VOIP

Home / VOIP

ACME SBC ACLI Command Tree

ACME SBC ACLI Command Tree

The ACLI is an administrative interface that communicates with other components of the ACME Net-Net system. The ACLI is a single DOS or Linux-like, line-by-line entry interface.

You can access the ACLI either through a direct console connection, a Telnet connection or an SSH connection.

 

acme_conf_terminal_tree_1s

[…]

H.323 PBX with ACME SBC

H.323 PBX with ACME SBC

H.323 PBX with ACME SBC : This example shows connecting an H.323 PBX to a SIP trunk with ACME SBC. The SD performs the conversion of H.323 to SIP.

 

H323_PBX_img1

 

Example Configuration : 

 

access-control

realm-id SIPtrunk
description
source-address 172.16.122.101:5060
destination-address 0.0.0.0
application-protocol SIP
transport-protocol UDP

[…]

Multi-site PBX Connectivity in ACME SBC

Multi-site PBX Connectivity in ACME SBC

Multi-site PBX Connectivity in ACME SBC : Consider the scenario where the Enterprise has multiple branch offices, each with one or more PBXs deployed. Should there be an ACME Net-Net SD on the network edge of each of the branch offices, then the Basic PBX Connectivity approach in the section above should be used at each office location.
However, should the ACME Net-Net SD be deployed in a data center as an aggregation point for many or all branch offices, then a multi-realm approach is recommended.
Typically, routing per branch office would be on a separate VLAN id. There is a one-to-one correlation of VLAN id and realm. Additionally, there is a one-to-one correlation of realm and sip-interface. Hence, the simplest model of multi-site PBX connectivity would require the Net-Net SD be configured with as […]

Topology Hiding in ACME SBC

Topology Hiding in ACME SBC

SIP Manipulation

You can do almost any SIP header manipulation in SIP Manipulation section in ACME SBC. I will show how to do topology hiding in Acme SBC with Header Manipulation Rules (HMRs).

HMR_manip1

[…]

ISDN User Part – ISUP

ISDN User Part – ISUP

 

The ISDN User Part – ISUP is responsible for setting up and releasing trunks used for inter-exchange calls. As its name implies, ISUP was created to provide core network signaling that is compatible with ISDN access signaling. The combination of ISDN access signaling and ISUP network signaling provides an end-to-end transport mechanism for signaling data between subscribers. Today, the use of ISUP in the network has far exceeded the use of ISDN on the access side. ISUP provides signaling for both non-ISDN and ISDN traffic; in fact, the majority of ISUP-signaled traffic currently originates from analog access signaling, like that used by basic telephone service phones.

The primary benefits of ISUP are its speed, increased signaling bandwidth, and standardization of message exchange. Providing faster call setup times than Channel Associated Signaling (CAS), it ultimately uses […]

Message Transfer Part 3 – MTP3

Message Transfer Part 3 – MTP3

Level 3 of the Message Transfer Part (Message Transfer Part 3 – MTP3) resides at layer 3 of the OSI model and performs the SS7 protocol’s network functions. The primary purpose of this protocol level is to route messages between SS7 network nodes in a reliable manner. This responsibility is divided into two categories:

  • Signaling Message Handling (SMH)

  • Signaling Network Management (SNM)

[…]

Message Transfer Part 2 – MTP2

Message Transfer Part 2 – MTP2 corresponds to OSI Layer 2 (the data link layer) and as such is the lowest protocol in the stack. Sitting on the physical layer, it provides a reliable means of transfer for signaling information between two directly connected signaling points (SPs), ensuring that the signaling information is delivered in sequence and error-free.

[…]

ACME SBC Functions & Features

ACME SBC Functions & Features

Security :

  • SBC DoS/DDoS protection
    • Protect SBC from DoS/DDoS attack and other malicious attacks
    • Protect SBC from non-malicious overloads
    • Allow trusted/authenticated users access while under DoS attack
    • Dynamically accept or reject traffic based on device behavior
  • Access control
    • Filter specific devices or whole networks on a per application basis
    • Permit access to known devices or networks
    • Permit access to from authorized/registered users; permit or deny access to mask users
    • Dynamically accept or reject traffic based on device behavior
    • Accept media only for authorized sessions
  • Topology hiding & privacy
    • Hide core topology to prevent directed attacks and preserve confidentiality
    • Mask user information for privacy and confidentality
    • Protect users and service provider infrastracture from eavesdroppers, identity thieves and fraud
    • Secure L2 and L3 VPN customers by maintaining security isolation between VPNs ; support inter-VPN sessions
    • Support for inter-VPN […]

Video over IP QoS (Network Monitoring of MPEG over a IP Transport)

This presentation on monitoring MPEG Transport Streams over IP networks describes test methodology used to ensure superior Quality of Service (QoS) in video. The webinar covers how to use cross layer correlation capabilities when monitoring, to easily detect key problems when they occur when delivering VoIP services. Also covered are the differences between IP video amd voice and data, and how to ensure a high-quality video viewing experience.

Speaker: Steve Holmes

Time: 60 minutes

Go to Top