Configuring Check Point NGX VPN-1/FireWall-1

Chapter 16: Enabling Voice-over-IP Traffic

Introduction

The purpose of this chapter is to show, first, the reason why VoIP should be secured and, second, how it is done. The biggest flaw in VoIP is that people get the wrong information about what it is and how it works. When reading books or papers on the Internet, you will see that many different people and organizations have their own opinions on how to secure VoIP. Most people don t think about VoIP in the right way and cite the following reasons for thinking that VoIP is secure with some standard methods:

  • I have spent a good deal of capital on new routers, and all the access lists work on them.

  • We do have firewalls up in our network.

  • The phones are going to be on our internal network only.

  • Our engineer has installed QoS on our network.

As you can see by these reasons, most people do not have a full understanding of why and how to secure VoIP traffic on a network. In this chapter we will explain why and how Check Point secures VoIP traffic.

Why Secure VoIP?

The first question most people ask when you broach the subject of security with regards to VoIP is well, they are just phones; why do they need to be secured? VoIP is just another set of protocols, like many others that are used on networks today, and so they need to be secured. If they are not secured from each other, they at least need to be...

UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Category: VoIP Software
Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.