SlideShare a Scribd company logo
SIP Security
Firewalls, SIP Servers and SBCs
Explained
• December 2018
1
2
What are the Risks?
Extortion Intrusion Theft of Services
3
The Risk is Real
Hackers targeted the phone system at Bob
Foreman’s architecture firm in Georgia,
making $166,000 in calls in a weekend.
Credit: Tami Chappell for The New York Times
4
Today’s Presenters:
Alan D Percy
Senior Director of Product Marketing
alan.percy@telcobridges.com
Luc Morissette
Director of Technical Support
luc.morissette@telcobridges.com
5
Agenda
Firewalls, SIP Servers and SBCs
• What are they?
• Why do I need them?
• What do they do?
• What do they NOT do?
• Where to learn more?
6
The Right Tool …
“Every tool is a
weapon if you
hold it right”
- Ani DeFranco
7
Just a little SIP
SIP is the foundation of the
new voice network…but:
• Specification is “loose” with
interoperability issues
• Separates call control
signaling from media
• “Chatty Cathy”
• Asynchronous
• “Stateful” By Korolev Alexandr
RFC 3261
8
OSI Model
Application SIP User Agent
Presentation G.711, G.729…
Session SIP
Transport TCP, UDP, RTP
Network IP, ICMP
Data Link Ethernet, 802.11
Physical CAT5, 2.4GHz
Network Switches
Firewall
/ Router
Session Border
Controllers SIP
Servers
9
Function of a Firewall
Internet
LANWAN
34.x.x.x
192.168.1.2 192.168.1.3 192.168.1.4
Trusted NetworkUntrusted Network
10
Firewall Functions
 Packet Filtering – Layer 2-4
Tracking and passing “good” traffic
 Blocking “unsolicited” traffic
 Pinhole Management
 Packet Forwarding
 NAT – Network Address Translation
 DHCP – Assigning IP addresses to devices
Header ManipulationRouting Engine
Media
SIP
Session
s
Public
WAN
34.0.0.
1
SIP Server
SIP
Application
s
34.0.0.X
SIP Server Architecture
12
SIP Server Functions
SIP Proxy/Router
SIP Header Manipulation
SIP Routing / Load Balancing
Script-based configuration
 No B2BUA
Exposes network topology
 No Media Handling
What is a SBC?
Local Area
Network
Network
Border
Wide Area
Network SBC
• Anywhere two SIP networks intersect
• Software-based “Network Function”
• Most often between a WAN and a LAN
SIP SIP
Routing Engine
Media
Media
Engine
SIP
Session
s
B2BUA
UAS UAC
Private LAN
192.168.0.X
Public WAN
34.0.0.1
Session Border Controller
SIP
Applicatio
ns
Session Border Controller Architecture
15
Firewall / SBC Deployment Models
SBC Behind the Firewall
LAN
WAN
34.1.1.1
192.168.1.2
192.168.1.4
Trusted Network
Untrusted Network SBC
Internet
Call Servers
16
Firewall / SBC Deployment Models
SBC Beside the Firewall
LAN
WAN
34.1.1.1
192.168.1.2
192.168.1.4
Trusted Network
Untrusted Network
SBC
Internet
Call Servers
34.1.1.2
17
Use Case – Hosted IP-PBX/UC
Tasks:
 Security – DDOS & Topology Hiding
 Registration/Subscription Forwarding
 NAT Traversal
IP-PBX / UC / Contact Center with Local & Remote Users
Asterisk
Work-at-home users
SBC
18
Comparison Summary
Function Firewall SIP Server SBC
Layer 2-4 Packet Filtering   
Router / NAT / DHCP   
Prevent DOS / DDOS Attacks   
SIP Header Manipulation / Interoperability  
SIP Routing  
Toll Fraud Protection  
Topology Hiding 
Block Robocallers (STIR/SHAKEN) 
QOS Measurement / Reporting 
Media Transcoding / Transcryption 
Prevent Media DDOS Attacks 
19
Introducing…
Learn more at: www.FreeSBC.com
20
Congratulations!
You now know
enough to be
dangerous!
How do you continue
your knowledge?
21
Q&A
Download your FreeSBC software:
www.freesbc.com
Frequently Asked Questions at:
forums.freesbc.com
Other educational webinars at:
freesbc.com/video-library
Q/A?

