09-30-2008 11:26 AM - edited 03-17-2019 09:30 PM
I have an Avaya IP phone connected to a Cisco 3560 PoE and the phone will be located in a public location. I believe there is a way to disable the PC port on a Cisco IP phone, but I have been told that Avaya does not support this and it must be achieved on the switch. So I've enable port-security and specified the MAC address of the IP phone - problem is the MAC address can be clearly read by looking at the back of the phone. What other techniques are recommended to protect internal networks from rogue devices being connected to IP phone ports in public locations?
Solved! Go to Solution.
10-06-2008 11:25 AM
Following is a selection of Cisco secure infrastructure technologies that are especially useful for protecting voice systems:
Virtual LAN
Voice and Video-Enabled VPN
Access Control Lists
Port Security
Cisco Secure Access Control Server
DHCP Snooping
Cisco Firewall Solutions
Intrusion Prevention
Wireless Security
Application Security
Voice Security Primer: Protecting the Voice Infrastructure:
10-06-2008 11:25 AM
Following is a selection of Cisco secure infrastructure technologies that are especially useful for protecting voice systems:
Virtual LAN
Voice and Video-Enabled VPN
Access Control Lists
Port Security
Cisco Secure Access Control Server
DHCP Snooping
Cisco Firewall Solutions
Intrusion Prevention
Wireless Security
Application Security
Voice Security Primer: Protecting the Voice Infrastructure:
11-18-2008 09:20 AM
Are you using ACS?
11-19-2008 08:00 AM
I do not have the luxury of using ACS. But for my edification, what features does ACS offer in relation to my question?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide