Quantcast
Channel: VOIP-info.org Page Changes
Viewing all 2667 articles
Browse latest View live

VOIP Service Providers Business Europe

$
0
0
Diff from version 640 to 641 (current)

@@ -755,7 +755,6 @@

 * [http://www.numbergroup.com/sip-trunking|NumberGroup.com] Free UK 0800, 03 and 01/02 gerographic telephone numbers to SIP & PSTN termination. Unlimited SIP Trunks with no set up or recurring costs. Low termination costs using business grade routes.
 *[http://www.oralnet.co.uk|Oralnet] A company which provides tailored VoIP solutions for businesses; Oralnet provides call termination (IAX2, SIP) and DDI's. It develops, manages, installs and supports digital PBX's (inc. Asterisk), provides failover and high availability, conducts full BRA/ROI analysis, and also provides all manner of Internet hosting and connectivity services.
 * [http://www.orbistelecom.com|OrbisTelecom.com] Low cost business class calls, Free signup, over 50,000 free phone numbers, revenue share on 0871, 0870, 090* and 0207 / 0208 numbers, 50% revenue share on VoIP reseller accounts
-* [http://ostel.co.uk/|Ostel] - Providing open source, premises and hosted VoIP Telephony solutions for UK businesses.
 * [http://www.pack-net.co.uk | PackNet] - Business VoIP provider delivering professional and reliable telephony services throughout the UK. More information on [http://www.pack-net.co.uk/voip|business phone systems]
 * [http://www.pipex.net/] port your existing BT numbers. Flat rate plans.
 * [http://www.phone-numbers-uk.com] Choose your UK Phone Number from our range of different number types. Divert your UK Phone Number to a phone anywhere or to your answering serivice. UK Phone Numbers VoIP, Fax , voice mail and call forwarding options.
UserCommentTimeVersion
ostel2015-03-09 10:19641

Asterisk High Availability Solutions

$
0
0
Diff from version 102 to 103 (current)

@@ -1,6 +1,6 @@

 Once you understand the design issues and trade-offs of creating / selecting a High Availability solution (see ((Asterisk High Availability Design)) ), consider the following products and solutions to help you meet your High Availability (HA) or Load Balancing needs:
 
-*__HAAst__ from GenerationD [http://www.generationd.com/?target=HAAST|www.GenerationD.com] adds high availability / clustering to any pair of Asterisk servers. The High Availability for Asterisk (HAAst) add-on offers rapid automatic failover of a failed peer, IP sharing, advanced peer health detection, intelligent synchronization of files and databases, etc. HAAST also supports manual promote/demote for maintenance, a command line interface, a telnet interface, a web based interface, and a developer API. Installation is straight forward, with no additional hardware required. HAAst is available in Free and Commercial editions, in use at call centers, hospitals, and other high-uptime environments. See ((High Availability Asterisk (HAAst) )) for more information.
+*__HAAst__ from GenerationD [http://www.generationd.com/?target=HAAST|www.GenerationD.com] adds high availability / clustering to any pair of Asterisk servers. The High Availability for Asterisk (HAAst) add-on offers rapid automatic failover of a failed peer, IP sharing, advanced peer health detection, intelligent synchronization of files and databases, etc. HAAst also supports manual promote/demote for maintenance, a command line interface, a telnet interface, a web based interface, and a developer API. Installation is straight forward, with no additional hardware required, no additional or complex heartbeat/cluster/etc software required either. HAAst is available in Free and Commercial editions, in use at call centers, hospitals, and other high-uptime environments. See ((High Availability Asterisk (HAAst) )) for more information.
 
 *[http://hipbx.org|HiPBX] is a new FOSS highly-available enterprise ready CentOS6/Asterisk/FreePBX distribution. It is currently being written by one of the original developers of FreePBX, and tightly integrates with (currently) Cisco SPA model phones. It provides Active Directory integration, automatic phone provisioning, user-configuration of phone features through their own Web interface, and cluster and node management through a GUI. This is all new software, and is not based off an existing project. It's currently under intensive development, and all source code is available on [http://github.com/FreePBX/HiPBX|Github].
 
UserCommentTimeVersion
ocgltd2015-03-09 15:43103

Wireless VOIP

$
0
0
Diff from version 131 to 132 (current)

@@ -1,5 +1,5 @@

 *[http://www.soho-voip-phone.com|voip phones] - Perfect phones for making long distance calls and international calls
-*[http://virtisp.net|wireless phone resellers] - Become a wireless VOIP reseller - Your Brand
+*[http://novaphone.us|wireless phone resellers] - Become a wireless VOIP reseller - Your Brand
 *[http://cordless4u.com ] - Cordless4U Long range wireless Business & Rural VOIP Solutions up to 100km...perfect...
 *[http://sip-in-motion.blogspot.com|Enable VOIP on smartphone] - Steps to enable VOIP on NOKIA smartphones.
 *[http://www.skifactz.com/wifi/F1000G_antenna_1.htm|External Antenna Mod] - Add external high gain antenna to WiFi phone
UserCommentTimeVersion
ceoxantek2015-03-09 18:19132

Asterisk High Availability Design

$
0
0
Diff from version 20 to 23 (current)

@@ -34,10 +34,10 @@

 Simplistic clusters cannot fail over quickly - most commonly because they do not properly detection deterioration of a peer. In fact, they wait until the health of a peer has deteriorated so substantially that the peer is almost dead and unresponsive before they declare a failure. Detection of a failure must be near immediate, and the process of fail over must also be quick to prevent a no-service scenario.
 
