SafeVPN.net introduces a completely new product that will allow to significantly reduce traffic usage for a VPN connection that is used to run VoIP traffic. We were already introducing bandwidth optimization for VoIP VPN accounts, also known as “SBO” which was doing voice codec and transport protocol optimizations to reduce traffic usage, however these manipulations were affecting voice quality and some line monitoring parameters, like post dial delay (PDD).
SafeVPN.net now offering internet line load balancing for VoIP VPN accounts. This new kind of setup will allow to share two or more internet connections on one PC to run VPN. Currently we offer only PC-based solution, router-based installations aren’t supported, but we are working on implementation.
In order to get the service running each internet connection should be set on different subnet (for example, the router for connection 1 will run on 192.168.10.1/24, so the router for connection 2 should run on any different subnet, like 192.168.20.1/24). Both routers should be accessible on the LAN to which the PC connected.
For setting up load balancing service we’ll need login that PC remotely and make remote installation. Since it requires manual operation, we charge remote setup fee. The price for installation may be different and depends on the operating system running on the PC. Do not hesitate to contact us to get a quote.
SafeVPN.net is now offering VoIP VPN configuration files for DD-WRT routers. Bear in mind that not every DD-WRT router has OpenVPN client, which is necessary for running VoIP VPN account. We can recommend following routers that have firmware with OpenVPN support:
- Linksys E-series models.
- Asus RT-N10 and RT-N16, some WL-series models.
There is always a possibility to check if router model is listed in DD-WRT router database. There should be a firmware with vpn, openvpn, big or mega tags, otherwise it may not support OpenVPN. We do not recommend to choose routers with CPU frequency less than 400 MHz. CPU power is needed to provide encryption with no latency, otherwise it may decrease voice quality and number of voice channels forwarded at the same time.
Do not hesitate to contact us if you have any questions.
We had two reports recently that customers lost money from their SIM cards connected with our service on public IPs. Further investigation of one case showed that customer was using simple passwords on the devices. In device security settings they also had no any restriction for incoming calls from internet. With this scenario, anyone who scans IPs will get a reply on some VoIP port and http port from the device. After that they can try to send call there or guess the password and login to web interface to check device settings and allow calls from anywhere, so they could send calls then. To avoid such cases please do the following:
- use secure password for your device;
- restrict calls to accept them only from your SIP trunk IP or VoIP switch IP;
- in case you can’t restrict calls by IP, choose our bandwidth optimization service and ask to set your devices on private IP range. You will still be able to access devices remotely by accessing your Linux PC desktop with VNC or similar program and then accessing your devices from there.
Performing these simple steps will avoid money loss on your GSM/PSTN carriers.
Please note that VPN with public IP considers that anyone from internet can access your IP. Many special programs do automated port scans over internet to gather information about IP address. Please consider your security and never use easy to guess passwords on any services that you put on public IP. Also check security settings and hide everything that you don’t wish to be available publicly.