
Oracle SBC Security Guide
Part 2: Secure Installation and Configuration
Recommended Deployment Topologies
This section outlines the planning process for a secure installation and describes several recommended
deployment topologies for the system.
Session Border Controller
The SBC family products can be deployed following several generalized topology types; Peering
(sometimes called Trunking), Access (also called Hosted IP Services), and Hybrid which combines the
two models.
Peering
In a peering model the SBC is contacted by a SIP server to relay endpoint signaling information. The SIP
server may be a PBX, registrar, proxy, SBC, or other device. The IP of the device is usually trusted and
pre-provisioned in the SBC as an endpoint (session agent) that will be relaying calls. Since the remote
endpoint is already known, Access Control Lists (ACL) and Call Admission Controls (CAC) can be pre-
provisioned for the appropriate level of protection or service level assurance.
Comentarios a estos manuales