Voice Over Internet Protocol (Voip) Security

Total Page:16

File Type:pdf, Size:1020Kb

Voice Over Internet Protocol (Voip) Security VoIP Security Not feeling Use this guide to understand Voice safe in the over Internet online world? Protocol (VoIP) Telecommunications and Information Working Group (TEL) AUGUST 2008 VoIP Security Introduction About this Booklet This booklet is intended primarily to assist Small and Medium Enterprises (SMEs) in understanding the issues around VoIP security and to aid in safely using VoIP. This booklet also provides awareness information on the various types of VoIP implementations that are available, differences between traditional telephony and VoIP solutions, the different risks and threats introduced by a VoIP system, and how to protect against these threats. Contents A Background on VoIP Traditional landline telephony has been the mainstay of both household and business communication in the last century. With the introduction of fast broadband Internet What you need to know to read this book connections available at low-cost, a new technology has emerged in the voice communication space. Voice over Internet Protocol (VoIP) can offer significant cost Page 4 savings over traditional landline services for local or long distance calls, and for calls to both international locations and mobile devices. In view of this, market research Find the answers to your questions companies and analysts project that VoIP uptake is rapidly increasing and the future of Page 6 voice communication is closely tied to IP technologies. Why was VoIP developed? Selecting Your Voice over IP Solution VoIP was developed primarily as a technology to compete with traditional telephony, and Page 10 as such, the priorities during its development were focused on quality of voice calls and the reliability of the service. The ability to utilise VoIP telephony with existing telephone Using Your VoIP System switchboard technology and computer systems have also become pivotal considerations in VoIP development and adoption. This focus has allowed VoIP to rapidly become a Page 14 feasible alternative to traditional telephony, however has also introduced a number of security considerations to be addressed prior to achieving the same degree of ‘trust’ that Using VoIP with Other Technologies is now placed in the traditional landline telephone system. Page 28 The out of the box security of certain VoIP and Internet Telephony solutions is considered inadequate for some uses, unless properly considered and accounted for. An insecure VoIP Security Checklist VoIP system may expose organisations and individual users to potential eavesdropping on Page 34 conversations, theft of services, interruption of service and other impacts. Target audience of the booklet This booklet is aimed at all users, regardless of skill level. The content is written for SMEs, but is also applicable to consumer level users. DSL (Digital Digital subscriber line (DSL) is a technology which allows for digital Subscriber Line) data transmission over the wires of a local telephone network – A glossary of terms is usually found at the back of a book and enabling broadband Internet access. A particular form, called ADSL referred to only as required. However, you will find it much (asymmetric digital subscriber line) enables faster data transmission easier to understand this booklet if you take a few minutes now to over copper lines than conventional modem based technology. The familiarise yourself with the vocabulary of VoIP technologies. distinguishing characteristic of ADSL compared with other forms of DSL is that the volume of data flow is greater in one direction than the other – thus it is called asymmetric. Generally download bandwidth is greater than upload bandwidth. What you need to Cable Internet Cable Internet is a form of broadband Internet access which uses cable television infrastructure to transmit data. Cable Internet cabling 4 does not require traditional telephone line connections, but does know to read this book require cable television connections and wiring to be in place. POTS Plain old telephone service (POTS) is a term which describes the Softphone A softphone is a software program that enables IP telephony calls (Plain old telephone service that remains the basic form of residential and on a computer device or workstation. A softphone can be used with telephone service) small business service connection to the telephone network in most a microphone and speakers, or with a softphone capable handset parts of the world. (such as a USB IP telephone). An example softphone is Skype. PSTN The public switched telephone network (PSTN) is the infrastructure Convergence Convergence is the merging of separate networks, technologies, (Public switched for the world’s public circuit-switched telephone networks. This and environments into one collaborative multi-media network. A network is now almost entirely digital and includes fixed (land line) converged network is theoretically capable of handling the different telephone elements and functionalities associated with each separate network, network) telephones. The PSTN is able to deliver quality of service (QoS) guarantees meaning that downtime of the network is limited. and enables a higher level of interactivity between them. This booklet will be dealing with the convergence of voice data and regular data IP (Internet The internet protocol (IP) is a data-oriented protocol for transmitting on the same network. data across computer networks. IP is one of the fundamental Protocol) A denial of service (DoS) attack is an attempt at limiting or stopping technologies on which the Internet is built. IP provides a best effort Denial of Service (DoS) legitimate users from accessing a specific computer system or delivery