SlideShare a Scribd company logo
What is an SBC?
A look at the role of the
Session Border Controller
Alan D. Percy
alan.percy@telcobridges.com
November 2018
1
2
What are the Risks?
• Extortion
• DOS / DDOS Attacks
• Registration Floods
• Malformed SIP Headers
• Call Floods
• Intrusion
• Network Scanning
• Account Hacking
• Theft of Services
3
Agenda
Session Border Controllers
• What are they?
• How do they work?
• How are they used?
• Where to get free
SBC software?
• Where to learn more?
4
Firewall = SBC?
Internet
LANWAN
SIP
“A SBC is just a Firewall for SIP, right?”
RTP
5
SIP Server = SBC?
Answer: No – SIP Servers don’t have a B2BUA and have
no media handling security
6
Other Needs?
• SIP-aware Security
• Resolve SIP incompatibility
issues
• Convert media formats
• Facilitate call recording
• Measure voice/video quality
• Call Routing
• Billing By Korolev Alexandr
RFC 3261
What is a SBC?
Local Area
Network
Network
Border
Wide Area
Network SBC
• Anywhere two SIP networks intersect
• Software-based “Network Function”
• Most often between a WAN and a LAN
SIP SIP
Topology Hiding
Network
Border
Internet SBC
Application
10.X.X.X34.Y.Y.Y
“Back to Back User Agent”
B2BUA
DOS/DDOS/Intrusion Prevention
Network
Border
Internet SBC
Application
Detects and deflects
DOS/DDOS and Registration Floods
Encryption Demarcation
Network
Border
Service
Provider SBC
Application
ClearEncrypted
Encryption of session control (SIP/TLS)
and/or media (SRTP)
11
NAT Traversal
Tasks:
 NAT Detection
 Address Translation
 NAT Pinhole Maintenance
SMB/Enterprise
IAD/Router
NAT
Service Provider
Application
SBC
192.x.x.x 34.x.x.x
SIP
Media Services
• Codec conversion (Transcoding)
• Tones and Announcements
• Legal Intercept
• Voice quality measurement
Network
Border
Service
Provider SBC
Application
G.711G.729
Law
Enforcement
SIP Interoperability
Service
Provider
Network
Border
Privacy modification SIP From: Alice SIP From: Anonymous
SIP X-Header : Op-A SIP P-Header: No-chargeCustom header
SIP SIP-I  Carrier InteroperabilityProtocol
conversion
 Multi-vendor Compatibility
 Privacy enforcement
Service
Provider
Digit Manipulation SIP To: 555-1212 SIP To: +1 800 555-1212  Privacy enforcement
SBC
Traffic Management & Routing
• Call Rate Limiting
• Load Balancing
• Route by called/calling #
• Route by availability
• External/Custom/Third-party Algorithms
SBC
SIP Traffic
15
How does a SBC work?
Functions of a Session Border Controller
• Security
• Intrusion Protection
• “Line Rate” Inspection
• Topology Hiding
• B2BUA Interoperability
• Media Services
• Routing/Traffic Mgmt.
• More…
Session Border Controller
Functions
Intrusion
Detection
& Security
B2BUA Routing
Media
USE CASES
16
17
Use Cases - Peering
Tasks:
 Call routing
 Mediation
 Billing functions
Retail Service Provider
SoftSwitch
Wholesale VoIP Provider
SBC
SBC
Billing
18
Use Cases – Access
Tasks:
 DOS/DDOS Protection
 NAT Traversal
 SIP Registration screening
 Analytics and Billing
 QOS Monitoring & Reporting
SMB/Enterprise
IAD/Router
Service Provider
Softswitch
SBC
Billing
19
Use Cases – Redundancy
Tasks:
 Failure Detection
