Solved

Setting VOIP on a VPN tunnel between 2 sites

Posted on 2007-11-27
4
1,020 Views
Last Modified: 2012-05-05
Hello,
I am not sure if anyone out there can help me?!!
here is the idea I have:
I have a VPN tunnel between 2 sites (say site 1 is NYC and site 2 is CA )
 I would like to be able to place a phone call over that VPN line using VOIP as an internal call (for free)
bypassing the phone company.

Anyone knows what hardware + software needed to get this done.

Thank you.

Please let me know if more info needed.
0
Comment
Question by:Alex00
4 Comments
 
LVL 36

Accepted Solution

by:
grblades earned 250 total points
ID: 20359977
Asterisk (http://www.asterisk.org) or Trixbox (http://www.trixbox.org/) which is Asterisk as a complete linux installation which makes it much easier to install if you are not familar with Linux. Asterisk will run on practically any computer.

Then you will just need a couple of phones such as the Grandstream GXP-2000 or even software running on a pc.

There are interface cards you can buy to link it to a traditional phone system aswell.
0
 
LVL 3

Assisted Solution

by:shepimport
shepimport earned 250 total points
ID: 20452454
What kind of phone system do you have now?  If you have an analog or Digital system you can probally just use the existing PBX and pickup a 100$ gateway depending on how many concurrent calls you want across the circut... just because you want to make a VoIP call may not mean you need a complete voip system...

also vs. using VPN ( assuming ipsec) which adds a lot of bandwidth in the encryption overhead you can use gateways that support srtp (secure media) which does both encryption and head optimization... and than just choose a good authentication protocol.  If you give more details on your office size and hardware I can suggest hardware...

If it is very small... you may want to look into something like skype... which does free on net calling and you just need to buy a headset...

JG
0

Featured Post

MIM Survival Guide for Service Desk Managers

Major incidents can send mastered service desk processes into disorder. Systems and tools produce the data needed to resolve these incidents, but your challenge is getting that information to the right people fast. Check out the Survival Guide and begin bringing order to chaos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
Skype is a P2P (Peer to Peer) instant messaging and VOIP (Voice over IP) service – as well as a whole lot more.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question