If you want to know the details of how SIP trunking works, then I will explain here everything you need to know and the process too.
What Is SIP Trunking?
A SIP trunk is an essential system of virtual bundles of voice channels carried over IP by using SIP. It works for the setup, management, and tear-down of phone calls. Otherwise, traditional copper phone lines aren’t like these. It’s costly, a maintenance hassle, and has weather-related issues. That’s why people are moving to the SIP or internet-based communication system.
Key advantages:
Scalability: You can add or remove channels on demand.
Cost Efficiency: pay per channel or minute, no physical lines.
Feature-Rich: Leverage advanced call routing, disaster recovery, and codecs.
Core Components & Roles
IP-PBX or Hosted PBX Your on-prem or cloud-hosted telephony platforms, such as Free PBX, Cisco CUCM, 3CX, or our Cloud PBX that manages extension, call routing, and voicemail, etc.
Session Border Controller (SBC) Acts as a security and interoperability gatekeeper that hides your internal IP scheme, enforces encryption, and applies SIP normalization
Internet Telephony Service Provider (ITSP) The Voice providers that terminate calls to the PSTN or other SIP networks and allocate you a pool of DIDs with the voice channels.
Media Path (RTP/RTCP) Carries actual voice packets, typically RTP with RTCP for quality control. It may traverse a separate media proxy or go peer-to-peer via NAT traversable techniques.
Well, VoIP is the technology that businesses use to communicate. As well, SIP is the methods or protocol that execute its technology for terminating voice.
If I want to be more clear with the real thought, I think VoIP is a car and SIP is the engine of this system.
Real-World Example
MondoTalk’s Cloud PBX:
Using VoIP, you can make calls to the customer using broadband. SIP trunks to connect clients’ PBX systems to MondoTalk’s core telecom network. It offers IVR, Call transfer, CRM, MS team integration, Voice to email, mobile apps, and failover routing.
Common Combination Setup:
Component
Technology
Softphone App
VoIP (with SIP)
IP Desk Phone
SIP-enabled
PBX System
SIP-based (Cloud or On-Premise)
Call Routing & Trunking
SIP Trunks
Internet Connection
Underlying VoIP Carrier
How SIP Trunking Works The Process
Let’s break down step by step what happens when you make a VoIP Call through SIP trunking.
1. Call Initiation (SIP Signaling Begins)
The moment you dial a number, your IP PBX generates a SIP INVITE message.
This INVITE packet includes:
Caller ID
Callee’s number
Codec preferences
Authentication details
Then the message reached the SIP provider such as MondoTalk, Ufonii, or Twilio.
2. SIP Trunk Authentication and Routing
The provider receives your INVITE and authenticates it for use with username/password. This authentication will be IP-based. I mean whitelisted IPs. Once authenticated, the SIP server then checks the destination numbers and chooses the best route.
3. Media Negotiation (RTP Stream Setup)
SIP only sets up the session, and voice is sent via RTP( Real Time Transport Protocol).
Once the destination accepts the call, like a SIP 200 OK, both parties start sending voice data as audio packets.
RTP ports that are typically 10000-20000 open up dynamically, and NAT traversal or STUN/TURN are used if needed.
4. Call Connection and Ongoing Session
During the call:
SIP monitors session health via OPTIONS and SIP keep-alives.
Media streams flow back and forth using RTP.
Features such as DTMF tones, call recording, or transferring are also handled via in-band RTP or SIP info/notify messages.
5. Call Termination
Either party hangs up: sends a SIP BYE message.
Provider replies with 200 OK, confirming the call is terminated.
Call Detail Records (CDRs) are generated for billing and logs.
Voice quality is monitored in real-time via MOS scoring.
CDRs sync into Zoho CRM for call reports.
Personal Experience Insight:
We once had intermittent audio drops on rainy days. It turned out to be a poor-quality router at the retail site doing SIP ALG rewrites. We replaced it with a proper SIP-friendly route,r and the issue disappeared.
Example: Legal Firm
Helped a mid-size legal firm with 75 extensions replace their aging PRI circuits with a pair of redundant SIP trunks. They’d been paying for 23 channels on two ISDN PRIs.
Preparation Steps:
Bandwidth Assessment
Run a year’s worth of call logs and peak concurrent calls: 18. It allocates 100 kbps per G.711 call, 1.8 Mbps plus overhead, and 3 Mbps reserved.
SBC Deployment
Installing an on-premises SBC and configuring TLS on port 5061. It defined IP ACLs so that only the ITSP’s signaling IPs could connect.
PBX Configuration You can create two outbound trunks on the PBX:
SIP-Primary (UDP/5060, priority 1)
SIP-Backup (TCP/TLS/5061, priority 2): Set up inbound routes mapping each DID to a departmental ring group.
Test Calls & Failover
Then you can verify calls over SIP primary to PSTN. The system simulated failure by shutting off the primary, and calls seamlessly failed over to the backup.
Monitoring & QoS
Then configure SNMP polling on the SBC for call count, SIP errors, and set diffServ DSCP EF for RTP and CS3 for SIP to prioritize voice.
SIP Trunking: Common Technical Components
Component
Role in SIP Trunking
SIP Proxy
Handles SIP message routing & signaling
Registrar Server
Authenticates users/IPs
RTP Engine
Handles actual audio/video streaming
SBC (Session Border Controller)
Security, NAT traversal, protocol normalization
Media Gateway
Converts SIP to TDM for PSTN interconnects
Behind-the-Scenes Security
SIP over TLS: Encrypts signaling messages (prevents spoofing)
SRTP: Encrypts RTP audio (prevents call tapping)
SBCs: Firewall + protocol guard
Call Limits & IP ACLs: Prevent fraud
Personal Expertise: Lessons from the Field
Never underestimate the power of good call logs. If there is a SIP 503 or 408 error, then reading the SIP invite header, RTP latency, and timing in Wireshark has solved countries
Carrier Hops Matter: A poor SIP provider might route your call through 4-5 unnecessary hops, creating jitter, which reliable providers like Ufonii route more directly.
Don’t DIY NAT Traversal: Always use proper NAT rules and test with external SIP test tools like sipvicious or VoIPmonitor.
Real Call Center Experience: A major partner once migrated from ISDN to SIP trunking. Then the experience with SIP trunk, such as post migration, and they were able to slash their monthly bill by 40%, and they were able to add auto call routing and enable CRM integration.
Benefits Recap
SIP Trunking Advantage
Explanation
Scalability
Add/remove call capacity instantly
Cost Efficiency
No per-line charges like PSTN
Flexibility
Can be used across geographies with one trunk
Integration
Easily integrates with CRMs, APIs
Advanced Features
Call forwarding, recording, transcription, so on etc.
Testing Tools & Protocols
Wireshark – Packet capture for SIP, RTP.
sngrep – CLI SIP session viewer
VoIP monitor – Call quality analytics
SIP – SIP stress testing tool
3CX / Asterisk / FreePBX – Real PBX platforms to test with
Final Thoughts
SIP trunking is the backbone of the modern communication system.. Behind this scene, there are lots of dependencies such as a symphony of protocols, routing, codecs, and media negotiation. The beauty is in how many moving parts come together to make a simple” hello ”work. I mean it started from INVITE packets to RTP streams and from NAT traversal to carrier selection.
