Author: Scott Beer

Remote IP Phone Security Using VPN

Using VPN (IP-Sec) is a completely different way to provide a secure VoIP solution. Using already well-established encryption tunnel technologies, a secure tunnel is created between the remote phone and the IP‑PBX. In this example, the IP‑PBX resides behind a typical network firewall. The firewall is the border element between the Internet and LAN. The

Read More »

Remote IP Phone Security with SBCs

A remote phone deployment is completely different than SIP trunking. Remote phones are dynamic in location, and require significantly more calling features. Remote phones cannot be considered as peers, since phones register for services and change IP addresses often across multiple devices and locations. Remote phones require automatic provisioning with file servers and possibly require

Read More »

Remote IP Phone Security with Firewalls

A remote phone deployment in branch offices or work-at-home employees is completely different than SIP trunking. Remote phones are dynamic in location, and require significantly more calling features. Remote phones cannot be considered as peers, as phones register for services and change IP addresses often, across multiple devices and locations.     Remote phones require

Read More »

SIP Trunk Security with Session Border Controllers

As discussed in my previous blog, SIP trunking is often a peer-to-peer connection for the primary use of delivering PSTN connectivity over VoIP, and is delivered over a couple of different methods using ITSPs and Managed Service Providers. In this blog, I’ll be addressing a Session Border Controller (SBC) element used to define the peer-to-peer

Read More »

SIP Trunk Security with Firewalls

SIP Trunking is often a peer-to-peer connection for the primary use of delivering PSTN connectivity over VoIP. SIP Trunking is delivered over a couple of different methods: Internet Telephony Service Providers (ITSP) Deliver SIP Trunking over the Internet Managed Service Providers (MSP) Deliver SIP Trunking over the dedicated carriers WAN connections The application of security

Read More »
Scroll to Top