Securing Cisco IP Telephony Networks

Securing Cisco IP Telephony Networks

5.0 1
by Akhil Behl

View All Available Formats & Editions

The real-world guide to securing Cisco-based IP telephony applications, devices, and networks

Cisco IP telephony leverages converged networks to dramatically reduce TCO and improve ROI. However, its critical importance to business communications and deep integration with enterprise IP networks make it susceptible to attacks that legacy telecom systems did not


The real-world guide to securing Cisco-based IP telephony applications, devices, and networks

Cisco IP telephony leverages converged networks to dramatically reduce TCO and improve ROI. However, its critical importance to business communications and deep integration with enterprise IP networks make it susceptible to attacks that legacy telecom systems did not face. Now, there’s a comprehensive guide to securing the IP telephony components that ride atop data network infrastructures–and thereby providing IP telephony services that are safer, more resilient, more stable, and more scalable.

Securing Cisco IP Telephony Networks provides comprehensive, up-to-date details for securing Cisco IP telephony equipment, underlying infrastructure, and telephony applications. Drawing on ten years of experience, senior network consultant Akhil Behl offers a complete security framework for use in any Cisco IP telephony environment. You’ll find best practices and detailed configuration examples for securing Cisco Unified Communications Manager (CUCM), Cisco Unity/Unity Connection, Cisco Unified Presence, Cisco Voice Gateways, Cisco IP Telephony Endpoints, and many other Cisco IP Telephony applications. The book showcases easy-to-follow Cisco IP Telephony applications and network security-centric examples in every chapter.

This guide is invaluable to every technical professional and IT decision-maker concerned with securing Cisco IP telephony networks, including network engineers, administrators, architects, managers, security analysts, IT directors, and consultants.

  • Recognize vulnerabilities caused by IP network integration, as well as VoIP’s unique security requirements
  • Discover how hackers target IP telephony networks and proactively protect against each facet of their attacks
  • Implement a flexible, proven methodology for end-to-end Cisco IP Telephony security
  • Use a layered (defense-in-depth) approach that builds on underlying network security design
  • Secure CUCM, Cisco Unity/Unity Connection, CUPS, CUCM Express, and Cisco Unity Express platforms against internal and external threats
  • Establish physical security, Layer 2 and Layer 3 security, and Cisco ASA-based perimeter security
  • Complete coverage of Cisco IP Telephony encryption and authentication fundamentals
  • Configure Cisco IOS Voice Gateways to help prevent toll fraud and deter attacks
  • Secure Cisco Voice Gatekeepers and Cisco Unified Border Element (CUBE) against rogue endpoints and other attack vectors
  • Secure Cisco IP telephony endpoints–Cisco Unified IP Phones (wired, wireless, and soft phone) from malicious insiders and external threats

This IP communications book is part of the Cisco Press® Networking Technology Series. IP communications titles from Cisco Press help networking professionals understand voice and IP telephony technologies, plan and design converged networks, and implement network solutions for increased productivity.

Product Details

Cisco Press
Publication date:
Networking Technology: IP Communications Series
Edition description:
New Edition
Product dimensions:
7.40(w) x 8.90(h) x 1.50(d)

Meet the Author

Akhil Behl , CCIE No. 19564, is a Senior Network Consultant in Cisco Services, focusing

on Cisco Collaboration and Security Architectures. He leads collaboration and security

projects worldwide for Cisco Services and the Collaborative Professional Services (CPS)

portfolio for the commercial segment. Prior to his current role, he spent ten years working

in various roles at Linksys as a Technical Support Lead, as an Escalation Engineer at

Cisco Technical Assistance Center (TAC), and as a Network Consulting Engineer in Cisco

Advanced Services.

Akhil has a bachelor of technology degree in electronics and telecommunications from

IP University, India, and a master’s degree in business administration from Symbiosis

Institute, India. He is a dual Cisco Certified Internetwork Expert (CCIE) in Voice and

Security. He also holds many other industry certifications, such as Project Management

Professional (PMP), Information Technology Infrastructure Library (ITIL) professional,

VMware Certified Professional (VCP), and Microsoft Certified Professional (MCP).

Over the course of his career, he has presented and contributed in various industry

forums such as Interop, Enterprise Connect, Cloud Connect, Cloud Summit, Computer

Society of India (CSI), Cisco Networkers, and Cisco SecCon. He also has several research

papers published to his credit in various international journals.

Customer Reviews

Average Review:

Write a Review

and post it to your social network


Most Helpful Customer Reviews

See all customer reviews >

Securing Cisco IP Telephony Networks 5 out of 5 based on 0 ratings. 1 reviews.
Are you interested in Cisco IP Telephony and network security? If you are, then this book is for you! Author Akhil Behl, has done an outstanding job of writing a book that explains an End-to-End IP Telephony Security approach and architecture, and shows you how each piece of the puzzle fits together. Author Behl, begins by covering IP Telephony as a technology and provides an insight to rationale as to why you should be concerned about the security of your IP-based communications. Then, the author introduces you to the Cisco IP Telephony Security methodology and delves into demystifying the otherwise perceived complex IP Telephony Security methodology. He also shows you the layered security approach, which is instrumental to secure your Cisco IP Telephony network. He continues by covering many important topics such as Cisco IP Telephony Security life cycle, risk assessment, IP Telephony Security strategy, cost of security, and so on. Then, the author covers the topic of physical security as it pertains to Cisco IP Telephony to help you better prepare your network infrastructure, security policies, procedures, and organization as a whole against physical security threats from within and outside of your organization. He then introduces you to the OSI Layer 2 security issues as they pertain to Cisco IP Telephony. Next, the author presents an overview of the OSI Layer 3 security fundamentals. He also introduces you to the Cisco Adaptive Security Appliance, as an IP Telephony Firewall and shows you how to implement your organization’s security policy; thus, leveraging the features that the Cisco ASA offers. The author continues by covering the detailed steps to secure a multitude of technologies pertaining to the Cisco UCM and its integration with applications and endpoints; for example: secure phone conversations, secure trunks to ITSP and gateways, thwart toll fraud, secure CTI/JTAPI connections, and fighting SPIT. Then, he covers both Cisco Unity and Cisco Unity Connections voice messaging solution security, from an application and from a platform perspective. Next, the author discusses the security of the Cisco Unified Presence solution. He also introduces you to the Cisco IOS Voice Gateway platform security. The author continues by covering the Cisco Voice Gatekeeper and the Cisco Unified Border Element security. Then, he provides a comprehensive coverage of the security of the Cisco Unified Communications Manager Express call-control solution and the Cisco Unity Express voice-messaging solution. Next, the author covers the security of the Cisco Unified IP Phones, Cisco Wireless IP Phones, and the Cisco Unified IP communicator. Finally, he focuses on securing the IP Telephony network and application management aspect. This most excellent book focuses on providing you with an in-depth understanding of the Cisco Unified IP Telephony Security principles, features, protocols, and implementation best practices. More importantly, this great book provides an introduction to the key tools and techniques essential for securing a Cisco IP Telephony network of any sze.