SlideShare a Scribd company logo
Session Border Controllers - Top 10 FAQ
SBC – Top 10 FAQ
We answer your most frequently asked
Session Border Controller questions
January 2019
2
3
Past Webinars
http://www2.telcobridges.com/FreeSBCVideoLibrary
4
Frequently Asked Questions
1. What's difference between an SBC and a SIP Proxy?
2. How does an SBC detect and defend against
DOS/DDOS attacks?
3. Can an SBC help stop Robocallers?
4. How do SBCs limit call traffic?
5. What is topology hiding? Why do you need it?
6. Can I use an SBC to perform load balancing?
7. Do SBCs facilitate billing?
8. Does FreeSBC work with ________ ?
9. What are the risks/rewards for putting SBCs in the
cloud?
10. Is FreeSBC really Free? When is it not free?
5
Today’s Presenters:
Alan D Percy
Senior Director of Product Marketing
alan.percy@telcobridges.com
Marc St-Onge
Director of Sales Support
marc.stonge@telcobridges.com
6
The SIP School
What's difference between an SBC and a SIP Proxy?
7
8
SIP Proxy/Server Architecture
Header Manipulation
Routing Engine
Media
SIP
Session
s
Public
WAN
34.0.0.
1
SIP Proxy/Server
SIP
Application
s
34.0.0.X
Routing Engine
Media
Media
Engine
SIP
Session
s
B2BUA
UAS UAC
Private LAN
192.168.0.X
Public WAN
34.0.0.1
Session Border Controller
SIP
Applicatio
ns
Session Border Controller Architecture
10
Comparison Summary
Function Firewall SIP Server SBC
Layer 2-4 Packet Filtering   
Router / NAT / DHCP   
Prevent DOS / DDOS Attacks   
SIP Header Manipulation / Interoperability  
SIP Routing  
Toll Fraud Protection  
Topology Hiding 
Block Robocallers (STIR/SHAKEN) 
QOS Measurement / Reporting 
Media Transcoding / Transcryption 
Prevent Media Flood Attacks 
How does an SBC detect and defend against
DOS/DDOS attacks?
11
DOS/DDOS Attacks
Network
Border
Internet SBC
Application
DOS/DDOS and Registration Floods
13
Protecting against DOS/DDOS
• Built-in Firewall with Access Control Lists (ACL)
• Dynamic Firewall Management
• Blacklists - IP addresses/ports of known offenders
• Whitelists - known valid users
• Bandwidth Management
• Call Rate Limiting
• CPS limits, deflecting bad traffic
• Line Rate Speed Processing – Important
Can an SBC help stop Robocallers?
14
SHAKEN: Verify valid calling numbers
15
Robocaller Terminating
TSP
Call with
fake caller
ID
Happy customers
Authenticate
caller ID and
sign call
Verify
signature and
apply policies
Complete
with
warning
Block
Phone Captcha
Divert
Originating
Telecom
Service
Provider
Policy
choices
Originating service provider authenticates
16
Session
Border
Controller
Originating Telecom Service
Provider
Authentication
Service (AS)
Secure Key
Store (SKS)
Calling Party
1. Call
originates
2. SBC sends SIP
INVITE to AS
3. AS checks caller ID, and returns
signed SIP Identity header.
4. Sends call
Outbound Call
Terminating service provider verifies
17
Session
Border
Controller
Terminating Telecom Service Provider
Verification
Service (VS)
Certificate
Repository
(CR)
Inbound Call
1. Call
arrives
2. Call Control initiates
terminating trigger,
sends to VS.
3. VS looks up CR URL, fetches certificate and extracts public
key to verify the signature. Uses verification and token info to
select policy and return the call to Call Control.
4. Call
terminates
Called Party
Coming Attraction:
18
https://www2.telcobridges.com/STIRSHAKEN201
How do SBCs limit call traffic?
19
20
Call Rate Limiting
Intelligent “Speed Limiter” managing
the incoming call flow
• Maximum # Calls
• Max Calls Per Second (CPS)
• Inbound and Outbound
• Handling Excess Traffic:
• “Congestion” – Slowing responses
• “Network Limit” – Configured per network
• “Hard Limit” – Reject any new requests
What is topology hiding? Why do you need it?
21
22
Topology Hiding
Not exposing the
internal network
configuration or IP
addresses to the
outside world
Only the SBC is
visible to the outside
world
Substitutes IP
addresses in SIP
headers and on RTP
Can I use an SBC to perform load balancing?
23
24
Load Balancing
Distributing call traffic
based on:
• Priority
• Availability
• Round-robin
• Dialed or Calling #
• Table/Script bases
• And more…
Routing Engine
Do SBCs facilitate billing?
25
26
Billing Systems and SBCs
SBC
Subscribers
Call
Servers
Billing
System
$$$
Text CDR
or RADIUS
Does FreeSBC work with ________ ?
27
Interoperability
What are the risks/rewards for putting SBCs in the
cloud?
29
30
SBC Deployment Models Compared
Appliance
(Bare Metal)
Virtualized Cloud
Highest Performance
Most predictable
Small CPE appliances
Dedicated hardware
Best for large scale and
private datacenter
1+1 Redundancy
Flexible deployment
options
“Service Chain”
VM overhead limits
performance and
predictability
“Pay as you grow”
CAUTION: Media
charges and throughput
caps
“Noisy Neighbors?”
Good for dynamic
requirements and
flexible deployments
Is FreeSBC really Free? When is it not free?
31
32
FreeSBC Editions
Feature/Capability FreeSBC FreeSBC PRO
Back to Back User Agent (B2BUA)  
DDOS / DOS Protection  
NAT Traversal  
SIP Header / Digit Manipulation  
Call Routing  
Call Rate / Bandwidth Limiting  
Access to Wiki and Community Support  
Live Support and Software Update Service 
High Availability 1+1 90-day Trial 
Media Bypass (RTP no anchoring) 90-day Trial 
TB analytics 90-day Trial 
OSS/BSS, RADIUS, SNMP & API Connectors 90-day Trial 
For a full comparison, see: www.freesbc.com/pricing
33
Learn more at: www.FreeSBC.com
34
Learn More…
35
Q&A
The SIP School
www.thesipschool.com
Free copy of SBC software:
www.freesbc.com
Other Recorded webinars at:
freesbc.com/video-library
Q/A?

