Difference between revisions of "Tech Update Security"
John Wolfe (talk | contribs) (Created page with " '''Tech Update Security Security Best Practices''' Security is a serious concern for any application on a network. There is no shortage of potential intruders intent on steal...") |
|||
Line 1: | Line 1: | ||
− | '''Tech Update | + | '''Tech Update Security Security Best Practices''' |
− | Security | ||
− | Security Best Practices''' | ||
Security is a serious concern for any application on a network. There is no shortage of | Security is a serious concern for any application on a network. There is no shortage of | ||
potential intruders intent on stealing services and otherwise causing problems with your | potential intruders intent on stealing services and otherwise causing problems with your | ||
system. | system. | ||
+ | |||
IPitomy has designed several security features into the systems to thwart those threats and | IPitomy has designed several security features into the systems to thwart those threats and | ||
to avoid the shock of getting hacked. Proper use of security and adhering to a diligent | to avoid the shock of getting hacked. Proper use of security and adhering to a diligent | ||
security policy is your best way to avoid security breaches. | security policy is your best way to avoid security breaches. | ||
+ | |||
Here is a list of Best Practices to implement when installing an IP PBX System. Keep in | Here is a list of Best Practices to implement when installing an IP PBX System. Keep in | ||
mind that if users have access to the management interface and can add extensions or | mind that if users have access to the management interface and can add extensions or | ||
change passwords, they should be made aware of the best practices as well. | change passwords, they should be made aware of the best practices as well. | ||
− | Passwords | + | |
+ | ==Passwords== | ||
Passwords are the key to hacking into anything. Avoid using passwords that are dictionary | Passwords are the key to hacking into anything. Avoid using passwords that are dictionary | ||
words or number strings like 1234, 1111 etc. Never use words that can be associated with | words or number strings like 1234, 1111 etc. Never use words that can be associated with | ||
Line 19: | Line 20: | ||
A strong password has a combination of upper and lower case characters including | A strong password has a combination of upper and lower case characters including | ||
numbers and punctuation characters. | numbers and punctuation characters. | ||
+ | |||
All users should be reminded that the PIN number for their mailbox should not be their | All users should be reminded that the PIN number for their mailbox should not be their | ||
extension number. The default password for the system administration should always be | extension number. The default password for the system administration should always be | ||
changed. | changed. | ||
− | Port Forwarding | + | |
+ | ==Port Forwarding== | ||
If you are not using remote phones, turn off any unused port forwards. | If you are not using remote phones, turn off any unused port forwards. | ||
− | + | ||
+ | ==LAN vs. WAN== | ||
Always ensure local extensions are set to LAN. | Always ensure local extensions are set to LAN. | ||
− | Access Control List (ACL) | + | |
+ | ==Access Control List (ACL)== | ||
This controls which IP addresses are allowed to be connected to the system. Unauthorized users are dropped before they get a chance | This controls which IP addresses are allowed to be connected to the system. Unauthorized users are dropped before they get a chance | ||
to try anything. | to try anything. | ||
− | Create a Class of Service for Remote Phones | + | |
+ | ==Create a Class of Service for Remote Phones== | ||
+ | |||
Clone the default class of service and remove access to international dialing. | Clone the default class of service and remove access to international dialing. | ||
− | International Dialing | + | |
− | Remove international dialing or restrict it to only users who require it. If you don't use it, restrict it. | + | ==International Dialing== |
+ | Remove international dialing or restrict it to only users who require it. If you don't use it, restrict it. To do so, don't add a trunk to the Intl route, and then no one can make calls. |
Revision as of 21:51, 10 November 2015
Tech Update Security Security Best Practices Security is a serious concern for any application on a network. There is no shortage of potential intruders intent on stealing services and otherwise causing problems with your system.
IPitomy has designed several security features into the systems to thwart those threats and to avoid the shock of getting hacked. Proper use of security and adhering to a diligent security policy is your best way to avoid security breaches.
Here is a list of Best Practices to implement when installing an IP PBX System. Keep in mind that if users have access to the management interface and can add extensions or change passwords, they should be made aware of the best practices as well.
Passwords
Passwords are the key to hacking into anything. Avoid using passwords that are dictionary words or number strings like 1234, 1111 etc. Never use words that can be associated with you or your business. IPitomy generates random strong passwords when a SIP account is created. It is recommended that those SIP passwords remain strong if modified. A strong password has a combination of upper and lower case characters including numbers and punctuation characters.
All users should be reminded that the PIN number for their mailbox should not be their extension number. The default password for the system administration should always be changed.
Port Forwarding
If you are not using remote phones, turn off any unused port forwards.
LAN vs. WAN
Always ensure local extensions are set to LAN.
Access Control List (ACL)
This controls which IP addresses are allowed to be connected to the system. Unauthorized users are dropped before they get a chance to try anything.
Create a Class of Service for Remote Phones
Clone the default class of service and remove access to international dialing.
International Dialing
Remove international dialing or restrict it to only users who require it. If you don't use it, restrict it. To do so, don't add a trunk to the Intl route, and then no one can make calls.