SlideShare une entreprise Scribd logo
1  sur  29
Asterisk Deployment in
Large Enterprise and Cloud Solutions
                    Ali Pey
          Sr. Software Eng Architect
               Wed Jan 30, 2013
Cloud Services for Business


•   eFax®
•   eVoice®
•   FuseMail®
•   Campaigner®
•   KeepItSafe®
•   Onebox®
• www.j2.com




                                    2
Outline


•   Why Asterisk?
•   What can you do with Asterisk?
•   Network Diagrams
•   Large Enterprise and Could requirements
•   *** Proxy Servers (SBCs)
•   Load balancing, routing and failure detection
•   Security
•   NAT
•   Questions?
                                                    3
Why Asterisk? (1/3)


• It is Open Source
• It has a Community
  – Numerous companies and resources
  – Forums, mailing lists
  – Tools

• No Cost

 Open Source is revamping telecom

                                       4
Why Asterisk? (2/3)


• More Independence (Not depending on a single
  company)

• Continued Enhancements
  – The community is growing so are the features
  – Interoperability
  – WebRTC




                                                   5
Why Asterisk? (3/3)


• Flexibility, Customization and Integration
   –   Integrates with your back end
   –   Business Logic Integration
   –   Database Integration
   –   Special Features or Requirements




                                               6
What can you do with Asterisk? (1/3)


• Make a phone Call

• Conference, Hold, Transfer, Park,
  Announcement, Click to call, and many many
  more.

• Basically any Telephony Feature you can
  imagine


                                               7
What can you do with Asterisk? (2/3)


• Connect Phones/Clients:
  –   Analog
  –   SIP Phones
  –   Soft phone
  –   Web phone
  –   Mobile
  –   WebRTC
• Trunks:
  – IP (SIP)
  – Digital: T1/E1
  – Analog


                                             8
What can you do with Asterisk? (3/3)


•   PBX
•   Telephony and Voice Applications
•   Presence and BLF
•   Google Voice and WebRTC
•   Conferencing, Video, Fax, Auto Attendant, etc. etc.



• The question is: What can’t you do with Asterisk?




                                                          9
Diagram 1 - SIP Clients: SIP Phones, Soft phones,
Web Phones, Mobile or even WebRTC




                                                    10
Diagram 2: SIP Trunks




                        11
Diagram 3 - Analog/Digital Cards/Gateways
(Single point of failure)




                                            12
Large Enterprise and Cloud Solutions
       (or simply: Bigger Systems)

•   Redundancy
•   High Availability (Failure Detection)
•   Distribution and Routing Rules
•   Performance and Reliability
•   Security
•   NAT Traversal




                                              13
Proxy Servers
     What is a Proxy Server? (1/2)

• Registrar Server for Clients
• Routing, Rules, Failure Detection and Re-
  Routing
• SIP Signaling, Codec and Digit Manipulation
• Load Balancing
• Scripting
• Resource Allocation
• Rate Limiting


                                                14
What is a Proxy Server? (2/2)


•   NAT Traversal
•   Media Proxy (or Direct Media Path)
•   Performance
•   Redundancy and High Availability
•   Security and Authentication




                                         15
Two Asterisk Servers and One Proxy Server




                                            16
Two Asterisk – Two Proxy servers




                                   17
Fully Redundant Distributed Environment




                                          18
Proxy Servers (SBCs)


• Open Source vs. Commercial




                               19
Open Source Proxy Servers


• OpenSIPS
• Kamailio
• OverSIP (Ruby, WebSocket)




                                20
Commercial SBCs (Session Border Controller)


•   Acme Packet
•   Dialogic
•   Audiocodes
•   Sonus
•   And quite a few others




                                                     21
Fully Redundant Large Enterprise and Could
       Solution

•   Performance
•   Redundancy
•   High Availability
•   Routing, Rules, Load Balancing and Distribution
•   Security
•   NAT Traversal




                                                    22
Performance, Redundancy, High Availability and Distribution




                                                              23
Call Flow Diagram Examples


•   SIP Phone to SIP Phone Call
•   SIP Phone to SIP Trunk Call
•   SIP Trunk to SIP Trunk Call
•   Analog (Trunk or Phone) to SIP Trunk Call




