Chapter 26. Understanding Cisco IP Telephony Authentication and Encryption Fundamentals

Understanding Cisco IP Telephony Authentication and Encryption Fundamentals
<feature><title></title>

This chapter covers the following topics:

  • Explaining how file manipulation, tampering with call-processing signaling, man-in-the-middle attacks, eavesdropping, and IP phone and server identity theft can compromise a Cisco CallManager system

  • Explaining how the authentication and encryption mechanisms in a Cisco CallManager system protect against security threats

  • Explaining the role of CAPF, external CAs, MIC and LSC, CTLs, and Cisco CTL client

  • Explaining the PKI enrollment process in a Cisco IP telephony environment

  • Explaining where keys and ...

Get Authorized Self-Study Guide Cisco IP Telephony (CIPT), Second Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.