O'Reilly logo

Securing Cisco IP Telephony Networks by Akhil Behl

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Perimeter Security with Cisco Adaptive Security Appliance

It is 7 a.m. and your mobile rings. An onsite IP Telephony engineer is online with you explaining that there was an attack attempted on organization XYZ’s IP Telephony network. The attackers tried contravening the network perimeter security, but Cisco Adaptive Security Appliance (ASA) Firewall was unyielding and saved the day! You feel relaxed but anxious as to who might have attempted the attack. Paranoia about how you can ensure that next time they cannot break into your IP Telephony data center and wreak havoc.

While it is true that an organization can lose money and important data because of lack of security, it is more vital to sustain a good reputation so that the clientage ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required