SlideShare a Scribd company logo
What is an SBC?
A look at the role of the
Session Border Controller
Alan D. Percy
alan.percy@telcobridges.com
November 2018
1
2
What are the Risks?
• Extortion
• DOS / DDOS Attacks
• Registration Floods
• Malformed SIP Headers
• Call Floods
• Intrusion
• Network Scanning
• Account Hacking
• Theft of Services
3
Agenda
Session Border Controllers
• What are they?
• How do they work?
• How are they used?
• Where to get free
SBC software?
• Where to learn more?
4
Firewall = SBC?
Internet
LAN
WAN
SIP
“A SBC is just a Firewall for SIP, right?”
RTP
5
SIP Server = SBC?
Answer: No – SIP Servers don’t have a B2BUA and have
no media handling security
6
Other Needs?
• SIP-aware Security
• Resolve SIP incompatibility
issues
• Convert media formats
• Facilitate call recording
• Measure voice/video quality
• Call Routing
• Billing By Korolev Alexandr
RFC 3261
What is a SBC?
Local Area
Network
Network
Border
Wide Area
Network SBC
• Anywhere two SIP networks intersect
• Software-based “Network Function”
• Most often between a WAN and a LAN
SIP SIP
Topology Hiding
Network
Border
Internet SBC
Application
10.X.X.X
34.Y.Y.Y
“Back to Back User Agent”
B2BUA
DOS/DDOS/Intrusion Prevention
Network
Border
Internet SBC
Application
Detects and deflects
DOS/DDOS and Registration Floods
Encryption Demarcation
Network
Border
Service
Provider SBC
Application
Clear
Encrypted
Encryption of session control (SIP/TLS)
and/or media (SRTP)
11
NAT Traversal
Tasks:
 NAT Detection
 Address Translation
 NAT Pinhole Maintenance
SMB/Enterprise
IAD/Router
NAT
Service Provider
Application
SBC
192.x.x.x 34.x.x.x
SIP
Media Services
• Codec conversion (Transcoding)
• Tones and Announcements
• Legal Intercept
• Voice quality measurement
Network
Border
Service
Provider SBC
Application
G.711
G.729
Law
Enforcement
SIP Interoperability
Service
Provider
Network
Border
Privacy modification SIP From: Alice SIP From: Anonymous
SIP X-Header : Op-A SIP P-Header: No-charge
Custom header
SIP SIP-I  Carrier Interoperability
Protocol
conversion
 Multi-vendor Compatibility
 Privacy enforcement
Service
Provider
Digit Manipulation SIP To: 555-1212 SIP To: +1 800 555-1212  Privacy enforcement
SBC
Traffic Management & Routing
• Call Rate Limiting
• Load Balancing
• Route by called/calling #
• Route by availability
• External/Custom/Third-party Algorithms
SBC
SIP Traffic
15
How does a SBC work?
Functions of a Session Border Controller
• Security
• Intrusion Protection
• “Line Rate” Inspection
• Topology Hiding
• B2BUA Interoperability
• Media Services
• Routing/Traffic Mgmt.
• More…
Session Border Controller
Functions
Intrusion
Detection
& Security
B2BUA Routing
Media
USE CASES
16
17
Use Cases - Peering
Tasks:
 Call routing
 Mediation
 Billing functions
Retail Service Provider
SoftSwitch
Wholesale VoIP Provider
SBC
SBC
Billing
18
Use Cases – Access
Tasks:
 DOS/DDOS Protection
 NAT Traversal
 SIP Registration screening
 Analytics and Billing
 QOS Monitoring & Reporting
SMB/Enterprise
IAD/Router
Service Provider
Softswitch
SBC
Billing
19
Use Cases – Redundancy
Tasks:
 Failure Detection
 Traffic Redirection and Routing
 Performance Measurement
Service Provider
SBC
SBC
Wholesale
Provider(s)
20
Use Cases – CPaaS Providers
Tasks:
 SIP Trunking Interoperability
 FQDN Mapping
 Intelligent Call Routing
 Media By-pass
 Cloud Hosted
Cloud-based Communications Provider as a Service (CPaaS)
SIP Trunking
Provider(s)
CPaaS
SBC
Emergence of the E-SBC
Service Provider SBC
• Protect service provider’s network
• High density / Large capacity
• Billing Interfaces
• NAT Traversal
• SIP Trunking and Access
• Central Office / Cloud Deployment
• 1+1 Redundancy
• Legal Intercept (CALEA)
• Wireline and Wireless SPs
• Sold through Systems Integrators
Enterprise SBC
21
• Protect enterprise’s network
• Low to medium density
• Quality of Service measurement
• Intrusion Protection
• UC or IP-PBX Interoperabililty
• Customer Premises (CPE)
• Lower cost
• SIPREC for Call Recording
• Mid-market and Enterprises
• Sold through Resellers/Channels
22
Use Cases – E-SBC
Tasks:
 Security
 SIP Trunking Interoperability
 ANI/Caller-ID Substitution
 Cause Code Mapping
IP-PBX / UC / Contact Center with SIP Trunking
SIP Trunking
Provider(s)
UC or
Contact Center
SBC
23
Use Cases – E-SBC
Tasks:
 Security
 SIP Trunking Interoperability
 Registration Forwarding
IP-PBX / UC / Contact Center with SIP Trunking and Remote Users
SIP Trunking
Provider(s)
UC or
Contact Center
SBC
Work-at-home users
SBC
DEPLOYMENT
METHODS
24
25
SBCs “Back in the Day”
• SBCs were based on specialized
“purpose-built” hardware platforms
• Packet processing H/W
• DSP Modules
• DC Power
• High Availability in hardware
Changing Economics
“Old Way”
Hardware-centric
Proprietary appliances
EOL Hardware
Capital Expenditure + Maintenance
“Cloud Way”
26
Software-centric
COTS Hardware, Virtual or Cloud
Software-as-a-Service
“Pay-as-you-Grow”
TCO
Years
TCO
Years
27
SBCs as Software
“Service providers have been deploying session
border controllers (SBCs) predominantly as
standalone devices, but by 2019 they will
increasingly implement SBCs as software in
virtualized environments and on commercial
servers…”, Diane Myers, IHS Markit
Source: IHS Markit’s IMS and SBC Strategies and Vendor
Leadership Service Provider Survey, September 2019
28
SBC Deployment Models – COTS
• Highest performance and scale
• Most predictable performance
• Scales down to small CPE appliances
• Required dedicated hardware
29
SBC Deployment Models - Virtualized
• Deployed in CPE, Data Center, Private and Public
Cloud
30
SBC Deployment Models - VNF
• Deployed as a Virtualized
Network Function (VNF)
• Core of a Service Provider
or
Edge of a SP network on
uCPE
• Managed by Orchestration
S/W
SBC
31
SBC Deployment Models - Cloud
• “Pay as you Grow”
• Variety of platform choices
and operating systems
• Flexible scaling
32
Introducing…
Learn more at: www.FreeSBC.com
33
Congratulations!
• You now know enough to
be dangerous!
• How do you continue
your knowledge?
34
More on SBCs at The SIP School
35
Learn More…
36
Q&A
The SIP School
www.thesipschool.com
Free copy of SBC software:
www.freesbc.com
Other Recorded webinars at:
freesbc.com/video-library
Q/A?