 !! Cluster Level
-Clustering can happen at any level - from the SO level to the application level to the hardware level. Vendors tend to stretch (or blur) the level at which their solutions operate; for example, using a standby virtual machine would create a computer level "cluster" (stretching the definition), adding a redundant disk (RAID) might be defined as creating a cluster, etc. It's important to understand the level at which your cluster should operate:
-* __Hardware Level__: This sometimes sounds the most appealing, but upon deeper examination these solutions don't really work in the context above. There are hardware vendors who sell HA machines by adding redundant CPU's, memory, disks, etc. However, considering the criteria above this doesn't really solve the problem of maintaining optimal Asterisk usability/productivity. The upside is that these solutions are ready off the shelf and offer protection for simple failures.
-* __OS Level__: Using generic HA software like Linux HA/Heartbeat/CMAN or even virtual machines, you can create an OS level cluster. In addition to complexity, this type of solution is not normally aware of Asterisk productivity/usability (outside of simplistic measures), nor able to sense external factors (eg: ITSP trunk down, network route unavailable, etc). These solutions also mirror corrupt data as they are not Asterisk health aware. However, old-time Linux gurus love Linux HA so if your target market is Linux gurus this goes over well!
-* __Application Level__: Creating an "Application Cluster" instead of a "Linux Cluster" or "Machine Cluster" focuses solely on PBX service high availability. Some products create a cluster at the application level which is designed for a particular softswitch/pbx. However, the downside is that there are few such products and if they don't support your particular softswitch then you are out of luck.
+Clustering can happen at any level - from the hardware level to the OS level to the application level. Vendors tend to stretch (or blur) the level at which their solutions operate; for example, using a standby virtual machine would create a computer level "cluster" (stretching the definition), adding a redundant disk (RAID) might be defined as creating a hardware cluster, etc. It's important to understand the level at which your cluster should operate:
+* __Hardware Level__: There are hardware vendors who sell HA machines by adding redundant CPU's, memory, disks, etc. However, considering the criteria above this doesn't really solve the problem of maintaining optimal Asterisk usability/productivity, in fact, this is more about a high uptime machine, not high availability phone service. The upside is that these solutions are ready off the shelf and offer protection from simple failures. This includes using virtual machines (virtual hardware level cluster) and this achieves high hardware uptime at the expense of any awareness of PBX app performance, usability, trunk connectivity, etc. However this is simple to implement (just buy hardware and plug into box).
+* __OS Level__: Using generic HA software like Linux HA/Heartbeat/CMAN, you can create an OS level cluster. In addition to complexity, this type of solution is not normally aware of Asterisk productivity/usability (outside of simplistic measures), nor able to sense external factors (eg: ITSP trunk down, network route unavailable, etc). These solutions also mirror corrupt data as they are not Asterisk health aware. However, old-time Linux gurus love Linux HA so if your target market is Linux gurus this goes over well!
+* __Application Level__: Creating an "Application Cluster" instead of a "OS Cluster" or "Hardware Cluster" focuses solely on PBX service high availability. Some products create a cluster at the application level which is designed for a particular softswitch/pbx. The upside is that these applications are PBX specific and deeply aware of PBX functionality, operations, service level, etc. The downside is also that these applications are PBX specific - so if you don't find one for your particular PBX you are out of luck and have to go with OS or Hardware level clustering.
 
 !! Extensibility and Usability
 Less essential but certainly a nice to have is extensibility of the cluster control and monitoring. This may include interfacing with generic monitoring tools like Nagios, provision of API's for custom development, etc.
UserCommentTimeVersion
ocgltd2015-03-09 18:5223
ocgltd2015-03-09 15:4122
ocgltd2015-03-09 15:3721

SecAst (Asterisk Intrusion Detection and Prevention)

$
0
0
Diff from version 22 to 29 (current)

@@ -1,70 +1,48 @@

 {maketoc}
+{attachment id=4818}
 !Overview
-SecAst is an intrusion detection and prevention system designed specifically to protect Asterisk phone systems against fraud. SecAst uses a variety of techniques to detect intrusion attempts, halt ongoing attacks, and prevent future attacks.
+SecAst (Security For Asterisk) is a firewall and intrusion detection and prevention system designed specifically to protect Asterisk based phone systems against attack and fraud. SecAst uses a variety of techniques to detect intrusion attempts, halt ongoing attacks, and prevent future attacks. In addition, SecAst uses advanced techniques to detect valid credentials that have been disclosed / compromised and are being abused. SecAst also uses heuristic algorithms to detect fraudulent activity based on known attack patterns. Upon detection SecAst blocks the current attacker from the Asterisk host at the network level.
 
-Unlike fail2ban which simply monitors logs, SecAst communicates with Asterisk via the AMI (Asterisk Management Interface) for detailed caller activity, and also directly with the network interface for detailed traffic data. SecAst combines this data (along with log data) to deeply inspect the traffic moving through Asterisk and detect fraudulent/suspicious patterns. SecAst can detect and block over 14 predefined types of brute force attacks, and can detect and block a range of suspicious activities (including the suspicious use of valid credentials).
+SecAst is a 100% software solution, communicating with Asterisk primarily through the Asterisk Management Interface (AMI), but also monitoring Asterisk message/security logs for relevant information, and also communicating with the Linux network interfaces. The data from these sources allows SecAst to monitor connection and dial attempts with invalid credentials, the rate at which users/peers are dialing, the number of channels in use by user/peer across all protocols, the source IP of remote users/peers, etc. By combining this data SecAst can effectively stop attacks/fraud in its tracks, and alert the administrator with details of each attack.
+
+SecAst offers detailed geographic allow/deny rules (geofencing) down to the city level without large or complex firewall rules (all geofencing rules remain within SecAst). Use of geofencing dramatically reduces the number of, and risk from, attacks, allowing administrators to quickly eliminate continents/countries/regions/cities where their users would never be located.
+
+SecAst offers extensive interfaces to interact with other programs, utilities, external firewalls, billing systems, etc. allowing for considerable customization. For example, changes in Threat Level can trigger scripts which alert administrators, shutdown interfaces, change firewall rules, etc.
 
 SecAst is available in both free and commercial editions. You can get SecAst, as well as more documentation, at [http://www.generationd.com?target=secast|www.generationd.com].
 
