (ZRTP) Used to secure the media path Provides end-to-end security IETF draft written by Phil Zimmermann Requires no X.509 certificates Relies on OSI layer 8 authorization

64 Physical Security Summary of Countermeasures VoIP equipment in secured datacenter Lock wiring closet doors VoIP VLANs = Good Separate VoIP network = Better Separate VoIP network + Authentication + Encryption = Best! Logical Security CIS Benchmarks applied to all host platforms Regular patching and assessments Network IDS Firewall and NAT protection of gateway and proxies

65 Conclusion VOIP will lead to convergence of voice and data into a common infrastructure for wiring, routers, network connectivity. Companies will be able to deploy, manage and maintain one network to serve all communication needs, saving on infrastructure costs and resources. With VoIP the Internet becomes the backbone of a company s phone network. This leads to a number of threats: Hackers Worms Viruses DoS attacks The challenge of VoIP security is not new. History has shown that advances and trends in information technology typically outpace the corresponding realistic security requirements. Such requirements are often tackled only after these technologies have been widely adopted and deployed Cable Datacom News

66 Thank You! 66

Media Communications Internet Telephony and Teleconference

Media Communications Internet Telephony and Teleconference Lesson 13 Media Communications Internet Telephony and Teleconference Scenario and Issue of IP Telephony Scenario and Issue of IP Teleconference ITU and IETF Standards for IP Telephony/conf. H.323 Standard

More information

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP). This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,

More information

VoIP Security Threat Analysis

VoIP Security Threat Analysis 2005/8/2 VoIP Security Threat Analysis Saverio Niccolini, Jürgen Quittek, Marcus Brunner, Martin Stiemerling (NEC, Network Laboratories, Heidelberg) Introduction Security attacks taxonomy Denial of Service

More information

Voice over IP (VoIP)

Voice over IP (VoIP) Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 2 Outline 1. Introduction 2. Core SIP 3. Selected Extensions 3 Introduction: Signaling vs Media Signaling: Session establishment Session tear down Changes to the session Supplementary services Media:

More information

Secure Telephony Enabled Middle-box (STEM)

Secure Telephony Enabled Middle-box (STEM) Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components

More information

Allstream NGNSIP Security Recommendations

Allstream NGNSIP Security Recommendations Allstream NGN SIP Trunking Quick Start Guide We are confident that our service will help increase your organization s performance and productivity while keeping a cap on your costs. Summarized below is

More information

SIP Trunking & Security. Dan York, CISSP VOIPSA Best Practices Chair

SIP Trunking & Security. Dan York, CISSP VOIPSA Best Practices Chair SIP Trunking & Security Dan York, CISSP VOIPSA Best Practices Chair September 2, 2009 Privacy Availability Compliance Confidence Mobility Cost Avoidance Business Continuity TDM security is relatively

More information

Ingate SIParator /Firewall SIP Security for the Enterprise

Ingate SIParator /Firewall SIP Security for the Enterprise Ingate SIParator /Firewall SIP Security for the Enterprise Ingate Systems Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?... 3 3

More information

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved. VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like

More information

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA) security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, 29.03.2006, Atlanta, GA (USA) 2006 SWITCH Content and Firewall and NAT Privacy / Encryption SpIT / Authentication Identity General

More information

INTERFACE SPECIFICATION SIP Trunking. 8x8 SIP Trunking. Interface Specification. Version 2.0

INTERFACE SPECIFICATION SIP Trunking. 8x8 SIP Trunking. Interface Specification. Version 2.0 8x8 Interface Specification Version 2.0 Table of Contents Introduction....3 Feature Set....3 SIP Interface....3 Supported Standards....3 Supported SIP methods....4 Additional Supported SIP Headers...4

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand

More information

Session Initiation Protocol (SIP) Overview

Session Initiation Protocol (SIP) Overview Session Initiation Protocol (SIP) Overview T-110.7100 Applications and Services in Internet 6.10.2009 Jouni Mäenpää NomadicLab, Ericsson Contents SIP introduction, history and functionality Key concepts

