Connect directly to the PBX using your S-Series phone from a remote location. Sangoma phones natively support connecting a VPN from the phone directly to the PBX. You will need to set up your PBX VPN server first, and then use EndPoint Manager to tell the phone to use the VPN on a per-extension basis.
Full Answer
How does the sangoma connect mobile app work?
Answer The Sangoma Connect Mobile App (Connect) enables an iPhone or an Android device to be used as a phone with a Switchvox PBX. Switchvox Admins use the Switchvox Admin Suite (/admin) to assign Connect to a phone extension, and to set correct networking parameters as required by Connect. This document describes these Admin procedures.
Where are the sangoma cloud servers located?
All Sangoma Cloud servers are located in the U.S. and Canada, and are separate from the Sangoma Push Notification servers. Related: Please see the network diagram at the bottom of this page. A Switchvox administrator uses the Manage Phones tool to set up one or more phone assignments for a person.
Does sangoma support public push notifications from the PBX?
If the PBX is only accessible via VPN or in a private network, Sangoma public push notification server IP addresses must be port forwarded or whitelisted. (Note: push servers are auto-configured by the mobile app; administrators only need to provide network access to the PBX.)
How do businesses use remote access VPN?
Businesses use remote access VPNs to establish a secure connection between their network and the devices used by remote workers. Once connected, employees are able to access the resources on the network just as if their devices were physically plugged in at the office.
Zulu UC Desktop Softphone
Sangoma’s Zulu UC delivers productivity and collaboration tools (chat, SMS, click-to-call, file sharing) through a single application which can be installed locally or used in a browser. Zulu brings all of your tools together in one place, letting you take your work environment with you, wherever you are.
User Control Panel
The User Control Panel (UCP) is a browser-based, customizable dashboard available to every individual user, giving you call control options including:
Use Your Existing Desk Phone to Work at Home
If you use a Sangoma desk phone in the office, you can bring your phone home with you. In many cases, when attached to a properly-configured system, you can plug in at home immediately. Please keep in mind that you will likely need a wall plug adapter to power your phone, as most home users do not have Power-over-Ethernet (PoE).
Administrator Options for Connecting Remote Workers
System administrators have the following options for connecting remote employees:
Built-in Contact Center Features
PBXact also offers built-in contact center features for users like receptionists or service and support teams who handle a high volume of calls.
Sangoma Meet Video Conferencing
Lastly, we are excited to introduce a new video meeting solution: Sangoma Meet! With Sangoma Meet, users can host high-definition video calls with up to 50 participants, and up to 25 video displays at once. Meetings are private and secure, with password protection turned on by default.
What is a Sangoma Connect phone?
The Sangoma Connect Mobile App (Connect) enables an iPhone or an Android device to be used as a phone with a Switchvox PBX.#N#Switchvox Admins use the Switchvox Admin Suite (/admin) to assign Connect to a phone extension, and to set correct networking parameters as required by Connect. This document describes these Admin procedures.#N#How do I Use Sangoma Connect Mobile for Switchvox? is the article for phone users to learn how to use Connect.#N#Firewall/NAT Checklist has important information about requirements for configuring your firewall for use with Sangoma Connect Mobile.#N#Sunsetting Switchvox Mobile Softphone is the article with details about how to transition from Switchvox Mobile to Sangoma Connect.
How to set TLS/SRTP for a phone?
To set TLS/SRTP for a Main phone extension, use the Digium Phone Settings in the extension's settings. If you need an Additional Phone extension to use TLS/SRTP but the Main extension is not using it, you can set TLS/SRTP when you assign Connect to the Additional Phone extension, right in the Manage Phones tool.
How to confirm an IP address on Switchvox?
To confirm connectivity, open Connect on the mobile phone (have Connect in the foreground), then in the Switchvox admin suite navigate to Server > Connection Status > Phone and confirm an IP is listed for this extension. If you don't see an IP, it's likely there is a networking or SIP ALG issue that is preventing reliable communications.
What is the video codec for SIP?
Video Codecs are set in the Main SIP extension's Digium Phones settings (found in the Other Manufacturer's tab). H263 and H264 are on by default.
Is TLS/SRTP secure calling?
Transport should be set to TCP, or TLS/SRTP for secure calling. UDP should not normally be used. Secure calling with TLS/SRTP requires a valid certificate from a trusted authority. See HTTPS and SSL Certificates, and What do I need to know about TLS and SRTP in Switchvox? . T LS/SRTP encryption is recommended not only for security but because it bypasses any issues created by routers with improper SIP ALG implementations.
