Print Download PDF Send Feedback

Previous

Next

Securing Voice Over IP

In This Section:

Introduction to Check Point Secure VoIP

VoIP and the Security Gateway

Introduction to Check Point Secure VoIP

Check Point's R80.20 secures your VoIP environment. Check Point Security Gateways secure VoIP traffic in SIP, H.323, MGCP, and SCCP environments. VoIP calls involve complex protocols, each of which can carry potentially threatening information through many ports.

The Check Point Security Gateways confirm that the caller and receiver addresses are located where they are supposed to be, and that the caller and receiver are allowed to make and receive VoIP calls. The Gateways examine the contents of the packets and confirm that they carry only allowed information. Full stateful inspection on SIP, H.323, MGCP, and SCCP commands ensure that all VoIP packets are structurally valid, and that they arrive in a valid sequence.

This guide explains how to configure the Check Point Security Gateway when VoIP passes through it.

You can deploy VoIP over these protocols:

VoIP and the Security Gateway

This image is an overview of the VoIP protocols that Check Point supports.