Ir al contenido

Minerva Hosting - Soluciones de telefonía

Foros
Entrar...

Google




Boletín de novedades

Apúntate si quieres ser el primero en enterarte de las novedades


 

Security (Suscribirme)

Enlaces

> >|

A Guide to Securing Broadband Cable Networks: DOCSIS Security

http://www.recursosvoip.com/docs/english/docsis.pdf

Fuente: TechGuide
Formato: PDF

In the near future, cable networks will carry low-latency voice and video signals with quality rivaling or surpassing that of the Public Switched Telephone Network (PSTN). Along with the need for quality-of-service (QoS) assurance, voice- and video-over-IP services must also be protected from eavesdropping and theft of service. The PacketCable 1.2 Security Specification provides a framework for securing voice/video transmissions over cable networks. This Technology Guide addresses security in data over cable standards, summarizing the latest technical specifications outlined by CableLabs, a consortium of cable industry vendors and service providers, and introducing the security specifications outlined within DOCSIS.

Comentar Puntuar Guardar en Favoritos

A Guide to Securing Broadband Cable Networks: PacketCable Security

http://www.recursosvoip.com/docs/english/pktcable.pdf

Fuente: TechGuide
Formato: PDF

In the near future, cable networks will carry low-latency voice and video signals with quality rivaling or surpassing that of the Public Switched Telephone Network (PSTN). Along with the need for quality-of-service (QoS) assurance, voice- and video-over-IP services must also be protected from eavesdropping and theft of service. The PacketCable 1.2 Security Specification provides a framework for securing voice/video transmissions over cable networks. This Technology Guide outlines the business needs driving the packet cable specification and the latest technical specifications addressing cable network security introduced by CableLabs, an industry consortium of Multiple Systems Operators (MSOs) providing cable services to cable subscribers.

Comentar Puntuar Guardar en Favoritos

Bearer Network Security on 5E-XC OIU-IP

http://www.recursosvoip.com/docs/english/090094038004ad7b_White_paper.pdf

Fuente: Lucent Technologies
Formato: PDF

Service providers can achieve significant capital and operational savings by implementing IP-packet trunking and migrating from circuit to packet services in their networks by installing the Optical Interface Unit (OIU) in the Lucent Technologies 5ESS Switch. This paper reviews the security issues specific to the interface with the bearer network and describes how the various features of the OIU-IP addresses these.

Comentar Puntuar Guardar en Favoritos

Best practices for SIP NAT traversal

http://www.recursosvoip.com/docs/english/NATtraversal-BestPractices.pdf

Fuente: AG Projects
Formato: PDF

Traversing NAT (Network Address Translation) is one of the issues that hinder SIP communications. Some background about the problem: With an ideal Internet, all devices would be able to communicate end to end without any intermediaries except routers. This assumes each device has a routable IP address, a public reachable Internet identity. In reality, today many of the devices connected on the Internet are using a NAT function present in the border router. While this stops the Internet to initiate connections to the device (bad for IP telephony or other forms of peer-to-peer communications), it also protects the users against malicious attacks. Using NAT, one may also connect multiple devices to the Internet by only using one public IP address. So NAT has both advantages and disadvantages.

Why doesn’t SIP work by default behind NAT? The reason is that many of the communication parameters in SIP are transmitted within the SIP message; such parameters include the IP and port numbers used for signaling and media. A SIP device behind NAT does not know much about how it will be seen from the Internet, it only knows its own IP address and the ports where the SIP application runs. Once communication with the Internet starts, the NAT device translates the private IP:port combination of the SIP device connected on the private NAT interface to a temporary mapping of a public IP:port on the interface connected to the Internet.

Comentar Puntuar Guardar en Favoritos

Converged Communications Security

http://www.recursosvoip.com/docs/english/ef-lb2699.pdf

Fuente: Avaya
Formato: PDF

With the increasing deployment of IP telephony systems, attacks against IT systems that threaten business operations and the privacy of corporate and personal data no longer have an impact only on the data world. Coverage of security issues tends to focus on the type of attack and the estimated loss - be it immediate financial damage, negative impact on a company's reputation or loss of customer confidence. To protect against the threats, Avaya has devised its Unified Communication Center (UCC) that provides mobile employees with speech access to relevant information on a converged infrastructure using multiple layers of security.

Comentar Puntuar Guardar en Favoritos

Creating Building Blocks For Voice & Video Over IP

http://www.recursosvoip.com/docs/english/01687302600.pdf

Fuente: Polycom
Formato: PDF

In the past, corporate adoption of interactive voice and video technologies over IP has fallen short of analyst expectations. The adoption of this technology has suffered from the complexities of implementing the H.323 standard, no appropriate network infrastructure, conflicting security applications, and limited management platforms for VOIP and video technologies.

This paper summarizes the network infrastructure requirements for voice and video, focusing on issues found most frequently where the public Internet and private IP networks meet. It explores numerous solutions, pointing out their shortcomings and the need for a set of building blocks that address these issues without requiring network reconfiguration or exposing corporate assets to non-secure network conditions.

