Abstract

Professional, secure Voice over Internet Protocol (VoIP) networks are managed, secured, and operated by experienced professionals as organizations have migrated most of their key information and business resources to the Internet. This chapter summarizes some recommendations for securing VoIP network. Strong passwords should be used. Existing security policies, practices, and procedures to reflect the new requirements of converged networks should be updated. A security policy provides the framework, justification, and metrics for all other security-related development. Private network traffic and network periphery should be filtered. Monitor tools that protect against AILP spoofing attacks should be installed. All PC-based phones should be placed behind a firewall or Access control lists (ACL) to mediate VoIP traffic. Approval prior to the use of any IP smart phone agent software must authorized. The network time protocol (NTP port 123) should be blocked at the security perimeter. Local network time protocol (NTP) clients should receive clock information from a local Stratum 2, 3, or 4 clock sources. No VoIP systems IP phones, smart phones, VoIP-related server hardware and software, or networks will be put into operation without certification that they have complied in every manner with the aforementioned recommendations.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call