More Related Content

PPTX
What is an SBC? A look at the role of the Session Border Controller
PDF
What is an SBC? A look at the role of the Session Border Controller
PDF
FRAFOS Secure Session Border Control
PDF
Frafos ABC SBC - Secure peering
PDF
Scaling Open Source Applications with SBCs
PPTX
Scaling Open Source Applications with SBCs
PDF
Sbc the-critical-component for a successful IP PBX Deloyment
PPTX
FreeSBC - A New Approach to the SBC
What is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border Controller
FRAFOS Secure Session Border Control
Frafos ABC SBC - Secure peering
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
Sbc the-critical-component for a successful IP PBX Deloyment
FreeSBC - A New Approach to the SBC

Similar to Session Border Controllers - Top 10 FAQ (20)

PDF
FreeSBC - A New Approach to the SBC
PPTX
VoIP Frequently Asked Questions
PDF
VoIP Frequently Asked Questions
PDF
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
PPTX
The Deployment_MSTeams _Ribbon SBC on CORE
PPTX
How to Measure VoIP Voice Quality
PPTX
ProSBC a Deep Dive
PDF
How to Measure VoIP Voice Quality
PPTX
AUCUG Cloud PBX, Call Queuing & Sonus SBC's
PDF
ProSBC a Deep Dive
PPTX
Why Do I Need an SBC
PPTX
FutureComm 2010: Scaling Advanced VoIP Telecom Services
PDF
Introduction to Session Border Controller (SBC)
PDF
WebRTC - Bridging Web and SIP Worlds
PPTX
Introduction into SIP protocol
PDF
ProSBC Introduction
PPTX
ProSBC introduction
PPT
Sip Trunking Getting It Right The 1st Time
PDF
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
PDF
Session bordercontrollers
FreeSBC - A New Approach to the SBC
VoIP Frequently Asked Questions
VoIP Frequently Asked Questions
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
The Deployment_MSTeams _Ribbon SBC on CORE
How to Measure VoIP Voice Quality
ProSBC a Deep Dive
How to Measure VoIP Voice Quality
AUCUG Cloud PBX, Call Queuing & Sonus SBC's
ProSBC a Deep Dive
Why Do I Need an SBC
FutureComm 2010: Scaling Advanced VoIP Telecom Services
Introduction to Session Border Controller (SBC)
WebRTC - Bridging Web and SIP Worlds
Introduction into SIP protocol
ProSBC Introduction
ProSBC introduction
Sip Trunking Getting It Right The 1st Time
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
Session bordercontrollers
Ad

