SlideShare a Scribd company logo
SBC – Top 10 FAQ
We answer your most frequently asked
Session Border Controller questions
January 2019
2
3
Past Webinars
http://www2.telcobridges.com/FreeSBCVideoLibrary
4
Frequently Asked Questions
1. What's difference between an SBC and a SIP Proxy?
2. How does an SBC detect and defend against
DOS/DDOS attacks?
3. Can an SBC help stop Robocallers?
4. How do SBCs limit call traffic?
5. What is topology hiding? Why do you need it?
6. Can I use an SBC to perform load balancing?
7. Do SBCs facilitate billing?
8. Does FreeSBC work with ________ ?
9. What are the risks/rewards for putting SBCs in the
cloud?
10. Is FreeSBC really Free? When is it not free?
5
Today’s Presenters:
Alan D Percy
Senior Director of Product Marketing
alan.percy@telcobridges.com
Marc St-Onge
Director of Sales Support
marc.stonge@telcobridges.com
6
The SIP School
What's difference between an SBC and a SIP Proxy?
7
8
SIP Proxy/Server Architecture
Header ManipulationRouting Engine
Media
SIP
Session
s
Public
WAN
34.0.0.
1
SIP Proxy/Server
SIP
Application
s
34.0.0.X
Routing Engine
Media
Media
Engine
SIP
Session
s
B2BUA
UAS UAC
Private LAN
192.168.0.X
Public WAN
34.0.0.1
Session Border Controller
SIP
Applicatio
ns
Session Border Controller Architecture
10
Comparison Summary
Function Firewall SIP Server SBC
Layer 2-4 Packet Filtering   
Router / NAT / DHCP   
Prevent DOS / DDOS Attacks   
SIP Header Manipulation / Interoperability  
SIP Routing  
Toll Fraud Protection  
Topology Hiding 
Block Robocallers (STIR/SHAKEN) 
QOS Measurement / Reporting 
Media Transcoding / Transcryption 
Prevent Media Flood Attacks 
How does an SBC detect and defend against
DOS/DDOS attacks?
11
DOS/DDOS Attacks
Network
Border
Internet SBC
Application
DOS/DDOS and Registration Floods
13
Protecting against DOS/DDOS
• Built-in Firewall with Access Control Lists (ACL)
• Dynamic Firewall Management
• Blacklists - IP addresses/ports of known offenders
• Whitelists - known valid users
• Bandwidth Management
• Call Rate Limiting
• CPS limits, deflecting bad traffic
• Line Rate Speed Processing – Important
Can an SBC help stop Robocallers?
14
SHAKEN: Verify valid calling numbers
15
Robocaller Terminating
TSP
Call with
fake caller
ID
Happy customers
Authenticate
caller ID and
sign call
Verify
signature and
apply policies
Complete
with
warning
Block
Phone Captcha
Divert
Originating
Telecom
Service
Provider
Policy
choices
Originating service provider authenticates
16
Session
Border
Controller
Originating Telecom Service
Provider
Authentication
Service (AS)
Secure Key
Store (SKS)
Calling Party
1. Call
originates
2. SBC sends SIP
INVITE to AS
3. AS checks caller ID, and returns
signed SIP Identity header.
4. Sends call
Outbound Call
Terminating service provider verifies
17
Session
Border
Controller
Terminating Telecom Service Provider
Verification
Service (VS)
Certificate
Repository
(CR)
Inbound Call
1. Call
arrives
2. Call Control initiates
terminating trigger,
sends to VS.
3. VS looks up CR URL, fetches certificate and extracts public
key to verify the signature. Uses verification and token info to
select policy and return the call to Call Control.
4. Call
terminates
Called Party
Coming Attraction:
18
https://www2.telcobridges.com/STIRSHAKEN201
How do SBCs limit call traffic?
19
20
Call Rate Limiting
Intelligent “Speed Limiter” managing
the incoming call flow
• Maximum # Calls
• Max Calls Per Second (CPS)
• Inbound and Outbound
• Handling Excess Traffic:
• “Congestion” – Slowing responses
• “Network Limit” – Configured per network
• “Hard Limit” – Reject any new requests
What is topology hiding? Why do you need it?
21
22
Topology Hiding
Not exposing the
internal network
configuration or IP
addresses to the
outside world
Only the SBC is
visible to the outside
world
Substitutes IP
addresses in SIP
headers and on RTP
Can I use an SBC to perform load balancing?
23
24
Load Balancing
Distributing call traffic
based on:
• Priority
• Availability
• Round-robin
• Dialed or Calling #
• Table/Script bases
• And more…
Routing Engine
Do SBCs facilitate billing?
25
26
Billing Systems and SBCs
SBC
Subscribers
Call
Servers
Billing
System
$$$Text CDR
or RADIUS
Does FreeSBC work with ________ ?
27
Interoperability
What are the risks/rewards for putting SBCs in the
cloud?
29
30
SBC Deployment Models Compared
Appliance
(Bare Metal)
Virtualized Cloud
Highest Performance
Most predictable
Small CPE appliances
Dedicated hardware
Best for large scale and
private datacenter
1+1 Redundancy
Flexible deployment
options
“Service Chain”
VM overhead limits
performance and
predictability
“Pay as you grow”
CAUTION: Media
charges and throughput
caps
“Noisy Neighbors?”
Good for dynamic
requirements and
flexible deployments
Is FreeSBC really Free? When is it not free?
31
32
FreeSBC Editions
Feature/Capability FreeSBC FreeSBC PRO
Back to Back User Agent (B2BUA)  
DDOS / DOS Protection  
NAT Traversal  
SIP Header / Digit Manipulation  
Call Routing  
Call Rate / Bandwidth Limiting  
Access to Wiki and Community Support  
Live Support and Software Update Service 
High Availability 1+1 90-day Trial 
Media Bypass (RTP no anchoring) 90-day Trial 
TB analytics 90-day Trial 
OSS/BSS, RADIUS, SNMP & API Connectors 90-day Trial 
For a full comparison, see: www.freesbc.com/pricing
33
Learn more at: www.FreeSBC.com
34
Learn More…
35
Q&A
The SIP School
www.thesipschool.com
Free copy of SBC software:
www.freesbc.com
Other Recorded webinars at:
freesbc.com/video-library
Q/A?

