We Need Diverse Ya Sale
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    Original Essays | June 2, 2015

    Matthieu Ricard: IMG The Altruism Revolution



    With the famous phrase "Nature, red in tooth and claw," the Victorian poet Tennyson expressed the challenge that the emerging science of evolution... Continue »

    spacer
Qualifying orders ship free.
$32.00
List price: $77.50
Used Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
1 Local Warehouse Networking- Cisco

More copies of this ISBN

Securing Cisco IP Telephony Networks (Networking Technology: IP Communications)

by

Securing Cisco IP Telephony Networks (Networking Technology: IP Communications) Cover

 

Synopses & Reviews

Publisher Comments:

Security in essence, is one of the pivotal pieces of today's networks. Most books on VoIP or IP Telephony security focus on generic issues such as call signaling and media security. Cisco IP network professionals and key decision makers need more than that: they need real-world examples for securing Cisco IP telephony equipment, infrastructure, and applications that follow best practices. Securing Cisco IP Telephony Networks provides all that and more. Drawing on 10 years of experience with Cisco IP telephony and security, senior network consultant, Akhil Behl discusses the security issues surrounding modern day IP Telephony networks, defines the key threats faced by IP Telephony networks, and offers exceptionally detailed guidance on defending against these threats. The author covers following topics:

 

-          Introduction to Cisco IP telephony security

-          Explain rationale to secure IP communications

-          Cisco IP telephony security threats and mitigation

-          A complete IP telephony security framework for defining security construct of Cisco IP telephony networks

-          Best practices for developing Cisco IP telephony specific security policies, defining security levels, and evaluating cost vs. risk

-          Applying the security framework to network infrastructure security and application security

-          Safeguarding underlying network infrastructure – routers, switches, wireless, and physical security

-          Protecting Cisco IP telephony periphery using Cisco ASA Firewall and Cisco IPS technology

-          Securing key Cisco IP telephony components, including Cisco Unified Communications Manager, Cisco Unity, Cisco Unity Connection, Cisco Presence, Voice Gateways, Gatekeeper, CUBE, IP Phones, and so on

-          Preventing toll fraud, Man-in-the Middle, Denial-of-Service, reconnaissance, and many more dreadful attacks on Cisco IP telephony networks

-          Implementing secure IP telephony design, management protocols, and leveraging management tools 

Cisco-specific examples are provided for Cisco IP telephony components for example, Cisco IOS routers, Cisco Catalyst Switches, Cisco ASA Firewall, Cisco Unified Communications Manager, Cisco Unity Connection, Cisco Unified Communications Manager Express, Cisco Unity Express, Cisco Wireless Infrastructure, Cisco Unified IP Phones (wired/wireless) throughout the book. Leading practice recommendations the pave way for successful deployment of robust, secure, and resilient Cisco IP telephony networks. The book concludes with fundamentals of cryptography, advance firewall features, and Cisco Network/Host Intrusion Prevention/Detection mechanisms as they apply to Cisco IP telephony.

Synopsis:

The real-world guide to securing Cisco-based IP telephony applications, devices, and networks

Cisco IP telephony leverages converged networks to dramatically reduce TCO and improve ROI. However, its critical importance to business communications and deep integration with enterprise IP networks make it susceptible to attacks that legacy telecom systems did not face. Now, there’s a comprehensive guide to securing the IP telephony components that ride atop data network infrastructures–and thereby providing IP telephony services that are safer, more resilient, more stable, and more scalable.

Securing Cisco IP Telephony Networks provides comprehensive, up-to-date details for securing Cisco IP telephony equipment, underlying infrastructure, and telephony applications. Drawing on ten years of experience, senior network consultant Akhil Behl offers a complete security framework for use in any Cisco IP telephony environment. You’ll find best practices and detailed configuration examples for securing Cisco Unified Communications Manager (CUCM), Cisco Unity/Unity Connection, Cisco Unified Presence, Cisco Voice Gateways, Cisco IP Telephony Endpoints, and many other Cisco IP Telephony applications. The book showcases easy-to-follow Cisco IP Telephony applications and network security-centric examples in every chapter.

This guide is invaluable to every technical professional and IT decision-maker concerned with securing Cisco IP telephony networks, including network engineers, administrators, architects, managers, security analysts, IT directors, and consultants.