-!Brute Force Detection
-SecAst includes a wide range of brute force detection features including:
-* Attempt to register without matching peer / user ID
-* Attempt to register with wrong secret / password
-* Attempt to register without matching ACL
-* Challenge response mismatch during register
-* Attempt to register for peer not expecting registration
-* Attempt to use resources (dial) for peer that should register first
-* ACL mismatch (permit/deny) for peer
-* Peer not in local domain
+{attachment id=4820}
 
-!Breached Credential Detection
-In many cases Asterisk fraud (toll fraud) is caused by an attacker having gained access to valid credentials and then attempting to exploit them. SecAst includes a number of breached credential detection features including:
-* Heuristic detection (complex pattern detection of peer/user activity)
-* Dial cadence (rate at which caller is making calls)
-* Channel volumes (number of simultaneous calls in use by peer/user - across all protocols)
 
-!Geofencing
-SecAst includes the ability to detect the geographic location of each source IP, and allow/deny user access to Asterisk based on this location. Users can be restricted at 4 levels:
-* Continent
-* Country
-* Region
-* City
+!Asterisk Compatibility
+SecAst is compatible with a broad range of Asterisk versions and distributions. SecAst works with Asterisk versions 1.4 through 12, both 32-bit and 64-bit. SecAst is also compatible with a wide range of Asterisk distributions, from Digium's plain old Asterisk, to FreePBX and PBX In A Flash and TrixBox, to 3rd Lane and more.
 
-For example, to allow Asterisk use from the state of Michigan, in the country of US, in the continent of North America:
-~pp~ exceptions=NA:US:michigan: ~/pp~
-or to deny Asterisk use from all IP's in Asia:
-~pp~ exceptions=AS::: ~/pp~
+!Brute Force Attack Detection
+SecAst can detect brute force attacks (attempts to gain access by trying various combinations of usernames/passwords, commonly used extensions, commonly used passwords, etc). Unlike other products, SecAst can detect these attacks even if spread across many days (attackers are now performing "thin" attacks to bypass simplistic detection programs like fail2ban). SecAst can respond to these attacks by blocking them at the network level, preventing any further attempts. These blocks can last for hours, days, or indefinitely.
 
-!Blocking/Banning Attackers
-SecAst has the ability to block attackers at the network level. This can be done at the Asterisk server using iptables, and/or at an external firewall through SecAst API's.
+!Breached Credential Use Detection
+SecAst can detect unusual traffic and usage patterns indicative of credentials that have been breached (leaked or somehow discovered by an attacker). This includes monitoring the number of calls in progress, how quickly the calls are setup, even the rate at which the user is dialing digits. SecAst can respond to these attacks by blocking them at the network level, preventing any further attempts. These blocks can last for hours, days, or indefinitely.
 
-Based on configuration settings, SecAst can control the local iptables to add and remove IP addresses to effectively permit/deny access to the Asterisk server. As well, SecAst offers a number of hooks to allow the administrator to interface SecAst with an external firewall. SecAst include sample BASH scripts which can be called whenever an IP is added, removed etc. SecAst has been successfully interfaced with firewalls from Cisco, Barracuda, Mikrotik, and more. See API section below for more details.
+!Heuristic Attack Detection
+SecAst can learn new attack patterns and adjust its detection accordingly. The heuristic scanner monitors a variety of Asterisk and network traffic patterns to detect suspicious activity, correlate them with rules which indicate likely attacker activity, and then block the attacker at the network level, preventing any further attempts. These blocks can last for hours, days, or indefinitely.
 
-!API's / Programmatic Interfaces
-SecAst exposes a number of interfaces to allow for automatic interconnection with third party products and tools. These interfaces include:
-* Socket (control and data retrieval via Unix domain socket)
-* PHP (control and data retrieval via PHP class with command methods)
-* REST (control and data retrieval via web URL / AJAX)
-* BASH (IP notification/actions via call of BASH scripts)
-* Signals (basic controls via Linux signals)
+!Geographic Allow / Deny
+SecAst incorporates a database of IPv4 and IPv6 address across the world, including the continent / country / region / city of each IP. SecAst can be configured to allow or deny access to any combination of these geographic attributes (as well as a default allow / deny behavior). If an attacker or user attempts to use the Asterisk server from a denied location, the user is immediately disconnected. This creates a geographic fence (or geofence) which keeps good guys in and bay guys out.
 
-!User Interfaces
-SecAst offers a number of interfaces to facilitate the operation and monitoring of SecAst including:
-* Web - a web interface with reports and graphs
-* Telnet - a powerful and remote friendly interface to SecAst control
-* E-Mail - detailed information on the status/events affecting SecAst
+!Trunk and Endpoint Trust
+SecAst can be instructed to trust particular trunks, endpoints (users or phones), and IP addresses so that they are exempt from security screening. This allows administrators to grant particular users access regardless of location, call volumes, etc. (which may be necessary for traveling sales staff, etc). This also allows administrators to designate certain trunks / routes as trusted and others as untrusted.
 
-!Protocols
-At the time of creation of this page, SecAst supports SIP and IAX protocols. The vendor is also expanding coverage of other protocols (SCCP/Skinny/MGCP) with updates available on their website.
+!Threat Level Management
+SecAst monitors the number and rate of attacks against the Asterisk server, and based on administrator defined thresholds will set the threat level of the system. Changes in threat levels can trigger custom scripts, notifications, and other system based features.
 
-SecAst supports both IPv4 and IPv6. At the time of creation of this page, only IPv4 has been tested.
+!Telnet Interface
+Administrators will be immediately comfortable with the simple and powerful telnet interface to SecAst. The security system can be managed and controlled from a telnet interface, whether from a PC, a tablet, or a cell phone. The interface includes online help, and user friendly rich terminal output.
 
-!fail2ban vs SecAst
-SecAst includes all of the features of fail2ban (log monitoring), but this represents just a small fraction of the features of SecAst. Digium does not recommend the use of fail2ban to protect an Asterisk server (see [http://forums.asterisk.org/viewtopic.php?p=159984]) as simple log monitoring is insufficient.
+!Browser Interface
+Seasoned administrators and novices alike will be comfortable with the simple and powerful browser (web) interface to SecAst. The security system can be managed and controlled from any browser, including a PC, a tablet, or a cell phone. The interface includes blocking / unblocking IP's, checking threat levels, viewing attack history, etc.
 
