Every year the number of PBX fraud victims increases dramatically. More and more companies are targeted by individuals who are looking to bring down or exploit the communications system. Some do it for fun and others for illicit profit, but the end result is always the same… Huge bills and down time.
The most vulnerable targets remain small-medium size businesses that are new to managing their own IP PBX system. They either don’t have the IT experience and staff to properly secure and maintain the network, or they’re unaware of the risks altogether having recently switched from a landline system. Whatever the reason, many networks are consistently left unprotected. By the time most companies realize that something is wrong with their phone expenses, it’s too late - the network security has been compromised.
Who Needs an SBC?
If you are deploying an IP PBX system connected to the internet, chances are that it will get hacked within 5h-6h by hackers looking to make calls at your expense or to bring your communication network down just because they can.
- VoIP became a favorite target for hackers as its popularity and uptake increased in the past years
- Firewalls are just unable to block hackers who use scripts and bots to access PBX systems
- The Source address of the hacker is being deliberately spoofed, making it more difficult to detect even more when this one is also masked by the “noise” of many randomly generated addresses
- A common and devastating attack is the DoS (Denial of Service). PBX systems are unable to handle the flood of SIP requests generated by the hackers. These thousands of simultaneous requests brings your PBX down
- Brute force password guessing can have the same impact as a DoS attack
And these are only a few attacks out of the thousands used by hackers worldwide. Would you leave our home unlocked? So then why leave your PBX open? Most hackers today, are after the money; so they commit what is known as toll fraud. They access your PBX and use your accounts to place long distance calls or other chargeable calls.
BLOX eSBC Session Border Controller Built to Protect & Manage between IP Network Borders
- Blox eSBC is Session Border Controller up to 100 simultaneous Channels.
- Blox eSBC will secure your internal PBX/Gateway VolP Network from external network/internet
- Blox eSBC handles SIP-NAT issues observed in common VolP deployments
- Blox eSBC conducts DPI Packet Inspection of SIP traffic, supporting the Signatures for Key Malwares vulnerabilities observed in SIP Deployments
- Blox eSBC supports SIP-TLS, Topology Hiding, CAC, Media Pin-holing, Media
- Encryption (SRTP), Transcoding, Hosted PBX, Domain routing
BLOX Basic Functions
- SIP Outbound/Inbound Trunk and domain policies to route the calls
- Secure Remote access to Internal SIP PBX
- Eliminates bad VolP signaling and media protocol at the network boundary
- Built-in firewall which can controls IP Addresses/Port based Filtering, DOS/DDOS Attacks, IP Blacklist & NAT. It opens pinhole in the firewall to allow VolP signaling and media to pass through
- Media bridging, which may include Voice over IP and Fax over IP
- Least Call Routing Re-Direct
- DTMF Support for RFC2833/INBAND/SIP INFO
BLOX Main Features Advanced Features
- SIP Trunking (Connectivity)
- Remote Worker (Roaming User)
- SIP Registration Pass-thru
- Core Session Router (Call Routing)
- SIP Intrusion Prevention
- DDoS / DoS Attack Protection
- SIP Registration Scan Attack Detection
- SIP Header Normalization
- SIP Malformed Packet Protection
- Topology Hiding
- Call Access Control (Total calls per Trunk, Inbound/Outbound)
- Least Cost Routing
- Media anchoring
- Call Security with TLS
- Advanced NAT Traversal Capabilities
- T.38 Fax Relay
- CDR record generation
- SIP Header Manipulation
- RTCP Statistics
- IP Firewall
- VLAN and Virtual IP support
- IPSec Encryption
- Packet-to-packet call flows (B2B UA)
- Media relay with dynamic pinhole control
- SIP Request Rate Limiting
- Hardware-based Transcoding
- Hardware-based Media Encryption with SRTP
Allo Transcoding Module can provide you the following Media Service
- Media codec transcoding through Allo Transcoding card with Full RTP Transcoding (G.711, G.722, G.729, G.726, G.723.1, iLBC, AMR, G.722.1)
- SRTP media encryption through Allo Transcoding Card
- T.38 Fax Bridging (G711 to T.38 Packets)
Tech Specs
Functional Mode |
Topology Hiding with SIP Deep Packet Engine |
SIP Intrusion/Prevention |
~400+ SIP Attack Signatures Support |
Throughput |
~300 Mbps |
No of Concurrent Channels Supported |
100 concurrent channels |
Logging |
Local Security Event Console, Remote Syslog |
Device Management |
Web GUI via Https & SSH CLI |
Hardware |
Cortex A9 Quad Core Processor at 1.1GHz |
Primary Storage |
Supports 8/16/32/64 Gigabyte Module (Pluggable) |
RAM |
2 GB |
Interfaces |
2 Fast Ethernet Interfaces, 1 port fast Ethernet, 10/100 Mbits |
Physical & Environmental
Operation Temperature |
10°C to 40°C (50 F to 104 F) |
Storage Temperature |
0°C to 50°C (32°F to 122°F) |
Operating Humidity |
10% to 90%, Non-condensing |
Storage Humidity |
5% to 95%, Non-condensing |
Dimensions |
115mm (L) X 110mm (B) X 34mm (H) |
Weight |
250gms |
Power Input |
05V DC / 2.0 A |
Documents & User Guides
Versandgewicht: |
0,90 kg
|
Artikelgewicht: |
0,70 kg
|
HAN:
|
eSBC
|
Angaben zur Produktsicherheit
Herstellerinformationen:
allo.com
Ground Floor #176
Bangalore
Whitefield, Indien, 66
info@allo.com
https://www.allo.com
verantwortliche Person:
VoIPDistri, Mathias Gottensträter
Im Hagen 3
Nordrhein-Westfalen
Halle, Deutschland, 33790
info@voipdistri.com
https://voipdistri.com
Es gibt noch keine Bewertungen.