// voice & telephony · advanced

Session Border Controllers (SBCs) Explained

12 min read · Updated May 2026 · By TechDirectory Editorial Team
In a nutshell: A Session Border Controller is the SIP equivalent of a firewall — but it understands voice. It sits at the boundary between two SIP networks (typically your PBX and your carrier's SIP trunk, or Teams Direct Routing and a carrier), and handles security, interoperability, transcoding, topology hiding and call admission control. Almost every modern SIP voice deployment has one. Skipping it is a security and reliability mistake.

What is an SBC?

An SBC (Session Border Controller) is a specialised piece of equipment — hardware appliance, virtual machine, or cloud service — that sits at the boundary between two real-time communications networks and controls the traffic that crosses that boundary. "Session" refers to a SIP session (a call); "border" is the network boundary; "controller" because it doesn't just forward packets — it actively inspects, modifies and decides what to do with each one.

The closest analogy in the data world is a next-generation firewall: a deep-inspection device at a trust boundary that knows the application protocol well enough to enforce policy on it. An SBC is that, for SIP and RTP.

Where the SBC sits

Three common deployment positions:

Functionally all three do the same things; the differences are in scale, who runs them, and exactly which features are emphasised.

The seven jobs of an SBC

  1. Security — block attacks, enforce authentication, drop malformed SIP.
  2. Interoperability — normalise SIP differences between the PBX and the carrier.
  3. Transcoding — convert between voice codecs when each side speaks a different one.
  4. Topology hiding — prevent your internal addresses leaking outward.
  5. NAT / firewall traversal — get SIP and RTP working across address translation reliably.
  6. Call admission control & QoS — enforce concurrent-call limits and protect quality.
  7. Recording, monitoring, lawful intercept — give you a controlled tap point.

Detail on each below.

Security: signalling & media

SIP networks face two distinct kinds of attack:

The SBC also enforces:

Because the SBC fully terminates SIP and RTP at the boundary, the internal PBX never directly faces the public internet. That's a major attack-surface reduction even before any specific rules are configured.

Interoperability & SIP normalisation

SIP is a standard, but every vendor implements its own dialect. Differences include:

The SBC's SIP normalisation capability rewrites headers, re-orders codec lists, translates DTMF formats, and generally massages the conversation so the carrier sees something it likes and the PBX sees something it likes — even when those are different. Without an SBC, the answer to "this feature works against carrier A but not carrier B" is usually a custom PBX patch. With an SBC, it's a config change in the normalisation rules.

Transcoding

If your PBX wants to talk Opus or G.722 (HD voice) but your SIP trunk only supports G.711, someone has to convert in real time. The SBC can transcode codecs end-to-end — at a CPU cost, so transcoding capacity is often licensed separately and a number to size carefully.

You generally want to avoid transcoding when you can — it adds delay and a small quality penalty. The SBC's "passthrough" mode lets the same codec flow end-to-end whenever both sides agree, which is the default for most modern deployments.

Topology hiding & NAT

SIP messages carry a lot of network detail — your PBX's IP, the codecs it offers, sometimes user agent strings that identify the exact PBX vendor and version. A carrier or attacker on the other side of the trunk can fingerprint your environment from these.

The SBC rewrites SIP messages so the only address visible outside your network is the SBC's. Combined with NAT traversal — fixing up SDP addresses so RTP flows to and from public IPs even when endpoints sit behind NAT — this gives you a clean boundary regardless of internal topology.

Call admission control & QoS

The SBC enforces hard limits on:

It also marks egress traffic with QoS markings (DSCP EF for voice, AF for video) so downstream network equipment can prioritise it on congested links. Some SBCs do active media monitoring (MOS scoring) so you can spot quality issues before users complain.

Hardware, virtual, and cloud SBCs

Vendors & reference deployments

Major SBC vendors active in Singapore:

In practice the choice is usually driven by what your PBX or UC platform integrates best with, what your carrier requires, and what your integrator already supports.

Do I really need an SBC?

Five tests. If you answer "yes" to any one of these, you need an SBC.

The "I don't need one because my deployment is small" argument is the most common reason small voice deployments get hit by toll fraud. The boxes are cheap; the bills aren't.

Where to go next

Browse SIP & SBC specialists in Singapore

Looking for help scoping or operating an SBC?

Browse Telecom Providers →