ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Potential New SIP Providers - Thoughts?

    IT Discussion
    7
    29
    4.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NetworkNerdN
      NetworkNerd @art_of_shred
      last edited by NetworkNerd

      @art_of_shred said:

      @NetworkNerd said:

      @Minion-Queen said:

      That's awesome! That will make things much easier.

      They can do ip authentication (tie the trunk to a specific public ip) or the standard registration string (whichever you prefer).

      I know Vitelity offers that now, too. When you authenticate via IP, it utilizes load balancing on their servers. If you just do registry string, once you lock to a server, it's final for the duration of that connection.

      Some providers will even let you register multiple PBXs at once with their registration string (NexVortex).

      1 Reply Last reply Reply Quote 1
      • JaredBuschJ
        JaredBusch @NetworkNerd
        last edited by

        @NetworkNerd said:

        They did provide specifics. They said open UDP 1024 - 65535 for RTP traffic specifically but UDP 5060 for SIP.

        No, stating 1024-65535 is NOT specifics. It is a cop out.

        NetworkNerdN PSX_DefectorP 2 Replies Last reply Reply Quote 0
        • NetworkNerdN
          NetworkNerd @JaredBusch
          last edited by

          @JaredBusch said:

          @NetworkNerd said:

          They did provide specifics. They said open UDP 1024 - 65535 for RTP traffic specifically but UDP 5060 for SIP.

          No, stating 1024-65535 is NOT specifics. It is a cop out.

          Well, by the time I knew the port range I had no choice but to make it work because the port orders were in place, LOAs submitted, and contract with the losing provider was almost up (i.e. almost roped into auto-renew). But I understand what you mean about that port range being excessive.

          1 Reply Last reply Reply Quote 0
          • PSX_DefectorP
            PSX_Defector @JaredBusch
            last edited by

            @JaredBusch said:

            @NetworkNerd said:

            They did provide specifics. They said open UDP 1024 - 65535 for RTP traffic specifically but UDP 5060 for SIP.

            No, stating 1024-65535 is NOT specifics. It is a cop out.

            At that point, why not just completely make it unsecured and put in an any/any rule.

            I would silo that shit pronto, so when the inevitable pwnage happens it doesn't infect the rest of the network.

            DashrenderD 1 Reply Last reply Reply Quote 0
            • DashrenderD
              Dashrender @PSX_Defector
              last edited by

              @PSX_Defector said:

              @JaredBusch said:

              @NetworkNerd said:

              They did provide specifics. They said open UDP 1024 - 65535 for RTP traffic specifically but UDP 5060 for SIP.

              No, stating 1024-65535 is NOT specifics. It is a cop out.

              At that point, why not just completely make it unsecured and put in an any/any rule.

              I would silo that shit pronto, so when the inevitable pwnage happens it doesn't infect the rest of the network.

              If it's limited only to the IP of the SIP provider, what are you worried about? Don't get me wrong, we should of course limit the ports when possible, but really 1 port versus 64K ports - does it make you more vulnerable when you've locked the ports to a single incoming IP?

              JaredBuschJ 1 Reply Last reply Reply Quote 0
              • JaredBuschJ
                JaredBusch @Dashrender
                last edited by

                @Dashrender said:

                @PSX_Defector said:

                @JaredBusch said:

                @NetworkNerd said:

                They did provide specifics. They said open UDP 1024 - 65535 for RTP traffic specifically but UDP 5060 for SIP.

                No, stating 1024-65535 is NOT specifics. It is a cop out.

                At that point, why not just completely make it unsecured and put in an any/any rule.

                I would silo that shit pronto, so when the inevitable pwnage happens it doesn't infect the rest of the network.

                If it's limited only to the IP of the SIP provider, what are you worried about? Don't get me wrong, we should of course limit the ports when possible, but really 1 port versus 64K ports - does it make you more vulnerable when you've locked the ports to a single incoming IP?