More Related Content

What's hot

Ims call flow
Ims call flowIms call flow
Ims call flowMorg
 
Wcdma callflow
Wcdma callflowWcdma callflow
Wcdma callflow
nayanangshu
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
Vikas Shokeen
 
Introducing to LAC-CI
Introducing to LAC-CIIntroducing to LAC-CI
Introducing to LAC-CI
Riswan
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
Vikas Shokeen
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
Matt Bynum
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
Kent Loh
 
CS-Core Mobile Network (General)
CS-Core Mobile Network (General)CS-Core Mobile Network (General)
CS-Core Mobile Network (General)
Hamidreza Bolhasani
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
Alan Percy
 
Introduction to FreeSWITCH
Introduction to FreeSWITCHIntroduction to FreeSWITCH
Introduction to FreeSWITCH
Chien Cheng Wu
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
LivePerson
 
Simplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice CallSimplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice Call
3G4G
 
Monetizing VoLTE, RCS and Video; IMS MRF and Conferencing Solutions
Monetizing VoLTE, RCS and Video; IMS MRF and Conferencing SolutionsMonetizing VoLTE, RCS and Video; IMS MRF and Conferencing Solutions
Monetizing VoLTE, RCS and Video; IMS MRF and Conferencing Solutions
Radisys Corporation
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
Mohd Nazir Shakeel
 
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
Vikas Shokeen
 
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
Vikas Shokeen
 
Session initiation protocol SIP
Session initiation protocol SIPSession initiation protocol SIP
Session initiation protocol SIP
Laraib Khan
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
Kent Loh
 
Call flow
Call flowCall flow
Introduction into SIP protocol
Introduction into SIP protocolIntroduction into SIP protocol
Introduction into SIP protocol
Michal Hrncirik
 

What's hot (20)

Ims call flow
Ims call flowIms call flow
Ims call flow
 
Wcdma callflow
Wcdma callflowWcdma callflow
Wcdma callflow
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
 
