Chapter 16. Enabling Voice-over-IP Traffic

Solutions in this chapter:

Introduction

The purpose of this chapter is to show, first, the reason why VoIP should be secured and, second, how it is done. The biggest flaw in VoIP is that people get the wrong information about ...

Get Configuring Check Point NGX VPN-1/Firewall-1 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.