O'Reilly logo

Securing VoIP by Regis Jr Bates

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Approaches to VoIP security

Abstract

Approaches vary in how to address VoIP security. One can model the security planning process and incorporate it into the data security plan. Recall that voice is data and data is too. The main gist is to use whatever makes sense. This might include updating firewalls and NAT devices to be VoIP aware. Install SBCs; using different VLANs for voice and data may help. But one thing is prevalent and was stated earlier: “there is no Holy Grail out there.” This means that there is no one-stop shopping solution that will work for every organization. Therefore, to secure the VoIP network, layered approaches need to be taken. Include physical security with the logical security on the network to add to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required