Professional Documents
Culture Documents
Participant Participant
CONTENT 3
1 Overview
2 Preliminary Solution
3 Expected Results
4 Evaluation Methods
5 Milestone
CMC Telecom
01
OVERVIEW
• Demands
• Benefits
• Drawbacks
OVERVIEW: VOIP 5
SIP
SIP SECURITY
SIP Trunk
Analog CAS
BRI
TDM PBX
Phone KTS Phone KTS
Business Lines Business Lines
CMC Telecom
OVERVIEW: SIP SECURITY 8
Calls to High
IP-PBX Toll Fraud
Countries
IP-PBX
SBC
DEMANDS 9
CMC Telecom
TYPES OF 10
ATTACKS
Scanning on the Internet and
• Reconnaissance collecting information of business ‘s
VoIP service.
CMC Telecom
DRAWBACKS/ 12
RISKS
• SBC is not frequently updated
PRELIMINARY
SOLUTION
• Process
• Topology
PROCESS 14
01
0
3
02 04
CMC Telecom
TOPOLOGY 15
CMC Telecom
TOPOLOGY 16
CMC Telecom
TOPOLOGY 17
CMC Telecom
03
EXPECTED
RESULTS
EXPECTED RESULTS 19
SIP Trunking
Security
Cloud Phone
Remote Systems
Workers
CMC Telecom
04
EVALUATION
METHODS
EVALUATION METHODS 21
CMC Telecom
05
MILESTONE
MILESTONE 23
CMC Telecom
MILESTONE 24
CMC Telecom
Th an k Yo u Fo r
Li sten in g