Price: Price:

In Stock

Every year the number of PBX fraud victims increases dramatically. More and more companies are targeted by individuals who are looking to bring down or exploit the communications system. Some do it for fun and others for illicit profit, but the end result is always the same… Huge bills and down time.

The most vulnerable targets remain small-medium size businesses that are new to managing their own IP PBX system. They either don’t have the IT experience and staff to properly secure and maintain the network, or they’re unaware of the risks altogether having recently switched from a landline system. Whatever the reason, many networks are consistently left unprotected. By the time most companies realize that something is wrong with their phone expenses, it’s too late - the network security has been compromised.


FCC Certified CE CertifiedCISPR


Who Needs an SBC?

If you are deploying an IP PBX system connected to the internet, chances are that it will get hacked within 5h-6h by hackers looking to make calls at your expense or to bring your communication network down just because they can.


  • VoIP became a favorite target for hackers as its popularity and uptake increased in the past years
  • Firewalls are just unable to block hackers who use scripts and bots to access PBX systems
  • The Source address of the hacker is being deliberately spoofed, making it more difficult to detect even more when this one is also masked by the “noise” of many randomly generated addresses
  • A common and devastating attack is the DoS (Denial of Service). PBX systems are unable to handle the flood of SIP requests generated by the hackers. These thousands of simultaneous requests brings your PBX down
  • Brute force password guessing can have the same impact as a DoS attack

And these are only a few attacks out of the thousands used by hackers worldwide. Would you leave our home unlocked? So then why leave your PBX open? Most hackers today, are after the money; so they commit what is known as toll fraud. They access your PBX and use your accounts to place long distance calls or other chargeable calls.


BloX eSBC Session Border Controller Built to Protect & Manage between IP Network Borders


  • Blox eSBC is Session Border Controller up to 60 simultaneous Channels
  • Blox eSBC will secure your internal PBX/Gateway VolP Network from external network/internet
  • Blox eSBC handles SIP-NAT issues observed in common VolP deployments
  • Blox eSBC conducts DPI Packet Inspection of SIP traffic, supporting the Signatures for Key Malwares vulnerabilities observed in SIP Deployments
  • Blox eSBC supports SIP-TLS, Topology Hiding, CAC, Media Pin-holing, Hosted PBX, Domain routing


BLOX Basic Functions


  • SIP Outbound/Inbound Trunk and domain policies to route the calls
  • Secure Remote access to Internal SIP PBX
  • Eliminates bad VolP signaling and media protocol at the network boundary
  • Built-in firewall which can controls IP Addresses/Port based Filtering, DOS/DDOS Attacks, IP Blacklist & NAT. It opens pinhole in the firewall to allow VolP signaling and media to pass through
  • Media bridging, which may include Voice over IP and Fax over IP
  • Least Call Routing Re-Direct
  • DTMF Support for RFC2833/INBAND/SIP INFO


BLOX Advanced Features


  • SIP Trunking (Connectivity)
  • Remote Worker (Roaming User)
  • SIP Registration Pass-thru
  • Core Session Router (Call Routing)
  • SIP Intrusion Prevention
  • DDoS / DoS Attack Protection
  • SIP Registration Scan Attack Detection
  • SIP Header Normalization
  • SIP Malformed Packet Protection
  • Topology Hiding
  • Call Access Control (Total calls per Trunk, Inbound/Outbound)
  • Least Cost Routing
  • Media anchoring
  • Call Security with TLS
  • Advanced NAT Traversal Capabilities
  • T.38 Fax Relay
  • CDR record generation
  • SIP Header Manipulation
  • IP Firewall
  • VLAN and Virtual IP support
  • Packet-to-packet call flows (B2B UA)
  • Media relay with dynamic pinhole control
  • SIP Request Rate Limiting
  • GUI Troubleshooting tools – Ping, Traceroute, Packet Capture, SSH Terminal


Allo Transcoding Module can provide you the following Media Service


  • Media codec transcoding through Allo Transcoding Hardware with Full RTP Transcoding (G.711, G.722, G.729, G.726, G.723.1, iLBC, AMR, G.722.1)
  • SRTP media encryption through Allo Transcoding Hardware
  • T.38 Fax Bridging (G711 to T.38 Packets)
Technical Specifications

Functional Mode Topology Hiding with SIP Deep Packet Engine
SIP Intrusion/Prevention ~400+ SIP Attack Signatures Support
Throughput ~300 Mbps
No of Concurrent Channels Supported 60 concurrent channels
Logging Secure Console, Remote Syslog,CDR logs, Security Logs, Signaling Logs
Device Management Web GUI via Https & SSH CLI
Hardware Cortex A9 Quad Core Processor at 1.1GHz
Primary Storage Supports 8/16/32/64 Gigabyte Module (Pluggable)
Interfaces 2 Fast Ethernet Interfaces, 1 port fast Ethernet, 10/100 Mbits

Physical & Environmental

Operation Temperature 10°C to 40°C (50 F to 104 F)
Storage Temperature 0°C to 50°C (32°F to 122°F)
Operating Humidity 10% to 90%, Non-condensing
Storage Humidity 5% to 95%, Non-condensing
Dimensions 115mm (L) X 110mm (B) X 34mm (H)
Weight 250gms
Power Input 5V / 3A
Support & Downloads

Sparky + Shields
Build Yours Today!
Digital Telecom Cards

Copyright © - All Rights Reserved