strategy which means that there are no guarantees about resource. In the context of this booklet, DoS attacks will mainly be packet delivery, however reliability and delivery can be enhanced referring to the disruption of VoIP telephony. with a number of solutions. Protocol A protocol is a standard method for implementing communication IP Packets IP packets are small blocks of data which are used to send between two computer entities. Different protocols can exist to information across an IP network. A packet is a container of both tackle the same basic issue however their success may be highly the configuration and transport information required to deliver the varied. In many cases, the protocols must be the same at each end packet to the correct destination, and the actual information that the of a connection for computers to communicate. system / user / device is trying to communicate, i.e. the payload. Hardened System A hardened system is a computer server / terminal which has been Confidentiality, Confidentiality, integrity and availability (often referred to as CIA) configured in such a way that it is highly resilient to security risks. A Integrity and are three principal properties that information security aims to hardened system would likely have a well configured and up-to-date Availability protect. To maintain confidentiality is to ensure that data remains version of operating system, be well patched and have appropriate private – only the intended and authorised recipients, individuals, security software installed. The way the system communicates with other processes or devices, may read the data. To maintain integrity is systems would be configured with security and protection in mind. to ensure that data has not been altered during transmission from origin to reception. Availability is the assurance of timely and reliable Interoperability Interoperability is the ability of different systems and technologies access to data services. to communicate and share information with one another. SIP and H.323 The Session Initiation Protocol (SIP) and H.323 are the two standard PBX (Private The private automatic branch exchange (PABX) or private branch protocols that enable voice communication connections to occur. exchange (PBX) is a connection between a private business and the Branch eXchange) SIP is the newer of the two and was created specifically for IP PSTN. The PBX handles calls between your organisation’s extensions multimedia technologies. H.323 is an earlier protocol and was as well as connections to the PSTN. conceptualised initially for PBX technologies. WHEN USING VoIP COMPARE TO Page Reference: Page Reference: WHEN USING VoIP COMPARE TO TRADITIONAL TELEPHONY SERVICES, TRADITIONAL TELEPHONY SERVICES, QUESTIONS YOU MIGHT ASK: QUESTIONS YOU MIGHT ASK: WILL VoIP OFFER ANY SIGNIFICANT There are many benefits to VoIP networks, though there are Fraud and theft risks do exist in VoIP, as with any ARE THERE ANY FRAUD OR THEFT RISKS also some tradeoffs. Some potential benefits include higher communication protocol or network. However controls BENEFITS OVER MY LANDLINE PSTN scalability, mobility and being future ready. To learn more can be implemented to minimise this security risk. See the WITH VoIP? about the differences between VoIP systems and PSTN section: VoIP Threats: Integrity, Page 18. NETWORK? networks including both positives and negatives, see the section: Differences between VoIP and traditional telephony VoIP operates via a significantly different transport method services, Page 8. DOES VoIP HAVE ANY RELIABILITY to that of traditional telephony, and is a relatively young technology (circa 20 years) when compared to traditional ISSUES COMPARED TO TRADITIONAL What’S THE DIFFERENCE BETWEEN VoIP solutions are widely varied. For the home user, software-based VoIP or use of a Voice Box solution may telephony
Recommended publications
  • Analysis of Server-Smartphone Application Communication Patterns
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Aaltodoc Publication Archive Aalto University School of Science Degree Programme in Computer Science and Engineering Péter Somogyi Analysis of server-smartphone application communication patterns Master’s Thesis Budapest, June 15, 2014 Supervisors: Professor Jukka Nurminen, Aalto University Professor Tamás Kozsik, Eötvös Loránd University Instructor: Máté Szalay-Bekő, M.Sc. Ph.D. Aalto University School of Science ABSTRACT OF THE Degree programme in Computer Science and MASTER’S THESIS Engineering Author: Péter Somogyi Title: Analysis of server-smartphone application communication patterns Number of pages: 83 Date: June 15, 2014 Language: English Professorship: Data Communication Code: T-110 Software Supervisor: Professor Jukka Nurminen, Aalto University Professor Tamás Kozsik, Eötvös Loránd University Instructor: Máté Szalay-Bekő, M.Sc. Ph.D. Abstract: The spread of smartphone devices, Internet of Things technologies and the popularity of web-services require real-time and always on applications. The aim of this thesis is to identify a suitable communication technology for server and smartphone communication which fulfills the main requirements for transferring real- time data to the handheld devices. For the analysis I selected 3 popular communication technologies that can be used on mobile devices as well as from commonly used browsers. These are client polling, long polling and HTML5 WebSocket. For the assessment I developed an Android application that receives real-time sensor data from a WildFly application server using the aforementioned technologies. Industry specific requirements were selected in order to verify the usability of this communication forms. The first one covers the message size which is relevant because most smartphone users have limited data plan.