Introducing to LAC-CI
Introducing to LAC-CIIntroducing to LAC-CI
Introducing to LAC-CI
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 
CS-Core Mobile Network (General)
CS-Core Mobile Network (General)CS-Core Mobile Network (General)
CS-Core Mobile Network (General)
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
 
Introduction to FreeSWITCH
Introduction to FreeSWITCHIntroduction to FreeSWITCH
Introduction to FreeSWITCH
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
 
Simplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice CallSimplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice Call
 
Monetizing VoLTE, RCS and Video; IMS MRF and Conferencing Solutions
Monetizing VoLTE, RCS and Video; IMS MRF and Conferencing SolutionsMonetizing VoLTE, RCS and Video; IMS MRF and Conferencing Solutions
Monetizing VoLTE, RCS and Video; IMS MRF and Conferencing Solutions
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
 
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
 
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
 
Session initiation protocol SIP
Session initiation protocol SIPSession initiation protocol SIP
Session initiation protocol SIP
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
 
Call flow
Call flowCall flow
Call flow
 
Introduction into SIP protocol
Introduction into SIP protocolIntroduction into SIP protocol
Introduction into SIP protocol
 

Similar to Session Border Controllers - Top 10 FAQ

What is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border ControllerWhat is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border Controller
TelcoBridges Inc.
 
FRAFOS Secure Session Border Control
FRAFOS Secure Session Border ControlFRAFOS Secure Session Border Control
FRAFOS Secure Session Border Control
stefansayer
 
Frafos ABC SBC - Secure peering
Frafos ABC SBC - Secure peeringFrafos ABC SBC - Secure peering
Frafos ABC SBC - Secure peering
stefansayer
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
TelcoBridges Inc.
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
Alan Percy
 
Sbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSelf Employed
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBC
Alan Percy
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBC
TelcoBridges Inc.
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
Alan Percy
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
TelcoBridges Inc.
 
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
Biznes to Rozmowy
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
Alan Percy
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
Alan Percy
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
TelcoBridges Inc.
 
AUCUG Cloud PBX, Call Queuing & Sonus SBC's
AUCUG Cloud PBX, Call Queuing & Sonus SBC'sAUCUG Cloud PBX, Call Queuing & Sonus SBC's
AUCUG Cloud PBX, Call Queuing & Sonus SBC's
Andrew Morpeth
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
TelcoBridges Inc.
 
Why Do I Need an SBC
Why Do I Need an SBCWhy Do I Need an SBC
Why Do I Need an SBC
PacketBase, Inc.
 
FutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom ServicesFutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom ServicesRADVISION Ltd.
 
WebRTC - Bridging Web and SIP Worlds
WebRTC - Bridging Web and SIP WorldsWebRTC - Bridging Web and SIP Worlds
WebRTC - Bridging Web and SIP Worlds
IMTC
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
TelcoBridges Inc.
 

Similar to Session Border Controllers - Top 10 FAQ (20)

What is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border ControllerWhat is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border Controller
 
FRAFOS Secure Session Border Control
FRAFOS Secure Session Border ControlFRAFOS Secure Session Border Control
FRAFOS Secure Session Border Control
 
Frafos ABC SBC - Secure peering
Frafos ABC SBC - Secure peeringFrafos ABC SBC - Secure peering
Frafos ABC SBC - Secure peering
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
Sbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX Deloyment
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBC
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBC
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
AUCUG Cloud PBX, Call Queuing & Sonus SBC's
AUCUG Cloud PBX, Call Queuing & Sonus SBC'sAUCUG Cloud PBX, Call Queuing & Sonus SBC's
AUCUG Cloud PBX, Call Queuing & Sonus SBC's
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Why Do I Need an SBC
Why Do I Need an SBCWhy Do I Need an SBC
Why Do I Need an SBC
 
FutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom ServicesFutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom Services
 
WebRTC - Bridging Web and SIP Worlds
WebRTC - Bridging Web and SIP WorldsWebRTC - Bridging Web and SIP Worlds
WebRTC - Bridging Web and SIP Worlds
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
 

