Voice Over Internet Protocol (VOIP)

VOIP (Voice Over Internet Protocol) technology enables voice calls from a broadband Internet connection from devices like computers, VOIP phones and mobile devices. This differs from a regular analog phone line system. VOIP services convert one’s voice into a digital signal that traverses the Internet. VOIP is also called IP Telephony. 

VOIP software has two main flows: 1) session initiation using the TCP-based SIP protocol, and 2) media transport using the UDP-based RTP protocol. There are a bunch of additional protocols and variations that may need to be supported as well, depending on features enabled and devices used.

Often, a VOIP solution will have additional undocumented requirements, e.g., a dependence on reverse DNS or Reverse WINS. Some IP telephony devices, such as Cisco IP Phones, use DHCP option 150 and DHCP option 66 to push basic configurations, which then fetch full configuration files, background images, and other files from a TFTP server. Failure to meet these requirements typically leads to mysterious failures with unhelpful error messages.

Related Terms

Banyan Security Platform

As a device-centric Security Service Edge (SSE) solution, the Banyan Security Platform securely connects users to ...

BYOD (Bring Your Own Device)

A policy that allows employees to use their personal devices to access web resources, necessitating SWG solutions ...

Continuous Authorization

As one of the core principles of zero trust, continuous authorization leverages real-time device posture and ...

Device Identity

Device Identity refers to the ability to uniquely identify a specific device, much as you would identify a user. ...

Device Inventory

A comprehensive list of devices within an organization's network, including details such as device types, serial ...

Device Manager

An Enterprise Device Manager (abbreviated EDM, and sometimes referred to as MDM or UEM) enables IT administrators ...

Device Posture Assessment

The process of evaluating and determining the security posture of a device, such as a computer, mobile device, or ...

Device Trust Scoring

Trust Scoring: The calculation of a device’s Trust Level by evaluating the Effect of each Trust Factor.

Endpoint Detection and Response (EDR)

EDR is endpoint security technology that continuously monitors end-user devices to detect and respond to cyber ...

Endpoint Protection

Security solutions and measures implemented to secure endpoints, such as computers, laptops, and mobile devices, ...

Endpoint Security

Security measures and tools implemented on individual devices, such as laptops, smartphones, or tablets, to ...

Firewall

A Firewall is a security mechanism that monitors and controls incoming and outgoing network traffic. It's often ...