4.0.1 Background on SIP Trunks

The SIP Trunks are used for connecting to a local PBX or to a SIP VoIP provider. A Trunk can be used both for receiving and placing calls in a bidirectional way.

SIP trunks are mainly useful to interconnect ecosystem with other SIP infrastructure, using an end-to-site security model, featured by Enterprise Edition. SIP trunks have a very limited usefulness for Professional Edition.

Each SIP Trunk can be used to both receive and place calls. 

4.0.2 SIP Trunk's categories

From the version 2.5 you have two main SIP Trunk's categories:

  1. Secure Trunks
  2. Insecure Trunks

The former ones entail both TLS and SRTP, while the latter none of them: they use just RTP over UDP (thus without TLS). Which one is to be used depends on many factors, major one is the kind of PBX on the trunk's end. For example Cisco Unified Communications Manager are usually connected to via Secure Trunk, while SIP providers most often use the Unsecure Trunk.

4.0.3 Authentication Models in SIP Trunks

Apart for trunk's categories, you should get acquainted with the Authentication Model, that can be:

  1. SIP Account for Registered Trunks
  2. IP Authenticated for Unregistered Trunks

SIP Trunks using the Registered Authentication Model need an account on the other end. Then they use the account's credential to authenticate the Trunk when the is started and every communication that passes over that Trunk is considered authenticated, thus valid by default, and has the right to be processed and routed. 

SIP Trunks with no registration, on the other hand, do not need for an account to be setup: instead they use IP address to authorize every SIP communication directed to the . This model implies that any new SIP communication is authenticated against the sender's IP address (meaning the one belonging to the PBX connected to the ).

The latter model is mostly used enterprise systems, eg with CUCM. The former is mostly used with SIP Providers.

There's no way to perform an unauthenticated SIP INVITE on ! You can have different authentication models but you cannot choose to enable an unauthenticated SIP Trunk.

4.0.4 General starting point for SIP Trunk configuration

No matter what kind of Trunk you're going to configure on , you would anyway come throughout the SIP Trunk configuration page in order to complete your setup.

in  it's shown the tipical generic new sip trunk form. 

The fields have the following meanings:


You can reach  using the CALL ROUTING menu inside the Configuration. As you can read in  there are just 2 links inside it:

For creating a new SIP Trunk you go on the SIP Trunks menu voice and then use the New SIP Trunk in the SIP Trunk List page (see .

For each category and authentication models you are going to find a specific manual page describing the correct configuration and the possible parameters to be used.