Category SIP

Real-Time Voice Protection with SBC Guard
Without continual growth and progress, such words as improvement, achievement, and success have no meaning. Benjamin Franklin As most of my readers know, I began this blog writing about the specifics of the Session Initiation Protocol (SIP). In fact, for the longest time I called this site SIP Adventures and filled these pages with scores […]

VoIP Security in a Time of War
“You cannot choose your battlefield,God does that for you;But you can plant a standardWhere a standard never flew” Nathalia Crane Just when the stress of the pandemic was starting to ease and it looked as if the world might return to some sense of normal, we suddenly find ourselves on the cusp of World War […]

Debugging Avaya SIP
Another of my Avaya Engage breakout sessions is available for viewing outside the virtual conference. This time around I explore debugging SIP in an Avaya Aura system. After a quick introduction to SIP fundamentals, I look at how Avaya Aura uses SIP in an IMS, or half-call model. I show how resource reservation occurs and […]

Best Practices for SIP and UC Security
I had the honor of being asked to present three breakout sessions at the Avaya Engage virtual conference. While I prefer presenting in front of a live audience, COVID has taught me that flexibility is paramount. Although this wasn’t the smoothest performance of the three (I got better with each recording), I am very pleased […]

COVID Surprised and Lessons Learned
“Surprise is the greatest gift which life can grant us.” Boris Pasternak Until the pandemic changed everything, I was a regular attendee at in-person IAUG chapter meetings across the country. Most of the time I presented a topic, but on a few occasions, I was simply there to listen and learn. Although I have never […]

The Four Pillars of Communications Security
I have been working with IP technology for a long time. I can’t tell you the exact year of my first exposure, but it was sometime between 1985 and 1987. I was working at Northern Telecom as a software developer and was tasked with adding a TCP/IP stack to a version of Unix that ran on a Motorola […]

Deploying VoIP Security the NSA Way
In my latest guest blog post for Assertion, I take a look at the NSA guidelines for securing VoIP and UC. I learned a few new tricks and expect that you will, too. Take a look at let me know what you think about it. Deploying VoIP the NSA Way

One Year In
“God Grant me the serenity to accept the things I cannot change The courage to change the things I can And the wisdom to know the difference” Reinhold Niebuhr Today marks my one-year anniversary as an Avaya employee. As I wrote in It’s Déjà vu All Over Again, this is also the anniversary of my […]

How Vulnerable is Your VoIP?
In my latest guest article for Assertion I ask How Vulnerable is Your VoIP? It’s worth a look if only for a photograph of an 18-year-old me.

Beating SIP Hackers at Their Own Game
There’s an old saying that goes, “If you can’t beat ’em, join ’em.” While I am not advocating that you become a SIP hacker, it’s important that you become familiar with the tools they use. In my latest guest blog, I take a look at one of the most popular SIP hacking tools — SIPVicious. […]