This chapter covers the methodology of protection with a Session Border Controller (SBC). The main subjects are as follows:
There is no single solution to secure a VoIP service network entirely. The best practice is to integrate all possible solutions according to service model, network architecture, protocol model, target customers, peering partners, and so on.
Chapter 7, “Protection with VoIP Protocol,” demonstrated the methods of how to protect VoIP service with VoIP protocols. This chapter will demonstrate additional methods of protection with a major security device, Session Border Controller (SBC).
An SBC ...