Support

Support

Six Practices for Audio Security

- Does internet security really matter for just a phone call?
- Yes, it really does.

IP-based audio transmission involves complicated security issues. While viruses and hacker attacks are your prime concerns for the IP network, phone hijacking and eavesdropping continue to threaten traditional telephone communications.

Therefore, extra precautions and good security practices should be adopted for VoIP products.

Change the web GUI login password
The login password represents the first defense for product security, and shares the same heightened attention to personal privacy and credit information. The password must be regularly changed to strengthen security.
Click “System Tools > Change Password” to change the administrator’s and operator’s passwords (with complexity and confidentiality required). Such change takes immediate effect.

Change the SIP port
VoIP technology adopts several well-known ports, including 1719, 1720 and 5060. Some administrators, when configuring the firewall, keep all ports open for convenience and protection from unintended blockage of useful ports that affect VoIP communications. However, the entire device is exposed, subjecting those unused ports to denial-of-service attacks.
Click “Trunk > SIP trunk > Registration Options” to change the default “Local SIP Port” (Tip: Change to a large four-digit port number). This change effectively minimizes attack risks, and takes effect after the device is rebooted.

Change web port
Click “Advanced Settings > Security Configuration > Web Management” to change https and http ports, which takes effect after the device is rebooted.

Change IP extension passwords
Click “Extension > IP Extension” to change the default extension password. “Number + Letter + Symbol” is recommended.

Disable Telnet and SSH ports
These ports are disabled by default, and must be closed timely upon completion of access.
Click “Advanced Settings > Security Configuration”, and uncheck.

Others
Connection to the public network is usually inadvisable. If it is inevitably necessary, the DMZ configuration is inadvisable and only port forwarding is needed for the router.

You should take extra precautions. During the usual course of business, good security practices are conducive to preventing security breaches.

Contact Us

New Rockers will do our best to support you
Contact with Us now

Copyright © New Rock Technologies, Inc. All Rights Reserved. 沪ICP备15008515号-1