Difference between revisions of "Tech Update Security"

From IPitomy Wiki
Jump to navigation Jump to search
(Created page with " '''Tech Update Security Security Best Practices''' Security is a serious concern for any application on a network. There is no shortage of potential intruders intent on steal...")
 
Line 1: Line 1:
  
'''Tech Update
+
'''Tech Update Security Security Best Practices'''
Security
 
Security Best Practices'''
 
 
Security is a serious concern for any application on a network. There is no shortage of
 
Security is a serious concern for any application on a network. There is no shortage of
 
potential intruders intent on stealing services and otherwise causing problems with your
 
potential intruders intent on stealing services and otherwise causing problems with your
 
system.
 
system.
 +
 
IPitomy has designed several security features into the systems to thwart those threats and
 
IPitomy has designed several security features into the systems to thwart those threats and
 
to avoid the shock of getting hacked. Proper use of security and adhering to a diligent
 
to avoid the shock of getting hacked. Proper use of security and adhering to a diligent
 
security policy is your best way to avoid security breaches.
 
security policy is your best way to avoid security breaches.
 +
 
Here is a list of Best Practices to implement when installing an IP PBX System. Keep in
 
Here is a list of Best Practices to implement when installing an IP PBX System. Keep in
 
mind that if users have access to the management interface and can add extensions or
 
mind that if users have access to the management interface and can add extensions or
 
change passwords, they should be made aware of the best practices as well.
 
change passwords, they should be made aware of the best practices as well.
Passwords
+
 
 +
==Passwords==
 
Passwords are the key to hacking into anything. Avoid using passwords that are dictionary
 
Passwords are the key to hacking into anything. Avoid using passwords that are dictionary
 
words or number strings like 1234, 1111 etc. Never use words that can be associated with
 
words or number strings like 1234, 1111 etc. Never use words that can be associated with
Line 19: Line 20:
 
A strong password has a combination of upper and lower case characters including
 
A strong password has a combination of upper and lower case characters including
 
numbers and punctuation characters.
 
numbers and punctuation characters.
 +
 
All users should be reminded that the PIN number for their mailbox should not be their
 
All users should be reminded that the PIN number for their mailbox should not be their
 
extension number. The default password for the system administration should always be
 
extension number. The default password for the system administration should always be
 
changed.
 
changed.
Port Forwarding
+
 
 +
==Port Forwarding==
 
If you are not using remote phones, turn off any unused port forwards.
 
If you are not using remote phones, turn off any unused port forwards.
LA� vs. WA�
+
 
 +
==LAN vs. WAN==
 
Always ensure local extensions are set to LAN.
 
Always ensure local extensions are set to LAN.
Access Control List (ACL)
+
 
 +
==Access Control List (ACL)==
 
This controls which IP addresses are allowed to be connected to the system. Unauthorized users are dropped before they get a chance
 
This controls which IP addresses are allowed to be connected to the system. Unauthorized users are dropped before they get a chance
 
to try anything.
 
to try anything.
Create a Class of Service for Remote Phones
+
 
 +
==Create a Class of Service for Remote Phones==
 +
 
 
Clone the default class of service and remove access to international dialing.
 
Clone the default class of service and remove access to international dialing.
International Dialing
+
 
Remove international dialing or restrict it to only users who require it. If you don't use it, restrict it.
+
==International Dialing==
 +
Remove international dialing or restrict it to only users who require it. If you don't use it, restrict it.  To do so, don't add a trunk to the Intl route, and then no one can make calls.

Revision as of 21:51, 10 November 2015

Tech Update Security Security Best Practices Security is a serious concern for any application on a network. There is no shortage of potential intruders intent on stealing services and otherwise causing problems with your system.

IPitomy has designed several security features into the systems to thwart those threats and to avoid the shock of getting hacked. Proper use of security and adhering to a diligent security policy is your best way to avoid security breaches.

Here is a list of Best Practices to implement when installing an IP PBX System. Keep in mind that if users have access to the management interface and can add extensions or change passwords, they should be made aware of the best practices as well.

Passwords

Passwords are the key to hacking into anything. Avoid using passwords that are dictionary words or number strings like 1234, 1111 etc. Never use words that can be associated with you or your business. IPitomy generates random strong passwords when a SIP account is created. It is recommended that those SIP passwords remain strong if modified. A strong password has a combination of upper and lower case characters including numbers and punctuation characters.

All users should be reminded that the PIN number for their mailbox should not be their extension number. The default password for the system administration should always be changed.

Port Forwarding

If you are not using remote phones, turn off any unused port forwards.

LAN vs. WAN

Always ensure local extensions are set to LAN.

Access Control List (ACL)

This controls which IP addresses are allowed to be connected to the system. Unauthorized users are dropped before they get a chance to try anything.

Create a Class of Service for Remote Phones

Clone the default class of service and remove access to international dialing.

International Dialing

Remove international dialing or restrict it to only users who require it. If you don't use it, restrict it. To do so, don't add a trunk to the Intl route, and then no one can make calls.