    [Show full text]
  • Performance of VBR Packet Video Communications on an Ethernet LAN: a Trace-Driven Simulation Study
    9.3.1 Performance of VBR Packet Video Communications on an Ethernet LAN: A Trace-Driven Simulation Study Francis Edwards Mark Schulz edwardsF@sl .elec.uq.oz.au marksas1 .elec. uq.oz.au Department of Electrical and Computer Engineering The University of Queensland St. Lucia Q 4072 Australia Abstract medium term, we can expect that current LAN technolo- Provision of multimedia communication services on today’s gies will be utilized in the near term for packet transport of packet-switched network infrastructure is becoming increas- video applications [4,5, 61. Characterizing the performance ingly feasible. However, there remains a lack of information of current networks carrying video communications traffic is regarding the performance of multimedia sources operating therefore an important issue. This paper investigates packet in bursty data traffic conditions. In this study, a videotele- transport of real time video communications traffic, charac- phony system deployed on the Ethernet LAN is simulated, teristic of videotelephony applications, on the popular 10 employing high time-resolution LAN traces as the data traf- Mbit/s Ethernet LAN. fic load. In comparison with Poisson traffic models, the Previous work has established that Ethernet is capable of trace-driven cases produce highly variable packet delays, and supporting video communication traffic in the presence of higher packet loss, thereby degrading video traffic perfor- Poisson data traffic [6, 71. However, recent studies of high mance. In order to compensate for these effects, a delay time-resolution LAN traffic have observed highly bursty control scheme based on a timed packet dropping algorithm traffic patterns which sustain high variability over timescales is examined.
    [Show full text]
  • Title: Communicating with Light: from Telephony to Cell Phones Revision
    Title: Communicating with Light: From Telephony to Cell Phones Revision: February 1, 2006 Authors: Jim Overhiser, Luat Vuong Appropriate Physics, Grades 9-12 Level: Abstract: This series of six station activities introduces the physics of transmitting "voice" information using electromagnetic signals or light. Students explore how light can be modulated to encode voice information using a simple version of Bell's original photophone. They observe the decrease of the intensity of open-air signals by increasing the distance between source and receiver, and learn the advantage of using materials with different indices of refraction to manipulate and guide light signals. Finally, students are introduced to the concept of bandwidth by using two different wavelengths of light to send two signals at the same time. Special Kit available on loan from CIPT lending library. Equipment: Time Required: Two 80-minute periods NY Standards 4.1b Energy may be converted among mechanical, electromagnetic, Met: nuclear, and thermal forms 4.1j Energy may be stored in electric or magnetic fields. This energy may be transferred through conductors or space and may be converted to other forms of energy. 4.3b Waves carry energy and information without transferring mass. This energy may be carried by pulses or periodic waves. 4.3i When a wave moves from one medium into another, the waves may refract due a change in speed. The angle of refraction depends on the angle of incidence and the property of the medium. 4.3h When a wave strikes a boundary between two media, reflection, transmission, and absorption occur. A transmitted wave may be refracted.
    [Show full text]
  • Communication Protocol for Schools
    Communication Protocol for Schools Communication plays a key role in creating and fostering strong, positive relationships between the school and the home. Communication is a two-way street; our schools share information with our families and community, and our families share information with our schools. The purpose of this document is to guide, manage and improve school-home communication by offering a standard format, structure and sequence for regular, ongoing communication. Communication Channels Communication can take place in a variety of formats. The message and the purpose of the communication can help determine which format is most appropriate. Generally, the more issues-driven and/or detailed the information is, the more direct the communication channel chosen should be. Communication channels include: Face-to-face communication – one-on-one meetings, School Council meetings, Parent-Student- Teacher interviews Telephone conversations Hard copy, written communication – letters sent home from the school, paper school newsletters Electronic communication – email, electronic newsletters, websites, social media When the communication requires a dialogue, such as bringing forward a question or concern or when a discussion is required on a particular topic, the preferred channels of communication are ones that allow for an immediate and ongoing interaction between the people involved. The best formats for this kind of communication are face-to-face conversations or telephone conversations. Schools and families are encouraged to use these direct channels of communication when a topic is complex or requires a dialogue. These more direct forms of communication also help us establish a personal connection, which helps build relationships that we don’t get in other forms of communication.
