Chapter 7. Security
When implementing an IP telephony network, it is essential to carefully consider security; otherwise, the network with be vulnerable to attack and voice communications can suffer disruption.
Several different tools and techniques can be used to protect the IP telephony networks, and some of these are covered in this section.
DHCP Snooping
Several different tools and techniques can help protect the network against both Layer 2 and Layer 3 threats. One such technique is DHCP snooping.
VoIP devices, such as IP phones, can use the Dynamic Host Configuration Protocol (DHCP) to obtain IP configuration parameters, such as IP address and TFTP server address. Therefore, if an attacker is able to interfere with DHCP, he might be able ...
Get CCIE Voice Exam Quick Reference Sheets now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.