-fail2ban is a free and open source product, while SecAst is a commercial and closed source product. In order to prevent attackers from knowing what patterns SecAst detects the source code also cannot be released.
-
-As an alternative to fail2ban for small office / home office users, a free edition of SecAst is available from the Generation D website [http://www.generationd.com?target=secast|www.generationd.com]. Note that the free edition is limited in features and capacity, yet still exceeds the capabilities of many products like fail2ban.
+!Socket & REST Interfaces
+Developers will appreciate the socket and REST (Representational State Transfer) interfaces to SecAst, as the power and control of SecAst can be easily expanded and integrated with other system administration and monitoring tools. SecAst includes sample PHP code to show how to extract data and control SecAst via a web service and via the socket interface.
 
 !Screenshots
 Web Interface - Top attack sources by country

@@ -75,6 +53,4 @@

 {attachment id=4677}
 Telnet Interface - Control by telnet
 {attachment id=4678}
-
-
 
UserCommentTimeVersion
ocgltd2015-03-09 22:2629
ocgltd2015-03-09 22:2628
ocgltd2015-03-09 22:2426
ocgltd2015-03-09 22:2024
ocgltd2015-03-09 22:1923

High Availability Asterisk (HAAst)

$
0
0
Diff from version 28 to 31 (current)

@@ -1,4 +1,4 @@

-{attachment id=4817}{maketoc}
+{maketoc}{attachment id=4817}
 
 !Overview
 HAAst is software package designed specifically to create a high-availability cluster out of an any pair of Asterisk servers. HAAst can detect a range of failures on one Asterisk server and automatically transfer control to the other server, resulting in a telephony environment with minimal down time.

@@ -10,6 +10,9 @@

 HAAst does not require any other High Availability/heartbeat software, nor require use of shared disk/block level disk sharing etc. HAAst also does not require any other specialized hardware so there is no single point of failure. HAAst is robust in functionality but simple to set up and use.
 
 HAAst is available in Free and Commercial editions. The Free edition is suitable for companies wanting to test if the basic functionality & compatibility meets their needs. In addition, the Free edition is a functional and useful high availability add-on for SOHO environments, more capable that any other DIY scripts, etc. The commercial edition is suitable for companies with critical telephony uptime requirements including call centers, 911 emergency centers, hospitals, etc.
+
+{attachment id=4821}
+
 
 !Asterisk Compatibility
 HAAst is compatible with a broad range of Asterisk versions and distributions. HAAst works with Asterisk versions 1.4 through 13, both 32-bit and 64-bit. HAAst is also compatible with a wide range of Asterisk distributions, including Digium's plain old Asterisk, FreePBX, PBX In A Flash, TrixBox, 3rd Lane, and more. HAAst can even control a custom distribution through settings which allow starting and stopping any executable.
UserCommentTimeVersion
ocgltd2015-03-09 22:2831
ocgltd2015-03-09 22:2730

Asterisk security

$
0
0
Diff from version 45 to 55 (current)

@@ -1,39 +1,44 @@

-!Asterisk Security
+{maketoc}
+If you are looking to secure your PBX you have several options which can be implemented independently or in combination:
+* PBX Configuration - adjust the settings of your PBX to minimize obvious attack surfaces
+* Integrated Security - add software which integrates with your specific PBX to improve security
+* Layered Security - Add software/hardware around your PBX to improve security
 
-!!Quick Start
+Note that some recommendations (eg: changing ports) are ideal for small and home office installations, whereas these same recommendations are impractical for large-scale implementations. As well, some recommendations are a great starting point (eg: hardware firewall) but this is no longer sufficient to protect a PBX.
 
-!!!Hardware Firewall
+!Integrated Security
 
-Most Asterisk boxes should be located behind a hardware firewall. Configure the firewall to block traffic from anyone that doesn't need to connect to you. Allow your VoIP provider, any remote phones/users, and others that may need to connect, but keep the restrictions as tight as possible. If you do have remote users, lock your firewall down to only allow those users to connect if possible, rather than opening it to the entire internet. If you have mobile users this may not be an option however.
+!!!SecAst
+SecAst is an intrusion detection and prevention system designed specifically to protect Asterisk phone systems against intrusion and fraud. SecAst uses a variety of techniques to detect intrusion attempts, halt ongoing attacks, and prevent future attacks. SecAst is available in three editions, including a free edition. SecAst can be downloaded from [http://www.generationd.com/?target=secast|www.generationd.com] or checkout the wiki page ((SecAst (Asterisk Intrusion Detection and Prevention) ))
 
-Other services, such as SSH should be blocked by the hardware firewall.
+!!!Fail2Ban
+Fail2Ban is a free utilitiy which looks at log files for records of failures (to register, etc.) and then add their source IP to iptables.See security warning regarding fail2ban - don't depend on it.
 
-!!!Software Firewall
 
-Implement a software firewall if possible, using Linux IP Chains. The rules should be similar to the hardware firewall, with the possible addition of additional rules to protect against attacks originating on the local LAN.
+!Layered Security
+If you are looking to add layers around your PBX with generic protection:
 
-!!!SecAst
+!!!Hardware Firewall
+Most Asterisk boxes should be located behind a hardware firewall. Configure the firewall to block traffic from anyone that doesn't need to connect to you. Allow your VoIP provider, any remote phones/users, and others that may need to connect, but keep the restrictions as tight as possible. If you do have remote users, lock your firewall down to only allow those users to connect if possible, rather than opening it to the entire internet. If you have mobile users this may not be an option however.
 