What is the first option for a VPN?
The first option is to supply your workers with a PC/laptop with pre-configured VPN software.
How Are Remote-Access VPNs Different to Consumer VPN Solutions?
You may be familiar with the term ‘VPN’ from the vast range of consumer VPN solutions available on the market, like NordVPN, ExpressVPN, and TunnelBear.
What is a VPN?
You may be familiar with the term ‘VPN’ from the vast range of consumer VPN solutions available on the market, like NordVPN, ExpressVPN, and TunnelBear. Enterprise level remote-access VPNs use the same underlying technology but they are used very differently in practice.
Why is VPN traffic routed?
User traffic is routed through a VPN provider’s servers to preserve anonymity and privacy – creating a secure tunnel between the user’s device and whatever website or resource they’re trying to access. Consumers purchase a subscription to the service and manage connections and disconnections through software.
Why do people use VPN?
Personal, consumer VPN services are used by private individuals to encrypt their online traffic, protecting their online activity and their right to informational privacy. VPNs are often used to conceal or alter a device’s perceived geographic location.
Can a remote worker save sensitive data locally?
Additionally, the company has little to no control over how potentially sensitive data is handled. A remote worker could easily save sensitive data locally to a shared household device, or transmit it in an insecure way that contravenes the company’s IT security policy.
What is remote access VPN?
What is a remote access VPN? Businesses use remote access VPNs to establish a secure connection between their network and the devices used by remote workers. Once connected, employees are able to access the resources on the network just as if their devices were physically plugged in at the office.
What is site to site VPN?
A site-to-site VPN uses a secure gateway to connect a network at one location to one or more networks at another location. This type of VPN doesn’t require each device at the end location to have a VPN client installed because the gateway handles the traffic.
What are the advantages of remote access VPN?
Another advantage of remote access VPNs is that they provide companies with an affordable way to secure data sent by offsite employees. The initial investment needed to set up a remote access VPN is minimal and they can easily be scaled as a company grows and this is especially true if a VPN service provider is used.
Why is VPN important for business?
The most important benefit though is data security. When an offsite employee sends data through a VPN, it is encrypted, so even if a hacker is able to intercept that data, they won’t be able to use it. This is particularly important if an employee accesses their companies’ network using public Wi-Fi while traveling because traffic sent over these networks is usually not encrypted.
What is a network access server?
A network access server could be a dedicated server or it might be a software application running on a shared server. Users connect to the NAS over the internet in order to use a remote access VPN. In order to sign in to the VPN, the NAS requires that users provide valid credentials. To authenticate these credentials, the NAS uses either its own authentication process or a separate authentication server running on the network.
Why do businesses use VPNs?
Businesses use remote access VPNs to establish a secure connection between their network and the devices used by remote workers. Once connected, employees are able to access the resources on the network just as if their devices were physically plugged in at the office.
Can VPNs be used remotely?
While VPNs have grown increasingly popular among users looking to protect their data and privacy online, using the right type of VPN can make all the difference when working remotely. In this article, we’ll be taking a closer look at remote access VPNs, who offers them ( like Perimeter 81, our top ranked business VPN) and the benefits they can bring to organizations looking to mobilize a remote workforce quickly.
Review the Outgoing Call Rules
Restrict (deny) Outgoing Call Rules such as international call rules and allow only those users who would need to call internationally. You can do this by going to Setup > Manage > click on the pencil icon for an extension and go to the Outgoing Call Rules tab.
Decide on Voicemail Security
During a voicemail greeting, callers may push the "*" key to log into the current voicemail box. Change this setting to NO. Select Tools > PBX Features > Voicemail > Voicemail Routing.
IVR Extension Dialing Options
In IVRs, limit extension dialing to only necessary extensions. Please refer to this article for more information. If extension dialing within an IVR is not necessary, then disable extension dialing completely from the IVR.
Review the Call Reports Regularly
Monitor Reporting: Call Reports > Call Logs on a regular basis. Check for calls at odd hours or calls to international numbers, especially if users don't frequently place international calls. You can run Call Reports by hour of the day, or review the Call Logs daily to see what time calls were going out.
Additional Considerations
Contact your provider to see what security they can implement to prevent toll fraud.