  • Recognize vulnerabilities caused by IP network integration, as well as VoIP’s unique security requirements
  • Discover how hackers target IP telephony networks and proactively protect against each facet of their attacks
  • Implement a flexible, proven methodology for end-to-end Cisco IP Telephony security
  • Use a layered (defense-in-depth) approach that builds on underlying network security design
  • Secure CUCM, Cisco Unity/Unity Connection, CUPS, CUCM Express, and Cisco Unity Express platforms against internal and external threats
  • Establish physical security, Layer 2 and Layer 3 security, and Cisco ASA-based perimeter security
  • Complete coverage of Cisco IP Telephony encryption and authentication fundamentals
  • Configure Cisco IOS Voice Gateways to help prevent toll fraud and deter attacks
  • Secure Cisco Voice Gatekeepers and Cisco Unified Border Element (CUBE) against rogue endpoints and other attack vectors
  • Secure Cisco IP telephony endpoints–Cisco Unified IP Phones (wired, wireless, and soft phone) from malicious insiders and external threats

This IP communications book is part of the Cisco Press® Networking Technology Series. IP communications titles from Cisco Press help networking professionals understand voice and IP telephony technologies, plan and design converged networks, and implement network solutions for increased productivity.

 

Synopsis:

Most books on VoIP security focus on generic issues such as call signaling and media security. Cisco IP network professionals need more than that: they need real-world detail for securing specific Cisco IP telephony equipment, infrastructure, and applications. Securing Cisco IP Telephony Networks provides all that and more. Drawing on eight years of experience with IP telephony and security, long-time Cisco Senior Network Consulting Engineer Akhil Behl discusses the unique issues surrounding modern IP Telephony (IPT) security, defines the key threats faced by IPT networks, and offers exceptionally detailed guidance on defending against these threats. The author covers: * VoIP telephony security goals, threats, and tools * A complete IP telephony security framework for any environment * Best practices for developing policies, defining security levels, and evaluating cost vs. risk * Applying the security framework to network infrastructure security at all layers * Using firewalls at the network perimeter * Securing each key Cisco IPT component, including CUCM, Unity Connection, Presence, Gateways, Gatekeeper, phones, and more * Preventing toll fraud * Implementing secure IPT management protocols and tools, and much more. Cisco-specific examples are provided at the end of each chapter. The book concludes with a section-length case study that places key concepts in context and shows how to apply them throughout the entire IPT security lifecycle.

About the Author

Akhil Behl , CCIE No. 19564, is a Senior Network Consultant in Cisco Services, focusing

on Cisco Collaboration and Security Architectures. He leads collaboration and security

projects worldwide for Cisco Services and the Collaborative Professional Services (CPS)

portfolio for the commercial segment. Prior to his current role, he spent ten years working

in various roles at Linksys as a Technical Support Lead, as an Escalation Engineer at

Cisco Technical Assistance Center (TAC), and as a Network Consulting Engineer in Cisco

Advanced Services.

 

Akhil has a bachelor of technology degree in electronics and telecommunications from

IP University, India, and a master’s degree in business administration from Symbiosis

Institute, India. He is a dual Cisco Certified Internetwork Expert (CCIE) in Voice and

Security. He also holds many other industry certifications, such as Project Management

Professional (PMP), Information Technology Infrastructure Library (ITIL) professional,

VMware Certified Professional (VCP), and Microsoft Certified Professional (MCP).

Over the course of his career, he has presented and contributed in various industry

forums such as Interop, Enterprise Connect, Cloud Connect, Cloud Summit, Computer

Society of India (CSI), Cisco Networkers, and Cisco SecCon. He also has several research

papers published to his credit in various international journals.

Table of Contents

Part 1. Introduction

1. What is IPT Security and Why Do We Need It?

2. Components of IPT Security

3. What Can We Secure and How Can We Secure It

4 IPT Security Framework

Part 2. IPT Network Security

5. Physical Security

6. L2 Security

7. L3 Security

8. Perimeter Security Using ASA

Part 3. IPT Application Security

9. Cisco Unified Communication Manager Security

10. Unity Security

11. Cisco Unity Connection Security

12. Cisco Unified Presence Server Security

13. Voice Gateway Security

14. Gatekeeper Security

15. CME/CUE Security

16. Endpoint security (IP Phones, Soft phones, Wireless Phones)

Part 4. Securing IPT Management Protocols

17. Security of IPT Network Management Protocols

Part 5. Case Study

18. Securing an Enterprise IPT Network (Case Study)

Appendix A. Authentication and Encryption basics

Appendix B. Firewalling IPT Networks (Best Practices) and Positioning IDS / IPS in IPT network

