

We provide downloadable documents such as user manuals, product datasheet, product brochures, product leaflets, etc.


Together with our agents and distributors, we provide convenient local service and quality after-sales maintenance service. The standard service provided is 5×8 (5 days a week, 8 hours a day) technical service support, providing customers with maintenance, repair and remote technical support services through phone and e-mail.

The FAQ section summarizes the solutions to some problems in the installation, configuration and use of New Rock hardware and software products.


We provide the latest trends of ICT, follow us on the industry news and master the latest cutting-edge technology!



(New Rock Technologies, Inc.) is a new generation of intelligent communication equipment and solution provider. We provide future-oriented intelligent communication products and services to customers such as telecom operators, governments, enterprises, etc.

Since the establishment 19 years ago, New Rock has always taken R&D as our core mission and insisted on independent innovation. New Rock has more than 80 certificates and honors, with 19 years of industry brand recognition and influence, and is the common choice of many customers!

New Rock has established a nationwide service system with Shanghai headquarters as the center and six branches or offices in Beijing, Guangzhou, Shenzhen, Shandong, Wuhan and Chengdu to provide customers with perfect pre-sales consultation and after-sales service. At the same time, we provide products and services for customers in the United States, Middle East, Thailand, Malaysia, Indonesia, Philippines and other countries and regions with local distributors, and our products are exported to more than 60 countries in Southeast Asia, Europe, America, Middle East and Africa.

New Rock guarantees to serve customers throughout the whole sales process. We can provide - pre-sales service (solution communication/technical response, assistance in bidding, development of solution proposal), in-sales service (installation guidance, on-site support, project cutover), after-sales service (project acceptance test, maintenance documentation transfer, technical training, remote service). Please leave your message for any needs, we will do our best to serve you!

Since its establishment in 2003, New Rock has always taken R&D as its core and insisted on independent innovation. Years of technology accumulation have enabled New Rock to have a complete product line and rich practical experience in unified communications field. With 27 pieces of software copyrights, 50% of R&D technicians, 25% of R&D expenditure in sales, and tech cooperation with Fudan University, we have collaborated to apply visible light communication products for the nuclear power plant communication and other fields. Welcome to become New Rock partner! Hand in hand together to build a bright future!
ProductFeatures
Home>ProductFeatures > High Security
Due to the open nature of IP networks, the security of voice over IP (e.g. how to prevent DoS attacks, anti-theft hits, anti-eavesdropping, etc.) is a major concern in the development process. This is especially true for government agencies and medium and large enterprises, which have higher requirements for voice over IP security.
So what exactly are the security policies?
The common voice establishment and control signaling for voice over IP communications is the SIP protocol, which is an open protocol system. Any hacker can use these tools to obtain detailed information about the various components of IP voice communications (voice servers, voice gateways, IP phones, etc.): IP addresses, TCP/UDP ports of service applications, etc.
A DoS denial of service attack is a simple but very effective disruptive attack on networks today that will cause a computer or network to fail to provide normal services. A DoS attack on the various components of a voice over IP communications system will cause the operating system resources on these devices to be consumed. Some administrators set up their firewalls with all ports open for simplicity, in case they inadvertently block useful ports that affect VoIP communications. This exposes the entire device to the network and those ports that are not in use are vulnerable to denial of service attacks.
3.Enabling static/dynamic defences
Anti-call theft
In the old days of traditional telephony, there was a need to prevent theft of calls by means of hook-ups. In the age of Voice over IP, although there is no way for IP phones to make calls by hooking up a line, it is possible to gain access to the phone by stealing the user's extension number and password. To avoid IP phone theft calls, you need to protect your account information (like protecting your bank card account). For businesses, it is a good idea to tie the account number to an IP address (or even a MAC address) so that even if the account is stolen, you cannot make calls from elsewhere.
Common ways to prevent phone calls from being stolen include
- Setting up a whitelist for Web/SSH access
- Regularly changing Web login passwords and IP extension passwords, and enabling anti-violence cracking features
- Set up call permissions and rules for managing the length and frequency of long distance calls
- Enabling rights management
- Enable User-Agent header domain protection and SIP address granting
Anti-message eavesdropping
To intercept voice data during call setup or SIP calls, it is necessary to be located where the call is passing through, i.e. at the telephone service vendor or SIP end. As the connection may change the traffic routing, there are only a few implementable points for intercepting SIP calls, i.e. at the SIP client, at the proxy front-end or at the ISP used by both endpoints. This problem can be solved by end-to-end encryption of SIP.
Common ways of preventing information eavesdropping are
- Using TLS/SRTP data encryption
- Use with an enterprise session border controller SBC (the SBC is described as a "voice firewall" and offers a variety of security policies such as black and white lists, static/dynamic defenses, protection against DoS/DDoS/media streaming attacks, TLS/SFTP encryption, etc.)
- VPN network if available (of course, VPN account information must also be protected)
Dedicated staff for regular maintenance
In doing these security defenses, we also recommend that enterprises have dedicated management of their voice over IP equipment so that they can pay regular attention to abnormal information about the equipment, including: hardware failures, changes in the network environment or SIP registration, abnormal logins, SIP attacks, excessive concurrent or long-distance call volumes, operation logs and other information, so that suspicious situations need to be dealt with in a timely manner.
Tel:021-61202700 / 52217917
Address:5/F Block B, Building 1, No.188 Pingfu Road, Xuhui District, Shanghai 200231, China
Copyright © New Rock Technologies, Inc. All Rights Reserved. 沪ICP备15008515号-1