When it works well, it feels like magic.
FAQs
What happens when I make a SIP trunk call?
When you make a SIP trunk call, your phone system sends a SIP invitation packet to your VoIP provider. This includes the dialed number, caller ID, and preferred audio settings. The provider routes the call to the destination, and once answered, media flows directly via RTP. SIP keeps the session alive, monitors connection health, and handles call termination when either party hangs up.
How does SIP trunking connect to the public telephone network (PSTN)?
That’s a great question. Generally, SIP trunking connects to the PSTN via your VoIP provider, which acts as a gateway. Once your call reaches the provider’s SIP servers, it is routed through their carrier network and translated into a traditional phone call that can be handled by legacy telephone systems. It enables the voip to make landline or VoIP to mobile calls seamlessly.
Is SIP trunking secure?
Yes, SIP trunks are secure for businesses. But it requires a proper setup before using. SIP trunking generally uses protocols like SIP over TLS and SRTP to encrypt signaling and media streams. Session border controllers also help protect against fraud, unauthorized access, and DDoS attacks. The firewalls should be configured to avoid exposing SIP ports unnecessarily.
Why is RTP used in SIP trunking, and what is it?
RTP( Real Time Transport Protocol is used to carry the actual voice data once a call is established. While SIP handles the signaling, RTP transmits the audio packets in real time. The separation ensures flexibility and allows for better quality control and troubleshooting.
What are the most common issues with SIP trunking?
The most common SIP trunking issues include:
One-way or no audio. It usually happens due to NAT/firewall misconfiguration.
Call drops (caused by SIP timeouts or router issues)
Codec mismatches
SIP ALG interference on routers
How many calls can a SIP trunk handle?
A single SIP trunk can support multiple concurrent calls, it’s depending on your provider and bandwidth. Each simultaneous call typically requires around 100 Kbps with the G.711 codec, so your internet connection and trunk plan determine the actual capacity. Businesses can scale easily by increasing call channels.
What equipment is needed for SIP trunking?
To use SIP trunking, you typically need
IP PBX such as 3CX, FreePBX, and Cloud-based PBX
A router and a stable internet connection
SIP trunk provider credentials
VoIP phones, softphones, or analog phones with ATA adapters
VOIP is a voice-over-internet communication system. It helps businesses communicate with their business partners or employees in the office or remotely. It’s an internet-based communication system connecting remote offices for better communication.
Why is VOIP Popular?
Cost-effective for businesses.
Scalable for organizations growth.
Flexibility in remote work setup.
Easy to integrate any system like CRM, Chatbot, Microsoft team, etc.
VOIP Security Threats
Eavesdropping: Intercepting voice traffic to listen to private conversations.
Phishing and Vishing: Social engineering attacks targeting VOIP users to steal credentials or gain unauthorized access.
Denial-of-Service (DoS) Attacks: Overloading the VOIP system to cause disruptions.
VoIP Fraud: Exploit the system and make a firewall to unauthorize fraudulent calls.
Call Hijacking: Taking control of an ongoing VOIP call to redirect traffic or listen in.
Why is VoIP security system important?
Since VOIP transmits voice data over the internet using SIP and also the real-time transport Protocol.
Here are some value option why are VOIP security important:
Hackers interception calls
Unauthorized call rerouting and fraud
Overloading the VOIP system
Fake caller IDs to deceive users
Key Security Concepts for VOIP
Authentication
Importance of Strong Authentication:
Use complex passwords for user and administrator accounts.
It enables the multi-factor authentication that makes your system strong and prevents unauthorized access to your interface.
By limiting VOIP access, you can secure your settings. This should be done from the user’s site or administration. It can also ensure the security of SIP accounts that are not easy to access and avoid using default settings.
Encryption
SIP over TLS can secure signaling traffic to prevent interception during the call setup. VPNs are the private levels of a network used for private communication. They ensure the communication of remote users.
Firewalls and Access Controls
A firewall is one kind of protection system that protects fraud access to your communication network. VLANs which are special improve the security of the site. Most importantly ensure that your SIP is perfectly configured with ALG. Then you can eradicate the NAT issues by measuring your security system,
Intrusion Detection and Prevention
IDS/IPS for VOIP: Set up an intrusion detection or prevention system to monitor the unusual or malicious traffic to the system. Because it’s an indication that I’ll refer to an attack on the system. It’s an outstanding system that always monitors VOIP system traffic such as a spike in call volume or unusual IP addresses.
VOIP System 2025
Common VOIP Security Risks and How to Mitigate Them
1. Unauthorized Access and Account Hijacking
Risk: Attackers may gain unauthorized access to the VOIP system, Steal credentials, or take control of the system from the backside. It’s very hearted when you can see the calls are controlled by others and affect your overall security system.
Mitigation:
Use strong, unique passwords for all accounts.
Implement multi-factor authentication (MFA).
Regularly audit account activity and access logs.
Disable unused accounts.
Update password every 60 to 90 days.
2. Man-in-the-Middle (MITM) Attacks
Risk: These types of attackers could intercept the communication endpoints, potentially listening to the calls.
Mitigation:
Use SIP over TLS for encrypting signaling.
Use SRTP to ensure a secure media stream.
Encrypt data transmitted between VOIP endpoints.
3. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
Risk: Attackers overload the VoIP server with traffic that causes service outages.
Mitigation:
Deploy firewalls with rate-limiting capabilities to block traffic surges.
Use specialized DDoS protection services.
Keep VOIP software up to date with the security patches.
4. VoIP Fraud and Toll Fraud
Risk: Malicious users would exploit the VOIP system that works in unauthorized long-distance or international calls which leads to financial loss.
Mitigation:
Set up call limits and alerts for high-cost calls.
Implement the call detail records and monitor the unusual call patterns
Required, strong authentication for external access like SIP trunking provider.
5. Phishing and Vishing
Risk: Social engineering attacks trick users into providing sensitive information over VOIP.
Mitigation:
Train employees to recognize phishing attempts.
Always verify calls from unknown numbers before sharing sensitive information.
Block calls from suspicious or unauthorized numbers.
Best Practices for VOIP Security
Securing VOIP Devices
Strong Passwords for Devices: You would ensure a strong password in the used devices like IP phones, Softphones, and other VOIP devices.
Firmware Updates: Regularly update the VOIP devices and software to address known Vulnerabilities.
Disable Unnecessary Features: instant disable unnecessary VoIP features that manage the remote management and unusual protocols.
Securing VOIP Networks
Network Segmentation: Create Separate VLANDs for VOIP traffic to isolate it from other data traffic and prevent cross-contamination.
QoS (Quality of Service): Ensure the VoIP packets are prioritized in the network to prevent latency, Jitter, or packet loss.
