SIP trunk instead of a traditional telephone connection - this is the consistent implementation of the voice-over-IP concept even beyond the boundaries of your own network.
But be careful! Like almost all network elements, VoIP systems must also be protected against attacks from the Internet by suitable measures. A simple password protection is not sufficient here. Leaving out the necessary protective mechanisms can be expensive.
Protect your valuable VoIP infrastructure with professional session border controllers.