Search results
Page title matches
- Using SRTP, which is a security profile for RTP will add confidentiality, message authentication, and repla Data security protocols such as SRTP rely upon a separate key management system to secure3 KB (431 words) - 08:45, 4 November 2013
Page text matches
- <font class="basetext">Providing security for <br/>the internal network of the carrier.</font></div></div>8 KB (1,086 words) - 09:08, 31 July 2018
- ...rg/wiki/Session_border_controller SIP session border controller] providing security for the internal network of the carrier. It provides also NAT traversal sup690 B (99 words) - 09:01, 4 November 2013
- ...his will stop man in the middle attacks and hide the called identity. Data security protocols such as SRTP rely upon a separate key management system to secure4 KB (564 words) - 14:00, 13 May 2013
- ... provide media translation and in addition also accounting information and security services. Yate can be used as a SIP session border controller providing security for the internal network of the carrier. It provides also NAT traversal sup2 KB (385 words) - 07:27, 27 May 2013
- * enable [[SIP Security in Yate|security]] - allows you to use of SRTP packets for voice.8 KB (1,261 words) - 08:43, 4 November 2013
- * [[SIP Security in Yate]]8 KB (1,083 words) - 11:49, 27 October 2017
- ...nyssrc''=''yes'' in the config file. The downside is a slight reduction in security as any valid looking RTP packet received on the UDP port will be accepted,6 KB (870 words) - 14:12, 10 January 2014
- * [[SIP Security in Yate]]2 KB (381 words) - 15:16, 31 October 2013
- [[Category:SSL]] [[Category:Security]]1 KB (167 words) - 11:23, 4 November 2013
- Another benefit would be increased security by clearly specifing the interface to listen on.3 KB (556 words) - 07:52, 31 May 2013
- - -l authPrivLevel : the security level according to the authentication and11 KB (1,779 words) - 11:28, 4 November 2013
- ; secure: bool: Generate and accept RFC 4568 security descriptors for SRTP25 KB (3,811 words) - 10:09, 6 July 2018
- To do this, go into your account settings, find the Security section, and then edit your Two-step Verification settings.8 KB (1,258 words) - 15:25, 31 October 2013
- Using SRTP, which is a security profile for RTP will add confidentiality, message authentication, and repla Data security protocols such as SRTP rely upon a separate key management system to secure3 KB (431 words) - 08:45, 4 November 2013
- * Herta Security395 B (60 words) - 08:33, 22 August 2013
- ...ext to use for incoming connections.<br>This parameter is used when inband security (TLS) is negociated on an incoming connection.<br>If not set the connection ; Incoming: this flag is ignored, no inband security can be negotiated43 KB (6,355 words) - 13:27, 1 October 2019
- ...Node 2, each of them with it's own Point Code. For some reasons, let's say security issues or network design, we do not want to process the traffic received fr13 KB (2,284 words) - 11:12, 13 December 2017