 Traffic Redirection and Routing
 Performance Measurement
Service Provider
SBC
SBC
Wholesale
Provider(s)
20
Use Cases – CPaaS Providers
Tasks:
 SIP Trunking Interoperability
 FQDN Mapping
 Intelligent Call Routing
 Media By-pass
 Cloud Hosted
Cloud-based Communications Provider as a Service (CPaaS)
SIP Trunking
Provider(s)
CPaaS
SBC
Emergence of the E-SBC
Service Provider SBC
• Protect service provider’s network
• High density / Large capacity
• Billing Interfaces
• NAT Traversal
• SIP Trunking and Access
• Central Office / Cloud Deployment
• 1+1 Redundancy
• Legal Intercept (CALEA)
• Wireline and Wireless SPs
• Sold through Systems Integrators
Enterprise SBC
21
• Protect enterprise’s network
• Low to medium density
• Quality of Service measurement
• Intrusion Protection
• UC or IP-PBX Interoperabililty
• Customer Premises (CPE)
• Lower cost
• SIPREC for Call Recording
• Mid-market and Enterprises
• Sold through Resellers/Channels
22
Use Cases – E-SBC
Tasks:
 Security
 SIP Trunking Interoperability
 ANI/Caller-ID Substitution
 Cause Code Mapping
IP-PBX / UC / Contact Center with SIP Trunking
SIP Trunking
Provider(s)
UC or
Contact Center
SBC
23
Use Cases – E-SBC
Tasks:
 Security
 SIP Trunking Interoperability
 Registration Forwarding
IP-PBX / UC / Contact Center with SIP Trunking and Remote Users
SIP Trunking
Provider(s)
UC or
Contact Center
SBC
Work-at-home users
SBC
DEPLOYMENT
METHODS
24
25
SBCs “Back in the Day”
• SBCs were based on specialized
“purpose-built” hardware platforms
• Packet processing H/W
• DSP Modules
• DC Power
• High Availability in hardware
Changing Economics
“Old Way”
Hardware-centric
Proprietary appliances
EOL Hardware
Capital Expenditure + Maintenance
“Cloud Way”
26
Software-centric
COTS Hardware, Virtual or Cloud
Software-as-a-Service
“Pay-as-you-Grow”
TCO
Years
TCO
Years
27
SBCs as Software
“Service providers have been deploying session
border controllers (SBCs) predominantly as
standalone devices, but by 2019 they will
increasingly implement SBCs as software in
virtualized environments and on commercial
servers…”, Diane Myers, IHS Markit
Source: IHS Markit’s IMS and SBC Strategies and Vendor
Leadership Service Provider Survey, September 2019
28
SBC Deployment Models – COTS
• Highest performance and scale
• Most predictable performance
• Scales down to small CPE appliances
• Required dedicated hardware
29
SBC Deployment Models - Virtualized
• Deployed in CPE, Data Center, Private and Public
Cloud
30
SBC Deployment Models - VNF
• Deployed as a Virtualized
Network Function (VNF)
• Core of a Service Provider
or
Edge of a SP network on
uCPE
• Managed by Orchestration
S/W
SBC
31
SBC Deployment Models - Cloud
• “Pay as you Grow”
• Variety of platform choices
and operating systems
• Flexible scaling
32
Introducing…
Learn more at: www.FreeSBC.com
33
Congratulations!
• You now know enough to
be dangerous!
• How do you continue
your knowledge?
34
More on SBCs at The SIP School
35
Learn More…
36
Q&A
The SIP School
www.thesipschool.com
Free copy of SBC software:
www.freesbc.com
Other Recorded webinars at:
freesbc.com/video-library
Q/A?