Comentar Puntuar Guardar en Favoritos

Data Security in a Converged Network

http://www.recursosvoip.com/docs/english/SIcurity_news_release_W1348.pdf

Fuente: Siemens
Formato: PDF

The intent of this paper is to educate you, the reader, on VoIP security issues and dispel fact from myth. The information presented in this document is technical in nature but straightforward and easy to understand. The vulnerabilities in VoIP are clearly identified and illustrated for non-technical individuals. Presenting this information in a public forum, such as this paper, does not jeopardize the security of existing VoIP systems. Most of the information presented here is already known by skilled attackers. This open discussion of vulnerabilities is intended to prompt vendors and the VoIP user community to be more diligent about their security. In the end, sharing this information will allow for a more secure and trusted environment.

Comentar Puntuar Guardar en Favoritos

Defining the requirements for third-generation wireless LAN security from location to application

http://www.recursosvoip.com/docs/english/security_whitepaper.pdf

Fuente: Meru Networks
Formato: PDF

Meru Networks offers the industry's most comprehensive multi-layer security, protecting the WLAN from physical location to application and content. Meru meets the enterprise's demands for strong wireless security without adding significant administrative burden or user training, without compromising on connectivity, and without having IT having to tradeoff security with service reliability or the types of applications that can be run over the WLAN.

Comentar Puntuar Guardar en Favoritos

Delivering Secure IP-Based Services: Jasomi Uses Intel Technology and AdvancedTCA for Its High-End C

http://www.recursosvoip.com/docs/english/9668sw.pdf

Fuente: Intel
Formato: PDF

Originally developed to provide security and access services in Voice over IP (VoIP) networks, the role of the session border controller has grown as service providers accelerate their delivery of IP-based services. A leading developer of session border controllers based on Intel technology, Jasomi Networks has continued to advance the state-of-the-art technology used in its PeerPoint products by using the AdvancedTCA form factor, programmable Intel network processors, and Intel NetStructure boards.

Comentar Puntuar Guardar en Favoritos

Deploying Cisco Secure ACS for Windows in a Cisco Aironet Environment

http://www.recursosvoip.com/docs/english/acsae_wp.pdf

Fuente: Cisco Systems
Formato: PDF

Cisco Secure ACS for Windows has long supported the centralization of access control and accounting for dial-up access servers, virtual private networks (VPNs), firewalls, and voice over IP (VoIP) solutions. Starting with Cisco Secure ACS v2.6 for Windows 2000/NT Servers, it supports standards-based IEEE 802.1X authentication of Cisco Aironet 1200, 1100, 350 and 340 Series Access Points.

Comentar Puntuar Guardar en Favoritos

Eliminating Boundaries: Extending VoIP Across Network Boundaries

http://www.recursosvoip.com/docs/english/nn107880-041404.pdf

Fuente: Nortel Networks
Formato: PDF

Voice over IP (VoIP) is here, it's proven, and deployments are expanding. That's where VoIP border control comes into play. These devices supervise the signaling and media streams entering or exiting a VoIP network-and satisfy critical requirements for security, service assurance, interoperability, and IP address translation in directly connecting VoIP networks -- whether carrier-to-carrier, carrier-to-enterprise, or carrier-to-residential users. Download this white paper to find out what direction to take for extending VoIP services beyond your own network.

Comentar Puntuar Guardar en Favoritos

Enhanced Security for IP Communications: Integrated Network Security

http://www.recursosvoip.com/docs/english/ipcom_pl.pdf

Fuente: Cisco Systems
Formato: PDF

This white paper describes how Cisco IP communication systems works. It gives information about security of IP communications that can be implemented with the use of Cisco IP communication systems.

Comentar Puntuar Guardar en Favoritos

Enterprise VoIP Security: Potential Threats and Best Practices

http://www.recursosvoip.com/docs/english/EnterpriseVoIP_WP.pdf

Fuente: Global Knowledge Network
Formato: PDF

This report highlights some of the potential corporate security problems associated with VoIP and addresses what measures can be taken to secure enterprise VoIP deployments.

Comentar Puntuar Guardar en Favoritos

Eyeball Any-Firewall Technology

http://www.recursosvoip.com/docs/english/Any-FirewallWhitePaper.pdf

Fuente: Eyeball Networks
Formato: PDF

VoIP and video telephony are poised for mass adoption. Internet-based voice and video telephony delivers a level of communications, interactivity and productivity not possible with traditional voice-only communications. Connecting subscribers requires a solution that can handle the complexities of firewalls, virtual IP addresses, port masquerading and other secure configurations. Eyeball Networks' exclusive Any-Firewall Technology was designed to address these issues while connecting users reliably and cost-effectively.

Comentar Puntuar Guardar en Favoritos

IP Telephony Security - A Double-Edged Sword?

http://www.recursosvoip.com/docs/english/3Com-503152.pdf

Fuente: 3Com
Formato: PDF

Most of the benefits of IP telephony are due to architecture-enabled transformation of telephony. Such transformation is enabled by implementing telephony and other convergence applications in location independent application servers. These servers can be deployed anywhere on the IP network as long as performance requirements are satisfied and connectivity exists between the servers and their clients (other applications and end-user devices).

Comentar Puntuar Guardar en Favoritos

> >|

Ayúdanos a mejorar este directorio de enlaces. Regístrate para comentar y puntuar enlaces existentes, o para sugerirnos nuevos enlaces. Si lo prefieres puedes enviarnos los datos del enlace y nosotros lo añadimos.




Gráfico pie página

Inicio | escríbenos | mapa | privacidad | webmasters | publicidad

http://www.recursosvoip.com
© Recursos VoIP
Alojados en Minerva Hosting - Obsesionados con la calidad

Gráfico derecho pie página