What Unified Communication is?

Organizations can improve communication between employees and improve the service provided to their customers. Telephony system users can continue to use all their communications services from anywhere, from any device, any time. The system combines the user's media devices from a desktop IP phone, personal video camera and mobile phone.

The personal computer systems and the organizational data can provide services such as,Click to call from PC, Instant-Messaging, Presence information , single number reach, Conference solutions ,Disa,
Unified Messaging (Fax2Mail&Mail2Fax,Voicemail,e-mail,SMS) and other types of multimedia elements like pictures, animations etc.

With all this the Unified communication created a new environment of personal communication and user experience so You as an individual, or a business will be able to manage all their communications in a single entity rather than separately .
2Bnet believe that together with our professional experience we will bring to your company a new world.

Why Unified Communication?

  • User's that rely on mobility in connection can remain connected with their softphones,wireless IP handsets,mobile phone connected via sip-proxy and etc even when they are outside the office or home.
  • Can significantly lower costs by enabling users to work from home or from anywhere else in the world regardless of geographic location and without fear of delays due to geographical distance.
  • Web and video conferencing calls will allow for better interactivity and subsequently better productivity, thereby reducing the cost on travel and telecoms.
  • Connection between the branches that allows free calls over the Internet and significant cost savings.
  • Phone calls are made at the same time between IP desk phone and mobile phone communicate wirelessly at no charge significantly and saves money for calls from mobile expensive. Although the service can also be securely outside the office by wireless or GSM connection from anywhere.
  • Users can work from anywhere in the organization without involving the network administrator or technician to copy extension with a simple login process, you can turn any enterprise IP phone user's to personal telephone (including extension number memories personality traits).
  • The system allows to share documents and applications between people in conversation and make it more efficient. The sharing can be done by pressing a button during a call or conference call as planned.
  • Can be connected to inter-organizational systems and applications from other manufacturers. For example, the system connects with e-mail applications for Unified Messaging, CRM systems for "bumping" and Dialing from the application screens.
  • The solution combines the Data Network, the Voice and Video Network into unified network that provides all communication services organization. Using the unified network simplifies network management and network maintenance costs discounter could apply to folded applications Data, Voice and Video.

What about Security?

Physical Security

IP PBX is usually locked in a secure environment, the IP network should be treated in a similar way. Each of the devices that carries IP Telephony traffic is really part of an IP PBX.
Once a user or attacker has physical access to one of the devices in a network, all kinds of problems could occur. Even if you have strong password security and the user or attacker cannot get into the network device, that does not mean that they cannot cause damage in a network by simply unplugging the device and stopping all traffic.

IP Addressing

IP addressing can be critical for controlling the data that flows in and out of the logically separated IP Telephony network. The more defined the IP addressing is within a network, the easier it becomes to control the devices on the network.

it is recommend to use IP addressing based on RFC 1918. This method of addressing allows deployment of a IP Telephony system into a network without redoing the IP addressing of the network. Using RFC 1918 also allows for better control in the network because the IP addresses of the voice endpoints are well defined and easy to understand. If the voice endpoints are all addressed within a 10.x.x.x. network, access control lists (ACLs) and tracking of data to and from those devices are simplified.If you have a well defined IP addressing plan for your voice deployments, it becomes easier to write ACLs for controlling the IP Telephony traffic and it also helps with firewall deployments.

Using RFC 1918 enables you easily to deploy one VLAN per switch and also enables you to keep the Voice VLAN free of any Spanning Tree Protocol (STP) loops.

If deployed correctly, route summarization could help to keep the routing table about the same as before the voice deployment, or just slightly larger.

IP Phone Security

IP Phones contain built-in features to increase security on a IP Telephony network. These features can be enabled or disabled on a phone-by-phone basis to increase the security of an IP Telephony deployment. Depending on the placement of the phones, a security policy will help determine if these features need to be enabled and where they should be enabled.

PC Port on the Phone

The phone has the ability to turn on or turn off the port on the back of the phone, to which a PC would normally be connected. This feature can be used as a control point to access the network if that type of control is necessary.

Depending on the security policy and placement of the phones, the PC port on the back of any given phone might have to be disabled. Disabling this port would prevent a device from plugging into the back of the phone and getting network access through the phone itself. A phone in a common area such as a lobby would typically have its port disabled.

For each person who needs to have network access and is approved for access, a separate Ethernet port would be required to provide that person with network access if the PC port on the phone is disabled. A person could still unplug the ethernet jack from the phone and attempt to plug it into another device.

PC Voice VLAN Access

Because there are two VLANs from the switch to the phone, the phone needs to protect the voice VLAN from any unwanted access. The phones can prevent unwanted access into the voice VLAN from the back of the phone. PC Voice VLAN Access prevents any access to the voice VLAN from the PC port on the back of the phone. When disabled, this feature does not allow the devices plugged into the PC port on the phone to "jump" VLANs and get onto the voice VLAN by sending 802.1q tagged information destined for the voice VLAN to the PC port on the back of the phone.

Web Access

Each IP Phone has a web server built into it to help with debugging ,remote status of the phone and management purposes. The web server also enables the phones to receive applications pushed from the IP PBX to the phones.
This setting can be global or it could be enabled or disabled on a phone-by-phone basis.

Open Source IP PBX why not?

Placement of a computer - any computer, the global network - could expose him to abuse and vandalism.
Although the open source world (we know) not exposed spyware, viruses, and other evils - but like any system requires computing - Protection, control and monitoring against abuse.
The open source world does not allow backup from the manufacturer like Cisco because there is no one behind him.
In addition, most installers are not aware of attacks and the dangers there are in the Internet world when they add the IP PBX to this world.
Remember Your telephone system is the beating heart of the organization, do not neglect it!