Firewalls: Use firewalls to restrict the external access to the VOIP system and block them
User Awareness and Training
Phishing and Social Engineering Awareness: Teach employees how to recognize phishing attempts and avoid falling victim to scams.
Regular Security Training: Hold on the periodic security and make awareness sessions. It makes sense to the users and informs them about the latest VoIP threats and security best practices.
Responding to VOIP Security Incidents
Incident Response Plan
Identify the Threat: Quickly identify the type of attack like DDoS, eavesdropping, and fraud.
Contain the Threat: Isolate the affected system that has blocked IP addresses and disable compromised accounts.
Eradicate the Threat: Remove malware or other malicious software from the VOIP system.
Recover the System: Restore the service and ensure a system that’s secure before bringing it back online.
Work with a Trusted VoIP Provider
The important matter here is that, as a VOIP user or service provider, you should think about the security system. You should also have great experience with VoIP and thread handling. Companies want to contract with a service that can give 100% security to their communication systems. They are also definitely looking for a company that can provide a 24/7 support system.
However, MondoTalk is different. It’s a business-grade communication solution that already helps many businesses solve their business-grade communication problems. With a glorious 20 years of working experience in the VoIP industry, MondoTalk has handled many threads and has been quite successful. People can trust and feel reliable with MondoTalk.
If you are looking for a telecom company that can provide you with VoIP solutions, then MondoTalk would be best.
Top VOIP Statistics
This is the percentage of wireless-only adults and children living in houses with only wireless telephones. (By age United States (Jan-Jun, 2022)
70% of American adults and 83% of children lived in a household without a landline at the end of 2022
By 2032, the VOIP service market is expected to reach $108.5 billion
The global UC market is expected to register a CAGR of 17.4% from 2023 to 2030.
The cloud-based contact center infrastructure market is expected to grow by 26% from 2024 to 2029.
82% of businesses reported cost savings when they moved to the cloud
85% of organizations will embrace a cloud-first principle by 2025
94% of businesses saw an improvement in security after switching to the cloud
38% of companies have staff that work from home
More than 4.7 million people work remotely at least half the time in the United States.
Vop can help small business to reduce the startup costs by up to 90%
The price of VOIP system may go up by 3% over the next five years
60% of customers prefer to contact businesses by phone
76% of businesses offer support outside of traditional business hours
76% of companies offer support outside of conventional business
SIP accounted for over 51% of the security event activity analyzed in 2016
Nearly 1 in every 6 adults in the US falls victim to scam calls.
60% of smartphone users have called a business directly from a Google search
59% of employees use a desk phone every day
76% of calls go unanswered if they’re from unidentified or unfamiliar phone numbers
76% of calls go unanswered if they are from unidentified phone numbers.
28% of cyberattacks are aimed at small businesses.
Global VOIP Service Market Assessment
Historical Size of the global VoIP market size US $120.7 billion by 2024. It raised an estimated size in 2024 which is US $132.2 billion. Now this market is projected to size about US $349.1 billion by 2034.
Steps of VOIP Security System For Small Business:
The VOIP Password Policy should be strong because it’s the best option for VOIP systems to safeguard communication systems. It protects against unauthorized access and cyber threads that seamlessly make sense for your communication.
Is it true?
Yes, I Hope So. I will explain everything we should look after for better performance at a time.
However, As a primary safeguard of your communication system, a Password policy is best!
At this step, I will explain some very important steps that make sense to keep safe of your communication;
Minimum Password Length: In the VOIP communication system, you should keep a password length of at least 12-16 characters for your administrative, User, and system-level account.
Longer passwords are indeed more resistant to brute-force attacks.
Password should include a mix of uppercase and lowercase letters numbers and special characters. Try to avoid common words that people usually accumulate themselves. For example, Password123 or admin 2025.
Efforts to enable two-factor locker that hit the cyber security system. A multi-factor authentication lock is important when you are going to a VOIP System on your own. Especially for administration or remote access.
It’s like a verification process. You can be verified by phone number, biometric, or security token.
You can change your password every 60 to 90 days later. Prevent the reuse of old passwords for specific numbers here and refresh it.
Lockout Mechanisms
Set a limit on the number of failed login attempts (e.g., 5 attempts) before locking the account or requiring manual intervention to unlock.
Implement temporary lockout periods (e.g., 15-30 minutes) to mitigate brute-force attacks.
Encrypt Password Storage
Ensure that passwords are encrypted both at rest and in transit using industry-standard encryption algorithms (e.g., AES-256).
Avoid storing passwords in plain text to protect against data breaches.
Avoid Default and Weak Passwords
Remove or change default system passwords for VOIP equipment (e.g., routers, PBX systems, softphones).
Ensure that any hardware or software devices that come with default passwords are secured upon installation.
User Training and Awareness
Educate users properly about the importance of strong passwords and best practices. Aware them to save the password system and not share it with anyone. Also, you shouldn’t use the same passwords for the different platforms.
Encourage the use of a password manager to store and generate strong passwords.
Audit and Monitor Account Access
Regularly audit the accounts. Check and access logs to protect against unusual or unauthorized attempts.
Monitor the VOIP system for suspicious activities such as IP address or unauthorized configuration.
Limit Account Privileges
Implement the principle of least privilege (PoLP) by granting users the minimum level of access necessary to perform their tasks. Implement the principle of Privilege or PoLP by granting users the minimum level of access necessary to perform their tasks.
Regularly review and adjust user permissions to ensure they are appropriate.
Use Secure Communication Channels
Ensure the VoIP traffic encrypted
Avoid transmitting sensitive information, such as passwords..
Backup and Recovery
Implement secure backup practices for VOIP configurations and user credentials, ensuring they are protected from unauthorized access.
Have a process in place to quickly reset or recover lost or compromised passwords without exposing the system to security risks.
Compliance with Standards
Align password policies with industry standards and regulatory requirements, such as NIST (National Institute of Standards and Technology) guidelines, GDPR, or PCI-DSS, where applicable.
Enable Encryption
Encrypt your VoIP calls to prevent unauthorized interception. Secure the real-time transport protocol and Transport Layer Security. They are commonly used for encrypting voice data and signaling traffic. Check out your VoIP data and ensure your encryption is enabled.
Encrypted communication reduces the risk of data breaches by over 50 % after the day work season.
How to Enable Encryption in VoIP
First, you should choose a VoIP provider that supports encryption Ensure that providers support SRTP and TLS. Because these protocols secure voice data during the transmission.
SRTP encrypts the voice data packets during data transmission.
VoIP system administration settings, navigate to the security or advanced settings tab and ensure the SRTP is Set as the Default protocol.
Using TLS for Signal encryption in VOIP port. In the VOIP calls, it’s a process for call setup and tear down process.
Enable TLS: Obtain and Configure SSL/TLS certificates from a trusted certification authority. Configure VOIP using HTTPS protocol for signaling.
Configure encryption for SIP server and update user endpoints including phones, softphones and use SIPS.
Use ZRTP for an additional media layer security. Setup VPN.
