Before you start to install VoIP for your organization or enterprise, you must be familiar with the following five terms: 1. Receptacle Address Translation (NAT) you must ensure that your network and security systems, including firewalls, IDS, VPNs, and so on, can support calling methods and VoIP's requirements for network security. The traditional static scheme is basically unable to meet the requirements of VoIP line control. Protocols under VoIP include the automatic allocation of ports when a call is installed and the need to open and close the secure channel ports as needed. The VoIP access check is also not limited to the network layer, but also to the application level to handle issues related to VoIP protocols in the context of receptacle address translation (NAT). Finally, the bandwidth, response speed and service quality are the important indexes of network security facilities when running multiple call lines simultaneously. 2. IP PBX General security risks are at a very basic level of control, which makes the system for some services refused even buffer overflow attacks are powerless. Because your IP PBX is a core part of your VoIP infrastructure, be sure to keep your IP PBX's basic operating system and network devices up to speed on a regular basis, patching to protect against recent security concerns. Review and evaluate your VoIP devices on a regular basis to find out where to locate and fix the vulnerabilities found to avoid system loss and attack. 3. VoIP calls should be constantly wary of remote devices entering the personal VoIP system, excluding all backdoor. VoIP telephony, as a terminal, is the most widely used part of VoIP infrastructure. False landings and password-management attacks are a common form of attack on this device. Log off all remote settings with security implications, such as FTP and Telnet, and internal management settings with security implications. 4. IPSec when your VoIP path is passing through a security-hidden channel, such as the Internet, use cryptography such as IPSec channels to keep VoIP access secure. Although many VoIP protocols now contain settings for passwords and validations, most of these are optional. It is important to emphasize that the establishment of secure channels is essential for the delivery of VoIP information between sites. 5. VLAN structure your network and balance VLAN to separate the digital and voice information access, although this from the network security perspective is very small, but the use of VoIP devices on separate VLAN, can ensure that voice and signal access is effectively separated, but also to better use of quality of Service (QoS) features. (Editor: ZHAOHB) to force (0 votes) (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title of the party (0 Votes) passed (0 votes) in the original: Before the installation of VoIP must know five terms return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.