-SecAst is an intrusion detection and prevention system designed specifically to protect Asterisk phone systems against fraud. SecAst uses a variety of techniques to detect intrusion attempts, halt ongoing attacks, and prevent future attacks. SecAst is available in three editions, including a free edition. SecAst can be downloaded from [http://www.generationd.com/?target=secast|www.generationd.com] or checkout the wiki page ((SecAst (Asterisk Intrusion Detection and Prevention) ))
+Other services, such as SSH should be blocked by the hardware firewall.
+
+!!!IPtables
+IPTables is the generic firewall included with Linux. It is not PBX aware (or intelligent in any way). IPTables is a great add-on to a larger security solution. However, simply adding static rules for every potential source is not a solution. Consider IPTables the basic of preventing someone from getting at your PBX - but it doesn't / can't know the actions or intent of someone connecting to your PBX.
 
 !!!Port Knock
+Port Knock can be used to provide remote access to your Asterisk machine, opening ports needed to access asterisk services only for your IP, using a predefined sequence of ports to request a temporary on-demand opening of specific ports needed for your remote/dynamic IP. This type of solution is useful for small installations with technically savvy users (since they have to port knock before before every connection) but can effective.
 
-Port Knock can be used to provide remote access to your Asterisk machine, opening ports needed to access asterisk services only for your IP, using a predefined sequence of ports to request a temporary on-demand opening of specific ports needed for your remote/dynamic IP.
-
-!!!Fail2Ban
-
-Implement Fail2Ban to prevent denial of service attacks (password guessing can cause excessive CPU utilization). See security warning regarding fail2ban - don't depend on it.
+!PBX Configuration
+If you wish to improve the security of your PBX through basic security configuration
 
 !!!Strong Passwords
-
 All remote users should have strong, alpha-numeric passwords. These should be long. They should NEVER be the same as the username or based on the user's extension.
 
 !!!Default Context
-
 Your ~np~[default]~/np~ context in -+extensions.conf+- should be empty. This context is used when other contexts might not match a peer. You should explicitly refer to a non-default context for remote SIP calls.
 
 !!!sip.conf configuration
-
 In the ~np~[general]~/np~ section, define:
 
 ~pp~

@@ -61,16 +66,16 @@

 
 Do your users need to be able to dial internationally? If not, make sure your dialplan blocks international calls (in the US, these calls start with a 011 typically, although some countries "look like" US numbers - so also block calls to area codes that don't correspond to areas you call). You may be able to request your provider also blocks international calls. If you only have SOME users that need to call internationally, place them in a different context than the rest of your users.
 
-!!!Logs, CDR
+!!!Custom modification to chan_sip.c
 
-Review your logs and CDR at least daily. Even one day of illegitimate calls can add up to tons of money quickly.
+See [http://www.abelcanada.com/secureasterisk.php|this page on how chan_sip.c] was modified to block IPs for a duration with bad login attempts. Similar modifications can be used to protect other areas.
 
+!Logs, CDR
 
-!!!Custom modification to chan_sip.c
+Review your logs and CDR at least daily. Even one day of illegitimate calls can add up to tons of money quickly.
 
-See [http://www.abelcanada.com/secureasterisk.php|this page on how chan_sip.c] was modified to block IPs for a duration with bad login attempts. Similar modifications can be used to protect other areas.
 
-!!References
+!References
 
 Security in a complex piece of software like Asterisk is not a simple thing. Help us collect information on the subject:
 

@@ -90,10 +95,8 @@

 * ((Asterisk security through geographic IP address restriction))
 * NetSec version of Asterisk v1.2.2: This release of Asterisk contains support for network security devices manufactured by Ranch Networks, Inc., using their MIDCOM interface library. You will need the companion libmidcom-0.1.0.tar.gz file to build the library. Contact Ranch Networks' support department for assistance in building and configuring __MIDCOM__ support.
 
-!!What is Midcom you ask?
-So Midcom is a IETF protocol Voip PBX speak to tell firewalls type boxes (like Ranch) what ports to open to allow calls through the firewall. The problem being as Voip get secure encrypted signaling firewalls will not be able to tell which ports to open to let media through the firewall. I am scared of the idea that my SIP proxy or IP PBX would be allowed to tell my firewall which ports to open. But I am not sure there is a better solution.
 
-!!Articles
+!Articles
 * Good paper that also includes short section on Midcom: [http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf|NIST: Security Considerations for Voice Over IP Systems]
 * BSI on VoIP security (German): [http://www.heise.de/newsticker/meldung/65312|Abstract] - [http://downloads.bsi-fuer-buerger.de/literat/studien/VoIP/voipsec.pdf|130 page report, 11 MB]
 * [http://nerdvittles.com/?p=580|Nerd Vittles] - Avoiding the $100,000 Phone Bill: A Primer on Asterisk Security

@@ -101,17 +104,11 @@

 * [http://www.sunshinenetworks.com.au/how-to/91-secure-your-voip-server-with-the-sunshinenetworks-knock.html|Secure your VoIP server with the SunshineNetworks knock] - A method to hide your VoIP server from the outside world, while still allowing remote users access without requiring them to take any additional actions such as first navigating to a web site, etc. Should work with any PBX that has iptables installed (CentOS-based systems have iptables installed by default).
 
 
-
-
-!!See also
-* ((Asterisk administration))
-* ((Asterisk encryption))
+!See also
 * ((SecAst (Asterisk Intrusion Detection and Prevention) ))
-* ((VLAN))
 * [http://www.securiteam.com/securitynews/5LP0720B5G.html] Security Notice: Asterisk / Sept 7, 2003 (Fixed).
 * [http://www.securiteam.com/unixfocus/5HP0H1PB5S.html] Security Notice: Asterisk / Sept 16, 2003.
 * [http://blogtech.oc9.com/index.php?option=com_content&view=article&catid=4:asterisk&id=175:20080329astchroot&Itemid=6|Asterisk server running in a chroot jail; not as secure as virtualization but here it is. (Asterisk 1.4.18 and Linux 2.6.24)] April 04, 2008.
 * [http://mikeoverip.wordpress.com/2009/01/13/asterisk-and-sip-attack-and-monitoring-via-event-correlation-by-using-sipp-and-sec/|Asterisk and SIP: attack and monitoring via event correlation, by using SIPp and SEC] January 13, 2009.
-
----
-* __((Asterisk))__: Start page | ((Asterisk introduction|Introduction)) | ((Asterisk FAQ|FAQ)) | ((Asterisk tips and tricks|Tips & Tricks))
+* ((Asterisk administration))
+* ((Asterisk encryption))
UserCommentTimeVersion
ocgltd2015-03-10 14:4055
ocgltd2015-03-10 14:3654
ocgltd2015-03-10 14:3553
ocgltd2015-03-10 14:3552
ocgltd2015-03-10 14:3051
ocgltd2015-03-10 14:3050
ocgltd2015-03-10 14:2949
ocgltd2015-03-10 14:2848
ocgltd2015-03-10 14:2247
ocgltd2015-03-10 14:2146

