Chapter 9. Protection with Enterprise Network Devices

This chapter covers the methodology of protection with the following network devices in enterprise VoIP networks:

Most network devices in an enterprise VoIP network have their own security features. Some devices (for example, a firewall) have strong capability with sophisticated features, and some devices (for example, an IP phone) have very limited capability.

As mentioned in previous chapters, there is no magic bullet—a single device or architecture that can protect the whole VoIP service network securely. The best practice ...

Get Voice over IP Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.