How to protect a non-TLS connection
Hello,
for some special scenarios we want to connect customers via non-TLS using a Layer-2 connection towards our SBC cluster (so unique IP address for IP-PBX and SIP interface on SBC per customer). For each enterprise a Session Agent and dedicated realm wil be configured.
- Is there a way to protect non-TLS connections for a man-in-the-middle attack?
- How can we verify the credentials of the IP-PBX (username/password on soft switch or IP address of IP-PBX) on the ACME SBC when someone else tries to authenticate with these credentials on the core soft switch?
- Can we limit this in the realm/session agent configuration?