Skip to Main Content
Securing Cisco IP Telephony Networks
book

Securing Cisco IP Telephony Networks

by Akhil Behl
August 2012
Intermediate to advanced content levelIntermediate to advanced
696 pages
17h 26m
English
Cisco Press
Content preview from Securing Cisco IP Telephony Networks

Chapter 6. Cisco IP Telephony Layer 2 Security

Layer 2 is one of the favorite places to attack by a hacker or attacker! The reason, you ask? It gives them access to virtually everything within your IP Telephony network! Also, Layer 2 attacks are the first ones a hacker will position, after getting access to a victim machine within your network. However, it should not make you feel anxious because this chapter addresses various Layer 2 threats. By the end of this chapter, you will know about the security attacks that can be used to exploit Layer 2 of your Cisco IP Telephony network and how you can deal with them.

This chapter covers the following topics:

• Layer 2 security overview

• IP Telephony Layer 2 security issues and mitigation

• Dealing ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Authorized Self-Study Guide Cisco Voice over IP (CVoice)

Authorized Self-Study Guide Cisco Voice over IP (CVoice)

Kevin Wallace

Publisher Resources

ISBN: 9780132731096Purchase book