Subtitle | ||||||
---|---|---|---|---|---|---|
| ||||||
Warning |
---|
There's no way to perform an unauthenticated SIP INVITE on PrivateServer! You can have different authentication models but you cannot choose to enable an unauthenticated SIP Trunk. |
The two configurations are parallel meaning that the Authentication method is not related with the encryption of the Trunk itself.
Subtitle | ||||||
---|---|---|---|---|---|---|
| ||||||
In
Xref | ||
---|---|---|
|
- SIP Account
- IP based
4.3.1 SIP Account authentication
If your PBX peer on the other end of the Trunk has given to you a SIP Account to be used for the Authentication, then you need to insert login and password in Username and Password fields. Plus you should enable the Register option (check
Xref | ||
---|---|---|
|
Typically this configuration is used by public SIP provider as Messagenet because providers because they can't rely just on the IP authentication (the customer's PBX could be behind an ADSL, for instance) and they need to be sure you're just the one who has the right to be connected despite the IP address you are using.
24.3.2 IP Address Authentication
In an enterprise scenario it's more than possible that the Authentication would be IP based. Both Cisco and Avaya works this way. That said, the IP Address Authentication is based on the Host field in the form of the Trunk creationenterprise scenarios the authentication is generally based on IP address, because inside enterprise's infrastructure all the structural elements use to have both private and static IP addresses.
Subtitle | ||||||
---|---|---|---|---|---|---|
| ||||||
In this case the IP address is most likely an internal one and it should be fixed: these features make it a reliable source for the authentication.
The IP Address Authentication is based on the Host field in the form of the Trunk creation.
Plus you need to enable the Send keep alive option (please see
Xref | ||
---|---|---|
|
Note |
---|
The downside of this option is that there will be some more traffic on the socket (each passage of the request is 1.8 KiloByte, thus you can count almost 3.6 KB of traffic every 3 minutes) |
The actual default value for the keep-alive interval is 60 seconds. You can configure the general keep-alive timeout in the NAT configuration form. Please read PSAM 2.4 Asterisk advanced Advanced configurations to get informations about it.
Info |
---|
Note that the keep alive option can be safely set up even on the SIP account authenticated trunk where it's optional. Instead it considered mandatory for an IP Address Authentication.info |
...