Contents

 
 Copyright Notice
 Important Information
 VoIP Administration Guide
Expand Securing Voice Over IP
Collapse VoIP Security Deployments
    Use Case 1: Enterprise Deployment - Perimeter VoIP Gateway
    Use Case 2: Enterprise Deployment - LAN Segmentation
    Use Case 3: Service Provider Deployment
Expand VoIP Technology and Standards
Expand Session Initiated Protocol (SIP)
Expand MGCP-Based VoIP
Expand H.323-Based VoIP
Expand SCCP-Based VoIP
Expand Configuring VoIP for Check Point Security Gateways
 Check Point Kernel Tables
Expand Working with Kernel Parameters on Security Gateway
Expand Kernel Debug on Security Gateway