Chapter 6. Cisco IP Telephony Layer 2 Security

Layer 2 is one of the favorite places to attack by a hacker or attacker! The reason, you ask? It gives them access to virtually everything within your IP Telephony network! Also, Layer 2 attacks are the first ones a hacker will position, after getting access to a victim machine within your network. However, it should not make you feel anxious because this chapter addresses various Layer 2 threats. By the end of this chapter, you will know about the security attacks that can be used to exploit Layer 2 of your Cisco IP Telephony network and how you can deal with them.

This chapter covers the following topics:

• Layer 2 security overview

• IP Telephony Layer 2 security issues and mitigation

• Dealing ...

Get Securing Cisco IP Telephony Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.