Appliance+Management+Approach.jpg' alt='Billing Software For Cisco Call Manager Snmp Service' title='Billing Software For Cisco Call Manager Snmp Service' />Securing Cisco IP Telephony Networks.Online Sample Chapter.Cisco IP Telephony Security Framework.Sample Pages. Download the sample pages includes Chapter 4 and IndexTable of Contents.Introduction xxiii Part I Introduction to Cisco IP Telephony Security 3.Chapter 1 What Is IP Telephony Security and Why Do You Need ItDefining IP Telephony Security 4 What Is IP Telephony What Is IP Telephony Security What Is the Rationale Behind Securing an IP Telephony Network What Can You Do to Safeguard Your IP Telephony Network IP Telephony Security Threats 8 How Do Hackers Attack an IP Telephony Network Foot Printing 9 Scanning 9 Enumeration 9 Exploit 9 Covering Tracks 1.What Are IP Telephony Security Threats and CountermeasuresCUCM Signaling and Media Paths.CUCM uses SIP or SCCP to communicate with Cisco IP Phones for call setup and teardown and for supplementary service tasks.Most books on VoIP security focus on generic issues such as call signaling and media security.Cisco IP network professionals need more than that they need real.Die folgende Liste enthlt die Zuordnung von TCPUDPPorts zu Protokollen, die von der IANA standardisiert wurden.Eine vollstndige Liste kann unter unixoiden.Billing Software For Cisco Call Manager Snmp Service' title='Billing Software For Cisco Call Manager Snmp Service' />Threats 1.Countermeasures 1.An Insight to Vo.IP Security Tools 1.IP Telephony SecurityPenetration Tools 1.Sniffing Tools 1.Scanning and Enumeration Tools 1.FloodingDo. S Tools 1.Signaling and Media Manipulation Tools 1.Business Challenges and Cisco IP Telephony Security Responses 1.Common Business Challenges Associated with IP Telephony Security 1.Cisco IP Telephony Security Responses 1.Summary 1. 7Chapter 2 Cisco IP Telephony Security Building Blocks 1.Introduction to IP Telephony Security Methodology 1.Understanding the IP Telephony Security Methodology 1.Demystifying IP Telephony Security Methodology 2.IP Telephony Security Architecture 2.Exploring IP Telephony Security Methodology and Defining Security Architecture 2.IP Telephony Security Assessment and Security Policy Development 2.IP Telephony Network Security Implementation 2.Physical Security 2.Layer 2 Security 2.Layer 3 Security 2.Perimeter Security 3.IP Telephony Application Security Implementation 3.Defining the IP Telephony Network Components That Should Be Secured 3.IP Telephony Network Elements That Should Be Secured 3.Summary 3. 4Chapter 3 What Can You Secure and How Can You Secure It Layered Security Approach for IP Telephony Security 3.IP Telephony Layered Security Approach 3.Case Study 3. 6 Enabling IP Telephony Security Layer upon Layer 3.Cisco IP Telephony Security Controls 4.Discovering IP Telephony Security Controls 4.Cisco IP Telephony Security Controls 4.Cisco IP Telephony Network Security Controls 4.Cisco IP Telephony Device Security Controls 4.Cisco IP Telephony Application Security Controls 4.Cisco IP Telephony Endpoint Security Controls 4.Cisco IP Telephony Security Overview 5.Discovering End to End IP Telephony Security 5.Understanding Each IP Telephony Component and its Relative Security Control 5.XYZ Headquarters Main Data Center 5.IP Telephony Data Center Security Insight 5.IP Telephony Remote Data Center Security Insight 5.IP Telephony Remote Site Security Insight 5.Telecommuter Solution Security Insight 5.Summary 5. 7Chapter 4 Cisco IP Telephony Security Framework 5.Cisco IP Telephony Security Life Cycle 6.Enabling IP Telephony Security 6.Security and Risk Assessment 6.IP Telephony Security Policy Development and Enforcement 6.Planning and Designing 6.IP Telephony Network and Application Security Deployment 6.Operate and Manage 6.Monitor 6. 4Developing an IP Telephony Security Policy 6.Building an IP Telephony Security PolicyStrategy In line with Your Corporate Security Policy 6.Risk Assessment 6.Components of IP Telephony Security Policy 6.IP Telephony Security PolicyStrategy 7.Core IP Telephony Security Policies 7.Physical Security of IP Telephony Equipment 7.Physical Security Policy 7.Local Area Network Security Policy 7.Wide Area Network and Perimeter Security Policy 7.IP Telephony Server Security Policy 7.Voice Application Security Policy 7.Endpoint Security Policy 7.Conclusion 8. 0Evaluating Cost of SecurityCost Versus Risk 8.Cost of Implementing IP Telephony Security 8.Cost of a Security Breach 8.How to Balance Between Cost and Risk 8.Determining the Level of Security for Your IP Telephony Network 8.Case Study 8. 