                                                24
Call Routing


•   Load Balancing
•   Resources
•   Dynamic Routing
•   Rules
•   Failure detection




                        25
Security


• Sooner or later
• Close network vs. Open and in between
• What to look for?
• What to examine?
• Each deployment has its own unique
  characteristics that can make it safe.
• Secure VoIP – Insecure system => Call patterns



                                               26
NAT


•   What is NAT?
•   Public IP vs. Private IP
•   SIP Signaling
•   Media




                               27
Questions?




             28
29

Contenu connexe

Tendances

Kamailio - Large Unified Communication Platforms
Kamailio - Large Unified Communication PlatformsKamailio - Large Unified Communication Platforms
Kamailio - Large Unified Communication PlatformsDaniel-Constantin Mierla
 
Kamailio with Docker and Kubernetes
Kamailio with Docker and KubernetesKamailio with Docker and Kubernetes
Kamailio with Docker and KubernetesPaolo Visintin
 
The 12 tasks of Asterisk
The 12 tasks of AsteriskThe 12 tasks of Asterisk
The 12 tasks of AsteriskElio Rojano
 
Using Asterisk and Kamailio for Reliable, Scalable and Secure Communication S...
Using Asterisk and Kamailio for Reliable, Scalable and Secure Communication S...Using Asterisk and Kamailio for Reliable, Scalable and Secure Communication S...
Using Asterisk and Kamailio for Reliable, Scalable and Secure Communication S...Fred Posner
 
FOSS Sthlm: Realtime Communication Update
FOSS Sthlm: Realtime Communication UpdateFOSS Sthlm: Realtime Communication Update
FOSS Sthlm: Realtime Communication UpdateOlle E Johansson
 
Ipo spaces calling document-v1
Ipo spaces calling document-v1Ipo spaces calling document-v1
Ipo spaces calling document-v1ManmeetShandilya2
 
SIP Server Optimizations for Mobile Networks
SIP Server Optimizations for Mobile NetworksSIP Server Optimizations for Mobile Networks
SIP Server Optimizations for Mobile NetworksDaniel-Constantin Mierla
 
Kamailio World 2014 - Introduction to IMS Application Servers
Kamailio World 2014 - Introduction to IMS Application ServersKamailio World 2014 - Introduction to IMS Application Servers
Kamailio World 2014 - Introduction to IMS Application Serverscaruizdiaz
 
AnyFirewall Engine v10.0 Developer Guide
AnyFirewall Engine v10.0 Developer GuideAnyFirewall Engine v10.0 Developer Guide
AnyFirewall Engine v10.0 Developer GuideEyeball Networks
 
stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...
stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...
stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...NETWAYS
 
Kamailio World 2018: Having fun with new stuff
Kamailio World 2018: Having fun with new stuffKamailio World 2018: Having fun with new stuff
Kamailio World 2018: Having fun with new stuffOlle E Johansson
 
CCNA site-to-site connectivity security
CCNA  site-to-site connectivity securityCCNA  site-to-site connectivity security
CCNA site-to-site connectivity securityNetworkel
 
FreeSWITCH on Docker
FreeSWITCH on DockerFreeSWITCH on Docker
FreeSWITCH on Docker建澄 吳
 
Voxter - Building Value with Kazoo - KazooCon 2015
Voxter - Building Value with Kazoo - KazooCon 2015Voxter - Building Value with Kazoo - KazooCon 2015
Voxter - Building Value with Kazoo - KazooCon 20152600Hz
 
Mr201307 investigation into_emet4.0_eng
Mr201307 investigation into_emet4.0_engMr201307 investigation into_emet4.0_eng
Mr201307 investigation into_emet4.0_engFFRI, Inc.
 
Sapex ip pbx packaging
Sapex ip pbx packagingSapex ip pbx packaging
Sapex ip pbx packagingmatrixtelesol
 

Tendances (20)

Kamailio - Large Unified Communication Platforms
Kamailio - Large Unified Communication PlatformsKamailio - Large Unified Communication Platforms
Kamailio - Large Unified Communication Platforms
 
Kamailio with Docker and Kubernetes
Kamailio with Docker and KubernetesKamailio with Docker and Kubernetes
Kamailio with Docker and Kubernetes
 
The 12 tasks of Asterisk
The 12 tasks of AsteriskThe 12 tasks of Asterisk
The 12 tasks of Asterisk
 
Using Asterisk and Kamailio for Reliable, Scalable and Secure Communication S...
Using Asterisk and Kamailio for Reliable, Scalable and Secure Communication S...Using Asterisk and Kamailio for Reliable, Scalable and Secure Communication S...
Using Asterisk and Kamailio for Reliable, Scalable and Secure Communication S...
 