VoIP Termination

$
0
0
Diff from version 160 to 161 (current)
UserCommentTimeVersion
skylinejaly2015-03-11 06:27161

Session Border Controller

$
0
0
Diff from version 37 to 38 (current)

@@ -15,7 +15,7 @@

 
 !!Products
 
-*[http://allo.com/sbc.html/ | ALLO SBCs for Enterprise and Carrier
+*[http://blox.org/ | BLOX - Open Source SBC
 *[http://www.opensips-solutions.com|OpenSIPS]-60,000 CPS on commodity hardware! A multi-functional, multi-purpose signaling SIP server - it can act as SIP Router/Switch, SIP Registrar, Application Server, Redirect Server, Load Balancer / Dispatcher, Back-to-Back User Agent, Presence Server, IM Server, Session Border Controller, SIP Front-End, NAT traversal Server, IP Gateway (SMS, XMPP) and platform for many other applications.
 *[http://www.cloudastrix.com | CloudAstrix SPE] for Service Provider Edition
 *[https://www.ecosmob.com/sbcsolution/ | Session Border controller Solution] to keep your network secure, reliable and scalable.
UserCommentTimeVersion
pintoroshan2015-03-12 05:5738

DID Service Providers

$
0
0
Diff from version 994 to 995 (current)

@@ -1068,7 +1068,7 @@

 * [http://www.enum2go.com|enum2go.] Providing enum enabled global numbers from UPT range +878 10
 * [http://www.buyvirtualnumber.com|buyvirtualnumber] Provides __Cheapest Virtual Phone Numbers__ with the Free forwarding to skype,Gtalk,iTalkWorld, trixbox or VOIP. Phone Numbers all over the world are available. Free PBX . Toll Free Number Available without Monthly commitments.
 * [http://www.flynumber.com|FlyNumber] Provides __Virtual Phone Numbers__ with the ability to forward for the calls to skype, trixbox or VOIP. Phone Numbers all over the world are available.
-* [http://www.flowroute.com/|__Flowroute LLC__] Wholesale VoIP, We offer low priced __single DIDs__ as well as __DID blocks__. Our system is very flexible: each DID can be routed individually and can use different inbound rates, Free CNAM Storage, __E911__, T.38 Fax support, SIP-TCP support, Redundant servers, Graph Statistics and great interface, A-Z SIP Termination
+* [http://www.flowroute.com/|__Flowroute Inc.__] Wholesale VoIP, We offer low priced __single DIDs__ as well as __DID blocks__. Our system is very flexible: each DID can be routed individually and can use different inbound rates, Free CNAM Storage, __E911__, T.38 Fax support, SIP-TCP support, Redundant servers, Graph Statistics and great interface, A-Z SIP Termination
 *[http://www.fonangle.com/|FonAngle FreedomSIP Trunking] - FonAngle FreedomSIP Trunking provides inbound and outbound services with USA/Canadian/International DIDs.
 * [http://www.fonoempresa.com.ar|Fonoempresa] DIDs from Buenos Aires, Argentina and the most importan cities/countries of the world. Inbound DID origination. IVRs, Call Centers or International Companies are our customers.
 * [http://www.fonosip.com|FonoSIP.com] DID Virtual Numbers . Get a local number in the cities where you have clients or family. Numbers available in 40 countries, 5000 cities.
UserCommentTimeVersion
avlaming2015-03-12 22:21995

BYOD

$
0
0
Diff from version 50 to 51 (current)

@@ -28,7 +28,7 @@

 |-
 | [http://dialdigit.com|DialDigit] || USA || $10.95 || $9.95+ || Yes || No || ?
 |-
-| [http://www.flowroute.com|Flowroute] ([http://www.flowroute.com/accounts/signup|Free Trial]) || USA / CAN || $35.00 Deposit || ((PAYG)) || Yes || No || Yes
+| [http://www.flowroute.com|Flowroute Inc.] ([http://www.flowroute.com/accounts/signup|Free Trial]) || USA / CAN || $35.00 Deposit || ((PAYG)) || Yes || No || Yes
 |-
 | [http://www.fonosip.com|FonoSIP] || USA || 0 || ((PAYG)) || Yes || No || Yes
 |-
UserCommentTimeVersion
avlaming2015-03-12 22:2251

VoIP Origination

$
0
0
Diff from version 53 to 54 (current)

@@ -115,7 +115,7 @@

 * Origination number observed as 720-279-3127
 * Fromdomain must be something other than proxy.ideasip.com (the proxy's IP address will work)
 
-[http://www.flowroute.com/|Flowroute LLC] Wholesale VoIP, A-Z SIP Termination, Cheap DIDs, Toll-Free Origination and Termination, Free CNAM Storage, E911, T.38 Fax support, SIP-TCP support, Redundant servers, Graph Statistics and great interface
+[http://www.flowroute.com/|Flowroute Inc.] Wholesale VoIP, A-Z SIP Termination, Cheap DIDs, Toll-Free Origination and Termination, Free CNAM Storage, E911, T.38 Fax support, SIP-TCP support, Redundant servers, Graph Statistics and great interface
 
 [https://teliax.com|Teliax] has been providing wholesale termination and origination since 2004. Teliax's customers include other VoIP providers. Teliax also offers a unique Partner program for resellers wishing to offer VoIP services to their customers.
 
