Skip to main content

Six Linux softphone's list

VoIP has improved a lot since its first days, today a lot of multinational business are using it as a reliable way to keep stay in touch.


With more and more telecommuters, and business man working, and with cell phone roaming costs still high, VoIP is a real option for both big and small corporations.

And when you talk to a CFO about investing to save costs, you usually will see the checkered flag for your project.

Most of these projects will involve IP phones or ATAs, but you may use softphones too, which are very convenient for the traveler guy, here we will review some of the soft phones available for Linux.


Linphone

Linphone is a mature piece of software, it uses SIP, for voice and video over IP, it can work as a stand alone application, and you can call other sip enabled devices just entering its ips on the dial window of Linphone, or you can configure it to use an Asterisk PBX.


There are binary packages for the most common distros, so try to install it using you package manager.


Ekiga

Ekiga, is the softphone for Gnome Desktop, it supports both SIP and H.323, also has support for webcams if you kernel recognize yours.

As with Linphone you may use Ekiga standalone, or with a softswitch, you can also create an account using the Ekiga configuration druid, but over all, it is a great soft phone to be used with Asterisk.
Here is a screencast to learn how to configure it, to work with Asterisk.


Kiax

Kiax is an IAX softphone, so it is intended only for use with Asterisk, its configuration is really simple, but keep in mind that you need to create the username in the iax.conf file, instead of the sip.conf file to be able to use this softphone, it is really a good option if you are working with Asterisk.


Skype

Skype is a closed softphone, it means you may not use it with any gateway, it uses a proprietary protocol, and only works with the skype Network skype site, but it lets you add contacts, call them by free, or chat with them.

You may also call land lines and cell phones using a credit card or paypal to add credit to your account, the rates are really low compared with normal Telco rates, as there is versions for Windows and Mac, it is widely used, and maybe the most popular softphone, it also has the advantage that you do not need to configure your own PBX.

Gizmo

Gizmo is another network like Skype, but the good thing is that its softphone also support SIP configuration, and can be connected to an Asterisk PBX, while using its own network!, you may also configure is with your favorite IM network, MSN, Yahoo messenger, etc.
The configuration is really easy, and you add credit to call to outside numbers, using its network, or use you own PBX to make those calls, I really recommend the use of this software, which can be downloaded from gizmo.com you can also download versions for cell phones, if you are using Ubuntu it is in medibuntu repository, if are using Crunchbang Linux you just have to install it with:
sudo aptitude install gizmo5




Twinkle


Twinkle is another great SIP softphone, which can be easy used with Asterisk, or any other SIP gateway, it is easy to configure, supports STUN server, NAT traversal, Instant messaging, and as the others, can be used in a phone to phone configuration, or using a Gateway / SIP registrant.


 

Comments

Post a Comment

Popular posts from this blog

How to configure multipath Debian CentOS for IBM Storage

This detailed how to guides to achieve high availability and performance on Debian and CentOS for accessing storage space at IBM DS8300 Data Storage Systems. Tested on Debian GNU/Linux 5.x Lenny 64 bits and CentOS 5.3 64 bits running on 8 cores blades, with Host Bus Adapters Qlogic and Emulex Light Pulse Fiber Channel in deployed systems at SERPRO . Observations showed that Debian Lenny has the best performance, for our app load profile and hardware. Also, there are listed a number of previously not clearly documented critical pitfalls to avoid. STUDY whole articles, hints, implications, and cited resources before planning your deployment. Every detail matters . Before start, you must have LUNs at IBM DS8300 storage configured for high availability and performance as explained at the article How to configure maximum performance storage space for Debian GNU/Linux on IBM DS 8300 Data Storage Systems . Multipath and storage basic concepts In order t...

Squid Access Lists

Access Lists There are a number of different access lists: http_access : Allows HTTP clients (browsers) to access the HTTP port. This is the primary access control list. http_reply_access : Allows HTTP clients (browsers) to receive the reply to their request. This further restricts permissions given by http_access , and is primarily intended to be used together with rep_mime_type acl for blocking different content types. icp_access : Allows neighbor caches to query your cache with ICP. miss_access : Allows certain clients to forward cache misses through your cache. This further restricts permissions given by http_access , and is primarily intended to be used for enforcing sibling relations by denying siblings from forwarding cache misses through your cache. cache : Defines responses that should not be cached. url_rewrite_access : Controls which requests are sent through the redirector pool. ident_lookup_access : Controls which requests need an Ident lookup. always_dire...

ipsec tunnel pfSense and Centos

pfSense 1.2.3 -------- external ip: 1.1.1.1 internal ip: 172.20.1.20 internal network: 172.20.1.0/24 Centos 5.5 -------- external ip: 2.2.2.2 internal ip: 172.20.2.1 internal network: 172.20.2.0/24 pfSense config from a reset. Firewall rule to allow all ipsec communication (all protocols). pfSense ipsec config -------------------- Mode: Tunnel Interface: WAN (I'm not sure this should be WAN, but changing it to LAN makes no difference) Local subnet: 172.20.1.0/24 Remote subnet: 172.20.2.0/24 Remote gateway: 2.2.2.2 Phase 1 Negotiation mode: agressive My identifier: My IP adress Encryption algorithm: 3DES Hash algorithm: SHA1 DH key group: 2 Authentication method: Pre-shared key Pre-Shared Key: secret Phase 2 Protocol: ESP Encryption algorithms: Rijndael (AES) Hash algorithms: SHA1 PFS key group: 2   Centos ipsec config ------------------- /etc/sysconfig/network-scripts/ifcfg-ipsec0 TYPE=IPSEC ...