Re: [fw-wiz] Firewall requirements for VoIP applications

Agreed. I would like to dig little deeper; which aspect of security? What are speciffic threats? What makes VoIP protocol characteristics ideal for these vulnerabilities? What solutions have folks discussed so far?

ArkanoiD <ark@xxxxxxxxx> wrote:
What about security? Firewall is not a bandwidth management device, but it may
enforce some protocol-level restrictions, which are worth implementing?

On Fri, Aug 18, 2006 at 09:58:46AM +0500, sai wrote:
On 8/14/06, Shahin Ansari wrote:

Any one has any favorite docos that explains potential shortcoming of
popular firewalls out there for VoIP applications? Especially proprietary
ones? I do not see why you can not use modular policy framework to address
these requirements.

voip works well only if it has bandwidth. most commercial firewalls do
not have bandwidth management features.

firewall-wizards mailing list
firewall-wizards mailing list

Talk is cheap. Use Yahoo! Messenger to make PC-to-Phone calls. Great rates starting at 1¢/min._______________________________________________
firewall-wizards mailing list

Relevant Pages

  • RE: Converged Network Assessment - VoIP Security
    ... VoIP Conference 2006 participants requirements: ... CPD Network Security Technologies ... Converged Network Assessment - VoIP Security ... convergence is going to have a lot to do with integrating VoIP ...
  • Risks Digest 24.32
    ... Report on security risks of applying CALEA to VoIP ...
  • SQL Voice Over IP Exposed!
    ... VOIP can Lower telecom costs and help with network ... consolidation -- and cause security problems if not handled right. ... "The idiosyncrasies of voice data may strain your security system to ...
    ... There's no question that VoIP Security is a BIG issue. ... vulnerability management needs. ... Download FREE whitepaper on how a managed service can help you: ...
  • RE: Question on VoIP security
    ... > I am currently facing an Intranet VoIP project (will be restricted to ... > 1 organization's Intranet, geographically disperse), from the security ... network, but treat the security side of it as you would any data port. ... just got a little easier as the phones are all going to have the same ...