UserCommentTimeVersion
avlaming2015-03-12 22:2354

Toll Free Termination Providers

$
0
0
Diff from version 155 to 157 (current)

@@ -204,7 +204,7 @@

 
 [http://www.circuitid.com|CircuitID] provides high-quality wholesale VoIP termination, origination, toll-free, and Microsoft Lync SIP Trunking services, at a low affordable cost. Experience carrier class quality, and savings benefits.
 
-[http://www.flowroute.com/|Flowroute LLC] Wholesale VoIP, A-Z SIP termination, cheap DIDs, toll-free origination and termination, free CNAM storage, E911, T.38 fax support, SIP-TCP support, redundant servers, graph statistics and great interface
+[http://www.flowroute.com/|Flowroute Inc.] Wholesale VoIP, A-Z SIP termination, cheap DIDs, toll-free origination and termination, free CNAM storage, E911, T.38 fax support, SIP-TCP support, redundant servers, graph statistics and great interface
 
 [http://www.future-nine.com/|Future Nine] Requires an account to be created - but you can terminate toll-free traffic for free. No payment required. If your toll-free volume is high Future Nine may even compensate you (pay you) for those minutes. (SIP registration not required)
 
UserCommentTimeVersion
avlaming2015-03-12 22:24157

Asterisk security

$
0
0
Diff from version 55 to 59 (current)

@@ -1,10 +1,10 @@

 {maketoc}
 If you are looking to secure your PBX you have several options which can be implemented independently or in combination:
-* PBX Configuration - adjust the settings of your PBX to minimize obvious attack surfaces
-* Integrated Security - add software which integrates with your specific PBX to improve security
-* Layered Security - Add software/hardware around your PBX to improve security
+* __PBX Configuration__ - adjust the settings of your PBX to minimize obvious attack surfaces (no longer considered optional - just part of setting up any PBX).
+* __Layered Security__ - Add software/hardware around your PBX to improve security (one notch above configuration - just part of operating any PBX).
+* __Integrated Security__ - add software which integrates with your specific PBX to improve security (this is what really makes a difference in protecting your PBX).
 
-Note that some recommendations (eg: changing ports) are ideal for small and home office installations, whereas these same recommendations are impractical for large-scale implementations. As well, some recommendations are a great starting point (eg: hardware firewall) but this is no longer sufficient to protect a PBX.
+Note that some recommendations (eg: changing ports, port knocking, etc.) are ideal for small and home office installations, whereas these same recommendations are impractical for large-scale implementations. As well, some recommendations are a great starting point (eg: hardware firewall) but this is no longer sufficient to protect a PBX.
 
 !Integrated Security
 
UserCommentTimeVersion
ocgltd2015-03-13 13:2759
ocgltd2015-03-13 13:2658
ocgltd2015-03-13 13:2557
ocgltd2015-03-13 13:2556

Session Border Controller

$
0
0
Diff from version 38 to 39 (current)

@@ -15,7 +15,7 @@

 
 !!Products
 
-*[http://blox.org/ | BLOX - Open Source SBC
+*[http://blox.org/ | BLOX - Open Source SBC]
 *[http://www.opensips-solutions.com|OpenSIPS]-60,000 CPS on commodity hardware! A multi-functional, multi-purpose signaling SIP server - it can act as SIP Router/Switch, SIP Registrar, Application Server, Redirect Server, Load Balancer / Dispatcher, Back-to-Back User Agent, Presence Server, IM Server, Session Border Controller, SIP Front-End, NAT traversal Server, IP Gateway (SMS, XMPP) and platform for many other applications.
 *[http://www.cloudastrix.com | CloudAstrix SPE] for Service Provider Edition
 *[https://www.ecosmob.com/sbcsolution/ | Session Border controller Solution] to keep your network secure, reliable and scalable.
UserCommentTimeVersion
admin2015-03-13 17:0239

VOIP Consultants

$
0
0
Diff from version 1566 to 1568 (current)

@@ -1040,6 +1040,21 @@

 ** __Contact person:__ [http://www.ucom.ch/people/ | Bernie Hoeneisen], dipl. El.-Ing. ETH
 ** __Email:__ info(a)dr-sip.ch
 
+---
+
+!!Ecosmob Technologies Pvt. Ltd.
+The VoIP experts provides highly professional support, design, development, configuration & consultancy services in VoIP.
+* Specialize in: Asterisk, FreeSWITCH, WebRTC, Kamailio, OpenSIPs, OpenSER, etc.
+* Quick technical support
+* Hands on expert VoIP team
+* [https://www.ecosmob.com/products/ | Advanced Feature rich VoIP Products]
+* [https://www.ecosmob.com/solutions | Customized VoIP Solutions]
+
+For any other details
+! Contact
+Ecosmob Tech. Pvt. Ltd.
+[https://www.ecosmob.com]
++1-303-997-3139
 
 ---
 !!!.e4 Technologies

@@ -1157,19 +1172,6 @@

 * Email: [mailto:sales@enterux.net|sales@enterux.net]
 [http://www.enterux.com/en/contact| Connect with us and find out how we can revolutionize the way you communicate]
 * [http://www.entvoice.com/training/| 50% Discount on the Asterisk Advanced Training Course, by the #1 Asterisk Company from India and the Official Digium Training Partner]
-
----
-!!!Ecosmob Technologies Pvt. Ltd.
-The VoIP experts provides highly professional support, design, development, configuration & consultancy services in VoIP.
-* Specialize in: Asterisk, FreeSWITCH, WebRTC, Kamailio, OpenSIPs, OpenSER, etc.
-* Quick technical support
-* Hands on expert VoIP team
-
-For any other details
-! Contact
-Ecosmob Tech. Pvt. Ltd.
-[http://www.ecosmob.com]
-+1-303-997-3139
 
