Solved

Security & VOIP

Posted on 2003-11-30
4
556 Views
Last Modified: 2010-04-11
Have to give a presentation on some of the choices for VOIP protocols that we may begin to use. I was wondering what your thoughts were concerning VOIP protocol security issues. I need some specifics however and it would help if you were actually working in the VOIP area and understand how VOIP works. Need this on the quick.
0
Comment
Question by:netmando
  • 2
4 Comments
 
LVL 18

Expert Comment

by:chicagoan
Comment Utility
0
 
LVL 9

Accepted Solution

by:
TooKoolKris earned 300 total points
Comment Utility
Well we are currently trying to come up with a VOIP solution ourselves for terminating multiple concurrent connections and then routing them into other LANs. Security for what we are doing is of some concern but not a lot due to the fact that we work with public data anyway. However I did do a little research in the area previously and from what I remember you really only have about 3 protocols to consider. H.323, SIP and MGCP. I would imagine you are either using H.323 or SIP as they are more popular. I would recommend H.323 to you if are more concerned with security, as it is the more comprehensive protocol. I’m pretty sure that H.323 can support authentication via IPSEC as well as provide for encryption. IMO you need to have a good level of encryption with your VOIP traffic because it’s protocols are easy to distinguish and therefore easily sniffed out by interceptors who can then reassemble the packets and sort of “tap the line” so to speak. Here are some links to some decent papers on the subject.

SANS Reading Room
 http://www.sans.org/rr/catindex.php?cat_id=64

Managing VOIP Solutions
http://www.concord.com/forms/createform.asp?formnum=508

Good VOIP Web Site
http://www.voiptimes.com/index.html

Have Fun
0
 

Author Comment

by:netmando
Comment Utility
Thanks TooKool, this is what I was looking for, good links and thanks for the quick reply.
0
 
LVL 9

Expert Comment

by:TooKoolKris
Comment Utility
You're welcome
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now