Inside Out Blog
How you do anything is how you do everything
  • Home
  • Technology
  • Money
  • Photography & Videography
  • Projects

Popular Tags

FusionPBX FreeSWITCH Security Clustering Linux VoIP MariaDB SEO Personal Load Balancing PHP High Availability Joomla Darktable Fail2Ban Nagios Mageia RPM DNS PowerDNS

Looking for RPMs? Set up our RHEL repo.

rpm

Works on CentOS6/7/8 & Alma/Rocky 8/9
Sponsored by OKay Inc

  1. You are here:  
  2. Home
  3. Technology

Configuring FusionPBX/FreeSWITCH to Work with Voxbone VoxOut

Details
Category: Technology
  • FreeSWITCH
  • FusionPBX

Voxout is the trunk service that Voxbone offers to make outgoing calls and emergency ones. I must say it is tricky to configure it, the PDF they give as a tech guide is next to useless and so far, if you google, you won't find any example of FreeSWITCH gateway configuration with Voxout. I will talk about how I did it.

Read more: Configuring FusionPBX/FreeSWITCH to Work with Voxbone VoxOut

How does DNS Tunneling Work?

Details
Category: Technology
  • VPN

DNS tunnelling is just another tunnelling technique. Usually, it is called VPN over DNS too, it is just naming. What it makes it very popular is that not all carriers or network administrators are aware of it or if they are, they don't know exactly how to stop it. Rogers, one of the biggest telecommunication carriers in Canada and Telcel the biggest player of mobile telephony in Mexico, both allow DNS tunnelling (I don't doubt other carriers do as well), so when you run out of data in your plan you can still connect if you configure it in your mobile. This is because smartphones need to connect to some carrier servers regardless if you have the right to 2G/3G/4G data access or not; smartphones still have access to the local DNS server. Local networks have the same symptom because DNS is used to access many IT services like the Active Directory, it is very difficult to differentiate between a true legitimate DNS query and DNS tunnelling traffic without the proper tools.

Because of this, I am going to describe how this technique works.

Read more: How does DNS Tunneling Work?

Enabling IP Authentication in FusionPBX

Details
Category: Technology
  • FusionPBX

IP Authentication is the fact of linking a sip extension against a set of known IPs. Therefore, any call signalled to or from a given IP will be linked to a linked SIP account. IP Authentication is needed (not a must) if you want to configure your PBX as a Class 4 PBX. If you want to know more about the difference between Class 4 and Class 5, read the article I published some years ago in this blog.

So, our scenario is our FusionPBX (pbx-b) is the carrier of another PBX (pbx-a). The pbx-a uses pbx-b as a carrier configured without registration (IP authenticated). Users register into pbx-a. When an outbound call is done, the user signals the authenticated INVITE to pbx-a, and then pbx-a forwards the SIP INVITE without authentication. Finally, pbx-b forwards the INVITE to the upstream carrier.

FusionPBX by default is shipped as a Class 5 PBX. You will need to do some web tuning to make it work as a Class 4 PBX. In this article, I will write about SIP Authentication, which is one of the many steps you need to do.

Read more: Enabling IP Authentication in FusionPBX

How to Add Additional PHP Versions to your ISPConfig 3 under CentOS/Alma/Rocky

Details
Category: Technology
  • PHP
  • ISPConfig3

Under ISPConfig 3 you can have more than one PHP release available for your websites. Not every project runs perfectly in all versions, there is still out there some software that needs PHP 5.

I will show how easy is to add new PHP versions. This example installs PHP 7.2. UPDATE: PHP 7.3 and 7.4 RPMs are out, the same process applies to them.

Update: This also applies to RHEL 9 distributions.

Read more: How to Add Additional PHP Versions to your ISPConfig 3 under CentOS/Alma/Rocky

Allowing an external PHP to do Basic Authentication against a Joomla Website

Details
Category: Technology
  • Joomla

So, as I am doing a very cool service I got into the dilemma of finding a user management system. It doesn't make sense to write all again if there are projects such as Joomla that do that very well. So my problem was reduced from coding a user management system to authenticating against Joomla.

Read more: Allowing an external PHP to do Basic Authentication against a Joomla Website

  1. Changing Joomla Authentication Schema to Clear
  2. Centralizing your Fail2ban + Honeypots = Proactive Security
  3. Backing Up & Restoring FusionPBX with PostgreSQL
  4. Configuring fail2ban to Resist SSH Brute Attacks

Page 24 of 35

  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28

Latest Articles

  • Protecting your PBX against Passwords Leaks
  • Installing Unifi OS on Linux
  • Understanding the E.164
  • Basic Protection against Telemarketing and Unwanted Calls with FreeSWITCH
  • OpenID Authentication (OKTA implementation)

Do you need some FusionPBX free support? Join this FusionPBX/FreeSWITCH Support Channel.

telegram logo

To know the rules, read the pinned post

Copyright © 2026 Inside Out Blog. All Rights Reserved.
Joomla! is Free Software released under the GNU General Public License.
  • Sitemap