More from TelcoBridges Inc. (20)

PDF
Network Transformation - Top 5 Best Practices
PDF
The Role of SBCs in Fraud Protection
PDF
Tmedia for Metaswitch - a FAQ Session
PDF
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
PDF
Marketing Open Source Software - 10 Tips
PDF
Contact Center as a Service - Challenges and Successes
PDF
Robocall Mitigation with YouMail and ProSBC
PDF
What is SS7? An Introduction to Signaling System 7
PDF
RESTful APIs and SBCs
PDF
New Opportunities with Two Factor Authentication (2FA) - A How To
PDF
UCaaS with 3cx and ProSBC
PDF
The Future of Media Gateways
PDF
How to Protect Against TDOS Attacks
PDF
ProSBC on Azure - A Tutorial
PDF
uCPE and VNFs Explained
PDF
How to Prevent Telecom Fraud in Real-Time
PDF
Enabling business with CPaaS and SBCs
PDF
Extending the Life of your SS7 Network with SIGTRAN
PDF
STIR-SHAKEN Top 10 FAQ
PDF
Battling Robocallers - How to Implement STIR-SHAKEN
Network Transformation - Top 5 Best Practices
The Role of SBCs in Fraud Protection
Tmedia for Metaswitch - a FAQ Session
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Marketing Open Source Software - 10 Tips
Contact Center as a Service - Challenges and Successes
Robocall Mitigation with YouMail and ProSBC
What is SS7? An Introduction to Signaling System 7
RESTful APIs and SBCs
New Opportunities with Two Factor Authentication (2FA) - A How To
UCaaS with 3cx and ProSBC
The Future of Media Gateways
How to Protect Against TDOS Attacks
ProSBC on Azure - A Tutorial
uCPE and VNFs Explained
How to Prevent Telecom Fraud in Real-Time
Enabling business with CPaaS and SBCs
Extending the Life of your SS7 Network with SIGTRAN
STIR-SHAKEN Top 10 FAQ
Battling Robocallers - How to Implement STIR-SHAKEN
Ad

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Tartificialntelligence_presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Mushroom cultivation and it's methods.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Per capita expenditure prediction using model stacking based on satellite ima...
Assigned Numbers - 2025 - Bluetooth® Document
Network Security Unit 5.pdf for BCA BBA.
Spectroscopy.pptx food analysis technology
Tartificialntelligence_presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
Mushroom cultivation and it's methods.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Heart disease approach using modified random forest and particle swarm optimi...
Machine learning based COVID-19 study performance prediction
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Group 1 Presentation -Planning and Decision Making .pptx
OMC Textile Division Presentation 2021.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Session Border Controllers - Top 10 FAQ

