Table of Contents
OVERVIEW ..................................................................................................................... 3
WEB UI/SSH ACCESS ................................................................................................... 4
Web UI Access ..................................................................................................................................... 4
Web UI Access Protocols ..................................................................................................................... 4
Admin Login .......................................................................................................................................... 5
User Management Levels .................................................................................................................... 6
SECURITY FOR SIP ACCOUNTS AND CALLS ............................................................ 7
Protocols and Ports .............................................................................................................................. 7
Anonymous/Unsolicited Calls Protection ............................................................................................. 8
SRTP .................................................................................................................................................. 10
SNMP ................................................................................................................................................. 10
SECURITY FOR GXP SERVICES ................................................................................ 11
Firmware Upgrade and Provisioning .................................................................................................. 11
TR-069 ................................................................................................................................................ 12
Syslog ................................................................................................................................................. 14
SECURITY GUIDELINES FOR GXP DEPLOYMENT .................................................. 15