                My response to that is how can I trust them to keep their stuff secure when they cannot even configure a proper set of ports for RTP?

                DashrenderD 1 Reply Last reply Reply Quote 0
                • DashrenderD
                  Dashrender @JaredBusch
                  last edited by

                  @JaredBusch said:

                  @Dashrender said:

                  @PSX_Defector said:

                  @JaredBusch said:

                  @NetworkNerd said:

                  They did provide specifics. They said open UDP 1024 - 65535 for RTP traffic specifically but UDP 5060 for SIP.

                  No, stating 1024-65535 is NOT specifics. It is a cop out.

                  At that point, why not just completely make it unsecured and put in an any/any rule.

                  I would silo that shit pronto, so when the inevitable pwnage happens it doesn't infect the rest of the network.

                  If it's limited only to the IP of the SIP provider, what are you worried about? Don't get me wrong, we should of course limit the ports when possible, but really 1 port versus 64K ports - does it make you more vulnerable when you've locked the ports to a single incoming IP?

                  My response to that is how can I trust them to keep their stuff secure when they cannot even configure a proper set of ports for RTP?

                  You have a completely valid point.

                  Setting that aside - does the rest of my point remain valid?

                  JaredBuschJ 1 Reply Last reply Reply Quote 0
                  • JaredBuschJ
                    JaredBusch @Dashrender
                    last edited by JaredBusch

                    @Dashrender said:

                    @JaredBusch said:

                    @Dashrender said:

                    @PSX_Defector said:

                    @JaredBusch said:

                    @NetworkNerd said:

                    They did provide specifics. They said open UDP 1024 - 65535 for RTP traffic specifically but UDP 5060 for SIP.

                    No, stating 1024-65535 is NOT specifics. It is a cop out.

                    At that point, why not just completely make it unsecured and put in an any/any rule.

                    I would silo that shit pronto, so when the inevitable pwnage happens it doesn't infect the rest of the network.

                    If it's limited only to the IP of the SIP provider, what are you worried about? Don't get me wrong, we should of course limit the ports when possible, but really 1 port versus 64K ports - does it make you more vulnerable when you've locked the ports to a single incoming IP?

                    My response to that is how can I trust them to keep their stuff secure when they cannot even configure a proper set of ports for RTP?

                    You have a completely valid point.

                    Setting that aside - does the rest of my point remain valid?

                    Yes, as long as you have properly restricted it to the provider, you have less to worry about.

                    NetworkNerdN 1 Reply Last reply Reply Quote 0
                    • NetworkNerdN
                      NetworkNerd @JaredBusch
                      last edited by

                      @JaredBusch said:

                      @Dashrender said:

                      @JaredBusch said:

                      @Dashrender said:

                      @PSX_Defector said:

                      @JaredBusch said:

                      @NetworkNerd said:

                      They did provide specifics. They said open UDP 1024 - 65535 for RTP traffic specifically but UDP 5060 for SIP.

                      No, stating 1024-65535 is NOT specifics. It is a cop out.

                      At that point, why not just completely make it unsecured and put in an any/any rule.

                      I would silo that shit pronto, so when the inevitable pwnage happens it doesn't infect the rest of the network.

                      If it's limited only to the IP of the SIP provider, what are you worried about? Don't get me wrong, we should of course limit the ports when possible, but really 1 port versus 64K ports - does it make you more vulnerable when you've locked the ports to a single incoming IP?

                      My response to that is how can I trust them to keep their stuff secure when they cannot even configure a proper set of ports for RTP?

                      You have a completely valid point.

                      Setting that aside - does the rest of my point remain valid?

                      Yes, as long as you have properly restricted it to the provider, you have less to worry about.

                      I've restricted SIP and RTP traffic to the Intelepeer ips as @Dashrender mentions.

                      1 Reply Last reply Reply Quote 0
                      • 1
                      • 2
                      • 2 / 2
                      • First post
                        Last post