Chapter 16. Enabling Voice-over-IP Traffic

Solutions in this chapter:

Introduction

The purpose of this chapter is to show, first, the reason why VoIP should be secured and, second, how it is done. The biggest flaw in VoIP is that people get the wrong information about ...

Get Configuring Check Point NGX VPN-1/Firewall-1 now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.