CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Q&A

    1:

    What systems are in the Campus module of the small IP telephony blueprint?

    A1:

    The Campus module of the small IP telephony blueprint contains the end-user systems and the corporate servers, such as voice-mail servers, e-mail servers, management servers, IP phones, and the Layer 2 infrastructure.

    2:

    Why do PC-based IP phones violate the axiom "Data and voice segmentation is key"?

    A2:

    PC-based IP phones violate the axiom because these are software-only IP telephony devices that reside on the data segment of the network but require access to the voice segment.

    3:

    What considerations given to production servers in the data segment also should be provided to the voice servers in the voice segment?

    A3:

    The considerations given to production servers in the data segment of the network that also should be provided to the voice servers in the voice segment of the network include turning off all unneeded services, patching the operating system with the latest security patches, hardening the OS configuration, disabling unnecessary or unused features in the voice system, and not running unnecessary applications on the voice servers.

    4:

    What is the best way to control the voice and data segment interaction?

    A4:

    Controlling the voice-to-data segment interaction is critical to successfully deploying and securing an IP telephony system. The best way to accomplish this task is to use a stateful firewall. This type of firewall provides denial-of-service (DoS) protection against connection starvation and fragmentation attacks, as well as dynamic, per-port access through it, when necessary. It additionally provides spoof mitigation and general packet filtering.

    5:

    What are some of the specific attack-mitigation details that are especially applicable to an IP telephony deployment?

    A5:

    These attack-mitigation details are specific to an IP telephony deployment:

    • Statically assign IP addresses to known MAC addresses in DHCP networks with IP phones deployed.

    • Turn off the common temporary automatic phone-registration feature that many call-processing managers have available.

    • Configure the call-processing managers to deny configuration information to unknown PC-based IP phones.

    • Use a utility such as ARPwatch to monitor MAC addresses in the voice segment.

    • Filter all inbound network segments at the stateful firewall in front of the call-processing manager and the voice-mail system, to restrict which devices can connect to these servers.

    6:

    What are some of the services provided by the voice-enabled firewall/router in the Corporate Internet module of the small IP telephony design?

    A6:

    The voice-enabled firewall router in the Corporate Internet module of the small IP telephony design provides not just the typical security services, such as NAT, VPN, stateful firewall inspection of traffic, and IDS, but also voice services, including VLAN segmentation.

    7:

    What are the key network devices in the Campus module of the medium-sized IP telephony blueprint, and what are their functions?

    A7:

    The key network devices in this module and their functions are as follows:

    Key Device

    Functions

    Layer 3 switch

    Routes and switches voice and data traffic within the module

    Layer 2 switch (with VLAN support)

    Provides network connectivity to endpoint user workstations and IP phones

    Corporate servers

    Provide e-mail and voice-mail services to internal users, and provide file, print, and DNS resolution to workstations

    User workstation

    Provides data services and voice services (through PC-based IP phones) to end users

    NIDS appliance

    Provides Layer 4 to Layer 7 packet inspection

    IP phones

    Provide voice services to end users

    Call-processing manager

    Provides voice services to IP telephony devices in the module

    Proxy server

    Provides data services to IP phones

    Stateful firewall

    Provides network-level filtering for the call-processing manager and the proxy server

    8:

    What is the primary function of the Campus module of the medium-sized IP telephony blueprint?

    A8:

    The primary function of the Campus module is to switch data, voice, and management traffic while enforcing the network and voice VLAN separation. The VLAN separation is augmented by the use of filtering on the Layer 3 switch and also a stateful firewall.

    9:

    What is the purpose of placing a NIDS between the voice and data segments of the network?

    A9:

    NIDS can be deployed between the voice and data segments to provide detection capabilities of any DoS attacks targeted specifically at the voice segment.

    10:

    How is resiliency provided in the Server module of the large IP telephony design?

    A10:

    Resiliency, or high availability, is ensured through the use of multiple call-processing managers and multiple firewalls configured in high-availability mode.


  • / 290