Chapter 8

Approaches to VoIP security

Abstract

Approaches vary in how to address VoIP security. One can model the security planning process and incorporate it into the data security plan. Recall that voice is data and data is too. The main gist is to use whatever makes sense. This might include updating firewalls and NAT devices to be VoIP aware. Install SBCs; using different VLANs for voice and data may help. But one thing is prevalent and was stated earlier: “there is no Holy Grail out there.” This means that there is no one-stop shopping solution that will work for every organization. Therefore, to secure the VoIP network, layered approaches need to be taken. Include physical security with the logical security on the network to add to ...

Get Securing VoIP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.