Services
Introduction of Encrypt Bridge defending force-out
Date: 2007-5-3 Hits: 1043
Description:
It can encrypt and decipher to the SIP signalling and RTP audio data, to make it to the general UDP data, and pass-through the force-out.
Easy to connect, without alteration to the network topology. The connective method below.
It setup direct-through IP and ports by changing the file hid_set.sh, which under the setting menu. After the setting, the system will forward the opposite data packet directly but without judgment nor disposition.
It can distinguish the data stream intelligently, without detriment to VOIP server.
Base on the system bottom development that cost less to system resources after setting up.
Run under Environment, Linux operating system. More detailed please follow the software to the corresponding editions on our website .
It can be set up into voip server directly in the software edition ,and the connective method and function below (hardware)
More details about each edition,please check at the Products
It can encrypt and decipher to the SIP signalling and RTP audio data, to make it to the general UDP data, and pass-through the force-out.
Easy to connect, without alteration to the network topology. The connective method below.
It setup direct-through IP and ports by changing the file hid_set.sh, which under the setting menu. After the setting, the system will forward the opposite data packet directly but without judgment nor disposition.
It can distinguish the data stream intelligently, without detriment to VOIP server.
Base on the system bottom development that cost less to system resources after setting up.
Run under Environment, Linux operating system. More detailed please follow the software to the corresponding editions on our website .
It can be set up into voip server directly in the software edition ,and the connective method and function below (hardware)
More details about each edition,please check at the Products