FOSS Sthlm: Realtime Communication Update
FOSS Sthlm: Realtime Communication UpdateFOSS Sthlm: Realtime Communication Update
FOSS Sthlm: Realtime Communication Update
 
Kamailio on Docker
Kamailio on DockerKamailio on Docker
Kamailio on Docker
 
Kamailio - SIP Servers Everywhere
Kamailio - SIP Servers EverywhereKamailio - SIP Servers Everywhere
Kamailio - SIP Servers Everywhere
 
Ipo spaces calling document-v1
Ipo spaces calling document-v1Ipo spaces calling document-v1
Ipo spaces calling document-v1
 
SIP Server Optimizations for Mobile Networks
SIP Server Optimizations for Mobile NetworksSIP Server Optimizations for Mobile Networks
SIP Server Optimizations for Mobile Networks
 
Kamailio World 2014 - Introduction to IMS Application Servers
Kamailio World 2014 - Introduction to IMS Application ServersKamailio World 2014 - Introduction to IMS Application Servers
Kamailio World 2014 - Introduction to IMS Application Servers
 
AnyFirewall Engine v10.0 Developer Guide
AnyFirewall Engine v10.0 Developer GuideAnyFirewall Engine v10.0 Developer Guide
AnyFirewall Engine v10.0 Developer Guide
 
stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...
stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...
stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...
 
Kamailio World 2018: Having fun with new stuff
Kamailio World 2018: Having fun with new stuffKamailio World 2018: Having fun with new stuff
Kamailio World 2018: Having fun with new stuff
 
Kamailio - Secure Communication
Kamailio - Secure CommunicationKamailio - Secure Communication
Kamailio - Secure Communication
 
CCNA site-to-site connectivity security
CCNA  site-to-site connectivity securityCCNA  site-to-site connectivity security
CCNA site-to-site connectivity security
 
FreeSWITCH on Docker
FreeSWITCH on DockerFreeSWITCH on Docker
FreeSWITCH on Docker
 
Nat
NatNat
Nat
 
Voxter - Building Value with Kazoo - KazooCon 2015
Voxter - Building Value with Kazoo - KazooCon 2015Voxter - Building Value with Kazoo - KazooCon 2015
Voxter - Building Value with Kazoo - KazooCon 2015
 
Mr201307 investigation into_emet4.0_eng
Mr201307 investigation into_emet4.0_engMr201307 investigation into_emet4.0_eng
Mr201307 investigation into_emet4.0_eng
 
Sapex ip pbx packaging
Sapex ip pbx packagingSapex ip pbx packaging
Sapex ip pbx packaging
 

Similaire à Asterisk Deployment in Large Enterprises and Cloud Solutions

Distribution, redundancy and high availability using OpenSIPS
Distribution, redundancy and high availability using OpenSIPSDistribution, redundancy and high availability using OpenSIPS
Distribution, redundancy and high availability using OpenSIPSDigium
 
Astricon 2012 - Redundancy and High Availability
Astricon 2012 - Redundancy and High AvailabilityAstricon 2012 - Redundancy and High Availability
Astricon 2012 - Redundancy and High Availabilityalipey
 
Lahav Savir - Massively Scaleable Mobile Gateways
Lahav Savir - Massively Scaleable Mobile GatewaysLahav Savir - Massively Scaleable Mobile Gateways
Lahav Savir - Massively Scaleable Mobile GatewaysLahav Savir
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...bdemchak
 
EarthLink Business mpls overview
EarthLink Business mpls overviewEarthLink Business mpls overview
EarthLink Business mpls overviewRoss McVey
 
Azure reference architectures
Azure reference architecturesAzure reference architectures
Azure reference architecturesMasashi Narumoto
 