More Related Content

PPTX
SIP - Introduction to SIP Protocol
PPT
C04 wireless telecommunication-systems[1]
PPT
PDF
Mobile Networks Architecture and Security (2G to 5G)
PPTX
802.11r Explained.
PPT
OSI layer by cisco
PPTX
SIP over TLS
SIP - Introduction to SIP Protocol
C04 wireless telecommunication-systems[1]
Mobile Networks Architecture and Security (2G to 5G)
802.11r Explained.
OSI layer by cisco
SIP over TLS

What's hot (20)

PPTX
Cisco Networking (Routing and Switching)
PPT
Basics Of Minilink Microwave Networks
PDF
What is Wireless Communication or Unguided Transmission Media
PPTX
What is an SBC? A look at the role of the Session Border Controller
PPT
Public Switched Telephone Network (PSTN)
PPTX
PDF
rrc-procedures-in-lte
PDF
Ericsson RBS 6000
PPTX
Network components
PDF
SRAN19 dimensioning.pdf
PPTX
How To Default Gateway
PPT
Radio propagation
PDF
Massive MIMO Channel Calibration in TDD Wireless Networks
PPT
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
PPTX
Vlans (virtual local area networks)
PPTX
Session initiation-protocol
PPT
eMBMS for LTE
PPSX
PPT
Lecture 11
PPT
Transmission Media
Cisco Networking (Routing and Switching)
Basics Of Minilink Microwave Networks
What is Wireless Communication or Unguided Transmission Media
What is an SBC? A look at the role of the Session Border Controller
Public Switched Telephone Network (PSTN)
rrc-procedures-in-lte
Ericsson RBS 6000
Network components
SRAN19 dimensioning.pdf
How To Default Gateway
Radio propagation
Massive MIMO Channel Calibration in TDD Wireless Networks
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Vlans (virtual local area networks)
Session initiation-protocol
eMBMS for LTE
Lecture 11
Transmission Media
Ad

Similar to Firewalls, SIP Servers and SBC - What's the Differences? (20)

PDF
What is an SBC? A look at the role of the Session Border Controller
PDF
Scaling Open Source Applications with SBCs
PPTX
Scaling Open Source Applications with SBCs
PDF
Sbc the-critical-component for a successful IP PBX Deloyment
PDF
LyncConference2013 - Dimensionnement et gestion des Réseaux
PDF
Introduction to FreeSWITCH
PDF
The Role of a SIP Softswitch in the Enterprise
PPTX
F5 Infosec Israel 2013 Application Centric Security
PPTX
VoIP Security 101 what you need to know
PPTX
Why Do I Need an SBC
PDF
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
PDF
Expocomm VoIP Presentation
PDF
Offre revendeurs UC
PPT
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...
PDF
why-your-network-needs-an-sbc-guide.pdf
PPTX
AudioCodes Session Border Controller Update
PDF
LinuxCon North America: SIPPing from the Open Source Well
PDF
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
PDF
Review of SIP based DoS attacks
PPTX
Microsoft Unified Communications Summit
What is an SBC? A look at the role of the Session Border Controller
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
Sbc the-critical-component for a successful IP PBX Deloyment
LyncConference2013 - Dimensionnement et gestion des Réseaux
Introduction to FreeSWITCH
The Role of a SIP Softswitch in the Enterprise
F5 Infosec Israel 2013 Application Centric Security
VoIP Security 101 what you need to know
Why Do I Need an SBC
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
Expocomm VoIP Presentation
Offre revendeurs UC
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...
why-your-network-needs-an-sbc-guide.pdf
AudioCodes Session Border Controller Update
LinuxCon North America: SIPPing from the Open Source Well
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
Review of SIP based DoS attacks
Microsoft Unified Communications Summit
Ad

More from Alan Percy (20)

