This chapter covers the following topics:
Explaining how file manipulation, tampering with call-processing signaling, man-in-the-middle attacks, eavesdropping, and IP phone and server identity theft can compromise a Cisco CallManager system
Explaining how the authentication and encryption mechanisms in a Cisco CallManager system protect against security threats
Explaining the role of CAPF, external CAs, MIC and LSC, CTLs, and Cisco CTL client
Explaining the PKI enrollment process in a Cisco IP telephony environment
Explaining where keys and ...