My strategy is to configure the firewall so that it only accepts
connections from expected places. E.g. for VOIP with A&A you would
only accept connections from A&A servers.
Similarly I use intermediate proxy servers to connect to my home
system using ssh, the home system's firewall only accepts ssh
connections from those proxy servers. (Of course the proxy servers
have to manage connections from anywhere but that's another sysadmin's
headache!)
--
Chris Green
·