Vodavi ip-7008d 사용자 가이드

다운로드
페이지 120
The Vodavi Difference 
 
73
 
 
 
 
December, 2005  
 
Vodavi Telenium
IP
 
Product Guide 
 
mobility ▪ presence ▪ collaboration ▪ convergence 
 
Myth: 
IP-based systems cannot be kept secure from threats. 
False. 
Network managers already have the burden of providing security for the servers, 
computers, and other devices on the LAN and WAN. Keeping intruders or unauthorized 
internal personnel out of critical systems is done the same way for network-based phone 
systems as it is for email and database servers. In fact, when a legacy PBX and its voice 
applications are on a separate network from the data network, there are two networks 
to guard and monitor. The PBX still has to be defended against the usual attacks like toll 
fraud, call redirection, and social engineering of account codes. A properly designed 
network, in which any access from the outside is secured by firewalls and controlled by 
VPN connections, is needed. A complete understanding of the Telenium
IP
 
system will 
enable the network manager to maintain the system securely. 
 
 
 
Myth: 
Voice quality will be lower on a VOIP system. 
False. 
The first wave of IP telephony solutions released several years ago suffered from voice 
quality problems. The technology used to convert spoken voice sound to network signals 
has been dramatically improved. A network designed to support voice, in which 
problems like jitter and congestion are minimized, and voice traffic can be prioritized, 
will provide a high-quality user experience. Telenium
IP
 
systems provide a voice quality 
experience equal to traditional digital PBXs when the network is well-managed and 
prioritized.