More Related Content

What's hot

Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
Alan Percy
 
Voip
VoipVoip
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
Matt Bynum
 
SIP vs PRI
SIP vs PRISIP vs PRI
IMS Signaling (Rev. 3)
IMS Signaling (Rev. 3)IMS Signaling (Rev. 3)
IMS Signaling (Rev. 3)
Sebastian Schumann
 
Introducing in Cisco Unified Contact Center Express
Introducing in Cisco Unified Contact Center ExpressIntroducing in Cisco Unified Contact Center Express
Introducing in Cisco Unified Contact Center Express
Emin Aliev
 
IMS + VoLTE Overview
IMS + VoLTE OverviewIMS + VoLTE Overview
IMS + VoLTE Overview
Hamidreza Bolhasani
 
Introduction into SIP protocol
Introduction into SIP protocolIntroduction into SIP protocol
Introduction into SIP protocol
Michal Hrncirik
 
IMS Standards
IMS  StandardsIMS  Standards
IMS Standards
Marie-Paule Odini
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocolSanthosh Somu
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
ALTANAI BISHT
 
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary RichenakerENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
enumplatform
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP)
Namra Afzal
 
Ims conference-call
Ims conference-callIms conference-call
Ims conference-call
Govind Dolare
 
IMS presentation
IMS presentationIMS presentation
IMS presentation
Anirudh Yadav
 
VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
Karel Berkovec
 
session initiation protocol - SIP
session initiation protocol - SIPsession initiation protocol - SIP
session initiation protocol - SIPMahmoud Abudaqa
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
Vikas Shokeen
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
Houman Sadeghi Kaji
 

What's hot (20)

Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
 
Voip
VoipVoip
Voip
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
 
SIP vs PRI
SIP vs PRISIP vs PRI
SIP vs PRI
 
IMS Signaling (Rev. 3)
IMS Signaling (Rev. 3)IMS Signaling (Rev. 3)
IMS Signaling (Rev. 3)
 
Introducing in Cisco Unified Contact Center Express
Introducing in Cisco Unified Contact Center ExpressIntroducing in Cisco Unified Contact Center Express
Introducing in Cisco Unified Contact Center Express
 
IMS + VoLTE Overview
IMS + VoLTE OverviewIMS + VoLTE Overview
IMS + VoLTE Overview
 
Introduction into SIP protocol
Introduction into SIP protocolIntroduction into SIP protocol
Introduction into SIP protocol
 
IMS Standards
IMS  StandardsIMS  Standards
IMS Standards
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocol
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
 
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary RichenakerENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP)
 
Ims conference-call
Ims conference-callIms conference-call
Ims conference-call
 
IMS presentation
IMS presentationIMS presentation
IMS presentation
 
IP PBX
IP PBXIP PBX
IP PBX
 
VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
 
session initiation protocol - SIP
session initiation protocol - SIPsession initiation protocol - SIP
session initiation protocol - SIP
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
 

Similar to What is an SBC? A look at the role of the Session Border Controller

Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
TelcoBridges Inc.
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
TelcoBridges Inc.
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
Alan Percy
 
Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
TelcoBridges Inc.
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBC
TelcoBridges Inc.
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBC
Alan Percy
 
Why Do I Need an SBC
Why Do I Need an SBCWhy Do I Need an SBC
Why Do I Need an SBC
PacketBase, Inc.
 
Session bordercontrollers
Session bordercontrollersSession bordercontrollers
Session bordercontrollers
Astri AndTi
 
Sbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSelf Employed
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
TelcoBridges Inc.
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
Alan Percy
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
TelcoBridges Inc.
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
Alan Percy
 
FutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom ServicesFutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom ServicesRADVISION Ltd.
 
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Nordic Infrastructure Conference
 
Frafos ABC SBC - Secure peering
Frafos ABC SBC - Secure peeringFrafos ABC SBC - Secure peering
Frafos ABC SBC - Secure peering
stefansayer
 
FRAFOS Secure Session Border Control
FRAFOS Secure Session Border ControlFRAFOS Secure Session Border Control
FRAFOS Secure Session Border Control
stefansayer
 
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
Biznes to Rozmowy
 
Asterisk Deployments
Asterisk DeploymentsAsterisk Deployments
Asterisk Deployments
Asterisk Community
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
Alan Percy
 

Similar to What is an SBC? A look at the role of the Session Border Controller (20)

Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBC
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBC
 
Why Do I Need an SBC
Why Do I Need an SBCWhy Do I Need an SBC
Why Do I Need an SBC
 
Session bordercontrollers
Session bordercontrollersSession bordercontrollers
Session bordercontrollers
 
Sbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX Deloyment
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
 
FutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom ServicesFutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom Services
 
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
 
Frafos ABC SBC - Secure peering
Frafos ABC SBC - Secure peeringFrafos ABC SBC - Secure peering
Frafos ABC SBC - Secure peering
 
FRAFOS Secure Session Border Control
FRAFOS Secure Session Border ControlFRAFOS Secure Session Border Control
FRAFOS Secure Session Border Control
 
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
 
Asterisk Deployments
Asterisk DeploymentsAsterisk Deployments
Asterisk Deployments
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 

More from Alan Percy

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptx
Alan Percy
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
Alan Percy
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
Alan Percy
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Alan Percy
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
Alan Percy
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
Alan Percy
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
Alan Percy
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
Alan Percy
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
Alan Percy
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
Alan Percy
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
Alan Percy
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
Alan Percy
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
Alan Percy
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
Alan Percy
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
Alan Percy
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
Alan Percy
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
Alan Percy
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
Alan Percy
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
Alan Percy
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
Alan Percy
 

