BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
While Session Initiation Protocol (SIP) trunking can benefit your IP telephony network in multiple ways, it does present significant security concerns. Not only does SIP trunking leave your network susceptible to all the vulnerabilities of time-division multiplexing (TDM) trunking, including toll fraud, but it also opens the door to IP-level threats, like denial of service attacks, which are much more difficult to launch against TDM trunks. But that doesn't mean that securing SIP trunking is beyond your reach; it just means that you have more potential problems to consider and, as a result, more safeguards to implement.
In this excerpt of a chapter from SIP Trunking: Migrating from TDM to IP for Business to Business Communications, authors Christina Hattingh, Darryl Sladden and ATM Zakaria Swapan lay out a multi-tiered approach to securing SIP trunks aimed at preventing all possible attacks against your network. You'll learn how to determine your SIP trunk's level of exposure, how limiting the number of devices that can contact your network can augment SIP trunk security, how to control session privacy, and much more.
Download the PDF of this SIP trunk security chapter excerpt from the book SIP Trunking: Migrating from TDM to IP for Business to Business Communications here.
Reproduced from the book SIP Trunking: Migrating from TDM to IP for Business to Business Communications by authors Christina Hattingh, Darryl Sladden and ATM Zakaria Swapan (ISBN-10: 1-58705-944-4; ISBN-13: 978-1-58705-944-5). Copyright 2010, Cisco Press. All rights reserved. For more information about this and other similar titles, visit Cisco Press.
About the book:
While many large enterprises have made the transition to IP telephony, and service providers have largely converted backbone networks to VoIP transport, one key missing link remains -- most businesses still connect to service providers through inflexible TDM trunks. In SIP Trunking: Migrating from TDM to IP for Business to Business Communications, authors and Cisco experts Christina Hattingh, Darryl Sladden and ATM Zakaria Swapan show how to use SIP trunking to eliminate legacy interconnects and gain the full benefits of end-to-end VoIP.
Targeted at enterprise decision-makers, network architects, consultants and service providers, the book aims to demystify SIP trunking technology and trends. The authors clarify the often murky transition from TDM to SIP interconnects, separating myth from reality through a series of detailed examinations, instructions and models. The end result is what Cisco calls "the first complete guide to planning, evaluating and implementing SIP trunking solutions."
Read SIP Trunking: Migrating from TDM to IP for Business to Business Communications to learn more about:
- The advanced unified communications solutions that SIP trunking facilitates.
- The systematic planning that goes into preparing your network for SIP trunking.
- How to generate effective requests for proposals (RFPs) for SIP trunking.
- Asking service providers the right questions about implementing SIP trunking, and making sense of their answers.
- Comparing SIP deployment models and assessing their tradeoffs.
- Addressing key network design issues, including SIP trunk security, call admission control and call flows.
- Managing SIP/TDM interworking throughout the transition.