Subtitle | ||||||
---|---|---|---|---|---|---|
| ||||||
Warning |
---|
There's no way to perform an unauthenticated SIP INVITE on PrivateServer! You can have different authentication models but you cannot choose to enable an unauthenticated SIP Trunk. |
The two configurations are parallel meaning that the Authentication method is not related with the encryption of the Trunk itself.
Subtitle | ||||||
---|---|---|---|---|---|---|
| ||||||
In
Xref | ||
---|---|---|
|
- SIP Account: you must insert username and password and set the Register option on
- IP based: you can leave the username and password fields blank but you have to enable the Qualify option. The HOST parameter is the authentication token.
4.3.1 SIP Account authentication
If the trunk is going to be also used for OUTBOUND calls (external calls) you need to be sure that the "Register" checkbox is checked. In this case the "Name" and "Secret" fields are mandatory as well. Otherwise you can uncheck the "Register" checkbox so the above fields will become optional.
Fill out the fields accordingly to the guidelines above and when you are done click on the "Update" icon at the bottom of the page.
You can get back to the "Sip Trunk List" page where the Sip Trunk table is now filled based on your settings (
Xref | ||
---|---|---|
|
A notification will inform you about the progress of the operation. The number shown in the notification is an internal identifier in the database and thus can be ignored.
To check the entered data of the SIP Trunk click on the "Host" value into the table (for example in this case you should click on "10.0.0.101"). This will open again the Edit Sip Trunk page with the previously entered data.
2.3.2 IP Address Authentication
dsfsdgyour PBX peer on the other end of the Trunk has given to you a SIP Account to be used for the Authentication, then you need to insert login and password in Username and Password fields. Plus you should enable the Register option (check
Xref | ||
---|---|---|
|
Typically this configuration is used by public SIP providers because they can't rely just on the IP authentication (the customer's PBX could be behind an ADSL, for instance) and they need to be sure you're just the one who has the right to be connected despite the IP address you are using.
4.3.2 IP Address Authentication
In an enterprise scenarios the authentication is generally based on IP address, because inside enterprise's infrastructure all the structural elements use to have both private and static IP addresses.
Subtitle | ||||||
---|---|---|---|---|---|---|
| ||||||
In this case the IP address is most likely an internal one and it should be fixed: these features make it a reliable source for the authentication.
The IP Address Authentication is based on the Host field in the form of the Trunk creation.
Plus you need to enable the Send keep alive option (please see
Xref | ||
---|---|---|
|
Note |
---|
The downside of this option is that there will be some more traffic on the socket (each passage of the request is 1.8 KiloByte, thus you can count almost 3.6 KB of traffic every 3 minutes) |
The actual default value for the keep-alive interval is 60 seconds. You can configure the general keep-alive timeout in the NAT configuration form. Please read PSAM 2.4 Advanced configurations to get informations about it.
Info |
---|
Note that the keep alive option can be safely set up even on the SIP account authenticated trunk where it's optional. Instead it considered mandatory for an IP Address Authentication.info |
Navbar |
---|