Chapter 8

Approaches to VoIP security


Approaches vary in how to address VoIP security. One can model the security planning process and incorporate it into the data security plan. Recall that voice is data and data is too. The main gist is to use whatever makes sense. This might include updating firewalls and NAT devices to be VoIP aware. Install SBCs; using different VLANs for voice and data may help. But one thing is prevalent and was stated earlier: “there is no Holy Grail out there.” This means that there is no one-stop shopping solution that will work for every organization. Therefore, to secure the VoIP network, layered approaches need to be taken. Include physical security with the logical security on the network to add to ...

Get Securing VoIP now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.