cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
481
Views
1
Helpful
6
Replies

voice vulnerability mitigation

jaheshkhan
Level 4
Level 4

we got voice vulnerability solutions  as below:

Enable encryption: Ensure that your VoIP traffic is encrypted using secure protocols such as Secure Real-time Transport Protocol (SRTP) or Transport Layer Security (TLS). Encryption prevents eavesdropping and tampering with voice data, even if a NAC bypass occurs.

 

Use secure signaling protocols: Deploy secure signaling protocols like SIP over TLS (Transport Layer Security) or SIP over VPN (Virtual Private Network) to protect the signaling and authentication processes in your VoIP network. This helps prevent unauthorized access to VoIP services.

Implement VLANs and access control: Divide your network into Virtual LANs (VLANs) and apply access control policies to restrict communication between them. This helps contain potential threats and limits the impact of a successful NAC bypass on the VoIP network.

cucm version is  11.5

how to achieve this? 


any cisco guide in this regard?

 

6 Replies 6

b.winter
VIP
VIP

IMHO, these are not "security vulnerabilities".
These are general guidelines on how to secure your voice traffic.

Furthermore, point 3 has nothing to do with CUCM.

This is actually solution for voice related security vulnerabilities recommended if its not done. 

if you know the right guide i can check it out.

But these points are not specific fixes to solve specific vulnerabilities.
They are general guidelines and recommendations. And you (the technician) are the one, who needs to specify which guidelines you implement in which way. The answers to these questions are different from company to company. There is no global solution, that fits everywhere.

It's like saying, that you should put on a rain cover, if it's raining.

For further info, check out the security guide of Cisco CUCM.
Or search the forum.

they just want SRTP and secure signaling protocol guide.

Is there any guide for that what normally people used to setup. 

IT manager wants it. he told me to check in the forum or cisco guide . but i couldnt find any step by step guide for it

As written, you should check out the security guide (The forum is not here, to google things for you, which are public in the internet). But luckily for you @Nithin Eluvathingal already did that.