O'Reilly logo

How to Cheat at VoIP Security by Michael Gough, CISSP Thomas Porter CCNP, CCDA, CCS

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Support Protocols

Solutions in this chapter:

Introduction

Protocols such as MGCP and SIP, or protocol umbrella groups like H.323, are usually the first things that come to mind when discussing VoIP technology. Although they are all great protocols in their own right, they depend on, and interoperate heavily with, support protocols. Many of the support protocols that are used by VoIP architectures enable services and features required for proper network operation.

This chapter will cover several of the support protocols typically found in VoIP environments and some of the security implications that they bring with them. This chapter is not intended to be an all-inclusive tutorial on these protocols. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required