| ||
For simplicity, most of our attack scenarios will target a single site Cisco VoIP deployment as depicted in Figure 7-5 adapted from Cisco's own deployment guide ( IP Telephony Deployment Models , http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_implementation_design_guide_chapter09186a0080447510.html).
A typical centralized multisite deployment might not veer off too much from this topology, as shown in Figure 7-6, also adapted from Cisco's deployment guide.