August 2012
Intermediate to advanced
696 pages
17h 26m
English
Layer 2 is one of the favorite places to attack by a hacker or attacker! The reason, you ask? It gives them access to virtually everything within your IP Telephony network! Also, Layer 2 attacks are the first ones a hacker will position, after getting access to a victim machine within your network. However, it should not make you feel anxious because this chapter addresses various Layer 2 threats. By the end of this chapter, you will know about the security attacks that can be used to exploit Layer 2 of your Cisco IP Telephony network and how you can deal with them.
This chapter covers the following topics:
• Layer 2 security overview
• IP Telephony Layer 2 security issues and mitigation
• Dealing ...