Setup VPN adds an encryption layer to all VoIP traffic. Configure the firewall and router-to-router VOIP traffic through a secure VPN.
Keep your VoIP software and hardware updated to avoid vulnerabilities that could bypass encryption protocols.
Update and Patch VOIP Devices Regularly. Always use tools to verify traffic is encrypted like Wireshark. These tools can help you analyze packet captures to confirm encryption.
3. Regularly Update Firmware and Software
Outdated Software is a common entry point for attackers. So regularly updating your VoIP device and systems is very important to the communication system. Enable automatic updates if possible or schedule regular maintenance to ensure all systems are up to date.
Firmware Update:
Firmware is embedded software that runs on VOIP devices like phones, routers, or something else gateway. More importantly, it controls how the hardware operates.
Updating firmware helps improve the performance of the device. Fixing bugs, enhance security, and provide new features.
Generally, Manufacturers release firmware updates to address vulnerabilities and optimize compatibility with other devices, which overall enhance device functionality.
Software Update:
This refers to updating the software used to manage the VoIP network, such as the VOIP server software, apps, or desktop/phone software clients.
Regular software updates ensure the system is running smoothly, provide secure patches for security, and add features to improve functionalities.
Deploy a Firewall
Use a Session Border Controller or a dedicated VOIP firewall to monitor and filter traffic. These firewalls help prevent malicious attacks.
Understand the VOIP Security Risks
Understanding VOIP Risk is the main priority to secure VoIP communication systems.
SIP Trunking Attacks: VOIP Protocols like SIP can be targeted by attackers to hijack calls or perform DoS attacks. So you should think about it first.
VoIP-specific Malware: Another option is malware. It can exploit VoIP systems for toll fraud, eavesdropping, and data theft.
Call Interception: Unprotected VOIP traffic is a safety risk. It can be intercepted if it’s not encrypted.
Denial of Service (DoS): Sometimes, attackers could overwhelm your VoIP system with excessive requests leading to service disruption.
Then you have a perfect turn to choose the right firewall for your VOIP system. Then what you should do?
Choose the Right Firewall
Hardware Firewall: If you are using physical VOIP devices like Phones, COnsider a dedicated hardware firewall such as Cisco ASA or Fortinet so that you can protect your network.
Software Firewall: In the reason for software, you can unlock the VoIP firewall in the PCs running VOIP software such as MondoTalk or 3CX and install firewall Software like pfSense or Windows Firewall.
Cloud Firewall: For cloud-based VOIp services, many cloud providers offer the integration of firewalls with advanced protection features.
Configure the Firewall for VOIP
Allow Only Necessary Ports: VOIP traffic requires specific ports to function. So you need to ensure first that only required ports are open for both signaling and media traffic.
SIP (Session Initiation Protocol): Typically uses ports like UDP 5060, and 5061 (for secure SIP over TLS).
RTP (Real-Time Protocol): It’s used for media like audio/video streams. Usually, it’s used within the range of UDP ports such as 10000-20000.
Block Unnecessary Traffic: Block all ports that aren’t needed for VOIP functionality. That way, we can protect the potential attack vectors.
Configure NAT (Network Address Translation) for VOIP:
If your VoIP system is behind a router with NAT, make sure the perfect firewall is configured to correctly SIP and RTP across NAT devices. This can be done using SIP ALG or Application Layer gateway or by configuring SIP to SIP NAT and special port forwarding.
Use Stateful Inspection: At that time, you have to check that your system supports the Stateful Inspection or deep packet Inspection. That means it can analyze and track the state of active VOIP calls to differentiate legitimate traffic from malicious attempts.
Enable SIP ALG (Application Layer Gateway): SIP ALG is a feature that helps with NAT and it ensures the traversal that signals VOIP well. It’s a way VOIP traffic can pass through routers and firewalls.
Regularly Monitor and Update Firewall Rules
Should continuously monitor the firewall logs for any unusual activities or attacks. It regularly updates the firewall’s role.
Regularly update firewall rules and make significant changes in your VoIP system.
Consider Specialized VOIP Security Tools
Some VoIP-specific security systems can be used alongside firewalls to provide additional protections
Session Border Controllers (SBCs): These are dedicated devices or software solutions that provide advanced security for VOIP systems that protect against attacks and manage traffic flow.
Example of Basic Firewall Rules for VOIP
Let’s assume you are using a hardware firewall to protect a VOIP server.
Allow SIP signaling traffic (usually UDP port 5060):
Allow inbound and outbound traffic for SIP traffic on the UDP port which is 5060.
If you use encrypted SIP that allows inbound /outbound traffic for SIP over TLS.
Allow RTP traffic for media (e.g., UDP ports 10000-20000): Allow inbound and outbound RTP traffic through the designed media port range.
Deny all other ports except for the ones needed for VOIP operation:
Block unnecessary ports like HTTP(80), HTTPS(443), and also FTP(21) unless explicitly needed.
Limit Access to VoIP Systems
Restrict access to your VoIP system to authorized personnel only. Use role-based access control (RBAC) to define permissions and limit administrative privileges to essential personnel.
Use Strong Authentication
You can use a strong password that has different logs. It will be unique for administrative and user accounts in the VOIP System. Multi-factor authentication is very important to limit access to the VoIP system. That will secure your communication system.
IP Whitelisting: it’s very good for VoIP users that limit the access of your system. VOIP system allows the IP address that you can limit to use and authorize range to use. It helps to prevent unauthorized access to your system.
GEO fencing: For highly sensitive systems, you can restrict access based on geographic region, blocking VOIP connections from regions where you don’t expect legitimate traffic.
Use a firewall: Configure a firewall to allow the traffic that needs VOIP ports to configure UDP 5060 for SIP signaling.
Set and detection systems that will monitor and block suspicious activities.
Secure Network Access
VPN (Virtual Private Network): At the same time, remote workers or remote offices require access to the VOIP systems through a VPN. It ensures that all VOIP traffic is encrypted and protected from interception or tampering over the public internet.
Dedicated VOIP VLAN: Isolate VOIP traffic from the regular data traffic that places the VOIP system in a separate Virtual Local Area Network. It ensures better control over access and improves the security system by segmenting VOIP data over access and improves.
Limit Access to Management Interfaces
Admin Panel Security: VOIP Management interfaces should be limited to authorized administrators when you need admin panel security.
Use dynamic secure protocols like HTTPS or SSH for management of the access to prevent sensitive data from being exposed.
Configuring the system to allow management access only from specific and trusted IP addresses.
Disable Unused Features: Turn off any unused or unnecessary management interface and protocols that reduce the potential attack surface.
Implement Session Timeout and Lockouts
Session Expiration: Set timeouts for initiative sessions. It automatically logs users out after a specified period of inactivity to prevent unauthorized access.
Account Lockout Mechanisms: Implement account lockout policies that temporarily disable an account after a set number of failed login attempts
Disable Unnecessary Services
Disable Unused Protocols: We would disable unnecessary services and protocols on your VOIP system. E.G. If you don’t need to support a particular protocol like H.323 or IAX. It turns off to minimize the attacks on the surface.
