Ghost Calls from Port Scanning - Printable Version +- Yealink Forums (http://forum.yealink.com/forum) +-- Forum: IP Phone Series (/forumdisplay.php?fid=4) +--- Forum: General topics (/forumdisplay.php?fid=15) +--- Thread: Ghost Calls from Port Scanning (/showthread.php?tid=1012) |
RE: Ghost Calls from Port Scanning - ctiefel - 12-04-2014 07:31 AM (12-04-2014 07:24 AM)bnelson Wrote: Remstar: How is changing TCP port doing anything when SIP uses UDP? RE: Ghost Calls from Port Scanning - Bryan Nelson - 12-04-2014 07:34 AM Our service supports using TCP as the SIP transport. Adds some latency, but it can be useful for situations like this, better battery life on mobile, bypassing SIP-ALG on verizon 4G hotspots, etc... It does use more resources on the server however. Edit: I just tested the "Allow IP Call" = No and I am no longer able to make an unsolicited call to the extension. Looks like newer firmware versions may have fixed this since I last tried. I will test more, and update here with results. Looks like the sip trust control is not required to kill generic sip vicious scanner calls. A more advanced scann attack might still be able to gather the extension, but I'll cross that bridge when it happens... RE: Ghost Calls from Port Scanning - Abe1048 - 12-26-2014 05:02 AM (12-04-2014 07:34 AM)bnelson Wrote: Our service supports using TCP as the SIP transport. Adds some latency, but it can be useful for situations like this, better battery life on mobile, bypassing SIP-ALG on verizon 4G hotspots, etc... Hi all, We have found that using a router with the tomato firmware fixes all theese issues. |