VIRTUAL PRIVATE NETWORKS (VPNs) AND ENCRYPTION. In this chapter, the discussion will cover the use of VPN and encryption techniques as possible means for securing VoIP.
Attempting to use any security method has its drawbacks such as the added overhead of handling the data transfer.
Remember that voice is data and data is too! So when voice is tunneled inside a VPN, there is a price to pay, that being less data and more overhead.
Additionally, when using a tunnel, the normal procedure is to use a form of encryption.
Thus, there are several choices available to secure the voice, albeit overhead not- withstanding.
VIRTUAL PRIVATE NETWORKS (VPNs) AND ENCRYPTION
The choices addressed here will include:
• VPNs as one solution
• Typical end-to-end path
• Types of VPNs depending on the layer of the OSI model being implemented
• What a VPN offers
• Dealing with the needs and wants of the users of VoIP
• How much is enough; what are the consequences of a voice packet being dropped or lost?
• The fve types of VPN that might be deployed
This coverage will then lead to a discussion on encryption, including the options of encryption technologies. Further, it will also discuss what the data scrambling brings to the overall performance and where it is used today.
In addition, this chapter will address the use of public key infrastructure from an overview basis along with
the use of 802.1X protocols to provide security on the network.
Finally, it will ad – dress use of IP Security (IPSec) as a means of securing the VoIP calls as they traverse the LAN and WAN.