More Related Content

Similar to What is an SBC? A look at the role of the Session Border Controller

Why Do I Need an SBC
Why Do I Need an SBCWhy Do I Need an SBC
Why Do I Need an SBC
PacketBase, Inc.
 
Session bordercontrollers
Session bordercontrollersSession bordercontrollers
Session bordercontrollers
Astri AndTi
 
Sbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSelf Employed
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
TelcoBridges Inc.
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
Alan Percy
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
TelcoBridges Inc.
 
FutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom ServicesFutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom ServicesRADVISION Ltd.
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
Alan Percy
 
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Nordic Infrastructure Conference
 
Frafos ABC SBC - Secure peering
Frafos ABC SBC - Secure peeringFrafos ABC SBC - Secure peering
Frafos ABC SBC - Secure peering
stefansayer
 
FRAFOS Secure Session Border Control
FRAFOS Secure Session Border ControlFRAFOS Secure Session Border Control
FRAFOS Secure Session Border Control
stefansayer
 
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
Biznes to Rozmowy
 
Asterisk Deployments
Asterisk DeploymentsAsterisk Deployments
Asterisk Deployments
Asterisk Community
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
Alan Percy
 
Integrating Unified Communications and Collaboration on an Aruba Access Network
Integrating Unified Communications and Collaboration on an Aruba Access NetworkIntegrating Unified Communications and Collaboration on an Aruba Access Network
Integrating Unified Communications and Collaboration on an Aruba Access Network
Aruba, a Hewlett Packard Enterprise company
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
TelcoBridges Inc.
 
Microsoft Unified Communications Summit
Microsoft Unified Communications SummitMicrosoft Unified Communications Summit
Microsoft Unified Communications Summit
Concurrency, Inc.
 