More from Alan Percy (20)

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptx
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

What is an SBC? A look at the role of the Session Border Controller

  • 1. What is an SBC? A look at the role of the Session Border Controller Alan D. Percy alan.percy@telcobridges.com November 2018 1
  • 2. 2 What are the Risks? • Extortion • DOS / DDOS Attacks • Registration Floods • Malformed SIP Headers • Call Floods • Intrusion • Network Scanning • Account Hacking • Theft of Services
  • 3. 3 Agenda Session Border Controllers • What are they? • How do they work? • How are they used? • Where to get free SBC software? • Where to learn more?
  • 4. 4 Firewall = SBC? Internet LANWAN SIP “A SBC is just a Firewall for SIP, right?” RTP
  • 5. 5 SIP Server = SBC? Answer: No – SIP Servers don’t have a B2BUA and have no media handling security
  • 6. 6 Other Needs? • SIP-aware Security • Resolve SIP incompatibility issues • Convert media formats • Facilitate call recording • Measure voice/video quality • Call Routing • Billing By Korolev Alexandr RFC 3261
  • 7. What is a SBC? Local Area Network Network Border Wide Area Network SBC • Anywhere two SIP networks intersect • Software-based “Network Function” • Most often between a WAN and a LAN SIP SIP
  • 11. 11 NAT Traversal Tasks:  NAT Detection  Address Translation  NAT Pinhole Maintenance SMB/Enterprise IAD/Router NAT Service Provider Application SBC 192.x.x.x 34.x.x.x SIP
  • 12. Media Services • Codec conversion (Transcoding) • Tones and Announcements • Legal Intercept • Voice quality measurement Network Border Service Provider SBC Application G.711G.729 Law Enforcement
  • 13. SIP Interoperability Service Provider Network Border Privacy modification SIP From: Alice SIP From: Anonymous SIP X-Header : Op-A SIP P-Header: No-chargeCustom header SIP SIP-I  Carrier InteroperabilityProtocol conversion  Multi-vendor Compatibility  Privacy enforcement Service Provider Digit Manipulation SIP To: 555-1212 SIP To: +1 800 555-1212  Privacy enforcement SBC
  • 14. Traffic Management & Routing • Call Rate Limiting • Load Balancing • Route by called/calling # • Route by availability • External/Custom/Third-party Algorithms SBC SIP Traffic
  • 15. 15 How does a SBC work? Functions of a Session Border Controller • Security • Intrusion Protection • “Line Rate” Inspection • Topology Hiding • B2BUA Interoperability • Media Services • Routing/Traffic Mgmt. • More… Session Border Controller Functions Intrusion Detection & Security B2BUA Routing Media
  • 17. 17 Use Cases - Peering Tasks:  Call routing  Mediation  Billing functions Retail Service Provider SoftSwitch Wholesale VoIP Provider SBC SBC Billing
  • 18. 18 Use Cases – Access Tasks:  DOS/DDOS Protection  NAT Traversal  SIP Registration screening  Analytics and Billing  QOS Monitoring & Reporting SMB/Enterprise IAD/Router Service Provider Softswitch SBC Billing
  • 19. 19 Use Cases – Redundancy Tasks:  Failure Detection  Traffic Redirection and Routing  Performance Measurement Service Provider SBC SBC Wholesale Provider(s)
  • 20. 20 Use Cases – CPaaS Providers Tasks:  SIP Trunking Interoperability  FQDN Mapping  Intelligent Call Routing  Media By-pass  Cloud Hosted Cloud-based Communications Provider as a Service (CPaaS) SIP Trunking Provider(s) CPaaS SBC
  • 21. Emergence of the E-SBC Service Provider SBC • Protect service provider’s network • High density / Large capacity • Billing Interfaces • NAT Traversal • SIP Trunking and Access • Central Office / Cloud Deployment • 1+1 Redundancy • Legal Intercept (CALEA) • Wireline and Wireless SPs • Sold through Systems Integrators Enterprise SBC 21 • Protect enterprise’s network • Low to medium density • Quality of Service measurement • Intrusion Protection • UC or IP-PBX Interoperabililty • Customer Premises (CPE) • Lower cost • SIPREC for Call Recording • Mid-market and Enterprises • Sold through Resellers/Channels
  • 22. 22 Use Cases – E-SBC Tasks:  Security  SIP Trunking Interoperability  ANI/Caller-ID Substitution  Cause Code Mapping IP-PBX / UC / Contact Center with SIP Trunking SIP Trunking Provider(s) UC or Contact Center SBC
  • 23. 23 Use Cases – E-SBC Tasks:  Security  SIP Trunking Interoperability  Registration Forwarding IP-PBX / UC / Contact Center with SIP Trunking and Remote Users SIP Trunking Provider(s) UC or Contact Center SBC Work-at-home users SBC
  • 25. 25 SBCs “Back in the Day” • SBCs were based on specialized “purpose-built” hardware platforms • Packet processing H/W • DSP Modules • DC Power • High Availability in hardware
  • 26. Changing Economics “Old Way” Hardware-centric Proprietary appliances EOL Hardware Capital Expenditure + Maintenance “Cloud Way” 26 Software-centric COTS Hardware, Virtual or Cloud Software-as-a-Service “Pay-as-you-Grow” TCO Years TCO Years
  • 27. 27 SBCs as Software “Service providers have been deploying session border controllers (SBCs) predominantly as standalone devices, but by 2019 they will increasingly implement SBCs as software in virtualized environments and on commercial servers…”, Diane Myers, IHS Markit Source: IHS Markit’s IMS and SBC Strategies and Vendor Leadership Service Provider Survey, September 2019
  • 28. 28 SBC Deployment Models – COTS • Highest performance and scale • Most predictable performance • Scales down to small CPE appliances • Required dedicated hardware
  • 29. 29 SBC Deployment Models - Virtualized • Deployed in CPE, Data Center, Private and Public Cloud
  • 30. 30 SBC Deployment Models - VNF • Deployed as a Virtualized Network Function (VNF) • Core of a Service Provider or Edge of a SP network on uCPE • Managed by Orchestration S/W SBC
  • 31. 31 SBC Deployment Models - Cloud • “Pay as you Grow” • Variety of platform choices and operating systems • Flexible scaling
  • 33. 33 Congratulations! • You now know enough to be dangerous! • How do you continue your knowledge?
  • 34. 34 More on SBCs at The SIP School
  • 36. 36 Q&A The SIP School www.thesipschool.com Free copy of SBC software: www.freesbc.com Other Recorded webinars at: freesbc.com/video-library Q/A?

