Guide

PBX Security Best Practices

This document outlines some of the most common IP PBX hacking situations and proposes some basic safeguard configurations. Source: http://i3forum.org Why is securing your...
Mindaugas Kezys
2 min read

Freeswitch installation on Debian 11

A short, step-by-step guide for proper installation of Freeswitch on Debian 11 (bullseye) The official instructions are barebone, so this guide is a supplement...
Mindaugas Kezys
2 min read

High-Availability, Redundancy and Fail-Over

It’s never a matter of if a system goes down. It’s always a matter of when. (SysAdmin wisdom) High Availability Computational environments designed to...
Mindaugas Kezys
3 min read

Quality Based Routing

Description Quality based routing represents an advanced type of traffic routing. Based on historical data, the system calculates route quality based on a predefined...
Mindaugas Kezys
4 min read

Call Routing by Caller ID

It is sometimes called location-based routing, or A-number routing, or origin-based routing. The main idea is to determine the path of the call based...
Mindaugas Kezys
2 min read

Connecting with A-Z VoIP Vendors

Intro In this post, we will provide an overview of three prepaid A-Z VoIP vendors and go over their self-help portals to show how...
Mindaugas Kezys
9 min read

Post Dial Delay (PDD)

This article describes Post Dial Delay (PDD), which in the client’s language is a long delay before a ring tone, a call taking too...
Mindaugas Kezys
5 min read

Creating an A-Z Tariff for Clients

The fastest way to start serving customers is to provide them with the so-called A-Z tariff price list, which tells them that you are...
Mindaugas Kezys
4 min read

Softswitch vs SBC

Some of our customers have misconceptions about what session border controllers (SBCs) are. People who ask for an SBC often actually need a softswitch...
Mindaugas Kezys
1 min read