More information

Cisco ATA 191 Analog Telephone Adapter Overview

Cisco ATA 191 Analog Telephone Adapter Overview Cisco ATA 191 Analog Telephone Adapter Overview Your Analog Telephone Adapter, page 1 Your Analog Telephone Adapter The ATA 191 analog telephone adapter is a telephony-device-to-ethernet adapter that allows

More information

Real Time Protocols. Overview. Introduction. Tarik Cicic University of Oslo December IETF-suite of real-time protocols data transport:

Real Time Protocols. Overview. Introduction. Tarik Cicic University of Oslo December IETF-suite of real-time protocols data transport: Real Time Protocols Tarik Cicic University of Oslo December 2001 Overview IETF-suite of real-time protocols data transport: Real-time Transport Protocol (RTP) connection establishment and control: Real

More information

IP Possibilities Conference & Expo. Minneapolis, MN April 11, 2007

IP Possibilities Conference & Expo. Minneapolis, MN April 11, 2007 IP Possibilities Conference & Expo Minneapolis, MN April 11, 2007 Rural VoIP Protocol, Standards and Technologies Presented by: Steven P. Senne, P.E Chief Technology Officer Finley Engineering Company,

More information

Security and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California

Security and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California Security and Lawful Intercept In VoIP Networks Manohar Mahavadi Centillium Communications Inc. Fremont, California Agenda VoIP: Packet switched network VoIP devices VoIP protocols Security and issues in

More information

Multimedia Communication

Multimedia Communication Multimedia Communication Session Description Protocol SDP Session Announcement Protocol SAP Realtime Streaming Protocol RTSP Session Initiation Protocol - SIP Dr. Andreas Kassler Slide 1 SDP Slide 2 SDP

More information

Voice over IP. What You Don t Know Can Hurt You. by Darren Bilby

Voice over IP. What You Don t Know Can Hurt You. by Darren Bilby Voice over IP What You Don t Know Can Hurt You by Darren Bilby What is VoIP? Voice over Internet Protocol A method for taking analog audio signals, like the kind you hear when you talk on the phone, and

More information

Session Initiation Protocol (SIP) Overview

Session Initiation Protocol (SIP) Overview Session Initiation Protocol (SIP) Overview T-110.7100 Applications and Services in Internet 5.10.2010 Jouni Mäenpää NomadicLab, Ericsson Research Contents SIP introduction, history and functionality Key

More information

Department of Computer Science. Burapha University 6 SIP (I)

Department of Computer Science. Burapha University 6 SIP (I) Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important

More information

Voice Over IP. How technology has taken a step back?

Voice Over IP. How technology has taken a step back? Voice Over IP How technology has taken a step back? Today is 22 nd December. Who I am? What I do? (next slide) What is the tumult all about? How do I think that technology has taken a step back? Who am

More information

Overview of the Session Initiation Protocol

Overview of the Session Initiation Protocol CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between Sotel IP Services SIP Edge Advanced SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue

More information

Setting Up a Mitel SX-2000 Digital PIMG Integration with Cisco Unity Connection

Setting Up a Mitel SX-2000 Digital PIMG Integration with Cisco Unity Connection Up a Mitel SX-2000 Digital PIMG Integration with Cisco Unity Connection Up a Mitel SX-2000 Digital PIMG Integration, page 1 Up a Mitel SX-2000 Digital PIMG Integration Task List for Mitel SX-2000 PIMG

More information

Setting up Alcatel 4400 Digital PIMG Integration

Setting up Alcatel 4400 Digital PIMG Integration up Alcatel 4400 Digital PIMG Integration with Cisco Unity Connection Up an Alcatel 4400 Digital PIMG Integration with Cisco Unity Connection, on page 1 Up an Alcatel 4400 Digital PIMG Integration with

More information

Setting Up an Alcatel 4400 Digital PIMG Integration with Cisco Unity Connection

Setting Up an Alcatel 4400 Digital PIMG Integration with Cisco Unity Connection up Alcatel 4400 Digital PIMG Integration with Cisco Unity Connection Up an Alcatel 4400 Digital PIMG Integration with Cisco Unity Connection, page 1 Up an Alcatel 4400 Digital PIMG Integration with Cisco

