This chapter covers the methodology of protection with a Session Border Controller (SBC). The main subjects are as follows:

•  Network border issues

•  Access and peer SBCs

•  SBC functionality

•  Service architecture design

CHAPTER 8Protection with Session Border Controller

There is no single solution to secure a VoIP service network entirely. The best practice is to integrate all possible solutions according to service model, network architecture, protocol model, target customers, peering partners, and so on.

Chapter 7, “Protection with VoIP Protocol,” demonstrated the methods of how to protect VoIP service with VoIP protocols. This chapter will demonstrate additional methods of protection with a major security device, Session Border Controller ...

Get Voice over IP Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.