More from Alan Percy

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptx
Alan Percy
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
Alan Percy
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
Alan Percy
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Alan Percy
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
Alan Percy
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
Alan Percy
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
Alan Percy
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
Alan Percy
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
Alan Percy
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
Alan Percy
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
Alan Percy
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
Alan Percy
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
Alan Percy
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
Alan Percy
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
Alan Percy
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
Alan Percy
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
Alan Percy
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
Alan Percy
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
Alan Percy
 
Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
Alan Percy
 

More from Alan Percy (20)

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptx
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Session Border Controllers - Top 10 FAQ

  • 1.
  • 2. SBC – Top 10 FAQ We answer your most frequently asked Session Border Controller questions January 2019 2
  • 4. 4 Frequently Asked Questions 1. What's difference between an SBC and a SIP Proxy? 2. How does an SBC detect and defend against DOS/DDOS attacks? 3. Can an SBC help stop Robocallers? 4. How do SBCs limit call traffic? 5. What is topology hiding? Why do you need it? 6. Can I use an SBC to perform load balancing? 7. Do SBCs facilitate billing? 8. Does FreeSBC work with ________ ? 9. What are the risks/rewards for putting SBCs in the cloud? 10. Is FreeSBC really Free? When is it not free?
  • 5. 5 Today’s Presenters: Alan D Percy Senior Director of Product Marketing alan.percy@telcobridges.com Marc St-Onge Director of Sales Support marc.stonge@telcobridges.com
  • 7. What's difference between an SBC and a SIP Proxy? 7
  • 8. 8 SIP Proxy/Server Architecture Header ManipulationRouting Engine Media SIP Session s Public WAN 34.0.0. 1 SIP Proxy/Server SIP Application s 34.0.0.X
  • 9. Routing Engine Media Media Engine SIP Session s B2BUA UAS UAC Private LAN 192.168.0.X Public WAN 34.0.0.1 Session Border Controller SIP Applicatio ns Session Border Controller Architecture
  • 10. 10 Comparison Summary Function Firewall SIP Server SBC Layer 2-4 Packet Filtering    Router / NAT / DHCP    Prevent DOS / DDOS Attacks    SIP Header Manipulation / Interoperability   SIP Routing   Toll Fraud Protection   Topology Hiding  Block Robocallers (STIR/SHAKEN)  QOS Measurement / Reporting  Media Transcoding / Transcryption  Prevent Media Flood Attacks 
  • 11. How does an SBC detect and defend against DOS/DDOS attacks? 11
  • 13. 13 Protecting against DOS/DDOS • Built-in Firewall with Access Control Lists (ACL) • Dynamic Firewall Management • Blacklists - IP addresses/ports of known offenders • Whitelists - known valid users • Bandwidth Management • Call Rate Limiting • CPS limits, deflecting bad traffic • Line Rate Speed Processing – Important
  • 14. Can an SBC help stop Robocallers? 14
  • 15. SHAKEN: Verify valid calling numbers 15 Robocaller Terminating TSP Call with fake caller ID Happy customers Authenticate caller ID and sign call Verify signature and apply policies Complete with warning Block Phone Captcha Divert Originating Telecom Service Provider Policy choices
  • 16. Originating service provider authenticates 16 Session Border Controller Originating Telecom Service Provider Authentication Service (AS) Secure Key Store (SKS) Calling Party 1. Call originates 2. SBC sends SIP INVITE to AS 3. AS checks caller ID, and returns signed SIP Identity header. 4. Sends call Outbound Call
  • 17. Terminating service provider verifies 17 Session Border Controller Terminating Telecom Service Provider Verification Service (VS) Certificate Repository (CR) Inbound Call 1. Call arrives 2. Call Control initiates terminating trigger, sends to VS. 3. VS looks up CR URL, fetches certificate and extracts public key to verify the signature. Uses verification and token info to select policy and return the call to Call Control. 4. Call terminates Called Party
  • 19. How do SBCs limit call traffic? 19
  • 20. 20 Call Rate Limiting Intelligent “Speed Limiter” managing the incoming call flow • Maximum # Calls • Max Calls Per Second (CPS) • Inbound and Outbound • Handling Excess Traffic: • “Congestion” – Slowing responses • “Network Limit” – Configured per network • “Hard Limit” – Reject any new requests
  • 21. What is topology hiding? Why do you need it? 21
  • 22. 22 Topology Hiding Not exposing the internal network configuration or IP addresses to the outside world Only the SBC is visible to the outside world Substitutes IP addresses in SIP headers and on RTP
  • 23. Can I use an SBC to perform load balancing? 23
  • 24. 24 Load Balancing Distributing call traffic based on: • Priority • Availability • Round-robin • Dialed or Calling # • Table/Script bases • And more… Routing Engine
  • 25. Do SBCs facilitate billing? 25
  • 26. 26 Billing Systems and SBCs SBC Subscribers Call Servers Billing System $$$Text CDR or RADIUS
  • 27. Does FreeSBC work with ________ ? 27
  • 29. What are the risks/rewards for putting SBCs in the cloud? 29
  • 30. 30 SBC Deployment Models Compared Appliance (Bare Metal) Virtualized Cloud Highest Performance Most predictable Small CPE appliances Dedicated hardware Best for large scale and private datacenter 1+1 Redundancy Flexible deployment options “Service Chain” VM overhead limits performance and predictability “Pay as you grow” CAUTION: Media charges and throughput caps “Noisy Neighbors?” Good for dynamic requirements and flexible deployments
  • 31. Is FreeSBC really Free? When is it not free? 31
  • 32. 32 FreeSBC Editions Feature/Capability FreeSBC FreeSBC PRO Back to Back User Agent (B2BUA)   DDOS / DOS Protection   NAT Traversal   SIP Header / Digit Manipulation   Call Routing   Call Rate / Bandwidth Limiting   Access to Wiki and Community Support   Live Support and Software Update Service  High Availability 1+1 90-day Trial  Media Bypass (RTP no anchoring) 90-day Trial  TB analytics 90-day Trial  OSS/BSS, RADIUS, SNMP & API Connectors 90-day Trial  For a full comparison, see: www.freesbc.com/pricing
  • 33. 33 Learn more at: www.FreeSBC.com
  • 35. 35 Q&A The SIP School www.thesipschool.com Free copy of SBC software: www.freesbc.com Other Recorded webinars at: freesbc.com/video-library Q/A?

