Definition

5 terms you need to know before you employ VoIP

Before beginning a successful VoIP rollout across your organization, you need to be familiar with the following five terms:

1. Network Address Translation

Make sure your network and security infrastructure, including firewalls, IDS, VPNs, etc., are voice-optimized and capable of supporting the advanced security requirements for VoIP. Traditional static policy rules are not adequate for VoIP traffic control. The protocols involved dynamically allocated ports during call setup, requiring opening and closing of ports at the security gateway on demand. Inspection of VoIP traffic not only at the network layer, but also at the application level is necessary to deal with the challenges of VoIP protocols in Network Address Translation (NAT) environments. Finally, bandwidth, latency and quality of service become critical requirements for network and security infrastructure, when processing multiple simultaneous voice streams.

2. IP PBX

Critical security vulnerabilities are being identified on a regular basis, leaving systems vulnerable for denial of service and even more severe buffer overflow attacks. As your IP PBX is at the core of your VoIP infrastructure, ensure that the base operating system of your IP PBX, as well as network infrastructure, are always updated and patched for the latest security vulnerabilities. Regular security assessments of your VoIP infrastructure provide identification and remediation of such security flaws to avoid attacks and prevent outages.

3. VoIP phone

Always properly secure any remote access and configuration capabilities to individual VoIP devices to eliminate any backdoors. VoIP phones as the endpoints are the most common and widest accessible component of a VoIP infrastructure. Default login and administrator passwords on such devices are a very common avenue for attacks. Disable any insecure remote access features, such as FTP and Telnet, and disable local administration and management features.

4. IPsec

If your VoIP traffic goes over unsecured channels, such as the Internet, use encryption technologies like IPsec tunnels to secure the VoIP traffic. While many of the VoIP protocols include capabilities for encryption and authentication, most of them are optional. It is essential to establish secure tunnels for carrying the VoIP information streams (call signaling, call control and media) between sites and over untrusted networks.

5. VLAN

Structure your network and leverage VLANs to separate voice and data devices and traffic. While this may have limited impact on security, deploying VoIP devices on separate VLANs permits isolating data traffic from voice and signaling traffic, as well as utilizing Quality of Service (QoS) capabilities.

By Gerhard Eschelbeck
20 Dec 2004 | SearchSecurity.com
 

This was last updated in May 2007
Posted by: Margaret Rouse

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More News and Tutorials

Do you have something to add to this definition? Let us know.

Send your comments to techterms@whatis.com

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: