Attacks on networks which implement VoIP could lead to the degradation of the IP PBX performance, the interception of conversations, the theft of important and confidential information, and the generation of large expenses in any organization, if they do not have the correct security mechanisms. VoIP is based on existing layers and protocols and therefore inherits their security issues. In relation to signalization, different protocols have been proposed for VoIP. However, the Session Initiation Protocol (SIP) tends to be the favorite one because it is standardized by the IETF and has many features. Similarly to any other Internet protocol, SIP is susceptible to security threads, and can be involved in different kinds of attacks. In this paper, we propose three basic scenarios, representing common fundamental network architectures for VoIP, from which more complex systems can be built. We also establish a set of policies and guidelines focused on the aforementioned architectures, in order to mitigate security threads and provide more effective solutions for existing vulnerabilities in VoIP.