Instruction manual
Issue 9 May 2003 3-1
3
IP security
NOTE:
Unless specifically stated otherwise, references in this document to “G3Vx 
and later” include the specified DEFINITY G3 (and more recent) versions, 
DEFINITY ECS, MultiVantage™ Software, and Communication Manager.
Introduction
This section summarizes some of the security issues that arise in a converged 
data and telephony network environment. It also recommends some of the 
practices that can minimize the risk of toll fraud and other security breaches in a 
converged network.
More information about network security can be found on the Avaya support 
website at http://www.avaya.com/support
.
In addition, refer to Chapter 20, ‘‘Links to additional security information’’.
Overview
As IP networks and telephony converge, companies may need to consider 
changes to their computer network to minimize the opportunity for perpetrators to 
compromise their IP telephony server or commit toll fraud. These changes range 
from simply monitoring IP traffic to physically isolating the IP telephony network 
from all other networks in the enterprise.
Although no network is perfectly protected from compromise by individuals with 
unethical intentions, there are practices that Avaya recommends to customers to 
assist in minimizing the chance of “crimes of opportunity” when a IP telephony 
server is placed on the enterprise network.