Integrating OpenStack To Existing Infrastructure
Integrating OpenStack To Existing InfrastructureIntegrating OpenStack To Existing Infrastructure
Integrating OpenStack To Existing InfrastructureHui Cheng
 
Integrating OpenStack to Existing infrastructure
Integrating OpenStack to Existing infrastructureIntegrating OpenStack to Existing infrastructure
Integrating OpenStack to Existing infrastructurelaurabeckcahoon
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityPaul Morse
 
Daitan Group Company Overview
Daitan Group Company OverviewDaitan Group Company Overview
Daitan Group Company OverviewDaitan Group
 
Routing Security
Routing SecurityRouting Security
Routing SecurityRIPE NCC
 
Secure Routing
Secure RoutingSecure Routing
Secure RoutingRIPE NCC
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA WebinarBrian Ray
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceSagi Brody
 
Splunk Conf2010: Corporate Express presents Splunk with SAP
Splunk Conf2010: Corporate Express presents Splunk with SAPSplunk Conf2010: Corporate Express presents Splunk with SAP
Splunk Conf2010: Corporate Express presents Splunk with SAPSplunk
 
Ready, Set, SD-WAN: Best Practices for Assuring Branch Readiness
Ready, Set, SD-WAN: Best Practices for Assuring Branch ReadinessReady, Set, SD-WAN: Best Practices for Assuring Branch Readiness
Ready, Set, SD-WAN: Best Practices for Assuring Branch ReadinessThousandEyes
 

Similaire à Asterisk Deployment in Large Enterprises and Cloud Solutions (20)

Distribution, redundancy and high availability using OpenSIPS
Distribution, redundancy and high availability using OpenSIPSDistribution, redundancy and high availability using OpenSIPS
Distribution, redundancy and high availability using OpenSIPS
 
Astricon 2012 - Redundancy and High Availability
Astricon 2012 - Redundancy and High AvailabilityAstricon 2012 - Redundancy and High Availability
Astricon 2012 - Redundancy and High Availability
 
Lahav Savir - Massively Scaleable Mobile Gateways
Lahav Savir - Massively Scaleable Mobile GatewaysLahav Savir - Massively Scaleable Mobile Gateways
Lahav Savir - Massively Scaleable Mobile Gateways
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...
 
EarthLink Business mpls overview
EarthLink Business mpls overviewEarthLink Business mpls overview
EarthLink Business mpls overview
 
Azure reference architectures
Azure reference architecturesAzure reference architectures
Azure reference architectures
 
Software defined networking: Primer
Software defined networking: PrimerSoftware defined networking: Primer
Software defined networking: Primer
 
Integrating OpenStack To Existing Infrastructure
Integrating OpenStack To Existing InfrastructureIntegrating OpenStack To Existing Infrastructure
Integrating OpenStack To Existing Infrastructure
 
Integrating OpenStack to Existing infrastructure
Integrating OpenStack to Existing infrastructureIntegrating OpenStack to Existing infrastructure
Integrating OpenStack to Existing infrastructure
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
Daitan Group Company Overview
Daitan Group Company OverviewDaitan Group Company Overview
Daitan Group Company Overview
 
Routing Security
Routing SecurityRouting Security
Routing Security
 
Secure Routing
Secure RoutingSecure Routing
Secure Routing
 
Sculpturing SIP World
Sculpturing SIP WorldSculpturing SIP World
Sculpturing SIP World
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA Webinar
 
Introduction to SDN
Introduction to SDNIntroduction to SDN
Introduction to SDN
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
 
Splunk Conf2010: Corporate Express presents Splunk with SAP
Splunk Conf2010: Corporate Express presents Splunk with SAPSplunk Conf2010: Corporate Express presents Splunk with SAP
Splunk Conf2010: Corporate Express presents Splunk with SAP
 
Swaminathan_Resume_May2015
Swaminathan_Resume_May2015Swaminathan_Resume_May2015
Swaminathan_Resume_May2015
 
Ready, Set, SD-WAN: Best Practices for Assuring Branch Readiness
Ready, Set, SD-WAN: Best Practices for Assuring Branch ReadinessReady, Set, SD-WAN: Best Practices for Assuring Branch Readiness
Ready, Set, SD-WAN: Best Practices for Assuring Branch Readiness
 

