A Secure Deployment Checklist
The following security checklist includes guidelines that help secure your system
The following security checklist includes guidelines that
help secure your system
- Do NOT connect your system to any untrusted networks, especially the Internet, until all protections have been configured. Customers have reported systems under configuration compromised in minutes due to incomplete configurations.
- Harden the management environment.
- Install HA connections between units over a direct cable vs. a network.
- Make sure all equipment is in locked cabinets or at least in a secure room.
- Configure console timeouts.
- Ensure that the wancom0 management port is connected to a private management LAN with an IP address that is not Internet routable.
- Set strong passwords for all default accounts prior to configuration.
- Disable telnet and FTP if they are enabled.
- Configure system ACLs to limit management traffic to users that really need access.
- If implementing SNMP, change the default community string and follow the SNMP configuration recommendations in Appendix H:
- Use strong ciphers for HTTPS web management connection.
- Practice the principle of least privilege.
- Carefully consider who has access to the admin password.
- Implement RADIUS or TACACS+ authentication if available.
- Restrict network access.
- Use services ACLs where possible.
- Refrain from configuring host-in-path addresses.
- Ensure that users coming from an untrusted network have to register prior to providing service.
- Implement DoS and CAC protections.
- Mitigate known fraud schemes by implementing sipShield or HMRs.
- Use strong ciphers for any TLS connections.
- Enable OCSP and mutual authentication if possible for TLS connections.
- Monitor the system for unusual events.
- Configure the SNMP trap receiver and syslog receiver.
- Send either CDRs or RADIUS accounting records to a fraud management system or implement a solution that can actively monitor SIP signaling.