A common security policy we make every time we connect a device to a network is the “Trusted or Untrusted Network.” For example, every time you take your laptop into a coffee shop and use their open Wi-Fi connection, you’re prompted to define the network zone to which you are connecting: home, work or public. Depending on what’s selected, the appropriate security settings are enabled.
In the context of VoIP and IP networking, trusted and untrusted zones are defined by where the security control devices are located. Firewalls are typically used as an IP network control point and SBCs are used as VoIP control points.
It is important to place an SBC between trusted and untrusted IP networks to provide security policies and ensure that each network does not have a direct connection. The Internet is the most untrusted IP network, and carrier private WAN IP networks are also outside the security of the enterprise trusted LAN network.
|Download this printable PDF Cheat Sheet for your reference on the powerful capabilities and features of the Session Border Controller.|