Asterisk Deployment in Large Enterprises and Cloud Solutions

  • 1. Asterisk Deployment in Large Enterprise and Cloud Solutions Ali Pey Sr. Software Eng Architect Wed Jan 30, 2013
  • 2. Cloud Services for Business • eFax® • eVoice® • FuseMail® • Campaigner® • KeepItSafe® • Onebox® • www.j2.com 2
  • 3. Outline • Why Asterisk? • What can you do with Asterisk? • Network Diagrams • Large Enterprise and Could requirements • *** Proxy Servers (SBCs) • Load balancing, routing and failure detection • Security • NAT • Questions? 3
  • 4. Why Asterisk? (1/3) • It is Open Source • It has a Community – Numerous companies and resources – Forums, mailing lists – Tools • No Cost  Open Source is revamping telecom 4
  • 5. Why Asterisk? (2/3) • More Independence (Not depending on a single company) • Continued Enhancements – The community is growing so are the features – Interoperability – WebRTC 5
  • 6. Why Asterisk? (3/3) • Flexibility, Customization and Integration – Integrates with your back end – Business Logic Integration – Database Integration – Special Features or Requirements 6
  • 7. What can you do with Asterisk? (1/3) • Make a phone Call • Conference, Hold, Transfer, Park, Announcement, Click to call, and many many more. • Basically any Telephony Feature you can imagine 7
  • 8. What can you do with Asterisk? (2/3) • Connect Phones/Clients: – Analog – SIP Phones – Soft phone – Web phone – Mobile – WebRTC • Trunks: – IP (SIP) – Digital: T1/E1 – Analog 8
  • 9. What can you do with Asterisk? (3/3) • PBX • Telephony and Voice Applications • Presence and BLF • Google Voice and WebRTC • Conferencing, Video, Fax, Auto Attendant, etc. etc. • The question is: What can’t you do with Asterisk? 9
  • 10. Diagram 1 - SIP Clients: SIP Phones, Soft phones, Web Phones, Mobile or even WebRTC 10
  • 11. Diagram 2: SIP Trunks 11
  • 12. Diagram 3 - Analog/Digital Cards/Gateways (Single point of failure) 12
  • 13. Large Enterprise and Cloud Solutions (or simply: Bigger Systems) • Redundancy • High Availability (Failure Detection) • Distribution and Routing Rules • Performance and Reliability • Security • NAT Traversal 13
  • 14. Proxy Servers What is a Proxy Server? (1/2) • Registrar Server for Clients • Routing, Rules, Failure Detection and Re- Routing • SIP Signaling, Codec and Digit Manipulation • Load Balancing • Scripting • Resource Allocation • Rate Limiting 14
  • 15. What is a Proxy Server? (2/2) • NAT Traversal • Media Proxy (or Direct Media Path) • Performance • Redundancy and High Availability • Security and Authentication 15
  • 16. Two Asterisk Servers and One Proxy Server 16
  • 17. Two Asterisk – Two Proxy servers 17
  • 18. Fully Redundant Distributed Environment 18
  • 19. Proxy Servers (SBCs) • Open Source vs. Commercial 19
  • 20. Open Source Proxy Servers • OpenSIPS • Kamailio • OverSIP (Ruby, WebSocket) 20
  • 21. Commercial SBCs (Session Border Controller) • Acme Packet • Dialogic • Audiocodes • Sonus • And quite a few others 21
  • 22. Fully Redundant Large Enterprise and Could Solution • Performance • Redundancy • High Availability • Routing, Rules, Load Balancing and Distribution • Security • NAT Traversal 22
  • 23. Performance, Redundancy, High Availability and Distribution 23
  • 24. Call Flow Diagram Examples • SIP Phone to SIP Phone Call • SIP Phone to SIP Trunk Call • SIP Trunk to SIP Trunk Call • Analog (Trunk or Phone) to SIP Trunk Call 24
  • 25. Call Routing • Load Balancing • Resources • Dynamic Routing • Rules • Failure detection 25
  • 26. Security • Sooner or later • Close network vs. Open and in between • What to look for? • What to examine? • Each deployment has its own unique characteristics that can make it safe. • Secure VoIP – Insecure system => Call patterns 26
  • 27. NAT • What is NAT? • Public IP vs. Private IP • SIP Signaling • Media 27
  • 29. 29