More information

White Paper. SIP Trunking: Deployment Considerations at the Network Edge

White Paper. SIP Trunking: Deployment Considerations at the Network Edge SIP Trunking: Deployment Considerations at the Network Edge at the Network Edge Executive Summary The move to Voice over IP (VoIP) and Fax over IP (FoIP) in the enterprise has, until relatively recently,

More information

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model 1. Description of Services. 1.1 SIP SBC with Field Trial Endpoint Deployment Verizon will assist

More information

Security for SIP-based VoIP Communications Solutions

Security for SIP-based VoIP Communications Solutions Tomorrow Starts Today Security for SIP-based VoIP Communications Solutions Enterprises and small to medium-sized businesses (SMBs) are exposed to potentially debilitating cyber attacks and exploitation

More information

This is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett.

This is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett. This is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett. For more information or to buy the paperback or ebook editions, visit

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between the PAETEC Broadsoft based SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1.0 Abstract

More information

Ingate Firewall & SIParator Product Training. SIP Trunking Focused

Ingate Firewall & SIParator Product Training. SIP Trunking Focused Ingate Firewall & SIParator Product Training SIP Trunking Focused Common SIP Applications SIP Trunking Remote Desktop Ingate Product Training Common SIP Applications SIP Trunking A SIP Trunk is a concurrent

More information

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling

More information

IPNext 187 Hybrid IP-PBX System High-performance Hybrid IP-PBX Solution

IPNext 187 Hybrid IP-PBX System High-performance Hybrid IP-PBX Solution IPNext 187 Hybrid IP-PBX System High-performance Hybrid IP-PBX Solution IP-PBX Features www.addpac.com AddPac Technology 2011, Sales and Marketing Contents IP-PBX Features Smart Multimedia Manager VoIP

More information

Understanding SIP exchanges by experimentation

Understanding SIP exchanges by experimentation Understanding SIP exchanges by experimentation Emin Gabrielyan 2007-04-10 Switzernet Sàrl We analyze a few simple scenarios of SIP message exchanges for a call setup between two SIP phones. We use an SIP

More information

Chapter 3: IP Multimedia Subsystems and Application-Level Signaling

Chapter 3: IP Multimedia Subsystems and Application-Level Signaling Chapter 3: IP Multimedia Subsystems and Application-Level Signaling Jyh-Cheng Chen and Tao Zhang IP-Based Next-Generation Wireless Networks Published by John Wiley & Sons, Inc. January 2004 Outline 3.1

More information

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels Network Security - ISA 656 Voice Over IP (VoIP) Security Simple SIP ing Alice s Bob Session Initiation Protocol Control channel for Voice over IP (Other control channel protocols exist, notably H.323 and

More information

Analysing Protocol Implementations

Analysing Protocol Implementations Analysing Protocol Implementations Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister and Arne-Kristian Groven The 5th Information Security Practice and Experience Conference (ISPEC 2009) Xi'an, China

More information

Firewalls for Secure Unified Communications

Firewalls for Secure Unified Communications Firewalls for Secure Unified Communications Positioning Guide 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 12 Firewall protection for call control

More information

Leveraging Amazon Chime Voice Connector for SIP Trunking. March 2019

Leveraging Amazon Chime Voice Connector for SIP Trunking. March 2019 Leveraging Amazon Chime Voice Connector for SIP Trunking March 2019 Notices Customers are responsible for making their own independent assessment of the information in this document. This document: (a)

More information

Unified Communications Manager Express Toll Fraud Prevention

Unified Communications Manager Express Toll Fraud Prevention Unified Communications Manager Express Toll Fraud Prevention Document ID: 107626 Contents Introduction Prerequisites Requirements Components Used Conventions Overview Internal vs. External Threats Toll

More information

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network 10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity

More information

SIPPING Working Group A. Johnston, Ed. Internet-Draft Avaya Intended status: BCP R. Sparks Expires: January 12, 2009 Estacado Systems C. Cunningham S.

