O'Reilly logo

Securing Cisco IP Telephony Networks by Akhil Behl

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Cisco IP Telephony Layer 2 Security

Layer 2 is one of the favorite places to attack by a hacker or attacker! The reason, you ask? It gives them access to virtually everything within your IP Telephony network! Also, Layer 2 attacks are the first ones a hacker will position, after getting access to a victim machine within your network. However, it should not make you feel anxious because this chapter addresses various Layer 2 threats. By the end of this chapter, you will know about the security attacks that can be used to exploit Layer 2 of your Cisco IP Telephony network and how you can deal with them.

This chapter covers the following topics:

• Layer 2 security overview

• IP Telephony Layer 2 security issues and mitigation

• Dealing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required