Ribbon ntta switching evolution
Ribbon ntta switching evolutionRibbon ntta switching evolution
Ribbon ntta switching evolution
dborsan
 
Making Legacy IBM Systems Visible in ServiceNow
Making Legacy IBM Systems Visible in ServiceNowMaking Legacy IBM Systems Visible in ServiceNow
Making Legacy IBM Systems Visible in ServiceNow
Precisely
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
Irsandi Hasan
 

Similar to What is an SBC? A look at the role of the Session Border Controller (20)

Why Do I Need an SBC
Why Do I Need an SBCWhy Do I Need an SBC
Why Do I Need an SBC
 
Session bordercontrollers
Session bordercontrollersSession bordercontrollers
Session bordercontrollers
 
Sbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX Deloyment
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
 
FutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom ServicesFutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom Services
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
 
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
 
Frafos ABC SBC - Secure peering
Frafos ABC SBC - Secure peeringFrafos ABC SBC - Secure peering
Frafos ABC SBC - Secure peering
 
FRAFOS Secure Session Border Control
FRAFOS Secure Session Border ControlFRAFOS Secure Session Border Control
FRAFOS Secure Session Border Control
 
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
 
Asterisk Deployments
Asterisk DeploymentsAsterisk Deployments
Asterisk Deployments
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
Integrating Unified Communications and Collaboration on an Aruba Access Network
Integrating Unified Communications and Collaboration on an Aruba Access NetworkIntegrating Unified Communications and Collaboration on an Aruba Access Network
Integrating Unified Communications and Collaboration on an Aruba Access Network
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
Microsoft Unified Communications Summit
Microsoft Unified Communications SummitMicrosoft Unified Communications Summit
Microsoft Unified Communications Summit
 
Ribbon ntta switching evolution
Ribbon ntta switching evolutionRibbon ntta switching evolution
Ribbon ntta switching evolution
 
Making Legacy IBM Systems Visible in ServiceNow
Making Legacy IBM Systems Visible in ServiceNowMaking Legacy IBM Systems Visible in ServiceNow
Making Legacy IBM Systems Visible in ServiceNow
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 

More from TelcoBridges Inc.

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best Practices
TelcoBridges Inc.
 
The Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionThe Role of SBCs in Fraud Protection
The Role of SBCs in Fraud Protection
TelcoBridges Inc.
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ Session
TelcoBridges Inc.
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
TelcoBridges Inc.
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
TelcoBridges Inc.
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
TelcoBridges Inc.
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
TelcoBridges Inc.
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
TelcoBridges Inc.
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
TelcoBridges Inc.
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
TelcoBridges Inc.
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
TelcoBridges Inc.
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
TelcoBridges Inc.
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
TelcoBridges Inc.
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
TelcoBridges Inc.
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
TelcoBridges Inc.
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
TelcoBridges Inc.
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
TelcoBridges Inc.
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
TelcoBridges Inc.
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
TelcoBridges Inc.
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
TelcoBridges Inc.
 

More from TelcoBridges Inc. (20)

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best Practices
 
The Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionThe Role of SBCs in Fraud Protection
The Role of SBCs in Fraud Protection
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ Session
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

