Cisco.IP.Telephony.Planning.Design.Implementation.Operation.and.Optimization [Electronic resources]

Tebyan

نسخه متنی -صفحه : 130/ 99
نمايش فراداده

Applications Security

Use the questions listed in Notes/Comments" section.

Yes

No

3 Do you require encrypted communication between the Cisco IP Phones?

Yes

No

4 Do you want Cisco IP Phones and other devices to authenticate to the call-processing servers before registration?

Yes

No

5 Do all the applications have antivirus software installed?

Yes

No

Notes/Comments

By using the information collected in Table C-10, you should be able to design an IPT system that meets the organization's security requirements.