• <progress id="xi9i2"><bdo id="xi9i2"></bdo></progress>
  • <samp id="xi9i2"></samp>
          <menuitem id="xi9i2"><strong id="xi9i2"><u id="xi9i2"></u></strong></menuitem>

            <progress id="xi9i2"><bdo id="xi9i2"><dfn id="xi9i2"></dfn></bdo></progress><menuitem id="xi9i2"><ins id="xi9i2"></ins></menuitem>
            <progress id="xi9i2"><bdo id="xi9i2"></bdo></progress>

          1. News

            News

            How we reduce the risks in the New Rock VoIP gateway setting?

            1. Pay attention to alerts and alarm levels on device (HX4G,MX8G,MX60E and MX120G)web GUI. The administrator can see the total number of security incidents after logging in the device, click the Basic > Alarms to view the details. After confirmation, the entry will not be displayed.
            2. Change the default Web password for the device.
            Note: The operator password cannot be the same as the administrator password.
            3. Change the default SIP port for the device.
            4. Check the anti-brute force mechanism including CAPTCHA for logging into Web GUI limiting the number of login attempts, and access whitelist of trusted IP addresses.
            Main manifestation: The same attack source IP address are made to the Web GUI or SSH in a short time. The IP addresses whose login attempts exceeding the specified limit will be added to the locked IP address list with the locked time which can be set by minute or hour or day.
            5. Disable the Telnet and SSH services on the device.
            Note: You need to set root and operator password to access SSH.
            6. Block the inbound Ping request on the device.
            Note: Ping is allowed by factory default but it is recommended to change, as the hacker could trigger an attack if he detects an address.
            7. Added restrictions on special number of roads.
            8. Let the operator open only those international call areas that need to be opened.
            9. Check the voice security configuration
            Note: When the gateway cannot call outside, first check whether the connection is normal(as long as there is a FXO connection, the defense mechanism is effective) , then examine the configuration.
            10. Set the access whitelist.
            11 .Change the http and https port.
            12. Configure static defense.
            Notes: ①Multiple rules can be added and working from the top down.
            ②Individual IP address of IP address segments can be configured but domain names are not supported.
            ③Configuration protocol types are optional including TCP,UDP and any.
            ④The local port can be configured in the range 0~65535.
            13. Configure dynamic defense.
            14. Enable TLS and SRTP encryption.
            Notes: There must be a supported device or soft switch in the environment.
            It is recommended to force TLS encrypted signaling and SRTP encrypted voice to be selected and to be checked/enabled on the line because it is disabled by default.
            15. Establish a VPN connection.

            Contact Us

            New Rockers will do our best to support you
            Contact with Us now

            Copyright ? New Rock Technologies, Inc. All Rights Reserved. 滬ICP備15008515號-1

            国产一区二区三区在线