PPTX
Network Transformation Best Practices-Working.pptx
PPTX
The Role of SBC in Fraud Protection
PPTX
Tmedia for Metaswitch - an FAQ Session
PPTX
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
PPTX
Marketing Open Source Software - 10 Tips
PPTX
Contact Center as a Service - Challenges and Successes
PPTX
Robocall Mitigation with YouMail and ProSBC
PPTX
How to Measure VoIP Voice Quality
PPTX
What is SS7? An Introduction to Signaling System 7
PPTX
RESTful APIs and SBCs
PPTX
VoIP Frequently Asked Questions
PPTX
New Opportunities with Two Factor Authentication (2FA) - A How To
PPTX
UCaaS with 3cx and ProSBC
PPTX
The Future of Media Gateways
PPTX
How to Protect Against TDOS Attacks
PPTX
ProSBC on Azure - A Tutorial
PPTX
uCPE and VNFs Explained
PPTX
How to Prevent Telecom Fraud in Real-Time
PPTX
ProSBC a Deep Dive
PPTX
Enabling business with CPaaS and SBCs
Network Transformation Best Practices-Working.pptx
The Role of SBC in Fraud Protection
Tmedia for Metaswitch - an FAQ Session
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Marketing Open Source Software - 10 Tips
Contact Center as a Service - Challenges and Successes
Robocall Mitigation with YouMail and ProSBC
How to Measure VoIP Voice Quality
What is SS7? An Introduction to Signaling System 7
RESTful APIs and SBCs
VoIP Frequently Asked Questions
New Opportunities with Two Factor Authentication (2FA) - A How To
UCaaS with 3cx and ProSBC
The Future of Media Gateways
How to Protect Against TDOS Attacks
ProSBC on Azure - A Tutorial
uCPE and VNFs Explained
How to Prevent Telecom Fraud in Real-Time
ProSBC a Deep Dive
Enabling business with CPaaS and SBCs

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
August Patch Tuesday
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Mushroom cultivation and it's methods.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
A Presentation on Touch Screen Technology
PDF
Encapsulation theory and applications.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Digital-Transformation-Roadmap-for-Companies.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
cloud_computing_Infrastucture_as_cloud_p
Group 1 Presentation -Planning and Decision Making .pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
August Patch Tuesday
A comparative study of natural language inference in Swahili using monolingua...
Mushroom cultivation and it's methods.pdf
1. Introduction to Computer Programming.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A novel scalable deep ensemble learning framework for big data classification...
A Presentation on Touch Screen Technology
Encapsulation theory and applications.pdf
Encapsulation_ Review paper, used for researhc scholars
A comparative analysis of optical character recognition models for extracting...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25-Week II
MIND Revenue Release Quarter 2 2025 Press Release

Firewalls, SIP Servers and SBC - What's the Differences?

  • 1. SIP Security Firewalls, SIP Servers and SBCs Explained • December 2018 1
  • 2. 2 What are the Risks? Extortion Intrusion Theft of Services
  • 3. 3 The Risk is Real Hackers targeted the phone system at Bob Foreman’s architecture firm in Georgia, making $166,000 in calls in a weekend. Credit: Tami Chappell for The New York Times
  • 4. 4 Today’s Presenters: Alan D Percy Senior Director of Product Marketing alan.percy@telcobridges.com Luc Morissette Director of Technical Support luc.morissette@telcobridges.com
  • 5. 5 Agenda Firewalls, SIP Servers and SBCs • What are they? • Why do I need them? • What do they do? • What do they NOT do? • Where to learn more?
  • 6. 6 The Right Tool … “Every tool is a weapon if you hold it right” - Ani DeFranco
  • 7. 7 Just a little SIP SIP is the foundation of the new voice network…but: • Specification is “loose” with interoperability issues • Separates call control signaling from media • “Chatty Cathy” • Asynchronous • “Stateful” By Korolev Alexandr RFC 3261
  • 8. 8 OSI Model Application SIP User Agent Presentation G.711, G.729… Session SIP Transport TCP, UDP, RTP Network IP, ICMP Data Link Ethernet, 802.11 Physical CAT5, 2.4GHz Network Switches Firewall / Router Session Border Controllers SIP Servers
  • 9. 9 Function of a Firewall Internet LANWAN 34.x.x.x 192.168.1.2 192.168.1.3 192.168.1.4 Trusted NetworkUntrusted Network
  • 10. 10 Firewall Functions  Packet Filtering – Layer 2-4 Tracking and passing “good” traffic  Blocking “unsolicited” traffic  Pinhole Management  Packet Forwarding  NAT – Network Address Translation  DHCP – Assigning IP addresses to devices
  • 11. Header ManipulationRouting Engine Media SIP Session s Public WAN 34.0.0. 1 SIP Server SIP Application s 34.0.0.X SIP Server Architecture
  • 12. 12 SIP Server Functions SIP Proxy/Router SIP Header Manipulation SIP Routing / Load Balancing Script-based configuration  No B2BUA Exposes network topology  No Media Handling
  • 13. What is a SBC? Local Area Network Network Border Wide Area Network SBC • Anywhere two SIP networks intersect • Software-based “Network Function” • Most often between a WAN and a LAN SIP SIP
  • 14. Routing Engine Media Media Engine SIP Session s B2BUA UAS UAC Private LAN 192.168.0.X Public WAN 34.0.0.1 Session Border Controller SIP Applicatio ns Session Border Controller Architecture
  • 15. 15 Firewall / SBC Deployment Models SBC Behind the Firewall LAN WAN 34.1.1.1 192.168.1.2 192.168.1.4 Trusted Network Untrusted Network SBC Internet Call Servers
  • 16. 16 Firewall / SBC Deployment Models SBC Beside the Firewall LAN WAN 34.1.1.1 192.168.1.2 192.168.1.4 Trusted Network Untrusted Network SBC Internet Call Servers 34.1.1.2
  • 17. 17 Use Case – Hosted IP-PBX/UC Tasks:  Security – DDOS & Topology Hiding  Registration/Subscription Forwarding  NAT Traversal IP-PBX / UC / Contact Center with Local & Remote Users Asterisk Work-at-home users SBC
  • 18. 18 Comparison Summary Function Firewall SIP Server SBC Layer 2-4 Packet Filtering    Router / NAT / DHCP    Prevent DOS / DDOS Attacks    SIP Header Manipulation / Interoperability   SIP Routing   Toll Fraud Protection   Topology Hiding  Block Robocallers (STIR/SHAKEN)  QOS Measurement / Reporting  Media Transcoding / Transcryption  Prevent Media DDOS Attacks 
  • 20. 20 Congratulations! You now know enough to be dangerous! How do you continue your knowledge?
  • 21. 21 Q&A Download your FreeSBC software: www.freesbc.com Frequently Asked Questions at: forums.freesbc.com Other educational webinars at: freesbc.com/video-library Q/A?

