Summary
This chapter is only a brief guide to the most common VoIP security technologies prevalent today. There are a plethora of additional resources including sites such as www.hackingvoip.com, books on Hacking VoIP, and RTP encryption.
Taking the basic steps outlined in this chapter will provide you sufficient amount of security against today's most common hacks, DoS attacks, and abuses. This should allow most small to medium sized PBXes or hosted VoIP systems to operate securely and reliably.
We now move on to the last chapter in this book where we consider a variety of subjects that don't fit into any particular category. We will also present the reader with other resources for learning more about SIP, VoIP, and FreeSWITCH.