Editor's Notes

  1. Welcome to “FreeSBC – A New Approach to the SBC”, a webinar event hosted by TelcoBridges Before we begin, a little housekeeping: As a live event participant, you’ll have the opportunity to interact with today’s speakers and hope you do pose your questions and comments on today’s topic using the Q/A panel. To pose a question or comment, open the Q/A panel by clicking on the box in the upper left of your screen. We’ll cover your questions toward the end of the session. We’ve found that some attendees may need to adjust the webinar View Options to see the full slide on your screen. If you are not seeing a full slide, move your mouse to the top of the webinar window and a View Option selection will appear – choose an option that best fits your screen. Also, today’s event is being recorded and all those that have registered will received a link to the recording for on-demand playback. We hope you share the link with your co-workers and others that would find the discussion valuable.
  2. First a little background: As network architects in service providers and large enterprises plan their migration to cloud infrastructure, one network security element plays a critical role and needs special treatment - the Session Border Controller. At the crossroads of real-time voice and video traffic, SBCs are tasked with providing protection against DDOS attacks, facilitating NAT traversal, providing topology hiding, resolving interoperability issues and much more.
  3. The traditional way of paying for network infrastructure assumed a hardware-centric appliance needed to be purchased, requiring a large capital expenditure followed by maintenance fees over the life of the equipment. The result was a front-loading of the TCO, a real problem for providers that are just starting out and are building a customer base. [BUILD] The new “Cloud Way” is a more software-centric model where initial costs are low, and increase later when a paid subscriber base is established by the provider. This model offers more opportunities for fostering new services and applications – ideally, growing new business opportunities.
  4. Recognizing these needs, TelcoBridges offers FreeSBC, a software SBC solution designed specifically for cloud and virtualized deployments. Highly scalable with carrier-grade reliability, FreeSBC is a commercial SBC, offered under a “freemium” business model. We feel FreeSBC better fits the emerging cloud application market needs for affordable voice network security.