CASHLY SBC8000 is a software-based SBC designed to deliver robust security, seamless connectivity, advanced transcoding and media controls to VoIP networks of enterprises, service providers, and telecom operators. SBC8000 offers users the flexibility to deploy the SBCs on their dedicated servers, virtual machines, and private cloud or public cloud, and to scale easily on demand.
•500 to 2000 Simultaneous calls
•SIP anti-attack
•300 to 1200 transcoding
•SIP Header manipulation
•CPS: 200 calls per second
•SIP malformed packet protection
•Max. 5000 SIP registrations
•QoS (ToS, DSCP)
•Max. 25 Registration per second
•NAT Traversal
•Unlimited SIP Trunks
•Dynamic load balancing
•Prevention of DoS and DDos attacks
•Flexible Routing Engine
•Control of Access Policies
•Caller/ Called number Manipulation
•Policy-based anti-attacks
•Web-bases GUI for configurations
•Call Security with TLS/SRTP
•Configuration Restore/Backup
•White List & Black List
•HTTP Firmware Upgrade
•Access Rule List
•CDR Report and Export
•Embedded VoIP Firewall
•Ping and Tracert
•Voice codecs: G.711A/U,G.723.1,G.729A/B, iLBC, AMR, OPUS
•Network Capture
•SIP 2.0 compliant, UDP/TCP/TLS
•System log
•SIP trunk (Peer to peer)
•Statistics and Reports
•SIP trunk (Access)
•Centralized management system
•B2BUA (Back-to-Back User Agent)
•Remote Web and Telnet
•SIP Request rate limiting
•1+1 Active-standby redundancy High Availability
•SIP registration rate limiting
•Dual redundant 100-240V AC power supply
•SIP registration scan attack detection
•19 inch 1U size
•SIP call scan attack detection
SBC for Large Enterprises & Service Providers
•500-2000 SIP sessions, 300-1200 transcoding
•1+1 Active-standby redundancy HA for service continuity
•Dual power supply Hot Backup
•Comprehensive SIP interoperability with various SIP platforms
•SIP mediation, SIP message Manipulation
•Unlimited SIP trunks
•Powerful routing mechanism
•QoS, static route, NAT traversal
Enhanced Security
•Protection against malicious attack: DoS/DDoS, malformed packets, SIP/RTP flooding
•Perimeter defense against eavesdropping, fraud and service theft
•TLS/SRTP for call security
•Topology hiding against network exposure
•ACL, Dynamic white & black list
•Bandwidth limitation & traffic control
•Intuitive Web interface
•Support SNMP
•Automated provisioning
•Cashly Cloud Management System
•Configuration Backup & Restore
•Debug tools