Tags
Language
Tags
November 2025
Su Mo Tu We Th Fr Sa
26 27 28 29 30 31 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 1 2 3 4 5 6
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Session Border Controller Fundamentals

    Posted By: ELK1nG
    Session Border Controller Fundamentals

    Session Border Controller Fundamentals
    Last updated 3/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 359.21 MB | Duration: 0h 49m

    Learn the fundamental concepts of the Avaya Session Border Controller Enterprise

    What you'll learn
    Learn the basic concepts of a Session Border Controller
    Understand the components of a Session Border Controller
    Define what are the security features of a Session Border Controller
    Learn the architecture for the Avaya Session Border Controller
    Requirements
    IP networking knowledge
    Description
    On this training we will learn the Avaya Session Border Controller for Enterprise is a flexible, fit for purpose solution for Enterprises - that includes a set of standard security features. The Avaya Session Border Controller for Enterprise provides all the functionality required for an enterprise to terminate SIP trunks without the complexity and higher price associated with typical SBCs and scales up to 2,000 simultaneous sessions per server.Avaya SBCE provides security to SIP-based Unified Communications (UC) networks. Avaya SBCE is available in two versions: Advanced Services and Standard Services. Either version can reside on supported servers for Release 6.3.Avaya SBCE has two main components: the Session Border Controller (Avaya SBCE) and a management system called the Element Management System (EMS).SBCE has following features:1. Security:a)Blocking Malicious attacks in general and Denial of Service (DoS) attacks in particularb)Preventing Toll fraud attacks based on using rogue media streamsc)Discarding Malformed packetsd)Controlling Access to the internal network2.PRIVACY:a)Hiding the internal network Topology (“Topology Hiding”)b)Encrypting SIP signaling packets and/or Media packets3.INTERPERABILITY:enables different networks to communicating by providing:a)Network Address Translation (NAT) – substituting external IPs with internal IPsb)Manipulation of headers within SOP messages4.REGULATORY:provide support for:a)Prioritizing Emergency Calls (e.g.,e911 phone calls)b)Documenting Compliance with communication regulationsc)Enabling Law enforcement agencies to intercept telecommunications (“wire tapping”)5. Media Services:a) Interpreting DTMF tones and relying them as signaling messagesb)Transcoding media from one codec to anotherc)Providing tones and announcementsd)Enabling reliable transmission of modern data and FAXese)Supporting diverse media streams such as video

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Section 2: Understanding the Session Border Controller

    Lecture 2 Understanding the Session Border Controller

    Section 3: What is a Session Border Controller?

    Lecture 3 What is a Session Border Controller?

    Section 4: Understanding the SBC Capacity

    Lecture 4 Understanding the SBC Capacity

    Section 5: SBC are different than Firewalls

    Lecture 5 SBC are different than Firewalls

    Section 6: SBC Architecture

    Lecture 6 SBC Architecture

    Section 7: SBC Design for a DMZ

    Lecture 7 SBC Design for a DMZ

    Section 8: Understanding Service Providers and SBCs

    Lecture 8 Understanding Service Providers and SBCs

    Any IT User, Design Teams, Operations, Contact Center