Editor's Notes

  • #2: Welcome to “FreeSBC – A New Approach to the SBC”, a webinar event hosted by TelcoBridges Before we begin, a little housekeeping: As a live event participant, you’ll have the opportunity to interact with today’s speakers and hope you do pose your questions and comments on today’s topic using the Q/A panel. To pose a question or comment, open the Q/A panel by clicking on the box in the upper left of your screen. We’ll cover your questions toward the end of the session. We’ve found that some attendees may need to adjust the webinar View Options to see the full slide on your screen. If you are not seeing a full slide, move your mouse to the top of the webinar window and a View Option selection will appear – choose an option that best fits your screen. Also, today’s event is being recorded and all those that have registered will received a link to the recording for on-demand playback. We hope you share the link with your co-workers and others that would find the discussion valuable.
  • #4: Full article at: https://www.nytimes.com/2014/10/20/technology/dial-and-redial-phone-hackers-stealing-billions-.html
  • #5: Some introductions to get started: I’m Alan Percy, Senior Director of Product Marketing for TelcoBridges and today’s event moderator. Joining us again is Luc Morissette, Director of Customer Support and one of the founders of TelcoBridges. Luc, thanks for being a part of today’s event. Before we begin, a little housekeeping: As a live event participant, you’ll have the opportunity to interact with today’s speakers and hope you do pose your questions and comments on today’s topic using the Q/A panel. To pose a question or comment, open the Q/A panel by clicking on the box in the upper left of your screen. We’ll cover your questions toward the end of the session. We’ve found that some attendees may need to adjust the webinar View Options to see the full slide on your screen. If you are not seeing a full slide, move your mouse to the top of the webinar window and a View Option selection will appear – choose an option that best fits your screen. Also, today’s event is being recorded and all those that have registered will received a link to the recording for on-demand playback. We hope you share the link with your co-workers and others that would find the discussion valuable. And we’re glad to have you, our attendees, with us today and encourage you to use the opportunity to interact with our speakers by posing your questions and comments.
  • #6: First a little background: As network architects in service providers and large enterprises plan their migration to cloud infrastructure, one network security element plays a critical role and needs special treatment - the Session Border Controller. At the crossroads of real-time voice and video traffic, SBCs are tasked with providing protection against DDOS attacks, facilitating NAT traversal, providing topology hiding, resolving interoperability issues and much more.
  • #20: Recognizing these needs, TelcoBridges offers FreeSBC, a software SBC solution designed specifically for cloud and virtualized deployments. Highly scalable with carrier-grade reliability, FreeSBC is a commercial SBC, offered under a “freemium” business model. We feel FreeSBC better fits the emerging cloud application market needs for affordable voice network security.