Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

IP Telephony/Data Network Integration

Posted on 2014-11-10
3
Medium Priority
?
173 Views
Last Modified: 2014-11-10
Hello Experts,

I have a project for a very small (2 Win 7 computers, 1 network printer and 2 IP phones with 3 lines) to design and build.

The computers will share a small fraction of data locally. The majority of the data will be processed, saved and backed up on a proprietary file management software on an internet server located off site.

Can I use 1 firewall to manage traffic of both voip and data without any problems?

Do I need to use 2 CAT6 cables to physically separate voice and data traffic, or employ 2 vans and only one wire?

Comcast is the Internet service provider.

Thank you in advance,

netsyssol
0
Comment
Question by:Netsyssol
  • 2
3 Comments
 
LVL 12

Accepted Solution

by:
Giant2 earned 2000 total points
ID: 40433144
2 Win7 PC
VOIP
Cloud
2 IP Phone
Using CAT6 cable is the right choice.
I suggest to be confident that Comcast give you a real DSL (upload/download speed).
One firewall could be able to manage both kind of traffic.
By me, 2 vans could be better than 2 wires.

Remember to limit the data speed, because voip must be able to use more bandwidth than data.

Good job!
0
 

Author Comment

by:Netsyssol
ID: 40433369
Thank you for the quick response Giant2.

The sales representative at Comcast gave me the wrong config of how Comcast is to provide phone service to the customer.

It is not a VOIP connection, rather an analog/digital modem. So voip traffic will not exist inside of the building. So, no need of a firewall to secure phones.

You answered my question and gave me great advice.

I am rewarding you the 500 points. Thank you. Netsyssol
0
 

Author Closing Comment

by:Netsyssol
ID: 40433373
Quick and accurate response. Thanks Giant2
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
In this article, we’ll look at how to deploy ProxySQL.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question