Q
Problem solve Get help with specific problems with your technologies, process and projects.

Why is VoIP authentication essential?

VoIP authentication advice.

What encryption algorithm is currently used for VoIP? Also, is authentication essential for VoIP and how can we prove the authentication?

The encryption algorithm varies vendor to vendor and will also vary based on how your network is configured (for instance, are you adding VPN connections into the mix?). Authentication allows you to register your users and equipment on the network. It is highly recommended that you provide some type of authentication, in particular for remote users. If a user does not authenticate, then you can deny access.

This was last published in March 2007

Dig Deeper on Unified Communications Resources

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchNetworking

SearchITChannel

Close