Are there any inherent security problems with UDP?
The implementation of most common e-conferencing solutions require the use of dynamic ports for User Datagram Protocol (UDP)-based audio and video streaming and Transmission Control Protocol (TCP)-based call control. Firewalls implemented as perimeter protection typically block UDP, the transport mechanism for multicast packets. Because of the connectionless nature of UDP, it is almost impossible to define a reasonable firewall policy that allows some UDP communications and blocks others. Many of the protocols that are implemented over UDP are easily exploitable.
Since, typical packet filtering firewalls don't support dynamic port filtering, it's always a good idea to use application-specific proxies that enable secure UDP streaming. Though some vendors are marketing H.323 firewall solutions, they are not sufficient for many environments. The other solution is to use Firewall Tunneling whereby the conferencing sever is placed behind the firewalls at both corporate and remote locations and relies on tunneling for access into network.
Learn how a new QUIC protocol is improving Web apps
Dig Deeper on Network security
Related Q&A from Puneet Mehta
Intrusion detection vs. intrusion prevention
Our expert, Puneet Mehta, tells us what the key difference is between intrusion detection and intrusion prevention, in this expert response. Continue Reading
How do I open port 177 on my router so that other clients can get a GUI display of my server remotel
Placement of the firewall
In this expert response, Puneet Mehta tells us where the placement of the firewall should be architecturally. Continue Reading