Turn Off Unused Accounts
Regularly audit user accounts and disable or delete accounts that are no longer needed. It redirects unauthorized account access.
Implement Network Segmentation
Separate your VoIP network from another business network to reduce the risk of cross-contamination.VLANs to isolate VOIP traffic and enhance your security system.
This isolation helps to enhance security by limiting the potential attack surface, reduces the risk of congestion, and ensures that VOIP traffic gets prioritized and handled with minimal interference.
The network segment is related to your system security, improving the performance of your system, and manageability.
Why Network Segmentation is Important for VOIP:
Improved Security: By isolating VOIP traffic, you can protect the system from any threats on the network. It is useful to prevent attacks from DoS or eavesdropping. It’s great when it’s working from the scratch segment.
Better Quality of Service (QoS): Segmentation allows for dedicated bandwidth and traffic priority, ensuring the VoIP calls have the necessary resources and a high-quality communication system established.
Simplified Troubleshooting and Management: The network segment makes it easier to diagnose and resolve VOIP issues that isolate it from other threads.
Minimizing Broadcast Traffic: Segmentation helps reduce unnecessary network broadcasts and it interferes with the VoIP traffic. Segmentation helps to reduce unnecessary network segmentation in the broadcast that could interfere with VoIP traffic.
Steps to Implement Network Segmentation in a VOIP System
1. Identify VOIP Traffic and Critical Components
VOIP Servers: Identify the components that handle VOIP services, such as the PBX server, SIP servers, and media servers, call controllers.
VOIP Endpoints: Identify all the VOIP endpoints like IP phones, Softphones, and conference phones that will interact with the system.
Signaling and Media Traffic: Classify the different types of VOIP traffic such as SIP and RTP. So understanding the traffic flows will help you design appropriate segments.
2. Create VLANs for VOIP Traffic
Dedicated VOIP VLAN: Create a VLAN specifically for VOIP traffic that is isolated from general network traffic. E.g. you could use VLAN ID 10 for VOIP and VLAN ID 20 for data traffic. Create a VLAN specifically for VoIP traffic. It isolates from general traffic. E.g. you could use VLAN ID 10 for VOIP and VLAN ID 20 for data traffic.
Assign all VOIP devices (e.g., IP phones, VOIP servers) to the VOIP VLAN.
Configure your network switches to tag packets with the VLAN ID for proper routing and isolation.
Separate Data VLAN: Create another VLAN for non-VOIP traffic like computers, printers, and file servers. It ensures these devices don’t use bandwidth which means VoIP calls
3. Set Up a Voice VLAN for Guest or External Traffic (Optional)
Guest VLAN for External Access: If external users or guests will access the VoIP system via remote workers and external SIP trunking providers. It creates a separate voice.
This external VLAN has stricter security measures and restrictions to limit the risk of attacks. It blocks the VoIP traffic from entering the internal network.
4. Configure Routing and Inter-VLAN Communication
Inter-VLAN Routing: Use a router and a layer 3 switch that allow communication between your VOIP VLAN and other VLANs that are VLANs. However, restricted communication minimizes exposure between VLANs.
5. Implement Quality of Service (QoS) for VOIP Traffic
You can configure QoS based on:
Differentiated Services Code Point (DSCP): Mark VoIP traffic with higher DSCP values to ensure it’s treated with higher priority by router and switches.
802.1p Priority Tagging: You should use 802.1p priority tagging to prioritize VOIP packets at the data link layer for faster and more efficient forwarding through switches.
Traffic Shaping: Go to the door and set bandwidth limits for non-VOIP traffic to prevent congestion that could degrade the VOIP quality.
8. Implement Redundancy and High Availability
Dual Network Paths: this is a great path for VoIP services. It implements redundancy by having multiple paths for traffic.
Failover Mechanisms: VOIP traffic should be automatically rerouted to backup systems to maintain uninterrupted service at that time.
9. Test the Segmentation Implementation
Test VOIP Quality: After successfully implementing the network segmentation test the VoIP system performance to ensure that the segmentation is providing the intended benefits.
9. Conduct Security Awareness Training
Security awareness training for VOIP is essential to ensure the users and administration understand the risks that are associated with the VOIP System. To protect the system, we should integrate the security and integrity of communications.
Case Study Of MondoTalk VOIP
JZ is a modnotalk client. They own a company and use VoIP for business-grade communication. It’s good! They had used among of communication systems for their business. Those weren’t unique and better communication services. Especially, It didn’t have good APIs and support systems to seamless their communication system.
Mondotalk finally offers them a good quality and seamless communication VoIP network. And it’s great because they were happy after using our system.
camilleD, is a MondoTalk client. They have been using MondoTalk for a long time. Before they came to Mondotalk, it was very frustrating for their Voip network. The quality of calls and APIs both are very important. It’s important to keep your communication system over the office or remote connectivity. Mondotalk ensures it for them. Finally, It’s a great successful Journey with MondoTalk.
VOIP is a cost-effective and flexible communication system. it saves cost and provides better opportunities for communication at businesses. If you are in the office or at home, it’s not a problem. If you can connect with a VoIP system like MondoTalk, You will be able to connect easily to your office and work effectively in a remote location.
As we know, communication is a very sensitive thing for businesses. So the security threads are common. Before using any service of VoIP companies, you should understand their quality of service and security system. Some common keys should be available such as encryption, authentication, multifactor authentication, firewall security of SIP trunk Etc.
MondoTalk’s Cloud PBX: With the Cloud PBX powering your business, you can connect your offices, located anywhere around Australia OR the world. Doing this will let you:
Transfer calls from any office to any other office free of charge
Answer sales calls sooner by allowing free staff in any office to answer the call
Extend your trading hours by using offices in different time zones
Have staff overseas or use BPO options
MondoTalk is a truly global company. We service customers in over 70 countries and are growing. With our Cloud PBX your office can be anywhere or mobil,e and our features will help give your business the competitive edge.
Please contact us for a free consultation so we can show you how we can not only save you money but also improve your business at the same time.
MondoTalk’s Cloud PABX: This video shows how easy we can make it for you to run multiple businesses from one phone. Each caller will be greeted correctly to each business. The MondoTalk Cloud PBX will let you know both before and after you pick up the phone which business the phone call is for. This gives you ample time to mentally prepare for dealing with the call thus allowing you to serve the potential client in a more professional manner.
1.General
For the purposes of these Terms and Conditions,
“Agreement” means this Agreement.
“MondoTalk” means MondoTalk Pty Ltd (Australia)
“You” means the subscriber. Derivative terms such as “Your” will have corresponding meanings.
“Equipment” means the applicable equipment, including but not limited to the Telephone Adapter (“TA”) TA, purchased or leased to You from MondoTalk, in order for You to Use the Service.
“Service” means the MondoTalk service, including as the case may be MondoTalk’s dial plans, Cloud PBX services, Broadband services, all of which may also include certain ancillary software or services.
