1.5 Administrator's Guide

  1. Home
  2. Docs
  3. 1.5 Administrator’s Guide
  4. Commissioning the unit
  5. Securing the system
  6. Network Security

Network Security

  • Preferably allow remote (external) access (VoIP and data) to the Com.X only by means of a Virtual Private Network (VPN)

  • Configure the Com.X and telephony devices (e.g. iTA or VoIP phones) on a separate network partition on a managed switched, or a physically separate network.

  • Assign IP addresses and services on the VoIP network based on a white list of approved MAC addresses.

  • Place the Com.X behind a firewall.

  • Perform port forwarding on a non-standard port to port 22 on the Com.X for SSH access. Tunnel HTTP access through the SSH connection.

  • Limit administrator access (SSH and web GUI) to a white list of MAC addresses, IP addresses or networks.

  • Activate fail2ban