SIPPING Working Group A. Johnston, Ed. Internet-Draft Avaya Intended status: BCP R. Sparks Expires: January 12, 2009 Estacado Systems C. Cunningham S. SIPPING Working Group A. Johnston, Ed. Internet-Draft Avaya Intended status: BCP R. Sparks Expires: January 12, 2009 Estacado Systems C. Cunningham S. Donovan Cisco Systems K. Summers Sonus July 11, Status

More information

Implementing Cisco Voice Communications & QoS (CVOICE) 8.0 COURSE OVERVIEW: WHO SHOULD ATTEND: PREREQUISITES: Running on UC 9.

Implementing Cisco Voice Communications & QoS (CVOICE) 8.0 COURSE OVERVIEW: WHO SHOULD ATTEND: PREREQUISITES: Running on UC 9. Implementing Cisco Voice Communications & QoS (CVOICE) 8.0 COURSE OVERVIEW: Running on UC 9.x Software Implementing Cisco Voice Communications and QoS (CVOICE) v8.0 is a 5-day training program that teaches

More information

Application Notes for Configuring SIP Trunking between Cincinnati Bell Any Distance evantage and Avaya IP Office Issue 1.0

Application Notes for Configuring SIP Trunking between Cincinnati Bell Any Distance evantage and Avaya IP Office Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between Cincinnati Bell Any Distance evantage and Avaya IP Office Issue 1.0 Abstract These Application Notes describe

More information

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures

More information

S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN. Antti Keurulainen,

S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN. Antti Keurulainen, S-72.333 Postgraduate Course in Radio Communications. Application Layer Mobility in Antti Keurulainen, 13.5.2004 antti.keurulainen@bitville.fi The Mobility Concepts is Link layer Mobility Network layer

More information

Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1.

Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1.1 Abstract These Application

More information

Application Scenario 1: Direct Call UA UA

Application Scenario 1: Direct Call UA UA Application Scenario 1: Direct Call UA UA Internet Alice Bob Call signaling Media streams 2009 Jörg Ott 1 tzi.org INVITE sip:bob@foo.bar.com Direct Call bar.com Note: Three-way handshake is performed only

More information

A survey of SIP Peering

A survey of SIP Peering A survey of SIP Peering Lars Strand (presenter) and Wolfgang Leister NATO ASI ARCHITECTS OF SECURE NETWORKS (ASIGE10) 17-22 May 2010 Switchboard operators Problem: Scalability the New York Telephone

More information

New and Current Approaches for Secure VoIP Service

New and Current Approaches for Secure VoIP Service New and Current Approaches for Secure VoIP Service H. Hakan Kılınç, Uğur Cağal Netas, Cyber Security Department, Istanbul hakank@netas.com.tr, ucagal@netas.com.tr Abstract: The current telecom technology

More information

Modern IP Communication bears risks

Modern IP Communication bears risks Modern IP Communication bears risks How to protect your business telephony from cyber attacks Voice-over-IP (VoIP) provides many new features over PSTN. However, the interconnection with your IT infrastructure

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho Telecommunication Services Engineering Lab 1 Roch H. Glitho Telecommunication Services Engineering Lab Multimedia Sessions Session Initiation Protocol (SIP) Conferencing Basics An advanced conferencing

More information

SIP as an Enabling Technology

SIP as an Enabling Technology SIP as an Enabling Technology SIP and VoIP Fundamentals Mike Taylor - CTO spscom.com 888.777.7280 Strategic Products and Services / 300 Littleton Road / Parsippany, NJ 07054 Agenda What is SIP? Acceptance

More information

Conducting an IP Telephony Security Assessment

Conducting an IP Telephony Security Assessment Conducting an IP Telephony Security Assessment Mark D. Collier Chief Technology Officer mark.collier@securelogix.com www.securelogix.com Presentation Outline Ground rules and scope Discovery Security policy

More information

Cisco Unified Communications Manager Trunks

Cisco Unified Communications Manager Trunks CHAPTER 2 A trunk is a communications channel on Cisco Unified Communications Manager (Cisco Unified CM) that enables Cisco Unified CM to connect to other servers. Using one or more trunks, Cisco Unified

More information

Request for Comments: Category: Standards Track Columbia U. G. Camarillo Ericsson A. Johnston WorldCom J. Peterson Neustar R.