“Software” means the downloadable software application(s) made available to You by MondoTalk in order to use the Service.
“User” includes any person including You, corporation, firm or other entity that uses the Service provided to You. Derivative terms such as “Usage” and “Use” will have corresponding meanings. Additionally “Customer” will hold the same meaning.
“Automatic Debit” means the automated credit card debit process.
“Call Termination Cost(s)” means the cost incurred by a Referred User for making a call that terminates to a PSTN service.
“Referred User” means a user introduced to MondoTalk services by You.
“MondoMate Rewards” means 5% of all Call Termination Costs generated by Referred Users.
“Inactive Account” means an account on which no call activity (no successful inbound or outbound calls recorded by our systems) has occurred for a continuous period of ninety (90) days. For clarity, missed calls, unanswered calls, voicemail checks, internal extension calls and system-generated events do not constitute call activity.
This Agreement covers the terms and conditions that apply to the voice over Internet Services that MondoTalk provides to You, our Customer. If You buy the MondoTalk VoIP Equipment and Services through MondoTalk affiliates or third party providers, You are the Customer, along with anyone using our Service, with or without Your consent.
BY SIGNING UP FOR, PAYING FOR, OR USING THE SERVICE, YOU REPRESENT THAT YOU ARE OF LEGAL AGE TO ENTER INTO THIS AGREEMENT AND THAT YOU HAVE READ AND UNDERSTAND FULLY THE TERMS AND CONDITIONS OF THIS AGREEMENT.
MondoTalk may modify or cancel Service or take corrective action at any time without prior notice as a result of Your violation of any of these terms and conditions. Terms and conditions may change from time to time, so please check the MondoTalk website, www.MondoTalk.com to stay up-to-date.
You agree not to Use MondoTalk Services in any way that is illegal, fraudulent or abusive as determined by MondoTalk. You may not alter any of the hardware or software on Your MondoTalk Equipment and/or Services.
2. Service
Quality of Service may be affected by conditions beyond our control, including atmospheric, geographic, or topographic conditions, Internet Service Providers, Wholesale Carriers, and/or Power outages. We do not warrant or guarantee that Service will be available at any specific time or geographic location, or that Service can be provided without interruption.
For this Service to work properly, You must have the MondoTalk Equipment and Services and access to the Internet.
Service interruptions will occur when a User account has a negative balance.
The Services are offered on a prepaid basis and recurring billing periods. User accounts that are subject to a recurring service charge are paid by Automatic Debit without further action taken by You. You hereby authorize such charges. Automatic Debit takes place (i) on a regular basis as defined by the Service, unless you give MondoTalk written notice of termination as set forth below; (ii) when the account balance is below a threshold set forth in the Dial Plan Details.
3. EMERGENCY SERVICES – 000 Access
MondoTalk is unable to pass your location details to emergency services, and therefore does not currently offer service to Emergency 000 calls. Please ensure you have a mobile or PSTN line available for your emergency calling needs.
4. Service Distinctions.
You acknowledge and understand that the Service is not intended as a basic telephone Service replacement. Important distinctions (some, but not necessarily all, of which are described in this Agreement) exist between telephone Service and the enhanced VoIP Service offering provided by MondoTalk. The Service is subject to different regulatory treatment than telephone Service.
This Service is not a local telephone Service or a regular long-distance telephone Service. This treatment may limit or otherwise affect your rights of redress before applicable Australian regulators such as the Australian Communications and Media Authority (ACMA) and the Telecommunications Industry Ombudsman (TIO).
5. Service Outage
Power Failure or Disruption.
You acknowledge and understand that MondoTalk Service does not function in the event of a power failure or disruption. Should there be an interruption in the power supply, the Service will not function until power is restored. A power failure or disruption may require the Customer to reset or reconfigure Equipment prior to utilizing the Service.
Broadband Service / ISP Outage or Termination / Suspension or Termination by MondoTalk
You acknowledge and understand that Service outages or suspension or termination of Service by Your broadband provider and/or ISP or by MondoTalk will prevent ALL Service, but You will continue to be billed for the Service unless and until You terminate Service in accordance with this Agreement. You acknowledge that MondoTalk out-sources the actual Internet telecommunications Voice over Internet switching infrastructure, and You acknowledge that MondoTalk will not be liable for any interruptions of Service, failure of Service or termination of Service.
Service Outage Due to Suspension of Your Account.
You acknowledge and understand that Service outages due to suspension of Your account as a result of billing issues will prevent ALL Service.
6. Pay-Per-Call Services
MondoTalk will not directly complete any calls to 1-900, 1-976 or other pay-per-call Service.
7. Phone number
The phone number we assign to You is not Your property. We may assign the phone number to another Customer if You cancel Service, Your account becomes an Inactive Account (including closure for inactivity under clause 14.1), or Service is terminated under this Agreement, or for technical reasons.
There is no minimum period of time that the number will remain idle. We reserve the right to reassign the number any time after the number becomes available. We may have to assign You a different number during the term of this Agreement, but we will notify You in advance.
8. Number Portability and Service Numbers
8.1 Keeping your existing number (Local Number Portability).
You may be able to port your existing fixed-line or mobile number to your MondoTalk Service. Local Number Portability is subject to carrier capability, your current provider’s requirements and applicable law. We may require an authorisation and supporting details from you to initiate a port. Downtime during a port is typically minimal but is not guaranteed.
8.2 Purchasing numbers from MondoTalk.
You may purchase telephone numbers from MondoTalk separately. Because this is an internet-based voice service, calling patterns are not tied to traditional geographic area codes and your Service will ring wherever you connect compatible equipment or apps to the internet, subject to our Service terms.
8.3 Number ownership and changes.
Numbers are allocated and managed under Section 7 (Phone number). We may need to change or reclaim a number in accordance with that section (including where your account is closed for inactivity under Section 14.1).
9. Payments and Billing.
You authorize MondoTalk to use Automatic Debit for charges incurred from the use of MondoTalk Services. As long as your credit card remains valid and in good standing, You may continue to use MondoTalk Services. You agree to pay for all charges incurred by the use of MondoTalk Services made available to You. You agree to comply with all other terms and conditions set forth in this Agreement.
To maintain customer credit card security it can take up to four (4) days from the time you order for your funds to be available in your account.
You are responsible for all uses of your account, irrespective of whether you authorized its use or not. Maintaining the confidentiality of your password is your sole responsibility. You agree to notify MondoTalk immediately by e-mail if your account or the Service is being stolen or fraudulently used. You are responsible for the payment of all charges incurred as a result of the use of your MondoTalk services. This includes but is not limited to the use, misuse, use by an unauthorized third party, any error, accidental use or loss.
You are not authorized to use your MondoTalk Services after your account has expired, or terminated. You remain responsible to MondoTalk for any charges resulting from the use of your MondoTalk account after any such an event. Charges are immediately payable to MondoTalk.
Calls are billed in one-minute increments, with a minimum time per call of one minute. Billing for calls begins when you press the “send” or “talk” button, and ends when you hit the end key or both parties disconnect. All rates are subject to change without prior notice.
