Establish a complete security plan as a VoIP service

Source: Internet
Author: User

From the security point of view, VoIP is ineffective, and it has both network and voice network weaknesses. However, the security challenges faced by VoIP are not unsolvable. All we need is a complete security plan.

Step 1: three major security threats of VoIP are authentication failure, integrity failure, and privacy protection failure. When implementing VoIP, consider these three threats at each network layer.

Step 2: Start from the physical layer. Ensure that the constructed LAN has integrity. Do you want to consider whether hackers will intrude into the system and initiate DoS attacks? Do I need to run VoIP on a separate security network? Most VoIP devices do not support 802.1x authentication standards, but they can still ensure the security of media access-although this is very troublesome to manage. If you want to use 802.11 for VoIP, you must require wireless equipment vendors to ensure QoS and roaming security.

Step 3: Let's talk about the IP layer. Services such as DHCP and DNS are crucial for VoIP networks. Have their reliability and security been taken into account? If you need to access VoIP over the internet, you also need a VPN tunnel. IPSec and ssl vpn vendors are enhancing their support for VoIP Security.

In step 2, 3, and 4, you also need to handle the problem of eavesdropping. Most enterprise LAN VoIP is not encrypted. That is to say, some people can intercept the call content of every phone in the enterprise network at the same time. Therefore, you need to determine where the eavesdropping device may be installed, and then ensure the security of these points; or install your own anti-eavesdropping device. Tip: pay special attention to the points for installing the IDS system.

Step 4: The Session Layer is responsible for all authentication tasks. Therefore, it is best to register every phone number connected to the VoIP network.

Step 5: The application layer is difficult to process. Most of the content of the VoIP network is on the phone, and it is difficult for the phone to strengthen its security. Therefore, there must be a plan for phone calls to expire, and it must be updated in a timely manner.

Generally, VoIP servers run general operating systems, such as Windows or Unix. Therefore, it should be noted that there will always be a tension between the VoIP application vendor and the operating system vendor, the former does not want others to touch the system they have carefully debugged, the latter will continuously release patches. If unprotected VoIP packets are mistakenly connected to the Internet, it will not only pose a huge risk, but also require constant upgrades of the Enterprise Firewall, therefore, Firewall vendors may require you to provide the source code of the VoIP application system. This cannot be ignored, so we can weigh the advantages and disadvantages.

There are many factors to consider about the security of VoIP. It can be said that every company's VoIP will inevitably encounter security problems, so we suggest you let it crash now, and then find out the weakness, to protect its security.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.