 ---
 !!!epbx.eu
UserCommentTimeVersion
ashvyasseo2015-03-17 03:331568
ashvyasseo2015-03-17 03:301567

Asterisk system vendors INDIA

$
0
0
Diff from version 822 to 825 (current)

@@ -41,12 +41,19 @@

 ---
 __Asterisk Service and Solution__
 
-* [http://www.asteriskservice.com | Asterisk Services and Solution] Provider division of Ecosmob Technologies Pvt. Ltd. has expertise in open source and Asterisk PBX. The company has developed many custom software solutions for the global clients and enjoy the leading position in the Asterisk industry. The team of experienced Asterisk developers offers design, development, configuration and support services for following [http://www.asteriskservice.com/asterisk/solutions.html | Asterisk Solutions]:
+* [https://www.asteriskservice.com | Asterisk Services and Solution] Provider division of Ecosmob Technologies Pvt. Ltd. has expertise in open source and Asterisk PBX. The company has developed many custom software solutions for the global clients and enjoy the leading position in the Asterisk industry. The team of experienced Asterisk developers offers design, development, configuration and support services for following [https://www.asteriskservice.com/asterisk/solutions.html | Asterisk Solutions]:
+
+* DID Router
+* Dynamic IVR Builder
+* WebRTC Client
+* Conferencing Solution
+* SBC Solution
+* Phone Number Verification
 
 !!!For Details Contact
 !!!Ashvini Vyas
 !!! [mailto:sales@ecosmob.com] or [mailto:ashvini.vyas@ecosmob.com]
-!!! [http://http://www.asteriskservice.com]
+!!! [https://www.asteriskservice.com]
 
 
 ---------------------------------------------------------------------------------------------------------------------------------
UserCommentTimeVersion
ashvyasseo2015-03-17 03:48825
ashvyasseo2015-03-17 03:42824
ashvyasseo2015-03-17 03:41823

WebRTC

$
0
0
Diff from version 22 to 24 (current)

@@ -44,7 +44,8 @@

 *[https://bistri.com/ | Bistri]
 *[http://www.brekeke.com/ | Brekeke PBX]
 *[http://www.cryptovoip.in/webRTCDemo/ | CryptoVoIP SIP WebRTCDialer]
-*[http://www.ecosmob.com/cosmoconf-conferencingsolution/ | CosmoConf - Conferencing Solution]
+*[https://www.ecosmob.com/cosmoconf-conferencingsolution/ | CosmoConf - Conferencing Solution]
+*[https://www.ecosmob.com/contactcenter/ | Contact Center Solution]
 *[http://www.junghannscom.de/ | C-Button]
 *[http://www.digium.com | Digium]
 *[http://thisisdrum.com/ | Drum]
UserCommentTimeVersion
ashvyasseo2015-03-17 04:1024
ashvyasseo2015-03-17 04:0923

Unified Communications

$
0
0
Diff from version 8 to 9 (current)

@@ -369,6 +369,9 @@

 * [http://www.mydivert.com/buy_telephone_numbers/25_Italy_numbers.html|Mydivert.com] Italian DID Provider offers local VoIP DID Virtual Phone Numbers. A low cost virtual international telephone number with free incoming calls and call forwarding
 * [http://www.VoipTiger.com|VoipTiger] Offers a Free cloud pbx - Call center features - Numbers (DIDs) in 53 countries - Free Android/Iphone app - Grandstream IP-phones - Codecs: ILBC/G711/G729/G722
 *[http://www.zigma5.com|Zigma5] provides cloud computing based business phone systems designed for today's mobile and distributed business world. Zigma5 provides Carrier Level services to the voice carriers around the world as well as virtual PBX based VoIP which gives Telephone & Fax to all businesses on monthly basis without any contract.
+
+!!!India
+*[https://www.ecosmob.com|Ecosmob Technologies] | is an India based IT company with an ambition to improve communication and collaboration with next generation and feature-rich VoIP solutions. The company offers various ready to use products like Multi-tenant conferencing, PBX, Voice & SMS Broadcasting, Contact center solutions. The company also offers custom software development globally to reach the business requirements of communication.
 
 !!!Latvia
 *[http://www.1pipetelecom.com|1Pipe Telecom] | OnePipe is a CLEC providing SIP Trunking, Hosted PBX, IP and other services, we provide services on our own network and gateways. Priced by trunk not by seat. Have 100 phones and 2 lines if you want. Numbers available in over 50 countries. Custom pricing available based on your project.
UserCommentTimeVersion
ashvyasseo2015-03-17 04:209

voip-info.org

$
0
0
Diff from version 17468 to 17471 (current)

@@ -23,6 +23,9 @@

 *****************************************************************************
 {/COMMENT}
 !!NEWS
+*2015-03-17 - [http://goo.gl/aaYuVk|VoIP Keeps Pace with Growth, Fixed Phones Not So Much
+*2015-03-17 - [http://www.opensips.org/Documentation/Tutorials-Emergency-2-1|OpenSIPS 2.1 Emergency Call handling] as per IETF specs (RFC 6881, RFC6442) and NENA i2
+*2015-03-17 - [http://www.3cx.com/blog/webrtc/webrtc-webconferencing/|Noteworthy WebRTC Use Cases Beyond the Business World]
 *2015-03-12 - [http://goo.gl/NtUdU4|Unified Communications Doesn't Seem All That Unified]
 *2015-03-09 - [http://www.3cx.com/blog/pbx/cost-savings-ip-pbx/|Why Cost Savings Alone Are Enough to Switch to IP-PBX]
 *2015-03-09 - [http://loway.ch/asterisk-callcenter-interviews.jsp?uid=interview-20150309-mathias_pasquay|An interview with Mathias Pasquay of pascom on the future of Asterisk call-centres]
UserCommentTimeVersion
ileanachermenschi2015-03-17 10:1917471
bogdan_iancu2015-03-17 09:4917470
3cxphonesystem2015-03-17 08:4617469
Viewing all 2667 articles
Browse latest View live




Latest Images