Internet Telephony Service Providers (ITSP) can come in many different deployment forms. Some providers simply require the Enterprise to provide their IP addresses, thus, creating an IP address-to-address, or peer-to-peer relationship. The authentication is based mainly on the IP addresses.
Peer-to-peer offers layers of security, along with SIP formatting restrictions. Rather than an open policy with lookup of account and authentication, this deployment style is a “trusted” relationship between the provider and the Enterprise equipment, processing phone calls only from trusted peers.
The SBC allows an IP-PBX and other devices to connect peer-to-peer with vendor SIP trunks by acting as an integration point between the IP-PBX and the ITSP. The SBC provides the same additional security features, SIP interoperability and routing requirements in peer-to-peer as it would in registration or authentication deployments.
|Download this printable PDF Cheat Sheet for your reference on the powerful capabilities and features of the Session Border Controller.|