It is of utmost importance to ensure that the Com.X system is secure. If a Com.X unit is public facing, large costs can be incurred if the VoIP configuration security is weak, or downtime and degraded performance may result from the Operating System being compromised. The following steps are recommended to ensure a secure Com.X system:
1.5 Administrator's Guide
- Managing the Unit
- Commissioning the unit
- Global Settings
- Network configuration
- Connections
- Ethernet Interface Configuration
- Firewall Configuration
- Network Quality of Service
- Hardware Device Configuration
- Managed SIP Phone Provisioning
- Configuring Comma device ports
- Extensions
- Trunk groups and VOIP providers
- Outbound Routes
- Inbound Routing
- FlexPaths
- Call recording
- Powering the Com.X via an Uninterrupted Power Supply
- Securing the system
- Call behavior on No answer / Busy
- Advanced configuration
- Announcements
- Calendar
- Callback
- Conferences
- Day / Night control
- DISA
- Feature Codes
- General Settings
- Intercom
- IVR
- Listening in on calls / Spy feature
- Music on hold
- Outbound routes
- Paging
- Parking Lot
- Phonebook
- Pin Sets
- Queues
- Ring Groups
- System Recordings
- Time Conditions
- Time Groups
- Voicemail Blasting
- Monitoring the system
- Advanced Administration
- Adding static routes to the network
- Console access
- fail2ban integration
- Microsoft Outlook integration
- Setting up a streaming music server
- Telephone Management Systems (TMS)
- Third Party Modules
- Flash operator panel
- Nagios
- ViBE
- Rebooting the system
- Configuring email services
- Asterisk PBX software management
- FreePBX access
- Manually backing up and restoring the configuration
- Setting the system’s date, time and timezone
- Video call support (H.263 and H.263+)
- Recovering / resetting the Com.X comma user password
- Booting the Com.X in recovery mode
- Troubleshooting
- User Control Panel
- search
- Home
- Docs
- 1.5 Administrator’s Guide
- Commissioning the unit
- Securing the system