Applications Security
Use the questions listed in Notes/Comments" section.
3
Do you require encrypted communication between the Cisco IP Phones?
4
Do you want Cisco IP Phones and other devices to authenticate to the call-processing servers before registration?
5
Do all the applications have antivirus software installed?
Notes/Comments
By using the information collected in Table C-10, you should be able to design an IPT system that meets the organizations security requirements.