P a g e | 1
Table of Contents
OVERVIEW ..................................................................................................................... 3
WEB UI/SSH ACCESS ................................................................................................... 4
Web UI Access ..................................................................................................................................... 4
Web UI Access Protocols ..................................................................................................................... 4
Admin Login .......................................................................................................................................... 5
User Management Levels .................................................................................................................... 6
SECURITY FOR SIP ACCOUNTS AND CALLS ............................................................ 8
Protocols and Ports .............................................................................................................................. 8
Anonymous/Unsolicited Calls Protection ............................................................................................. 9
SRTP .................................................................................................................................................. 11
SNMP ................................................................................................................................................. 11
SECURITY FOR GRP SERVICES ................................................................................ 12
Firmware Upgrade and Provisioning .................................................................................................. 12
TR-069 ................................................................................................................................................ 13
Syslog ................................................................................................................................................. 15
SECURITY GUIDELINES FOR GRP DEPLOYMENT .................................................. 16