Basic Deployment Scenarios

For simplicity, most of our attack scenarios will target a single site Cisco VoIP deployment as depicted in Figure 7-5 adapted from Cisco's own deployment guide ( IP Telephony Deployment Models , http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_implementation_design_guide_chapter09186a0080447510.html).

image from book
Figure 7-5: Single site Cisco VoIP deployment

A typical centralized multisite deployment might not veer off too much from this topology, as shown in Figure 7-6, also adapted from Cisco's deployment guide.

image from book
Figure 7-6: Centralized multisite VoIP deployment


Hacking Exposed VoIP. Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net