What is an SBC? A look at the role of the Session Border Controller

  • 1. What is an SBC? A look at the role of the Session Border Controller Alan D. Percy alan.percy@telcobridges.com November 2018 1
  • 2. 2 What are the Risks? • Extortion • DOS / DDOS Attacks • Registration Floods • Malformed SIP Headers • Call Floods • Intrusion • Network Scanning • Account Hacking • Theft of Services
  • 3. 3 Agenda Session Border Controllers • What are they? • How do they work? • How are they used? • Where to get free SBC software? • Where to learn more?
  • 4. 4 Firewall = SBC? Internet LAN WAN SIP “A SBC is just a Firewall for SIP, right?” RTP
  • 5. 5 SIP Server = SBC? Answer: No – SIP Servers don’t have a B2BUA and have no media handling security
  • 6. 6 Other Needs? • SIP-aware Security • Resolve SIP incompatibility issues • Convert media formats • Facilitate call recording • Measure voice/video quality • Call Routing • Billing By Korolev Alexandr RFC 3261
  • 7. What is a SBC? Local Area Network Network Border Wide Area Network SBC • Anywhere two SIP networks intersect • Software-based “Network Function” • Most often between a WAN and a LAN SIP SIP
  • 11. 11 NAT Traversal Tasks:  NAT Detection  Address Translation  NAT Pinhole Maintenance SMB/Enterprise IAD/Router NAT Service Provider Application SBC 192.x.x.x 34.x.x.x SIP
  • 12. Media Services • Codec conversion (Transcoding) • Tones and Announcements • Legal Intercept • Voice quality measurement Network Border Service Provider SBC Application G.711 G.729 Law Enforcement
  • 13. SIP Interoperability Service Provider Network Border Privacy modification SIP From: Alice SIP From: Anonymous SIP X-Header : Op-A SIP P-Header: No-charge Custom header SIP SIP-I  Carrier Interoperability Protocol conversion  Multi-vendor Compatibility  Privacy enforcement Service Provider Digit Manipulation SIP To: 555-1212 SIP To: +1 800 555-1212  Privacy enforcement SBC
  • 14. Traffic Management & Routing • Call Rate Limiting • Load Balancing • Route by called/calling # • Route by availability • External/Custom/Third-party Algorithms SBC SIP Traffic
  • 15. 15 How does a SBC work? Functions of a Session Border Controller • Security • Intrusion Protection • “Line Rate” Inspection • Topology Hiding • B2BUA Interoperability • Media Services • Routing/Traffic Mgmt. • More… Session Border Controller Functions Intrusion Detection & Security B2BUA Routing Media
  • 17. 17 Use Cases - Peering Tasks:  Call routing  Mediation  Billing functions Retail Service Provider SoftSwitch Wholesale VoIP Provider SBC SBC Billing
  • 18. 18 Use Cases – Access Tasks:  DOS/DDOS Protection  NAT Traversal  SIP Registration screening  Analytics and Billing  QOS Monitoring & Reporting SMB/Enterprise IAD/Router Service Provider Softswitch SBC Billing
  • 19. 19 Use Cases – Redundancy Tasks:  Failure Detection  Traffic Redirection and Routing  Performance Measurement Service Provider SBC SBC Wholesale Provider(s)
  • 20. 20 Use Cases – CPaaS Providers Tasks:  SIP Trunking Interoperability  FQDN Mapping  Intelligent Call Routing  Media By-pass  Cloud Hosted Cloud-based Communications Provider as a Service (CPaaS) SIP Trunking Provider(s) CPaaS SBC
  • 21. Emergence of the E-SBC Service Provider SBC • Protect service provider’s network • High density / Large capacity • Billing Interfaces • NAT Traversal • SIP Trunking and Access • Central Office / Cloud Deployment • 1+1 Redundancy • Legal Intercept (CALEA) • Wireline and Wireless SPs • Sold through Systems Integrators Enterprise SBC 21 • Protect enterprise’s network • Low to medium density • Quality of Service measurement • Intrusion Protection • UC or IP-PBX Interoperabililty • Customer Premises (CPE) • Lower cost • SIPREC for Call Recording • Mid-market and Enterprises • Sold through Resellers/Channels
  • 22. 22 Use Cases – E-SBC Tasks:  Security  SIP Trunking Interoperability  ANI/Caller-ID Substitution  Cause Code Mapping IP-PBX / UC / Contact Center with SIP Trunking SIP Trunking Provider(s) UC or Contact Center SBC
  • 23. 23 Use Cases – E-SBC Tasks:  Security  SIP Trunking Interoperability  Registration Forwarding IP-PBX / UC / Contact Center with SIP Trunking and Remote Users SIP Trunking Provider(s) UC or Contact Center SBC Work-at-home users SBC
  • 25. 25 SBCs “Back in the Day” • SBCs were based on specialized “purpose-built” hardware platforms • Packet processing H/W • DSP Modules • DC Power • High Availability in hardware
  • 26. Changing Economics “Old Way” Hardware-centric Proprietary appliances EOL Hardware Capital Expenditure + Maintenance “Cloud Way” 26 Software-centric COTS Hardware, Virtual or Cloud Software-as-a-Service “Pay-as-you-Grow” TCO Years TCO Years
  • 27. 27 SBCs as Software “Service providers have been deploying session border controllers (SBCs) predominantly as standalone devices, but by 2019 they will increasingly implement SBCs as software in virtualized environments and on commercial servers…”, Diane Myers, IHS Markit Source: IHS Markit’s IMS and SBC Strategies and Vendor Leadership Service Provider Survey, September 2019
  • 28. 28 SBC Deployment Models – COTS • Highest performance and scale • Most predictable performance • Scales down to small CPE appliances • Required dedicated hardware
  • 29. 29 SBC Deployment Models - Virtualized • Deployed in CPE, Data Center, Private and Public Cloud
  • 30. 30 SBC Deployment Models - VNF • Deployed as a Virtualized Network Function (VNF) • Core of a Service Provider or Edge of a SP network on uCPE • Managed by Orchestration S/W SBC
  • 31. 31 SBC Deployment Models - Cloud • “Pay as you Grow” • Variety of platform choices and operating systems • Flexible scaling
  • 33. 33 Congratulations! • You now know enough to be dangerous! • How do you continue your knowledge?
  • 34. 34 More on SBCs at The SIP School
  • 36. 36 Q&A The SIP School www.thesipschool.com Free copy of SBC software: www.freesbc.com Other Recorded webinars at: freesbc.com/video-library Q/A?