04.03.2014 Views

IPT Attack Mitigation - Interop

IPT Attack Mitigation - Interop

IPT Attack Mitigation - Interop

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Layer-3/4 <strong>Attack</strong> <strong>Mitigation</strong> II<br />

• <strong>Mitigation</strong>:<br />

•Segment DATA from VOICE (continued)<br />

Only allow interaction through firewalled access<br />

Mitigates many IP and voice protocol attacks<br />

Make certain your vendor of choice supports voice protocols<br />

•Filter (ACL/FW) and rate-limit (QoS) traffic to known profiles<br />

Endpoints don’t need 100Mb rates to the IP PBX, limit flows<br />

on a per-port basis<br />

•Protect the network stack of any server – PFW/HIDS/HIPS/AV<br />

IP PBX<br />

Voice Gateway<br />

User System<br />

Corporate<br />

Server<br />

V<br />

Voice Segment<br />

Data Segment<br />

User System<br />

Proxy Server<br />

Secure Voice N+I<br />

© 2004, Cisco Systems, Inc. All rights reserved.<br />

Vmail Server<br />

Email Server<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!