Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

For simplicity, most of our attack scenarios will target a single site Cisco VoIP deployment as depicted in Figure 7-5 adapted from Cisco's own deployment guide ( IP Telephony Deployment Models , http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_implementation_design_guide_chapter09186a0080447510.html).

Figure 7-5: Single site Cisco VoIP deployment

A typical centralized multisite deployment might not veer off too much from this topology, as shown in Figure 7-6, also adapted from Cisco's deployment guide.

Figure 7-6: Centralized multisite VoIP deployment

Категории