Request for Comments: Category: Standards Track Columbia U. G. Camarillo Ericsson A. Johnston WorldCom J. Peterson Neustar R. Network Working Group J. Rosenberg Request for Comments: 3261 dynamicsoft Obsoletes: 2543 H. Schulzrinne Category: Standards Track Columbia U. G. Camarillo Ericsson A. Johnston WorldCom J. Peterson Neustar

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

Vulnerabilities in Dual-mode / Wi-Fi Phones

Vulnerabilities in Dual-mode / Wi-Fi Phones Vulnerabilities in Dual-mode / Wi-Fi Phones 8/2/07 Sachin Joglekar Vulnerability Research Lead 1 Outline (Total 60-70 min) Introduction (7 min) Protocol Stack (7 min) Current State of Security Features

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

Understanding Cisco Unified Communications Security

Understanding Cisco Unified Communications Security Cisco Support Community Presents Tech-Talk Series Understanding Cisco Unified Communications Security Akhil Behl Solutions Architect, akbehl@cisco.com Author of Securing Cisco IP Telephony Networks 2010

More information

NEC: SIP Trunking Configuration Guide V.1

NEC: SIP Trunking Configuration Guide V.1 NEC: SIP Trunking Configuration Guide V.1 FOR MORE INFO VISIT: CALL US EMAIL US intermedia.net +1.800.379.7729 sales@intermedia.net 2 NEC: SIP Trunking Configuration Guide V.1 TABLE OF CONTENTS Introduction...

More information

CS519: Computer Networks. Lecture 9: May 03, 2004 Media over Internet

CS519: Computer Networks. Lecture 9: May 03, 2004 Media over Internet : Computer Networks Lecture 9: May 03, 2004 Media over Internet Media over the Internet Media = Voice and Video Key characteristic of media: Realtime Which we ve chosen to define in terms of playback,

More information

Session Border Controller

Session Border Controller CHAPTER 14 This chapter describes the level of support that Cisco ANA provides for (SBC), as follows: Technology Description, page 14-1 Information Model Objects (IMOs), page 14-2 Vendor-Specific Inventory

More information

Request for Comments: 4083 Category: Informational May 2005

Request for Comments: 4083 Category: Informational May 2005 Network Working Group M. Garcia-Martin Request for Comments: 4083 Nokia Category: Informational May 2005 Input 3rd-Generation Partnership Project (3GPP) Release 5 Requirements on the Session Initiation

More information

Real-time Communications Security and SDN

Real-time Communications Security and SDN Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,

More information

Application Notes for Configuring SIP Trunking between CenturyLink SIP Trunk (Legacy Qwest) Service and Avaya IP Office R8.0 (16) Issue 1.

Application Notes for Configuring SIP Trunking between CenturyLink SIP Trunk (Legacy Qwest) Service and Avaya IP Office R8.0 (16) Issue 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between CenturyLink SIP Trunk (Legacy Qwest) Service and Avaya IP Office R8.0 (16) Issue 1.0 Abstract These Application

More information

EP502/EP504 IP PBX 1.1 Overview

EP502/EP504 IP PBX 1.1 Overview 1.1 Overview The EP502/EP504 is an embedded Voice over IP (VoIP) Server with Session Initiation Protocol (SIP) to provide IP extension phone connection for global virtual office of small-to-medium business

More information

Application Notes for Avaya IP Office Release 8.0 with AT&T Business in a Box (BIB) over IP Flexible Reach Service Issue 1.0

Application Notes for Avaya IP Office Release 8.0 with AT&T Business in a Box (BIB) over IP Flexible Reach Service Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office Release 8.0 with AT&T Business in a Box (BIB) over IP Flexible Reach Service Issue 1.0 Abstract These Application Notes

More information

Unified Communications Threat Management (UCTM) Secure Communications and Collaborations

Unified Communications Threat Management (UCTM) Secure Communications and Collaborations Secure Cloud Communication and Collaboration. Overview The emergence of IP Voice, Video, Unified Communication and Collaborations (UC&C) technology and applications are causing a fundamental shift in the

More information

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide 28 May 2009 3Com VCX Connect Solution SIP Trunking Table of Contents 1 3COM VCX CONNECT AND INGATE... 1 1.1 SIP TRUNKING SUPPORT...