Editor's Notes

  1. Welcome to “FreeSBC – A New Approach to the SBC”, a webinar event hosted by TelcoBridges Before we begin, a little housekeeping: As a live event participant, you’ll have the opportunity to interact with today’s speakers and hope you do pose your questions and comments on today’s topic using the Q/A panel. To pose a question or comment, open the Q/A panel by clicking on the box in the upper left of your screen. We’ll cover your questions toward the end of the session. We’ve found that some attendees may need to adjust the webinar View Options to see the full slide on your screen. If you are not seeing a full slide, move your mouse to the top of the webinar window and a View Option selection will appear – choose an option that best fits your screen. Also, today’s event is being recorded and all those that have registered will received a link to the recording for on-demand playback. We hope you share the link with your co-workers and others that would find the discussion valuable.
  2. Some introductions to get started: I’m Alan Percy, Senior Director of Product Marketing for TelcoBridges and today’s event moderator. Having joined the company in December, I’m the “new kid on the block” and responsible for driving awareness of the session border controller solutions from TelcoBridges. Joining us today is Marc Saint-Onge, Director of Sales Support for TelcoBridges. Marc has a long history with TelcoBridges, providing technical expertise and advice to customers across the globe. Marc, thanks for being a part of today’s event. [Marc response] And we’re glad to have you, our attendees, with us today and encourage you to use the opportunity to interact with our speakers by posing your questions and comments.
  3. Recognizing these needs, TelcoBridges offers FreeSBC, a software SBC solution designed specifically for cloud and virtualized deployments. Highly scalable with carrier-grade reliability, FreeSBC is a commercial SBC, offered under a “freemium” business model. We feel FreeSBC better fits the emerging cloud application market needs for affordable voice network security.