Tag Archives: SIP

VoIP Security in a Time of War

“You cannot choose your battlefield,God does that for you;But you can plant a standardWhere a standard never flew” Nathalia Crane Just when the stress of the pandemic was starting to ease and it looked as if the world might return to some sense of normal, we suddenly find ourselves on the cusp of World War […]

Debugging Avaya SIP

Another of my Avaya Engage breakout sessions is available for viewing outside the virtual conference.  This time around I explore debugging SIP in an Avaya Aura system.  After a quick introduction to SIP fundamentals, I look at how Avaya Aura uses SIP in an IMS, or half-call model.  I show how resource reservation occurs and […]

Best Practices for SIP and UC Security

I had the honor of being asked to present three breakout sessions at the Avaya Engage virtual conference.  While I prefer presenting in front of a live audience, COVID has taught me that flexibility is paramount. Although this wasn’t the smoothest performance of the three (I got better with each recording), I am very pleased […]

COVID Surprised and Lessons Learned

“Surprise is the greatest gift which life can grant us.” Boris Pasternak Until the pandemic changed everything, I was a regular attendee at in-person IAUG chapter meetings across the country.  Most of the time I presented a topic, but on a few occasions, I was simply there to listen and learn.   Although I have never […]

The Four Pillars of Communications Security

I have been working with IP technology for a long time. I can’t tell you the exact year of my first exposure, but it was sometime between 1985 and 1987. I was working at Northern Telecom as a software developer and was tasked with adding a TCP/IP stack to a version of Unix that ran on a Motorola […]

Deploying VoIP Security the NSA Way

In my latest guest blog post for Assertion, I take a look at the NSA guidelines for securing VoIP and UC.  I learned a few new tricks and expect that you will, too.  Take a look at let me know what you think about it. Deploying VoIP the NSA Way

How Vulnerable is Your VoIP?

In my latest guest article for Assertion I ask How Vulnerable is Your VoIP? It’s worth a look if only for a photograph of an 18-year-old me.

Beating SIP Hackers at Their Own Game

There’s an old saying that goes, “If you can’t beat ’em, join ’em.”  While I am not advocating that you become a SIP hacker, it’s important that you become familiar with the tools they use.  In my latest guest blog, I take a look at one of the most popular SIP hacking tools — SIPVicious.  […]

Planning a Successful SIP Trunk Migration

I keep getting asked to guest blog post about SIP and I just can’t seem to say “no.”  If you are planning a SIP migration or want to tune your existing configuration, this is the article for you. Planning a Successful SIP Trunk Migration

Creating SIP Trunks With Avaya CPaaS

In my latest video, I show you how easy it is to configure and deploy SIP trunks on Avaya CPaaS.  To make it simple to understand, I give you a step-by-step way to PSTN-enable a free SIP soft client.  Check it out!