Chapter 9. Protection with Enterprise Network Devices
This chapter covers the methodology of protection with the following network devices in enterprise VoIP networks:
Most network devices in an enterprise VoIP network have their own security features. Some devices (for example, a firewall) have strong capability with sophisticated features, and some devices (for example, an IP phone) have very limited capability.
As mentioned in previous chapters, there is no magic bullet—a single device or architecture that can protect the whole VoIP service network securely. The best practice ...