VoIP and SIP Trunking - The Security Issues

For those of you looking to replace PSTN connectivity, so you can take full advantage of VoIP, giving you much cheaper local, toll-free, domestic and international long-distance services, then SIP trunking can help you save money. That’s why it’s increasingly popular.

SIP trunks eliminate costly time-division multiplexing trunks and gateways, allowing calls to be routed over the carrier’s backbone and use the same IP connection for all communications.

But the caveat is that it needs to be secured. With most VoIP systems, the PSTN serves as a barrier between a company and the outside world, minimising the risk of attack from the Internet. If SIP trunking replaces the PSTN, then that barrier is removed and your phone system becomes vulnerable to IP-based attacks through the SIP trunk.

Security issues around SIP trunking include whether or not you have the same security requirements and security policies as your provider; what changes might have to be made to the firewall, NAT device, IP PBX, private IP addresses, numbering plan and other components; and how you will maintain user/caller ID privacy.

You wouldn’t contemplate connecting your data network to the Internet just relying on the router for security. Everyone has a firewall for good reason. Similarly, protecting your SIP connection is crucial.

To ensure security, you need to deploy a real-time security solution which provides comprehensive threat protection, strict policy enforcement, robust access control, and privacy.

Some data firewall suppliers have now extended their solutions to meet some of the security requirements for connectivity. However, as in all things to do with security, it is sometimes better to deploy specialist solutions for specialised requirements.

Companies like Sipera are now providing solutions which specifically address UC security issues, including SIP trunking. Sipera’s UC-Sec appliance solution, for example, serves as the demarcation point for the client’s VoIP and UC network, enforcing fine-grained security policies.

It protects against SIP and RTP threats, by blocking them at the enterprise perimeter. It maintains the privacy of the internal network, caller/user IDs, and communications, as well as performing firewall/NAT traversal to simplify the deployment of SIP trunks.

Posted on May 16, 2011  Reviews | Share |  Digg
Filed in:  | 
All comments require the approval of the site owner before being displayed.

Post a Comment

Please use a valid e-mail address. Your address will not be publicly visible and is only a means for us to contact you when asked. Thank you.

(will show your gravatar icon)
Home page

Comment (Some html is allowed: )  

Enter the code shown (prevents robots):

  All brand, company, and product names are trademarks or registered trademarks of their
  respective owners. © 2012 VoIP Monitor. All rights reserved. Privacy Policy  Terms