Chapter 6. Cisco IP Telephony Layer 2 Security

Layer 2 is one of the favorite places to attack by a hacker or attacker! The reason, you ask? It gives them access to virtually everything within your IP Telephony network! Also, Layer 2 attacks are the first ones a hacker will position, after getting access to a victim machine within your network. However, it should not make you feel anxious because this chapter addresses various Layer 2 threats. By the end of this chapter, you will know about the security attacks that can be used to exploit Layer 2 of your Cisco IP Telephony network and how you can deal with them.

This chapter covers the following topics:

• Layer 2 security overview

• IP Telephony Layer 2 security issues and mitigation

• Dealing ...

Get Securing Cisco IP Telephony Networks now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.