When installing and configuring SMG, you should pay attention to security settings – access organization to PBX management and monitoring, as well as call processing security. You should also pay attention to configuration backup.

Organization of access implies:

Using SMG on a public network is undesirable without the use of additional security measures, such as a session border controller (SBC), a firewall, etc.

Changing passwords on WEB and CLI

Changing passwords for admin/root accounts is mandatory to ensure device security.

Passwords are changed via the ‘Users: Management’ menu.

Changing the WEB password for the admin account is done in the ‘Set the administator password for web-interface’.  

Changing the CLI password for the admin account is done in the ‘Set the administrator password for telnet/ssh’. More detailed information on setting can be found in the «Management» section.

Changing the password for the root account is done through the shell. In order to change the password, you need connect to SMG via ssh/console and run the following commands:

SMG2016>

SMG2016> sh (выход из режима cli в режим shell)

/home/admin #

/home/admin #

/home/admin # passwd root (команда для смены пароля root)

Changing password for root

New password: (ввести новый пароль)

Retype password: (повторить новый пароль)

Password for root changed by root

/home/admin #

/home/admin #

/home/admin # save

tar: removing leading '/' from member names

***Saved successful

New image 0

Restored successful

/home/admin #

Creating restricted accounts

Creation of limited accounts for the web is done through the 'Users:Management' menu.

Creating restricted accounts is not supported for the CLI. More information on settings can be found in the «Management» section.

Restricting access to signaling and management interfaces

Restrictions are configured in the 'TCP/IP Settings' 'Network Interfaces' menu.


More detailed configuration information can be found in the Network interfaces section.

Telnet access to the device should be prohibited via the public IP address.

Management should be allowed NOT via public addresses. If it is still used management via public IP, then it is necessary to use a list of allowed IP addresses – you need to add to the white list the address from which connections will be allowed. For all the rest, the access should be denied.

CHANGING STANDARD PORTS FOR ACCESS TO THE DEVICE

The setting is made in the menu 'TCP/IP Settings' 'Network Settings'

SMG2016>

SMG2016> config

Entering configuration mode.

SMG2016-[CONFIG]> network

Entering Network mode.

SMG2016-[CONFIG]-NETWORK>

PORT Number in the range 1-65535

SMG2016-[CONFIG]-NETWORK> set settings web (specify the necessary port in the 1–65535 range)

It is recommended to use the HTTPS protocol to access the web interface.

It can be configured in the 'Security' → 'SSL/TLS settings' section.  The 'HTTPS only' should be selected as the 'Protocol for WEB-interface' in the SSL/TLS settings. It is also possible to use authorization via PAM/RADIUS. More detailed information on setup can be found in the SSL/TLS settings section.

CONFIGURING A LIST OF ALLOWED IP ADDRESSES

The setting is made in the 'Security' 'White addresses list' menu.

More detailed configuration information can be found in White addresses list section.

Configuring a static firewall

A static firewall is used to restrict access to network interfaces according to a list of pre-defined rules.

The settings can be made in the Security -> Static Firewall menu.

More detailed configuration information can be found in the Static firewall section.

Configuring a dynamic firewall

A dynamic firewall is used to restrict access to network interfaces based on analysis of requests to various services. If repeated unsuccessful attempts to access service from the same IP address are detected, the dynamic firewall temporarily blocks it.

If an address is temporarily blocked several times, it is permanently blocked in the black list of addresses.

The settings can be made in the Security Dynamic Firewall menu.

More detailed configuration information can be found in the Dinamic firewall section.

It is not recommended to use standard port 5060 for SIP signaling.

It is necessary to periodically check the information in the Security Blocked addresses list section. It displays a list of addresses blocked by the dynamic firewall from which an unsuccessful attempt was made to gain access to the device.

It is recommended to periodically change passwords for accessing the device via web/ssh. The Policy of shifting passwords should be determined by your security team.

It is recommended to use the latest software version: https://eltex-co.ru/support/downloads/