O'Reilly logo

Securing Cisco IP Telephony Networks by Akhil Behl

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. What Can You Secure and How Can You Secure It?

The key to secure an IP Telephony network requires taking into account voice, data, and video communications as a coherent system (converged communications network) and employing a multilayered, homogeneously applied defense construct for the system infrastructure. This goes uniformly for call control, management, applications, and endpoints. The security solution should be layered with multiple controls and fortifications at various network levels. This minimizes the possibility that a single point of failure could compromise overall security. In other words, if one security layer is contravened, other defensive barriers are still available to deter the attack.

This chapter helps you ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required