    [Show full text]
  • Voice Over Internet Protocol (Voip): a Brief Review
    © APR 2018 | IRE Journals | Volume 1 Issue 10 | ISSN: 2456-8880 Voice over Internet Protocol (VoIP): A Brief Review ANURAG K MADHESHIYA1, KIRAN S KALE2, SHIV K YADAV3, JIGNESHKUMAR R. VALVI4 1,2,3,4 Department of Electronics and Communication, SVNIT Surat, India Abstract -- VoIP stands for Voice over Inter Protocol. It is setting up calls, registering the calls, authenticating a communication protocol mainly used for voice and terminating the call. Protocol belonging to H.323 communication, data transfer and video calling. It is based family of protocol uses TCP and UDP connection for on packet transmission over internet network. Paul Baran transportation. For call registering and call signaling and other researchers developed the packet network in the H.225 protocol is used. For media session mid twentieth century. In 1973 Dany Cohen first demonstrated packet voice in flight simulator application. establishment and controlling H.245 is used. For Due to its digital nature it is easy to operate on this protocol. conferencing T.120 protocol is used [3]-[4]. Index Terms: MGCP, Packet, QoS, SIP I. INTRODUCTION Voice over Internet Protocol also known as Voice over IP and VoIP is a communication standard for transmission of voice signal, data transmission and video conferencing. Actually this technology follow packet switching. In packet switching first the input signal (voice, data, video) converted into digital form so other operation becomes simple after this we do encoding, compressing of digital data to make more secure transmission through channel. Then after this we transmit the signal over the channel. At receiver side we do reverse of it but it also require an addition block before receiver to store packets and reorder these packets because in packet switching different Figure 1: Call flow of H.323 packets follow different path so reaches in random manner.
    [Show full text]
  • An Evaluation Protocol for Picture Archiving and Communication System: a Systematic Review
    ORIGINAL PAPER An Evaluation Protocol for Picture Archiving and Communication System: a Systematic Review Mohsen S. Tabatabaei1, ABSTRACT Mostafa Langarizadeh1, Introduction: Picture archiving and communication system (PACS) serves to store, transmit, communi- Kamran Tavakol2 cate and manage medical images. A logical evaluation protocol assists to determine whether the system is technically, structurally and operationally fit. The purpose of this systematic review was to propose a 1Department of Health Information logical evaluation protocol for PACS, particularly useful for new hospitals and other healthcare institutions Management, School of Health Management and Information Sciences, Iran University of in developing countries. Methods and Materials: We systematically reviewed 25 out of 267 full-length Medical Sciences. Tehran, Iran articles, published between 2000 and 2017, retrieved from four sources: Science Direct, Scopus, PubMed 2School of Medicine, University of Maryland and Google Scholar. The extracted data were tabulated and reviewed successively by three independent Baltimore. Baltimore, MD, USA panels of experts that oversaw the design of this study and the process by which the PACS evaluation protocol was systematically developed. Results: The outcome data were ranked by expert panels and Corresponding author: Mohsen S. Tabatabaei, Tel: +98-990-188-0720. E-mail: [email protected] analyzed statistically, with the reliability established at 0.82 based on the Pearson’s correlation coefficient. The essential components and the best options to establish an optimal PACS were organized under nine main sections: system configuration; system network; data storage; data compression; image input; image doi: 10.5455/aim.2017.25.250-253 characteristics; image presentation; communication link; and system security, with a total of 20 compo- ACTA INFORM MED.
