This chapter covers the following topics:
Identifying potential threats against IP phones and the attack tool or method
Explaining how signed firmware images prevent rogue or incorrect images from being placed on the IP phone
Configuring parameters in the Phone Configuration window of Cisco CallManager Administration to harden the IP phone
Explaining how disabling the PC port, the Settings button, and web access help secure the IP phone
Explaining how, by ignoring gratuitous ARP, the IP phone can help prevent a man-in-the-middle attack
Explaining how blocking the PC from accessing the voice ...