Step-by-Step Guide

VoIP protocols revealed

Most VoIP hardware uses one of two standard protocols, H.323 or Session

    Requires Free Membership to View

Initiation Protocol (SIP), to register themselves and initiate calls. This tip examines these two protocols which systems integrators and other channel professionals may use to create more secure VoIP networks for their customers.

 

VoIP Protocols: A technical guide

Like all new technologies, VoIP implementations require careful design, testing and analysis to identify and eliminate security vulnerabilities, and reduce the risk of compromise. Here we will review the two main protocols that power VoIP -- Session Initiation Protocol (SIP) and H.323 -- and their known vulnerabilities, as well as how functional protocol testing ("fuzzing") can help defeat such problems.

Learn more about the two main VoIP protocols and their strengths and weaknesses.

Get more information on VoIP protocols and their security vulnerabilities.

For a full glossary of voice terminology, view this list of VoIP protocols.

This was first published in June 2007

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: