EasyManua.ls Logo

AudioCodes Mediant 500 - Secure Device Access; Save Configuration

AudioCodes Mediant 500
40 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
BroadSoft SIP Trunk
Quick Guide 36 Document #: LTRT-14020
5.8 Secure Device Access
Note:
Due to the vast number of potential attacks (such as DDoS), security of your VoIP
network should be your paramount concern. The AudioCodes device provides a wide
range of security features to support perimeter defense. For recommended security
configuration for your AudioCodes device, refer to AudioCodes' Security Guidelines
document.
It's recommended that when leaving the device at the end customer's premises, its
management interface will be accessible by remote, only when required. If not required,
request the end customer’s IT administrator to disable the following ports:
Port 80 - HTTP Web interface access
Port 443 - HTTPS Web interface access
Port 22 - SSH access
Port 23 - Telnet access
Ports 161 - SNMP access
If future remote management is required, first ask the end customer’s IT administrator to
open the appropriate port (e.g., HTTP or HTTPS port) to manage the device.
5.9 Save Configuration
Note:
Firewall settings for the DMZ must be in place before resetting the device. After
the device is reset, its new IP configuration is applied and it is no longer available for
management from the LAN. Therefore, make sure the firewall allows the ports required
for call handling. See Section 5.2 for more information.
Save configuration as follows:
1. On the toolbar, click Save button:

Other manuals for AudioCodes Mediant 500

Related product manuals