Better Music Builder VM-82U G3 Instruction Manual Page 45

  • Download
  • Add to my manuals
  • Print
  • Page
    / 484
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 44
Issue 9 May 2003 3-1
3
IP security
NOTE:
Unless specifically stated otherwise, references in this document to “G3Vx
and later” include the specified DEFINITY G3 (and more recent) versions,
DEFINITY ECS, MultiVantage™ Software, and Communication Manager.
Introduction
This section summarizes some of the security issues that arise in a converged
data and telephony network environment. It also recommends some of the
practices that can minimize the risk of toll fraud and other security breaches in a
converged network.
More information about network security can be found on the Avaya support
website at http://www.avaya.com/support
.
In addition, refer to Chapter 20, ‘‘Links to additional security information’’.
Overview
As IP networks and telephony converge, companies may need to consider
changes to their computer network to minimize the opportunity for perpetrators to
compromise their IP telephony server or commit toll fraud. These changes range
from simply monitoring IP traffic to physically isolating the IP telephony network
from all other networks in the enterprise.
Although no network is perfectly protected from compromise by individuals with
unethical intentions, there are practices that Avaya recommends to customers to
assist in minimizing the chance of “crimes of opportunity” when a IP telephony
server is placed on the enterprise network.
Page view 44
1 2 ... 40 41 42 43 44 45 46 47 48 49 50 ... 483 484

Comments to this Manuals

No comments