
188
SMG digital gateway
9
APPENDIX E. GUIDELINES FOR SMG OPERATION IN A PUBLIC NETWORK
SMG operation in a public network requires to take all security measures in order to avoid the device
password brute forcing, DoS (DDoS) attacks, and other intrusive actions which may lead to unstable operation,
subscriber data theft, attempts to perform calls at the expense of other subscribers, and consequently to
damages to the service provider as well as subscribers.
Avoid using SMG in a public network without additional protective measures like session border controller
(SBC), firewall, etc.
Guidelines for SMG Operation in a Public Network
Operation in a public network with the default SIP signalling port 5060 is not recommended. To
change this, modify the
Port for SIP signalling reception
parameter in the
SIP interfaces
settings in
SIP general configuration and SIP interface settings. This setting will not ensure complete
protection as the signalling port may be discovered during port scanning.
If IP addresses of all devices communicating with SMG are known, use the
iptables
utility to
configure rules allowing access from these addresses and denying access from all other ones.
Also, you should configure the
fail2ban
utility.
Fail2ban stores unsuccessful SIP protocol access attempts in a log file (/tmp/log/pbx_sip_bun.log), and if
the number of such attempts exceeds a defined value, the IP address, which has originated them, will be banned
for the specified time. The utility also allows generation of lists for trusted and untrusted addresses.
For detailed
description, see section
4.1.11.1
.