Category: FreePBX News

Remote IP Phone Security with SBCs

A remote phone deployment is completely different than SIP trunking. Remote phones are dynamic in location, and require significantly more calling features. Remote phones cannot be considered as peers, since phones register for services and change IP addresses often across multiple devices and locations. Remote phones require automatic provisioning with file servers and possibly require

Read More »

Remote IP Phone Security with Firewalls

A remote phone deployment in branch offices or work-at-home employees is completely different than SIP trunking. Remote phones are dynamic in location, and require significantly more calling features. Remote phones cannot be considered as peers, as phones register for services and change IP addresses often, across multiple devices and locations.     Remote phones require

Read More »

SIP Trunk Security with Session Border Controllers

As discussed in my previous blog, SIP trunking is often a peer-to-peer connection for the primary use of delivering PSTN connectivity over VoIP, and is delivered over a couple of different methods using ITSPs and Managed Service Providers. In this blog, I’ll be addressing a Session Border Controller (SBC) element used to define the peer-to-peer

Read More »

SIP Trunk Security with Firewalls

SIP Trunking is often a peer-to-peer connection for the primary use of delivering PSTN connectivity over VoIP. SIP Trunking is delivered over a couple of different methods: Internet Telephony Service Providers (ITSP) Deliver SIP Trunking over the Internet Managed Service Providers (MSP) Deliver SIP Trunking over the dedicated carriers WAN connections The application of security

Read More »

Why Security is Important with VoIP

Security is one of the most frequently discussed topics, yet the importance of securing VoIP is hard to overstate. Over the course of the next six weeks, we’ll discuss VoIP Security specific to SIP Trunking and Remote Phone applications. Due to the growth of VoIP, it’s important to understand some of the common threats. Every

Read More »
Scroll to Top