    [Show full text]
  • Internet of Things (Iot): Protocols White Paper
    INTERNET OF THINGS (IOT): PROTOCOLS WHITE PAPER 11 December 2020 Version 1 1 Hospitality Technology Next Generation Internet of Things (IoT) Security White Paper 11 December 2020 Version 1 About HTNG Hospitality Technology Next Generation (HTNG) is a non-profit association with a mission to foster, through collaboration and partnership, the development of next-generation systems and solutions that will enable hoteliers and their technology vendors to do business globally in the 21st century. HTNG is recognized as the leading voice of the global hotel community, articulating the technology requirements of hotel companies of all sizes to the vendor community. HTNG facilitate the development of technology models for hospitality that will foster innovation, improve the guest experience, increase the effectiveness and efficiency of hotels, and create a healthy ecosystem of technology suppliers. Copyright 2020, Hospitality Technology Next Generation All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the copyright owner. For any software code contained within this specification, permission is hereby granted, free-of-charge, to any person obtaining a copy of this specification (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the above copyright notice and this permission notice being included in all copies or substantial portions of the Software.
    [Show full text]
  • How to Improve Your Cell Phone Signal
    Here are a few free and paid options that are available: Clear Out Obstructions Town of Paradise Valley Femtocells When there’s a clear line of sight between your cell phone 6401 East Lincoln Drive Like Wi-Fi Calling, femtocells depend on having broad- and cell tower, it’s easy for the two to hear each other. But Paradise Valley, Arizona 85253 band landline internet with a minimum speed of 1.5 Mbps when there are objects and obstructions in between, it gets download & 256Kbps upload to have any decent results. a little harder for the two to communicate. There are Town of Paradise Valley In short, they convert landline internet to cellular signals. about 5 main causes of poor cellular signal: While femtocell is the proper & broad term, each carrier • Cell tower distance (of course) likes to brand their own femtocell names. So you'll see things like AT&T Microcell, Verizon Network Extender, • External interference (trees, hills, mountains, valleys, metal How to Improve Your T-Mobile Personal CellSpot or Sprint Airave or Magicbox. structures & high buildings) But they're all femtocells. • Building material & construction (metal, concrete, thick Cell Phone Signal These devices can range from $100 to $300 with a possi- walls, energy-efficient installations, etc.) • Internal interference (electronics, metal objects, anything ble monthly subscription service on top of your landline Phone: 480-348-3690 internet bill. If you're a long-time subscriber with contin- magnetic or electronic can interfere with cell waves) Fax: 480-951-3715 ual reception problems, contacting your carrier may re- • Weather Email: [email protected] sult in a free or discounted femtocell.
    [Show full text]
  • Landline Telephone and Mobile Electronic Communications Device Usage
    District of Columbia Government – Office of the Chief Technology Officer Landline Telephone and Mobile Electronic Communications Device Usage Policy Number: OCTO – 7006.0 Creation Date: June 4, 2012 Approved By: Allen Y. Lew, City Administrator Approval Date: June 11, 2012 Effective Date: June 11, 2012 Revised Date: February 28, 2014 1. Scope/Applicability: This policy applies to all DC Agency Directors, Chief Information Officers, and their Agency Telecommunications Coordinators (ATCs) designees, the DC Chief Technology Officer, and all DC workforce members (including employees, contractors, and interns). 2. Authority: DC Official Code §§ 1-1401 et seq. 3. Purpose: This policy is intended to minimize costs for DC government landline telephone and mobile electronic communications device (“mobile device”) usage. 4. Policy: Each DC Agency Director may assign government-issued mobile device to workforce members to access the DC government network provided that the Agency Director and workforce member comply with the following procedures. 5. Procedure: 5.1. All landline telephones and mobile devices issued to employees are the property of the DC government and may be removed from the employee’s possession at any time. 5.2. All DC government-owned or operated landline phones and mobile devices should be used only to conduct official business. Minimal personal use is permitted for emergency and other necessary situations. 5.3. Abuse of an issued mobile device may result in relinquishment of the device, repayment of fees for unauthorized use or disallowed services, and/or disciplinary action. 5.4. Unauthorized use of landline telephones and mobile devices may result in repayment of fees for unauthorized use.