More information

Best Practices for VoIP Security

Best Practices for VoIP Security Best Practices for VoIP Security Agenda A brief introduction to REDCOM A short history of phone system hacking VoIP overview VoIP vulnerabilities VoIP Security Standards Risk mitigation methods Conclusion

More information

EarthLink Business SIP Trunking. Toshiba IPEdge 1.6 Customer Configuration Guide

EarthLink Business SIP Trunking. Toshiba IPEdge 1.6 Customer Configuration Guide EarthLink Business SIP Trunking Toshiba IPEdge 1.6 Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0

More information

Security Assessment Checklist

Security Assessment Checklist Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment

More information

Application Note. ShoreTel / Ingate / Verizon Business SIP Trunking. 09 June 2017 Version 1 Issue 2

Application Note. ShoreTel / Ingate / Verizon Business SIP Trunking. 09 June 2017 Version 1 Issue 2 Product: ShoreTel Ingate Verizon Business I n n o v a t i o n N e t w o r k A p p N ote TPP-10466 Date: October, 2012 System version: ShoreTel 13.x Application e ShoreTel / Ingate / Verizon Business SIP

More information

EarthLink Business SIP Trunking. Allworx 6x IP PBX SIP Proxy Customer Configuration Guide

EarthLink Business SIP Trunking. Allworx 6x IP PBX SIP Proxy Customer Configuration Guide EarthLink Business SIP Trunking Allworx 6x IP PBX SIP Proxy Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed

More information

The Session Initiation Protocol

The Session Initiation Protocol The Session Initiation Protocol Report August 2003 2003 Meridea Financial Software Ltd All rights reserved. No part of this document may be copied or otherwise reproduced in any form without prior written

More information

IMPLEMENTING CISCO VOICE COMMUNICATIONS AND QOS

IMPLEMENTING CISCO VOICE COMMUNICATIONS AND QOS IMPLEMENTING CISCO VOICE COMMUNICATIONS AND QOS V8.0 (CVOICE) COURSE OVERVIEW: Implementing Cisco Voice Communications and QoS (CVOICE) teaches students about voice gateways, characteristics of VoIP call

More information

Q&As. Implementing Cisco Collaboration Devices v1.0. Pass Cisco Exam with 100% Guarantee

Q&As. Implementing Cisco Collaboration Devices v1.0. Pass Cisco Exam with 100% Guarantee 210-060 Q&As Implementing Cisco Collaboration Devices v1.0 Pass Cisco 210-060 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back

More information

Application Notes for Configuring SIP Trunking between Global Crossing SIP Trunking Service and an Avaya IP Office Telephony Solution Issue 1.

Application Notes for Configuring SIP Trunking between Global Crossing SIP Trunking Service and an Avaya IP Office Telephony Solution Issue 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between Global Crossing SIP Trunking Service and an Avaya IP Office Telephony Solution Issue 1.0 Abstract These

More information

Telecommunications Glossary

Telecommunications Glossary Telecommunications Glossary API - Application Programming Interface. An API allows two applications to communicate. It's what enables data to be seamlessly distributed to different applications on different

More information

Setting Up a Serial (SMDI, MCI, or MD-110) PIMG Integration with Cisco Unity Connection

Setting Up a Serial (SMDI, MCI, or MD-110) PIMG Integration with Cisco Unity Connection CHAPTER 11 Setting Up a Serial (SMDI, MCI, or MD-110) PIMG Integration with Cisco Unity Connection For detailed instructions for setting up a serial (SMDI, MCI, or MD-110) PIMG integration with Cisco Unity

