I would assume that a laptop plugged into the VOIP phone ethernet connection would be assigned an IP address within that scope. Also, I would assume that this will allow it to connect to the VOIP elements (CLAN’s and Medpros) and that the CLAN’s and Medpro have telnet and ftp desabled (unless taking a vintage upgrade) and only accept ssh connections. And, also, I would assume that the CLANs and Medpros are protected from ping floods.
We have designed the network by isolating all the VOIP elements only into a VLAN, and we use a VRF. The phones, and, thus, phone ethernet ports are located in the private network side and communicate with the CM via that network.
I would be interested in hearing anyone's opinions regarding physical ethernet port level security. I feel that we have addressed this issue well, but, am not entirely sure. It is important that we are able to project an ironclad security presentation regarding Avaya VoIP to our security personnel.
Thank you,
Marilynn
We have designed the network by isolating all the VOIP elements only into a VLAN, and we use a VRF. The phones, and, thus, phone ethernet ports are located in the private network side and communicate with the CM via that network.
I would be interested in hearing anyone's opinions regarding physical ethernet port level security. I feel that we have addressed this issue well, but, am not entirely sure. It is important that we are able to project an ironclad security presentation regarding Avaya VoIP to our security personnel.
Thank you,
Marilynn