Appendix A

Validate Existing Security Infrastructure

Solutions in this chapter:


We begin the process of securing the VoIP infrastructure by reviewing and validating the existing security infrastructure. Addition of VoIP components to a preexisting data network is the ideal opportunity to review and bolster existing security policy, architecture, and processes.

One way of visualizing the components of a given security architecture is to use Figure A.1, which graphically shows a number of network security interfaces.

Figure ...

Get How to Cheat at VoIP Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.