Appendix A

Validate Existing Security Infrastructure

Solutions in this chapter:

Introduction

We begin the process of securing the VoIP infrastructure by reviewing and validating the existing security infrastructure. Addition of VoIP components to a preexisting data network is the ideal opportunity to review and bolster existing security policy, architecture, and processes.

One way of visualizing the components of a given security architecture is to use Figure A.1, which graphically shows a number of network security interfaces.

f13-01-9781597491693
Figure ...

Get How to Cheat at VoIP Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.