Issue 3.4.1 June 2005
187
Security
This chapter discusses the security design and features for Avaya Communication Manager,
and how to operate Avaya systems securely.
Note:
Note:
Because this information is valuable both to those who want to protect the system
and to those who seek to “hack” into those systems, the information in this
section is deliberately incomplete. For example, we discuss the use of one-time
passwords for user authentication, but not the mechanism of how this feature
works.
Earlier systems did not interface with the data network and were neither susceptible to the types
of attacks that are prevalent on those networks, nor provided a gateway into such networks
from which an attack might be launched. With the convergence of voice (IP Telephony) and data
over corporate enterprise networks, this is no longer true.
The main topics included in this chapter are:
●
Your security policy
●
Avaya Communication Manager and Media Servers
●
IP Telephony circuit pack security
●
Toll fraud
Your security policy
System security does not begin with the system itself, but with the people and the organizations
that operate or use the system. One of the most important tools for securing a system is to have
a written, published, and enforceable security policy. Your security policy should clearly address
these questions:
●
What are you trying to protect?
●
What are you protecting it from?
●
How likely is a threat against these assets?
Summary of Contents for Application Solutions
Page 1: ...Avaya Application Solutions IP Telephony Deployment Guide 555 245 600 Issue 3 4 1 June 2005 ...
Page 20: ...About This Book 20 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 21: ...Issue 3 4 1 June 2005 21 Section 1 Avaya Application Solutions product guide ...
Page 22: ...22 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 106: ...Call processing 106 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 124: ...Avaya LAN switching products 124 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 139: ...Issue 3 4 1 June 2005 139 Section 2 Deploying IP Telephony ...
Page 140: ...140 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 186: ...Traffic engineering 186 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 204: ...Security 204 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 228: ...Avaya Integrated Management 228 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 274: ...Reliability and Recovery 274 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 275: ...Issue 3 4 1 June 2005 275 Section 3 Getting the IP network ready for telephony ...
Page 276: ...276 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 356: ...Network recovery 356 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 366: ...Network assessment offer 366 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 367: ...Issue 3 4 1 June 2005 367 Appendixes ...
Page 368: ...Appendixes 368 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 394: ...Access list 394 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 414: ...DHCP TFTP 414 Avaya Application Solutions IP Telephony Deployment Guide ...