When installing and configuring SMG, you should pay attention to security settings – access organization to PBX management and monitoring, as well as call processing security. You should also pay attention to configuration backup.
Organization of access implies:
Using SMG on a public network is undesirable without the use of additional security measures, such as a session border controller (SBC), a firewall, etc. |
Changing passwords for admin/root accounts is mandatory to ensure device security. |
Passwords are changed via the ‘Users: Management’ menu.
Changing the WEB password for the admin account is done in the ‘Set the administator password for web-interface’.
Changing the CLI password for the admin account is done in the ‘Set the administrator password for telnet/ssh’. More detailed information on setting can be found in the «Management» section.
Changing the password for the root account is done through the shell. In order to change the password, you need connect to SMG via ssh/console and run the following commands:
SMG2016>
SMG2016> sh (выход из режима cli в режим shell)
/home/admin #
/home/admin #
/home/admin # passwd root (команда для смены пароля root)
Changing password for root
New password: (ввести новый пароль)
Retype password: (повторить новый пароль)
Password for root changed by root
/home/admin #
/home/admin #
/home/admin # save
tar: removing leading '/' from member names
***Saved successful
New image 0
Restored successful
/home/admin #
Creation of limited accounts for the web is done through the 'Users:Management' menu.
Creating restricted accounts is not supported for the CLI. More information on settings can be found in the «Management» section.
Restrictions are configured in the 'TCP/IP Settings' → 'Network Interfaces' menu.
More detailed configuration information can be found in the Network interfaces section.
Telnet access to the device should be prohibited via the public IP address.
Management should be allowed NOT via public addresses. If it is still used management via public IP, then it is necessary to use a list of allowed IP addresses – you need to add to the white list the address from which connections will be allowed. For all the rest, the access should be denied.
CHANGING STANDARD PORTS FOR ACCESS TO THE DEVICE
The setting is made in the menu 'TCP/IP Settings' → 'Network Settings'
SMG2016>
SMG2016> config
Entering configuration mode.
SMG2016-[CONFIG]> network
Entering Network mode.
SMG2016-[CONFIG]-NETWORK>
PORT Number in the range 1-65535
SMG2016-[CONFIG]-NETWORK> set settings web (specify the necessary port in the 1–65535 range)
It is recommended to use the HTTPS protocol to access the web interface.
It can be configured in the 'Security' → 'SSL/TLS settings' section. The 'HTTPS only' should be selected as the 'Protocol for WEB-interface' in the SSL/TLS settings. It is also possible to use authorization via PAM/RADIUS. More detailed information on setup can be found in the SSL/TLS settings section.
CONFIGURING A LIST OF ALLOWED IP ADDRESSES
The setting is made in the 'Security' → 'White addresses list' menu.
More detailed configuration information can be found in White addresses list section.
A static firewall is used to restrict access to network interfaces according to a list of pre-defined rules.
The settings can be made in the ‘Security’ -> ‘Static Firewall’ menu.
More detailed configuration information can be found in the Static firewall section.
A dynamic firewall is used to restrict access to network interfaces based on analysis of requests to various services. If repeated unsuccessful attempts to access service from the same IP address are detected, the dynamic firewall temporarily blocks it.
If an address is temporarily blocked several times, it is permanently blocked in the black list of addresses.
The settings can be made in the ‘Security’ → ‘Dynamic Firewall’ menu.
More detailed configuration information can be found in the Dinamic firewall section.
It is not recommended to use standard port 5060 for SIP signaling.
It is necessary to periodically check the information in the ‘Security’ → ‘Blocked addresses list’ section. It displays a list of addresses blocked by the dynamic firewall from which an unsuccessful attempt was made to gain access to the device.
It is recommended to periodically change passwords for accessing the device via web/ssh. The Policy of shifting passwords should be determined by your security team.
It is recommended to use the latest software version: https://eltex-co.ru/support/downloads/ |