Product Details

ISBN:
9781587142956
Author:
Behl, Akhil
Publisher:
Cisco Press
Subject:
Networking - General
Copyright:
Edition Description:
Trade paper
Series:
Networking Technology: IP Communications
Publication Date:
20120806
Binding:
TRADE PAPER
Language:
English
Pages:
696
Dimensions:
9.09 x 7.26 x 1.363 in 1114 gr

Related Subjects

Computers and Internet » Networking » Cisco
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General
Computers and Internet » Networking » Security » General

Securing Cisco IP Telephony Networks (Networking Technology: IP Communications) Used Trade Paper
0 stars - 0 reviews
$32.00 In Stock
Product details 696 pages Cisco Press - English 9781587142956 Reviews:
"Synopsis" by ,

The real-world guide to securing Cisco-based IP telephony applications, devices, and networks

Cisco IP telephony leverages converged networks to dramatically reduce TCO and improve ROI. However, its critical importance to business communications and deep integration with enterprise IP networks make it susceptible to attacks that legacy telecom systems did not face. Now, there’s a comprehensive guide to securing the IP telephony components that ride atop data network infrastructures–and thereby providing IP telephony services that are safer, more resilient, more stable, and more scalable.

Securing Cisco IP Telephony Networks provides comprehensive, up-to-date details for securing Cisco IP telephony equipment, underlying infrastructure, and telephony applications. Drawing on ten years of experience, senior network consultant Akhil Behl offers a complete security framework for use in any Cisco IP telephony environment. You’ll find best practices and detailed configuration examples for securing Cisco Unified Communications Manager (CUCM), Cisco Unity/Unity Connection, Cisco Unified Presence, Cisco Voice Gateways, Cisco IP Telephony Endpoints, and many other Cisco IP Telephony applications. The book showcases easy-to-follow Cisco IP Telephony applications and network security-centric examples in every chapter.

This guide is invaluable to every technical professional and IT decision-maker concerned with securing Cisco IP telephony networks, including network engineers, administrators, architects, managers, security analysts, IT directors, and consultants.

  • Recognize vulnerabilities caused by IP network integration, as well as VoIP’s unique security requirements
  • Discover how hackers target IP telephony networks and proactively protect against each facet of their attacks
  • Implement a flexible, proven methodology for end-to-end Cisco IP Telephony security
  • Use a layered (defense-in-depth) approach that builds on underlying network security design
  • Secure CUCM, Cisco Unity/Unity Connection, CUPS, CUCM Express, and Cisco Unity Express platforms against internal and external threats
  • Establish physical security, Layer 2 and Layer 3 security, and Cisco ASA-based perimeter security
  • Complete coverage of Cisco IP Telephony encryption and authentication fundamentals
  • Configure Cisco IOS Voice Gateways to help prevent toll fraud and deter attacks
  • Secure Cisco Voice Gatekeepers and Cisco Unified Border Element (CUBE) against rogue endpoints and other attack vectors
  • Secure Cisco IP telephony endpoints–Cisco Unified IP Phones (wired, wireless, and soft phone) from malicious insiders and external threats

This IP communications book is part of the Cisco Press® Networking Technology Series. IP communications titles from Cisco Press help networking professionals understand voice and IP telephony technologies, plan and design converged networks, and implement network solutions for increased productivity.

 

"Synopsis" by , Most books on VoIP security focus on generic issues such as call signaling and media security. Cisco IP network professionals need more than that: they need real-world detail for securing specific Cisco IP telephony equipment, infrastructure, and applications. Securing Cisco IP Telephony Networks provides all that and more. Drawing on eight years of experience with IP telephony and security, long-time Cisco Senior Network Consulting Engineer Akhil Behl discusses the unique issues surrounding modern IP Telephony (IPT) security, defines the key threats faced by IPT networks, and offers exceptionally detailed guidance on defending against these threats. The author covers: * VoIP telephony security goals, threats, and tools * A complete IP telephony security framework for any environment * Best practices for developing policies, defining security levels, and evaluating cost vs. risk * Applying the security framework to network infrastructure security at all layers * Using firewalls at the network perimeter * Securing each key Cisco IPT component, including CUCM, Unity Connection, Presence, Gateways, Gatekeeper, phones, and more * Preventing toll fraud * Implementing secure IPT management protocols and tools, and much more. Cisco-specific examples are provided at the end of each chapter. The book concludes with a section-length case study that places key concepts in context and shows how to apply them throughout the entire IPT security lifecycle.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.