Skip to Content
Switching to VoIP
book

Switching to VoIP

by Theodore Wallingford
June 2005
Intermediate to advanced
502 pages
21h 48m
English
O'Reilly Media, Inc.
Content preview from Switching to VoIP
This is the Title of the Book, eMatter Edition
Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.
220
Chapter 10
CHAPTER 10
Security and Monitoring
Like the Web, email, and other Internet communications tools, IP telephony can be
secured. This fact is one of its biggest appeals over old-school telephone equipment.
Security means enforcing system policy, recording instances of abuse for forensic and
litigation purposes, encrypting or otherwise hiding sensitive information in transit,
bolstering call-management systems’ resilience to exploitive attacks and computer
viruses, and securing the access perimeter of the VoIP network.
Security tools and enforcement practices for VoIP applications are the same, essen-
tially, as those for other IP-based apps, because they run on the same network. The
security objective of VoIP systems is largely the same as those of other IP-based sys-
tems: in a nutshell, preserve the operational status of the system.
There are many threats to this objective and many countermeasures to the threats.
Policy enforcements points, like firewalls, protect lower layers of the network, while
authentication systems like RADIUS and application proxies provide higher-layer
security. This chapter describes how to secure and harden a VoIP server, the basics
of DMZs, how to enable logging of VoIP traffic with iptables, how to tweak the log-
ging configuration of Asterisk, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Voice over IP First-Step

Voice over IP First-Step

Kevin Wallace
Securing VoIP

Securing VoIP

Regis Jr (Bud) Bates
Low-cost Smart Antennas

Low-cost Smart Antennas

Qi Luo, Steven Shichang Gao, Chao Gu, Wei Liu

Publisher Resources

ISBN: 0596008686Catalog PageErrata