Solved

Security & VOIP

Posted on 2003-11-30
4
560 Views
Last Modified: 2010-04-11
Have to give a presentation on some of the choices for VOIP protocols that we may begin to use. I was wondering what your thoughts were concerning VOIP protocol security issues. I need some specifics however and it would help if you were actually working in the VOIP area and understand how VOIP works. Need this on the quick.
0
Comment
Question by:netmando
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 18

Expert Comment

by:chicagoan
ID: 9845927
0
 
LVL 9

Accepted Solution

by:
TooKoolKris earned 300 total points
ID: 9846010
Well we are currently trying to come up with a VOIP solution ourselves for terminating multiple concurrent connections and then routing them into other LANs. Security for what we are doing is of some concern but not a lot due to the fact that we work with public data anyway. However I did do a little research in the area previously and from what I remember you really only have about 3 protocols to consider. H.323, SIP and MGCP. I would imagine you are either using H.323 or SIP as they are more popular. I would recommend H.323 to you if are more concerned with security, as it is the more comprehensive protocol. I’m pretty sure that H.323 can support authentication via IPSEC as well as provide for encryption. IMO you need to have a good level of encryption with your VOIP traffic because it’s protocols are easy to distinguish and therefore easily sniffed out by interceptors who can then reassemble the packets and sort of “tap the line” so to speak. Here are some links to some decent papers on the subject.

SANS Reading Room
 http://www.sans.org/rr/catindex.php?cat_id=64

Managing VOIP Solutions
http://www.concord.com/forms/createform.asp?formnum=508

Good VOIP Web Site
http://www.voiptimes.com/index.html

Have Fun
0
 

Author Comment

by:netmando
ID: 9846159
Thanks TooKool, this is what I was looking for, good links and thanks for the quick reply.
0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 9846730
You're welcome
0

Featured Post

SuperAntiSpyware Licenses Discounted by 25% !

Exclusive offer to Experts Exchange Members!
Buy SuperAntiSpyware License(s) from us and save 25% on the regular purchase price.
- Includes Full SuperAntiSpyware Vendor Support Entitlements
- Your Subscription does not begin until you activate your license
- Buy for your friends

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question