4 The Riddles Are Over 8.Putting Together All the Pieces 8.IP Telephony Security Framework 8.Summary 9. 2Part II Cisco IP Telephony Network Security 9.Chapter 5 Cisco IP Telephony Physical Security 9.IP Telephony Physical Security 9.What Is IP Telephony Physical Security All About Physical Security Issues 9.Restricting Access to IP Telephony Facility 9.Securing the IP Telephony Data Center Perimeter 9.IP Telephony Data Center Internal Security 9.Personnel Training 1.Disaster Recovery and Survivability 1.Locking Down IP Telephony Equipment 1.Environmental Factors 1.Summary 1. 03. Chapter 6 Cisco IP Telephony Layer 2 Security 1.Layer 2 Security Overview 1.Cisco IP Telephony Layer 2 Topology Overview 1.Why Bother with Layer 2 SecurityIP Telephony Layer 2 Security Issues and Mitigation 1.VLAN Hopping Attack and Mitigation 1.Attack Details 1.Mitigation 1. 11 Spanning Tree Protocol STP Manipulation 1.Attack Details 1.Mitigation 1. 12 DHCP Spoofing 1.Attack Details 1.Mitigation 1. 14 ARP Spoofing 1.Attack Details 1.Mitigation 1. 16 MAC Address Spoofing Attack 1.Attack Details 1.Mitigation 1. 17 IP Spoofing Attack 1.Attack Details 1.Mitigation 1. 20 CAM Table Overflow and DHCP Starvation Attack 1.Attack Details 1.Mitigation 1. 22.Dealing with Rogue Endpoints 8.What Is 8. 02. 1x and How Does it Work EAP Authentication Methods 1.IP Telephony 1. 26.Layer 2 Security Best Practices 1.Summary 1. 33. Chapter 7 Cisco IP Telephony Layer 3 Security 1.Layer 3 Security Fundamentals Securing Cisco IOS Routers 1.Cisco IOS Platform Security 1.Restricting Management Access 1.Securing the Console Port 1.Securing the Auxiliary Port 1.Securing the VTY Ports 1.Securing the HTTP Interface 1.Disabling Unnecessary IOS Services 1.Small Services 1.Finger Service 1.Boot. P 1. 43 Cisco Discovery Protocol CDP 1.Proxy ARP 1. 45 Directed Broadcast 1.Source Routing 1.Classless Routing 1.Configuration Autoloading 1.Securing TFTP 1. 49.Securing Routing Protocols 1.Routing Information Protocol v.RIPv. 2 1. 51 Enhanced Interior Gateway Routing Protocol EIGRP 1.Open Shortest Path First OSPF 1.Border Gateway Protocol BGP 1.Securing Hot Standby Routing Protocol HSRP 1.Safeguarding Against ICMP Attacks 1.ICMP Unreachables 1.ICMP Mask Reply 1.ICMP Redirects 1.Constraining ICMP 1.Securing User Passwords 1.Controlling User Access and Privilege Levels 1.Enabling Local Authentication and Authorization 1.Enabling External Server based Authentication, Authorization, and Accounting AAA 1.Configuring Cisco TACACS Based Authentication 1.Configuring Cisco TACACS Based Authorization 1.Configuring Cisco TACACS Based Accounting 1.Antispoofing Measures 1.RFC 2. 82. 7 Filtering 1.Unicast Reverse Packet Forwarding u.RPF 1. 62. Router Banner Messages 1.Securing Network Time Protocol NTP 1.Blocking Commonly Exploited Ports 1.Extending Enterprise Security Policy to Your Cisco Router 1.Password Minimum Length 1.Authentication Failure Rate 1.Block Logins 1. 66 Disable Password Recovery 1.Layer 3 Traffic ProtectionEncryption 1.Layer 3 SecurityBest Practices 1.Summary 1. 69. Chapter 8 Perimeter Security with Cisco Adaptive Security Appliance 1.IP Telephony Data Centers Integral Element Cisco Adaptive Security Appliance 1.An Introduction to Cisco ASA Firewall 1.Cisco ASA Firewall and OSI layers 1.Cisco ASA Basics 1. Fxhome Ltd Photokey 4 Automatic Green Screen Removal Software For Photographers Using Mac And Windows here. Cisco ASA Stateful Firewall 1.Cisco ASA Firewall Interfaces 1.Cisco ASA Firewall Security Levels 1.Cisco ASA Firewall Modes 1.Cisco ASA Network Address Translation 1.Cisco ASA UTM Appliance 1.Cisco ASA IP Telephony Firewall 1.Securing IP Telephony Data Center with Cisco ASA 1.Case Study Perimeter Security with Cisco ASA 1.Cisco ASA Qo. S Support 1.Firewall Transiting for Endpoints 1.Cisco ASA Firewall ACL Port Usage 1.Introduction to Cisco ASA Proxy Features 2.Cisco ASA TLS Proxy 2.Cisco ASA Phone Proxy 2.Cisco VPN Phone 2.Cisco VPN Phone Prerequisites 2.Implementing VPN Phone 2.Remote Worker and Telecommuter Voice Security 2.Summary 2. 31. Part III Cisco IP Telephony Application and Device Security 2.Chapter 9 Cisco Unified Communications Manager Security 2.Cisco Unified Communications Manager CUCM Platform Security 2.CUCM Linux Platform Security 2.Certificate Based Secure Signaling and Media Certificate Authority Proxy Function 2.Enabling CUCM Cluster Security Mixed Mode 2.Security by Default SBD 2.TFTP Download Authentication 2.TFTP Configuration File Encryption 2.Trust Verification Service Remote Certificate and Signature Verification 2.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
November 2017
Categories |