More information

SIP Trunk design and deployment in Enterprise UC networks

SIP Trunk design and deployment in Enterprise UC networks SIP Trunk design and deployment in Enterprise UC networks Tony Mulchrone Technical Marketing Engineer Cisco Collaboration Technology Group Objectives of this session a) Provide a quick overview of SIP

More information

become a SIP School Certified Associate endorsed by the Telecommunications Industry Association (TIA)

become a SIP School Certified Associate endorsed by the Telecommunications Industry Association (TIA) SSCA Certification become a SIP School Certified Associate endorsed by the Telecommunications Industry Association (TIA) Exam Objectives The SSCA exam is designed to test your skills and knowledge on the

More information

NGN: Carriers and Vendors Must Take Security Seriously

NGN: Carriers and Vendors Must Take Security Seriously Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Avaya Aura Communication Manager 5.2.1, Avaya Aura Session Manager 6.1 and Avaya Aura Session Border Controller 6.0.3 with AT&T IP Toll

More information

Session Initiation Protocol (SIP) Ragnar Langseth University of Oslo April 26th 2013

Session Initiation Protocol (SIP) Ragnar Langseth University of Oslo April 26th 2013 Session Initiation Protocol (SIP) Ragnar Langseth University of Oslo April 26th 2013 Overview SIP Basic principles Components Message flow Mobility in SIP Personal Mobility Terminal Mobility Pre-call Mid-call

More information

AP-SAV100 Analog Voice Intercom

AP-SAV100 Analog Voice Intercom AP-SAV100 Analog Voice Intercom IP Gateway High Performance IP Extension Solution for Legacy Analog Door Phone www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification

More information

Inspection for Voice and Video Protocols

Inspection for Voice and Video Protocols CTIQBE Inspection The following topics explain application inspection for voice and video protocols. For basic information on why you need to use inspection for certain protocols, and the overall methods

More information

Non. Interworking between SIP and H.323, MGCP, Megaco/H.248 LS'LDORJ,QF 7HFKQRORJ\ 'ULYH 6XLWH 3KRQH )D[

Non. Interworking between SIP and H.323, MGCP, Megaco/H.248 LS'LDORJ,QF 7HFKQRORJ\ 'ULYH 6XLWH 3KRQH )D[ Non Interworking between SIP and H.323, MGCP, Megaco/H.248 7HFKQRORJ\ 'ULYH 6XLWH 3KRQH )D[ 6DQ -RVH &$ 86$ 85/ ZZZLSGLDORJFRP Joon Maeng Jörg Ott jmaeng@ipdialog.com jo@ipdialog.com The Starting Point

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) Session Initiation Protocol (SIP) Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices A part

More information

Cisco SPA Line IP Phone Cisco Small Business

Cisco SPA Line IP Phone Cisco Small Business Cisco SPA 301 1-Line IP Phone Cisco Small Business Basic, Affordable, IP Phone for Business or Home Office Highlights Basic 1-line business-class IP phone Connects directly to an Internet telephone service

More information

EarthLink Business SIP Trunking. ShoreTel 14.2 IP PBX Customer Configuration Guide

EarthLink Business SIP Trunking. ShoreTel 14.2 IP PBX Customer Configuration Guide EarthLink Business SIP Trunking ShoreTel 14.2 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0

More information

Multimedia Applications. Classification of Applications. Transport and Network Layer

Multimedia Applications. Classification of Applications. Transport and Network Layer Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management

More information

Application Notes for Configuring SIP Trunking between TelePacific SmartVoice SIP Connect and an Avaya IP Office Telephony Solution 1.

Application Notes for Configuring SIP Trunking between TelePacific SmartVoice SIP Connect and an Avaya IP Office Telephony Solution 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between TelePacific SmartVoice SIP Connect and an Avaya IP Office Telephony Solution 1.0 Abstract These Application

More information

Application Notes for Configuring Avaya IP Office 8.1 with Etisalat SIP Trunk service Issue 1.0

Application Notes for Configuring Avaya IP Office 8.1 with Etisalat SIP Trunk service Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Avaya IP Office 8.1 with Etisalat SIP Trunk service Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

Journal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč

Journal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication

More information

Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0

Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0 Abstract These Application Notes

More information