Enabling Voice-over-IP Traffic

The purpose of this chapter is to show, first, the reason why VoIP should be secured and, second, how it is done. The biggest flaw in VoIP is that people get the wrong information about what it is and how it works. When reading books or papers on the Internet, you will see that many different people and organizations have their own opinions on how to secure VoIP. Most people don't think about VoIP in the right way and cite the following reasons for thinking that VoIP is secure with some standard methods: • I have spent a good deal of capital on new routers, and all the access lists work on them.