  • 2. SBC – Top 10 FAQ We answer your most frequently asked Session Border Controller questions January 2019 2
  • 4. 4 Frequently Asked Questions 1. What's difference between an SBC and a SIP Proxy? 2. How does an SBC detect and defend against DOS/DDOS attacks? 3. Can an SBC help stop Robocallers? 4. How do SBCs limit call traffic? 5. What is topology hiding? Why do you need it? 6. Can I use an SBC to perform load balancing? 7. Do SBCs facilitate billing? 8. Does FreeSBC work with ________ ? 9. What are the risks/rewards for putting SBCs in the cloud? 10. Is FreeSBC really Free? When is it not free?
  • 5. 5 Today’s Presenters: Alan D Percy Senior Director of Product Marketing alan.percy@telcobridges.com Marc St-Onge Director of Sales Support marc.stonge@telcobridges.com
  • 7. What's difference between an SBC and a SIP Proxy? 7
  • 8. 8 SIP Proxy/Server Architecture Header Manipulation Routing Engine Media SIP Session s Public WAN 34.0.0. 1 SIP Proxy/Server SIP Application s 34.0.0.X
  • 9. Routing Engine Media Media Engine SIP Session s B2BUA UAS UAC Private LAN 192.168.0.X Public WAN 34.0.0.1 Session Border Controller SIP Applicatio ns Session Border Controller Architecture
  • 10. 10 Comparison Summary Function Firewall SIP Server SBC Layer 2-4 Packet Filtering    Router / NAT / DHCP    Prevent DOS / DDOS Attacks    SIP Header Manipulation / Interoperability   SIP Routing   Toll Fraud Protection   Topology Hiding  Block Robocallers (STIR/SHAKEN)  QOS Measurement / Reporting  Media Transcoding / Transcryption  Prevent Media Flood Attacks 
  • 11. How does an SBC detect and defend against DOS/DDOS attacks? 11
  • 13. 13 Protecting against DOS/DDOS • Built-in Firewall with Access Control Lists (ACL) • Dynamic Firewall Management • Blacklists - IP addresses/ports of known offenders • Whitelists - known valid users • Bandwidth Management • Call Rate Limiting • CPS limits, deflecting bad traffic • Line Rate Speed Processing – Important
  • 14. Can an SBC help stop Robocallers? 14
  • 15. SHAKEN: Verify valid calling numbers 15 Robocaller Terminating TSP Call with fake caller ID Happy customers Authenticate caller ID and sign call Verify signature and apply policies Complete with warning Block Phone Captcha Divert Originating Telecom Service Provider Policy choices
  • 16. Originating service provider authenticates 16 Session Border Controller Originating Telecom Service Provider Authentication Service (AS) Secure Key Store (SKS) Calling Party 1. Call originates 2. SBC sends SIP INVITE to AS 3. AS checks caller ID, and returns signed SIP Identity header. 4. Sends call Outbound Call
  • 17. Terminating service provider verifies 17 Session Border Controller Terminating Telecom Service Provider Verification Service (VS) Certificate Repository (CR) Inbound Call 1. Call arrives 2. Call Control initiates terminating trigger, sends to VS. 3. VS looks up CR URL, fetches certificate and extracts public key to verify the signature. Uses verification and token info to select policy and return the call to Call Control. 4. Call terminates Called Party
  • 19. How do SBCs limit call traffic? 19
  • 20. 20 Call Rate Limiting Intelligent “Speed Limiter” managing the incoming call flow • Maximum # Calls • Max Calls Per Second (CPS) • Inbound and Outbound • Handling Excess Traffic: • “Congestion” – Slowing responses • “Network Limit” – Configured per network • “Hard Limit” – Reject any new requests
  • 21. What is topology hiding? Why do you need it? 21
  • 22. 22 Topology Hiding Not exposing the internal network configuration or IP addresses to the outside world Only the SBC is visible to the outside world Substitutes IP addresses in SIP headers and on RTP
  • 23. Can I use an SBC to perform load balancing? 23
  • 24. 24 Load Balancing Distributing call traffic based on: • Priority • Availability • Round-robin • Dialed or Calling # • Table/Script bases • And more… Routing Engine
  • 25. Do SBCs facilitate billing? 25
  • 26. 26 Billing Systems and SBCs SBC Subscribers Call Servers Billing System $$$ Text CDR or RADIUS
  • 27. Does FreeSBC work with ________ ? 27
  • 29. What are the risks/rewards for putting SBCs in the cloud? 29
  • 30. 30 SBC Deployment Models Compared Appliance (Bare Metal) Virtualized Cloud Highest Performance Most predictable Small CPE appliances Dedicated hardware Best for large scale and private datacenter 1+1 Redundancy Flexible deployment options “Service Chain” VM overhead limits performance and predictability “Pay as you grow” CAUTION: Media charges and throughput caps “Noisy Neighbors?” Good for dynamic requirements and flexible deployments
  • 31. Is FreeSBC really Free? When is it not free? 31
  • 32. 32 FreeSBC Editions Feature/Capability FreeSBC FreeSBC PRO Back to Back User Agent (B2BUA)   DDOS / DOS Protection   NAT Traversal   SIP Header / Digit Manipulation   Call Routing   Call Rate / Bandwidth Limiting   Access to Wiki and Community Support   Live Support and Software Update Service  High Availability 1+1 90-day Trial  Media Bypass (RTP no anchoring) 90-day Trial  TB analytics 90-day Trial  OSS/BSS, RADIUS, SNMP & API Connectors 90-day Trial  For a full comparison, see: www.freesbc.com/pricing
  • 33. 33 Learn more at: www.FreeSBC.com
  • 35. 35 Q&A The SIP School www.thesipschool.com Free copy of SBC software: www.freesbc.com Other Recorded webinars at: freesbc.com/video-library Q/A?