All calls made to mobile telephones are deemed to have been completed. Forwarded calls from the system to any external numbers are deemed as outgoing calls and regular rates will apply. You must notify MondoTalk in writing of any disputed charges within thirty (30) days of the charges or you will be deemed to have waived your right to dispute the charges.
We will use commercially reasonable efforts to notify you of any changes to services charged using Automatic Debits, such notification are not considered a prerequisite to the effectiveness of any such change. Rates do not include additional charges you may incur for originating a call from a cell phone.
You will be responsible for any taxes which are or may come into effect for the Services offered. These taxes will be deducted using Automatic Debits or charged directly to your pre paid card.
All recurring fees and any additional per minute charges incurred will be deducted using Automatic Debits.
Monthly dial plans and pre-paid dial plans are non-refundable other than as defined in section 13, regardless of who actually Uses Your Service, and regardless of whether the phone Usage is made with Your consent or knowledge.
9.1 MondoMate Payments
Payments made by the MondoMate program (http://mondomate.mondotalk.com) shall be made in Australian Dollars.
MondoTalk agrees to pay the MondoMate Rewards to You and/or a charity.
Transferring MondoMate rewards is at sole cost to You.
10. Disputed Charges.
If You think there’s been an error in a charge posted to Your account, You need to notify MondoTalk within thirty (30) days of the charges or you will be deemed to have waived your right to dispute the charges.
11. Dial Plans
11.1 Pre-Paid Plans
Pre-Paid accounts have no expiration or use-by date. However, accounts may be closed for inactivity under clause 14.1.
11.2 Monthly Plans
We charge you by the month. Charges for calls made outside the plan description (such as mobile, international or calls in excess of the included minutes) are not included in subscription fees and you will be charged for these calls as they are made. Plan minutes are not rolled over and expire at the end of each billing period.
12. Free Accounts
Free Accounts that become Inactive Accounts may be terminated under clause 14.1.
13. Equipment, Returns and Refunds
13.1 Customer-Provided Equipment (CPE).
You are responsible for supplying, maintaining and securing any devices, networks or software you use with the Service. We are not responsible for any fault, incompatibility or security issue arising from your equipment or environment.
13.2 Equipment Purchased from MondoTalk.
(a) Title passes to you on our receipt of full payment. Risk passes to you on delivery.
(b) Manufacturer warranties (if any) apply as provided by the manufacturer. To the extent permitted by law, we do not give separate warranties for purchased equipment beyond those that cannot be excluded under the Australian Consumer Law.
(c) Returns and RMAs must follow our then-current RMA process. You are responsible for backing up data and removing personal information before returning any item.
(d) Nothing in this clause limits your rights under clause 17A (Australian Consumer Law).
13.3 Leased Equipment.
13.3.1 Title. Title in Leased Equipment remains with MondoTalk (or our lessor). You obtain only a right to use it in accordance with this Agreement.
13.3.2 Risk. Risk of loss, theft or damage to Leased Equipment passes to you on delivery and remains with you until it is returned to and received by us in accordance with clause 13.3.6. You must take reasonable care of the Leased Equipment and keep it safe, secure and insured (where applicable).
13.3.3 Use of Leased Equipment. You must use Leased Equipment only with the Service, in accordance with law and the manufacturer’s instructions, and you must not sell, charge, encumber, modify (except as permitted by the manufacturer) or part with possession without our written consent.
13.3.4 Manufacturer warranties. Leased Equipment may be covered by manufacturer warranties; any warranty service is subject to the manufacturer’s terms.
13.3.5 Repair or replacement of Leased Equipment. If Leased Equipment fails in normal use during the lease, we may (at our option) repair or replace it with equivalent equipment.
13.3.5.1 Exclusions. We are not obliged to repair or replace Leased Equipment where the issue arises from: misuse, neglect, unauthorised modification, accident, liquid or physical damage, wear-and-tear, failure to follow instructions, or use with incompatible power, peripherals, software or networks.
13.3.6 Return of Leased Equipment. On the earlier of Service termination, replacement, or our reasonable request, you must promptly return Leased Equipment to the address we specify, in good working order (allowing for fair wear and tear), with all accessories. If you fail to return it within a reasonable time, or it is returned damaged beyond fair wear and tear, we may charge a reasonable replacement or repair fee.
13.3.7 Locked Leased Equipment. We may deploy technical controls (for example, SIM/IMEI locks, MDM, or similar) to protect Leased Equipment. You must not remove, circumvent or tamper with these controls. We may remotely disable or lock Leased Equipment on loss, theft, non-return, or where permitted by law and this Agreement.
13.4 Refunds and Service End.
Except as required by the Australian Consumer Law or expressly stated otherwise in this Agreement, fees paid are non-refundable. For the avoidance of doubt, closure for inactivity under clause 14.1 constitutes Service end for the purposes of this clause. This clause operates subject to clause 17A (Australian Consumer Law).
14. Termination and Reactivation of Your Account
If your account becomes an Inactive Account, it may be suspended or closed under clause 14.1. To continue using the Service after closure, you must reactivate your account and you may be assigned a new phone number.
14.1 Inactivity, Closure and Forfeiture. If your account becomes an Inactive Account, we may suspend or close the account. We may (but are not obliged to) send a courtesy notice to your last known email. Failure to receive any notice does not delay or prevent closure. On closure for inactivity, the Service ends and any remaining prepaid balance, credit or promotional amounts are forfeited, and phone numbers may be reclaimed or reassigned in accordance with clause 7. To the maximum extent permitted by law, no refunds are payable.
15. Lost or Stolen Equipment
If Your phone is lost or stolen, You are responsible for charges incurred until You notify us or the Service provider of the loss of Your MondoTalk phone. Once You call us, Your account will be suspended. Once You purchase a new MondoTalk phone, any money left in Your old phone account will be transferred to Your new MondoTalk phone account.
16. Copyright / Trademark / Unauthorized Usage of Device, Firmware & Software
The Service and Device and any firmware or software Used to provide the Service or provided to You in conjunction with providing the Service, or embedded in the Device, and all Services, information, documents and materials on MondoTalk’s website(s) are protected by trademark, copyright or other intellectual property laws and international treaty provisions. All websites, corporate names, Service marks, trademarks, trade names, logos and domain names (collectively “marks”) of MondoTalk are and shall remain the exclusive property of MondoTalk and nothing in this Agreement shall grant You the right or license to Use any of such marks.
You acknowledge that You are not given any license to Use the firmware or software Used to provide the Service or provided to You in conjunction with providing the Service, or embedded in the Device, other than a nontransferable, revocable license to Use such firmware or software in object code form (without making any modification thereto) strictly in accordance with the terms and conditions of this Agreement.
You expressly agree that the Device is exclusively for Use in connection with the Service and that MondoTalk will not provide any passwords, codes or other information or assistance that would enable You to Use the Device for any other purpose.
