Chapter 7. UC Security
When implementing an IP telephony network, it is essential to carefully consider security; otherwise, the network will be vulnerable to attack and voice communications may suffer disruption.
Several different tools and techniques can be used to protect the IP telephony networks, and some of these are covered in this chapter.
DHCP Snooping
Several different tools and techniques can help protect the network against both Layer 2 and Layer 3 threats. One such technique is DHCP snooping.
VoIP devices, such as IP phones, can use the Dynamic Host Configuration Protocol (DHCP) to obtain IP configuration parameters, such as IP address and TFTP server address. Therefore, if an attacker is able to interfere with DHCP, he might be ...
Get CCIE Voice v3.0 Quick Reference now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.