SECURITY GUIDELINES FOR GAC2500 DEPLOYMENT
Often times the GAC2500s are deployed behind NAT. The network administrator can consider following
security guidelines for the GAC2500 to work properly and securely.
• Turn off SIP ALG on the router
On the customer’s router, it’s recommended to turn off SIP ALG (Application Layer Gateway). SIP ALG
is common in many routers intending to prevent some problems caused by router firewalls by inspecting
VoIP packets and modifying it if necessary. Even though SIP ALG intends to prevent issues for VoIP
devices, it can be implemented imperfectly causing problems, especially in some cases SIP ALG
modifies SIP packets improperly which might cause VoIP devices fail to register or establish calls.
• Use TLS and SRTP for SIP calls
On the GAC2500, it’s recommended to use TLS for SIP transport with “sips” in SIP URL scheme for
SIP signaling encryption, and use SRTP for media encryption. Below are the SIP ports and RTPs port
used on the GAC2500 if the network administrator needs to create firewall rules.
▪ Starting from 5060 for account 1, the port numbers increase by 2 for account x. For example,
5062 is the default local SIP port for account 2, 5064 for account 3, etc. The local SIP port can
be configured under Account→SIP Settings for each SIP account.
▪ The Local RTP port can be configured from web UI → Advanced Settings → General Settings.
This parameter defines the local RTP-RTCP port pair used to listen and transmit. If it is
configured with X, in channel 0 the port X will be used for audio RTP message, the port X+1
for audio RTCP message, the port X+2 for video RTP message and the port X+3 for video
RTCP. In Channel 1, each port number will be incremented by 4 for each message. This
increment rule will apply to other channels and other port numbers. By default, the Account 1
will use Channel 0, Account 2 Channel 1, Account 3 Channel 2, Account 4 Channel 3, and
Account 5 Channel 4 and Account 6 Channel 5. Default setting is 5004.The valid range is from
1024 to 65400
Note: On the customer’s firewall, it’s recommended to ensure SIP port is opened for the SIP accounts
on the GAC2500. It’s not necessary to use the default port 5060/5062/… on the firewall. Instead, the
network administrator can consider mapping a different port on the firewall for GAC2500 SIP port 5060
for security purpose.
• Use HTTPS for web UI access
GAC2500 Web UI access should be equipped with strong administrator password in additional to using
HTTPS. Also, do not expose the GAC2500 web UI access to public network for normal usage.
• Use HTTPS for firmware downloading and config file downloading
Use HTTPS for firmware downloading and provisioning. Besides that, set up username and password
for the HTTP/HTTPS server to require authentication. It’s also recommended to turn on “Validate
Certification Chain” so the GAC2500 will validate server certificate when downloading the firmware or
config file.