Freeswitch and PBX security

Status
Not open for further replies.

yukon

Member
Oct 3, 2016
138
14
18
Was wondering what everyone's security ideas are. How do you keep your system secure, how do you protect your provisioning, etc.

For me:
  • All customers required to have static IP
  • IP tables configured to only allow those IP's on 5060, etc
  • Only https enabled, any IP can hit 443
  • Use CIDR in fusionpbx provisioning
  • Use http auth password for fusionpbx provisioning
  • fail2ban setup with fusionpbx installed scripts and a couple custom ones.
Any other ideas and how do you handle security?
 

NateDoc

New Member
Nov 1, 2016
3
0
1
43
All accounts use named domains - that limits attackers dramatically since without knowing the domain name they can't ever successfully invite. Goes without saying not to use the domain in rDNS for this to be effective.
 

DigitalDaz

Administrator
Staff member
Sep 29, 2016
3,045
566
113
I have customers with static and dynamic IP
Provisioning I still do in the clear.
I also only use domain names and block anything that so much as sniffs at the IP

The current rule.v4 I think I have just posted on here somehwere
 

roger_roger

Member
Oct 12, 2016
198
19
18
69
I used to block all address except my customer's but then we started offering a mobile client and that made it mandatory that we do not block any addresses.

I have an ACL on my router that blocks most RIPE addresses and some other large blocks that I have identified as being potentially bad. I also have fail2ban set pretty aggressively as well.
 
Status
Not open for further replies.