

For security reasons, some providers allow you to switch to encrypted trunks to further increase security.įrom the Swyx point of view a SIP-ALG is not necessary for SwyxWare or would not implement increased security.A vulnerability in the DNS application layer gateway (ALG) functionality that is used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. Direct communication is therefore exclusively to and from one provider.

This is done either via a secured VPN or via the so-called RemoteConnector-Service. SwyxWare itself does not provide public dial-in for end devices. Disabling the ALG functions for the SIP protocol does not affect other protocols. Also other firewall rules, IDS systems and other techniques will still work. The security issue of a SwyxWare is not affected by deactivating these ALG functions.

Please contact the manufacturer of the corresponding firewall solution. Whether and how the SIP ALG can be deactivated depends on the router you are using. It is therefore advisable to deactivate the SIP-ALG or SIP-Helper functions in the above-mentioned cases. In DMZ scenarios, however, 2 firewalls are often used, which is why pure internal telephony can also be affected in such cases. In principle, a SIP-ALG is used on the "external" firewall to the Internet, so that it would only actively intervene in the traffic if the calls involved were external (via or from the SIP provider).
