What encryption algorithm is currently used for VoIP? Also, is authentication essential for VoIP and how can we prove the authentication?
The encryption algorithm varies vendor to vendor and will also vary based on how your network is configured (for instance, are you adding VPN connections into the mix?). Authentication allows you to register your users and equipment on the network. It is highly recommended that you provide some type of authentication, in particular for remote users. If a user does not authenticate, then you can deny access.
Dig Deeper on Unified Communications Resources
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.