If You decide to Use the Service through an interface device not provided by MondoTalk, which MondoTalk reserves the right to prohibit in particular cases or generally, You warrant and represent that You possess all required rights, including software and/or firmware licenses, to Use that interface device with the Service and You will indemnify and hold harmless MondoTalk against any and all liability arising out of Your Use of such interface device with the Service. You shall not reverse compile, disassemble or reverse engineer or otherwise attempt to derive the source code from the binary code of the firmware or software.
17. LIMITATION OF LIABILITY
MONDOTALK SHALL NOT BE LIABLE TO YOU FOR ANY INDIRECT, SPECIAL INCIDENTAL, CONSEQUENTIAL, EXEMPLARY OR PUNITIVE DAMAGES OF ANY KIND, INCLUDING LOST PROFITS (REGARDLESS OF WHETHER WE HAVE BEEN NOTIFIED THAT SUCH LOSS MAY OCCUR) BY REASON OF ANY ACT OR OMISSION IN OUR PROVISION OF EQUIPMENT OR SERVICES. WE SHALL NOT BE LIABLE FOR ANY ACT OR OMISSION OF ANY OTHER COMPANY FURNISHING A PART OF OUR SERVICE OR ANY EQUIPMENT PROVIDED FOR SUCH SERVICE – INCLUDING FOR ERRORS OR OMISSIONS OF ANY VENDORS PARTICIPATING IN OFFERS MADE THROUGH US – OR FOR ANY DAMAGES THAT RESULT FROM ANY PRODUCT OR SERVICE PROVIDED BY OR MANUFACTURED BY THIRD PARTIES. IN NO EVENT SHALL MONDOTALK BE LIABLE FOR AN AMOUNT EXCEEDING THE PURCHASE PRICE OF THE PHONE AND SERVICE. SOME JURISDICTIONS PROHIBIT LIMITATION OF DAMAGES RESULTING FROM PHYSICAL INJURY OR DAMAGE AND YOU MAY HAVE ADDITIONAL RIGHTS THAN AS SET FORTH ABOVE.
17A. Australian Consumer Law
Nothing in this Agreement excludes, restricts or modifies any rights or remedies you may have under the Competition and Consumer Act 2010 (Cth), including the Australian Consumer Law (ACL), that cannot lawfully be excluded. Where our liability for a breach of a consumer guarantee under the ACL can be limited, it is limited, at our option, to: (a) in the case of services, supplying the services again or paying the cost of having the services supplied again; and (b) in the case of goods, repairing or replacing the goods, supplying equivalent goods, or paying the cost of repair, replacement or supply of equivalent goods.
18. Indemnification
You agree to indemnify and hold harmless MondoTalk from any and all liabilities, penalties, claims, causes of action and demands brought by third parties (including the costs, expenses and attorneys’ fees on account thereof resulting from Your Use of the MondoTalk and MondoTalk Equipment and Services) whether based in contract or tort (including strict liability) and regardless of the form of action.
19. LIMITED WARRANTY
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, AND EXCEPT FOR THE LIMITED WARRANTY SET FORTH IN THE MATERIALS ACCOMPANYING THE MONDOTALK PHONE, OR POSTED AT OUR WEBSITE. WE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED BY LAW, INCLUDING ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. WE MAKE NO WARRANTY THAT THE SERVICE WILL BE UNINTERRUPTED OR ERROR FREE. WE DO NOT AUTHORIZE ANYONE, INCLUDING BUT NOT LIMITED TO EMPLOYEES, REPRESENTATIVES OR AGENTS OF MONDOTALK, OR MONDOTALK AFFILIATES, THIRD PARTY SERVICE PROVIDERS TO MAKE ANY WARRANTY OF ANY KIND ON OUR BEHALF AND YOU SHOULD NOT RELY ON ANY SUCH STATEMENT. SOME JURISDICTIONS DO NOT ALLOW DISCLAIMER OF EXPRESS WARRANTIES AND YOU MAY HAVE ADDITIONAL RIGHTS THAN AS SET FORTH ABOVE.
20. Notices
Any notice or other communication will be in writing and will be provided by personal delivery, email or by facsimile to MondoTalk or You as applicable, at the email address, regular address or facsimile number as set forth in Your Service order(s). Notices delivered in person will be effective on the date of such delivery. Notices delivered by email or facsimile will be effective on the date of transmission, provided printed proof of transmission is obtained. Any notice we send You will be sent to Your last known residence or electronic address as shown on our records, or via electronic messaging to Your MondoTalk account.
21. Use of Your subscriber information
We handle your personal information in accordance with the Privacy Act 1988 (Cth) and the Australian Privacy Principles, and our Privacy Policy available on our website. We may use the information you provide to market services related to our offerings. You can opt out of marketing at any time via the method stated in our Privacy Policy.
22. Choice of Law; Jurisdiction (Australia).
These terms, and any dispute, claim or proceeding arising out of or in connection with them or the Services, are governed by the laws in force in Western Australia and the Commonwealth of Australia, without regard to conflict-of-laws principles. Each party irrevocably submits to the non-exclusive jurisdiction of the courts of Western Australia and the Federal Court of Australia (Western Australia Registry), and to the courts that may hear appeals from them.
23. Entire Agreement
These terms and conditions constitute the entire Agreement between You and MondoTalk with respect to our Equipment and Services and the terms and conditions under which they are offered and provided to You. These terms and conditions supersede all oral or written communications and understandings between You and MondoTalk with respect to our Equipment and Services to You and the terms and conditions under which they are offered and provided to You.
24. Severability
If any part of these terms and conditions is legally declared invalid or unenforceable, all other parts of these terms and conditions are still valid and enforceable. Such invalidity or non-enforceability will not invalidate or render unenforceable any other portion of these terms and conditions.
25. No Third Party Beneficiaries
No provision of these terms and conditions provides any person or entity not a party to these terms and conditions with any remedy, claim, liability, reimbursement, or cause of action or create any other third party beneficiary rights.
26. Future Changes to This Agreement
From time to time MondoTalk may change the terms and conditions of this Agreement. Notices will be considered given and effective on the date posted on www.mondotalk.com. These changes will become binding on You on the date they are posted to our website and no further notice by us is required upon Your continued Use of the Service. The Agreement as and when posted supersedes all previously agreed to electronic and written terms of use, including, without limitation, any terms included with the packaging of the Equipment and also supersedes any written terms provided to Retail Customers in connection with retail distribution, including, without limitation, any written terms enclosed within the packaging of the Equipment.
27. Incompatibility with Other Services
(a) Certain Broadband and Cable Modem Services. We do not warrant that the Services will be compatible with all internet services. MondoTalk expressly disclaim any express or implied warranties or conditions regarding the compatibility of the Service with any particular internet service.
(b) Home Security Systems. Home security systems may not be compatible with the Service. In order to use any alarm monitoring functions for any security system installed in your home or business You may be required to maintain a telephone connection through your local exchange carrier. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.
Nothing in these Terms limits any rights you may have under the Competition and Consumer Act 2010 (Cth) or any other law that cannot lawfully be excluded.
Find Out More →