References

Port protocol flows/topologies:

  • Appendix B, " Access Lists ." Avaya IP Telephony Deployment Guide . http:// support.avaya.com/elmodocs2/comm_mgr/r3_1/ pdfs /245600_4_2.pdf

  • For IP phones, in the LAN Admin Guide , see http://support.avaya.com/elmodocs2/4600/233507_2_3.pdf (PDF Page 34+)

  • For softphone/IP agent, see http://support.avaya.com/japple/css/japple?PAGE=Document&temp.productID=107767&temp.bucketID=159907&temp.documentID=151464&temp.selectedRelease=141984

Relevant whitepapers and documentation:

  • Avaya Toll Fraud and Security Handbook .http://support.avaya.com/elmodocs2/comm_mgr/r3/pdfs/025600_10.pdf

  • " Administration for Network Connectivity for Avaya Communication Manager " in the Avaya Communication Manager is a very good resource for documentation covering Avaya Media Encryption. http://support.avaya.com/elmodocs2/comm_mgr/r3_1/pdfs/233504_11.pdf (PDF page 187+)

  • Lab Testing Summary Report (Avaya Media Encryption). January 2006. http://www.miercom.com/dl.html?fid=20050131&type=report

  • Avaya Media Encryption . http://support.avaya.com/elmodocs2/white_papers/media_encryption.pdf

  • Avaya Communication Manager 3.1System Capacities Table .http://support.avaya.com/elmodocs2/comm_mgr/r3_1/pdfs/03_300511_1_1.pdf

  • What's New in Avaya Communication Manager 3.1 . http://support.avaya.com/elmodocs2/comm_mgr/r3_1/pdfs/03_300682_1_1.pdf

  • Security and Avaya Communication Manager Media Servers .http://support.avaya.com/elmodocs2/s8700/docs/Media_Server_Security.pdf

  • Hardening Practices of the Linux Operating System within Avaya Communication Manager . http://support.avaya.com/elmodocs2/white_papers/Linux_OS_Hardening.pdf

  • An Overview of Communication Manager Transport and Storage Encryption Algorithms . http://support.avaya.com/elmodocs2/comm_mgr/102882.pdf

  • CM Network Services . http://support.avaya.com/elmodocs2/multivantage/95933.pdf

  • Avaya G250 and G350 Media Gateway Security Features Overview . http://support.avaya.com/elmodocs2/white_papers/G250_G350_Security.pdf

  • Avaya G700 Media Gateway Security Features Overview .http://support.avaya.com/elmodocs2/G700/102412.pdf

  • Avaya G700 / G350 RADIUS Configuration Overview . http://support.avaya.com/elmodocs2/white_papers/G350-700_RADIUS.pdf

  • CLAN/Medpro/IPSI firmware. http://support.avaya.com/japple/css/japple?PAGE=Document&temp.bucketID=108025&temp.productID=107602&temp.documentID=200575&temp.releaseID=129470

Security advisories and vulnerability response/classification policy:

  • Avaya Security Advisories. http://support.avaya.com/security

  • Avaya's Product Security Vulnerability Response Policy. http://support.avaya.com/elmodocs2/security/security_vulnerability_response.pdf

  • Avaya's Security Vulnerability Classification. http://support.avaya.com/elmodocs2/security/security_vulnerability_classification.pdf



Hacking Exposed VoIP. Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net