Applications Protocol Paper-VoIP security
NTC/406
Explains how the application layer manages distributed applications and their protocols Here in Afghanistan we use Voice over Internet Protocol (VoIP) for our NIPR, SIPR and CENTRIX voice capabilities. We utilize the Cisco MCS 7835 Media Convergence Server which allows for any user with internet access to create and receive calls of varies types.Because of this method of communications, it too is also targeted for attacks by unauthorized access, sniffing, and data capturing techniques. To reduce the exposure of this transmission, policies and protocol should be implemented. VoIP is a protocol with the means of communication that originates from local area network domain and provides the essential functions for audio and visual of live streaming transmission. To ensure reliability and security of these connections, information technology personal will need to address the known issues related to this domain. The Local Area Network is one of seven domains situated within the network and provides the crucial link to interior and exterior connections for accessing information. To address these security issues, we must first consider the known threat, risk, and vulnerabilities associated with this domain and connection type.
Voice over internet protocol transfers packets over the network by utilizing the Public Branch Exchange (PBX) and Public Switch Telephone Network or PSTN. This function uses the H.323 suit of protocols, the session initiation protocol, and simplifies this connection using the virtual tie line. Yet, all these functions occur within the local area domain which is the essential functioning security aspect. The reason for this is ensure that this domain itself is secure; there are a few implementations that need to be addresses. Our Cisco firewall, ASR 1006