...
Secure call is encrypted from client up to server.
The end The end to site security site security model provides a strong security a strong security level and can be used among two or more
equipped devices and/or
among SNOM 300 landline among SNOM 300 landline devices or also for connecting other
PBX PBX, secure or not. If
PBX is not secure, we face a crypto-to-clear scenario, where the call is secured between
and
, but is not secured
between betweenand PBXand PBX.
Given that in this security model the server can decrypt secure calls content, it is possible to provides advanced telephony features such as:
...
End to End security model
Secure call is encrypted from client up to the other client. Despite server relays encrypted traffic, it does not knows the encryption keys, so it cannot decrypt the call content.
The end to end security model provides the highest security level but can be used only between two
equipped devices.This security model does cannot be used to integrate enterprise PBXs.
In this security model the server cannot decrypt secure call content, so advanced features are not available.
Multilevel security model
This is a mix of the other security model. Each call made by
...
client produces encrypted traffic based on the recipient of the secure call:
- if the call recipient is another
...
- client, the call is made using the ZRTP protocol for key exchange
- if the recipient of the call is not a
...
- client
- the call is made using the SDES protocol
This security model can be used to integrate enterprise PBXs.
It is also possible to provides advanced telephony features such as:
- 3-way calls
- call transfer
- conference rooms
using SDES protocol.
is the PBX committed to perform Secure Calls both end to end and end to site. It differs from a standard PBX for exposing just the Secure Call service to VoIP clients and can be connected to a standard PBX via SIP Trunks if configured accordingly.is ...
the VoIP client for Secure Calls connections. It has to be used along with
.Conference Rooms
The Conference Room is the kind of call that more persons can partecipate. The conference calls are usually defined as "rooms", whose access can be limited by time settings or pass code.
Warning |
---|
This feature is not available for account end-to-end accounts. |
Conference Calls
Conference Call, as its name implies, is a call involving at least three users. It differs from Conference Room by the fact that Conference Call is one Secure Call at which third parties got invited. So it's one sort of dynamic conference room. All users invited are thus added to conversation in progress by either caller or callee.
Warning |
---|
This feature is not available for account end-to-end accounts. |
Call transfer
Call transfer is a typical PBX performance which is implemented in PrivateServer as well. One of the partecipant can hold on his/hers peer and perform a new call to the number to which trasfer the call. If the desired number picks up the call, then the transferrer can close the communication and let his/hers peer talk with the trasferred number.
...