Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Use latest versions of 
    Spacevars
    0product
    software. When new security vulnerabilities are reported in operating systems and common third-party software, Sonus
    Spacevars
    0company
    produces maintenance releases incorporating the fixes.
  2. Configure Access Control Lists.
  3. Use TLS/SRTP for SIP/Media.
  4. Only use Certificates from Trusted CA. Do not use self-signed certificates (unless the systems with self-signed certificates are within your trusted network).
  5. Enable enhanced password security for SBC operator accounts.
  6. If Active Directory is used, use TLS with Active Directory.
  7. Check if RADIUS is used for user authentication.
    • Passwords are encrypted during RADIUS authentication process. However, RADIUS works on UDP and fields other than the user's credentials are not encrypted. RADIUS servers and the
      Spacevars
      0product
      are usually within the same trusted domain (inside corporate LAN protected by firewall or over VPN) and so this is not an issue at all. However, if confidentiality is important even inside the trusted domain, RADIUS should not be used.
    • Documentation links:
  8. Check if RADIUS CDR confidentiality is required
    • RADIUS CDR transport is based on UDP and this data is not encrypted. In all cases however, RADIUS servers and 
      Spacevars
      0product
      are usually within the same trusted domain (inside corporate LAN protected by firewall or over VPN), consequently this is not an issue. However, if confidentiality is important inside the trusted domain, RADIUS should not be used.
    • Documentation link:
  9. If the ASM module is present, configure the ASM Firewall.
  10. If the ASM module is present, configure the ASM security template

...