O'Reilly logo

Voice over IP Security by Patrick Park

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Protection with Session Border Controller

This chapter covers the methodology of protection with a Session Border Controller (SBC). The main subjects are as follows:

There is no single solution to secure a VoIP service network entirely. The best practice is to integrate all possible solutions according to service model, network architecture, protocol model, target customers, peering partners, and so on.

Chapter 7, “Protection with VoIP Protocol,” demonstrated the methods of how to protect VoIP service with VoIP protocols. This chapter will demonstrate additional methods of protection with a major security device, Session Border Controller (SBC).

An SBC ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required