Table of Contents
OVERVIEW ..................................................................................................................... 3
WEB UI/SSH ACCESS ................................................................................................... 4
GVC32xx Web UI Access ..................................................................................................................... 4
Web UI Access Protocols ..................................................................................................................... 4
User Login ............................................................................................................................................ 4
User Management Levels .................................................................................................................... 5
SSH Access .......................................................................................................................................... 6
DEVICE CONTROL SECURITY ..................................................................................... 7
Screen lock ........................................................................................................................................... 7
Permission to install apps from unknown sources ............................................................................... 7
GUI Config Tool Settings ...................................................................................................................... 7
SECURITY FOR SIP ACCOUNTS AND CALLS ............................................................ 8
Protocols and Ports .............................................................................................................................. 8
Anonymous/Unsolicited Calls Protection ........................................................................................... 10
SRTP .................................................................................................................................................. 11
NETWORK SECURITY ................................................................................................. 12
VPN .................................................................................................................................................... 12
802.1X ................................................................................................................................................ 12
Bluetooth ............................................................................................................................................ 13
SECURITY FOR GVC32XX SERVICES ....................................................................... 14
Provisioning via Configuration File ..................................................................................................... 14
Firmware Upgrading ........................................................................................................................... 16
TR-069 ................................................................................................................................................ 17
ADB Service ....................................................................................................................................... 18
LDAP .................................................................................................................................................. 18
Syslog ................................................................................................................................................. 19
SECURITY GUIDELINES FOR GVC32XX DEPLOYMENT.......................................... 20