    [Show full text]
  • Voice Over Internet Protocol (VOIP): Overview, Direction and Challenges 1 U
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by International Institute for Science, Technology and Education (IISTE): E-Journals Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.4, 2013 Voice over Internet Protocol (VOIP): Overview, Direction And Challenges 1 U. R. ALO and 2 NWEKE HENRY FIRDAY Department of Computer Science Ebonyi State University Abakaliki, Nigeria 1Email:- [email protected] 2Email: [email protected] ABSTRACT Voice will remain a fundamental communication media that cuts across people of all walks of life. It is therefore important to make it cheap and affordable. To be reliable and affordable over the common Public Switched Telephone Network, change is therefore inevitable to keep abreast with the global technological change. It is on this basis that this paper tends to critically review this new technology VoIP, x-raying the different types. It further more discusses in detail the VoIP system, VoIP protocols, and a comparison of different VoIP protocols. The compression algorithm used to save network bandwidth in VoIP, advantages of VoIP and problems associated with VoIP implementation were also critically examined. It equally discussed the trend in VoIP security and Quality of Service challenges. It concludes by reiterating the need for a cheap, reliable and affordable means of communication that would not only maximize cost but keep abreast with the global technological change. Keywords: Voice over Internet Protocol (VoIP), Public Switched Telephone Network (PSTN), Session Initiation Protocol (SIP), multipoint control unit 1. Introduction Voice over Internet Protocol (VoIP) is a technology that makes it possible for users to make telephone calls over the internet or intranet networks.
    [Show full text]
  • Messagenet Services Contract
    MESSAGING AND TELECOMMUNICATION SERVICES ART. 1 – OBJECT OF AGREEMENT 1.1 The object of the present agreement is the MESSAGENET s.r.l.supply of various messaging and telecommunication services, including sending and receving faxes through e-mail, sending and receiving SMS, ip phonics and voicemail and hybrid mail services. MESSAGENET s.r.l. has its registered office in Via Mario Pagano 47, Milan, Italy, company register 1605496, VAT no. 13004930155, and hereafter referred to as “MESSAGENET”. 1.2 Services offered by MESSAGENET are subscribable individually, unless stated otherwise. Services have basic technical access requirements that users must view through the web before subscribing to any of them. 1.3 Before using any MESSAGENET service, subscription to www.messagenet.it is required, together with personal data and other information required by MESSAGENET. ART. 2 – DURATION OF AGREEMENT 2.1 The present agreement starts with activation of at least one service by MESSAGENET. 2.2 Free services do not expire and can be withdrawn both by the user and MESSAGENET at any time, and MESSAGENET will hold no responsibility towards the user. 2.3 Services with fixed fee run until expiration of the fee and are renewable. 2.4 Recharge services with payment expire a year after their last recharge. 2.5 The present agreement ceases when none of the client’s services are active,upon client request of cancellation through the web or a registered letter with return receipt to MESSAGENET. In case of unsubscription from any service that includes fee division into installments, to proceed with the cancellation MESSAGENET will require that the client pay all fees not paid until the expiration of any subscribed service.
    [Show full text]
  • Wireless Home Phone Base a Guide to Your Service and Device 2 TABLE of CONTENTS
    Wireless Home Phone Base A Guide to Your Service and Device 2 TABLE OF CONTENTS Introduction 3 About Your Service 4–7 About Your Device 8–9 Device Installation 10–13 How It Works 14–15 Voicemail 16 Using Your Device 17–19 Helpful Tips 20–22 Important Information 23 Frequently Asked Questions 24–26 Troubleshooting 27–33 Specifications 34–35 Radio Frequency (RF) Energy 36 FCC Compliance 37 Warranty 38 Support 39 INTRODUCTION 3 Thank You For Choosing Consumer Cellular! We think your cell service should be easy to use, affordable and that you should never have to sign a contract. More than anything though, we think your wireless company should be there for you. That’s where this guide comes in. It’s a quick and easy reference to your new device and cellular service. If you would like to learn more, please flip to the SUPPORT section at the back of the guide, where you’ll find a variety of customer support options. We hope you enjoy your new Wireless Home Phone Base! 4 ABOUT YOUR SERVICE Coverage Area International Calling Your Consumer Cellular plan covers calls to and from To make an international call using your wireless home anywhere in the United States (including Puerto Rico, phone base, please dial: 1-401-537-2523 and follow U.S. Virgin Islands and Guam) with no long distance the prompts. Our international rates start at just 10¢ per or roaming charges. minute plus standard usage fees. Transferring A Phone Number Transferring a landline phone number to the Wireless Home Phone Base can take five (5) days or more.
    [Show full text]