OpenScape Voice V7, Security Checklist, Planning Guide, Issue 2_addfiles
OpenScape Voice V7, Security Checklist, Planning Guide, Issue 2_addfiles
${DocID}
06/2012
Siemens Enterprise Communications GmbH & Co. KG
2012
Documentation
OpenScape Voice V7
Security Checklist
Planning Guide
A31003-H8070-P102-2-76A9
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1 General Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2 Update and Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3 Customer Deployment - Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2 OpenScape Voice V7 Hardening Measures at a Glance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3 Server Hardening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.1 Hardware Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2 BIOS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.3 Operating System Hardening. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.3.1 Close Unused IP Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.3.2 Password Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.3.2.1 Changing Predefined Passwords for Administrator Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.3.2.2 Change Predefined Passwords for Application Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.3.2.3 Change Default Password Policies for New Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.3.3 Change Denial of Service (DoS) Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.3.4 Allow Internet Protocol Security (IPsec) Fragmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.3.5 Turn on IPsec Between Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.3.6 Transport Layer Security (TLS) Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.3.6.1 Change the Default TLS Certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.3.6.2 Activate Verification for Mutual TLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.3.7 Securing the Administrative Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.3.7.1 SNMP Community Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.3.8 Securing SOAP Signaling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.3.8.1 Securing SOAP Signaling via IPsec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.3.8.2 Securing SOAP Signaling via TLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.3.9 Adding Authorization to SOAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.3.10 Firewalling the SOAP Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.3.11 Securing the IMM or IRMC Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.3.11.1 Change the Default Passwords for the IMM/iRMC Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.3.11.2 Deactivate Clear-Text Administration / Activate Encrypted Communication - FTS RX330S1 and
RX200S6 Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.3.11.3 Deactivate Clear-Text Administration / Activate Encrypted Communication - IBM x3250M3,
x3550M2 and x3550M3 platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.3.12 Securing the Signaling Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
3.3.12.1 Activate TLS Signaling for SIP Subscribers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
3.3.12.2 Activate TLS Keep-Alive for OpenStage Phones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.3.13 Activate MTLS Signaling for SIP Endpoints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.3.14 Activate Digest Authentication to the SIP Subscribers and SIP Endpoints . . . . . . . . . . . . . . . . . . . . 40
3.3.15 Activate Authentication of SIP Subscribers and SIP Endpoints behind Trusted Endpoints . . . . . . . . 42
3.3.16 Securing Media Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.3.17 Securing CSTA Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.4 Securing the Billing Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.5 Security Patches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.5.1 BIOS Security Updates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.5.2 OpenScape Voice Assistant Security Updates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
A31003-H8070-P102-2-76A9, 06/2012
OpenScape Voice V7, Planning Guide 3
Contents
A31003-H8070-P102-2-76A9, 06/2012
4 OpenScape Voice V7, Planning Guide
001_Introduction.fm
Introduction
General Information
1 Introduction
• to adapt these default settings to the needs of the individual customer and the
specific characteristic of the solution to be deployed.
• to weigh the costs (of implementing security measures) against the risks (of
omitting a security measure) and to “harden” the systems accordingly.
As a basis for that, the Security Checklists are published. They support the
customer and the service both directly and indirectly, as well as those wanting to
maintain it themselves, to agree on the settings and to document the decisions
that are made.
1. In the planning and design phase of a particular customer project. Use the
Security Checklists of every relevant product to evaluate if all of the products
that form a part of the solution can be aligned with the customer’s security
requirements. Document in the Checklist how they can be aligned. This
ensures that security measures are appropriately considered and included in
the Statement of Work to build the basis for the agreement between SEN and
the customer. The customer will be responsible for the individual security
measures:
• during operation.
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 5
001_Introduction.fm
Introduction
Update and Feedback
A31003-H8070-P102-1-76A9, 06/2012
6 OpenScape Voice V7, Planning Guide
001_Introduction.fm
Introduction
Customer Deployment - Overview
Customer Supplier
Company
Name
Address
Telephone
Date:
General Remarks
Date
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 7
001_Introduction.fm
Introduction
Customer Deployment - Overview
A31003-H8070-P102-1-76A9, 06/2012
8 OpenScape Voice V7, Planning Guide
002_at_a_glance_measures.fm
OpenScape Voice V7 Hardening Measures at a Glance
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 9
002_at_a_glance_measures.fm
OpenScape Voice V7 Hardening Measures at a Glance
A31003-H8070-P102-1-76A9, 06/2012
10 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Hardware Security Settings
3 Server Hardening
Customer Comments
and Reasons
• Fujitsu RX200 S6
• Fujitsu RX330 S1
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 11
003_Server_hardening.fm
Server Hardening
Operating System Hardening
• IBM: http://www-947.ibm.com/support/entry/portal/Documentation
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
12 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
During the installation, all administrator accounts are created with default
passwords which are generally known. These passwords must be changed upon
deployment.
• "root"
• "srx"
• "sysad"
• "superad"
• "cdr"
• "solid"
• "secad"
• "dbad".
References OSV V7 Service Manual: Installation and Upgrades
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 13
003_Server_hardening.fm
Server Hardening
Operating System Hardening
Use the assistant to change the password of the solid database accounts.
• "dba"
• "rtp"
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
14 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
The customer's password policy has to be installed in case the customer creates
new administrator accounts that are allowed to log in via SSH or SFTP.
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 15
003_Server_hardening.fm
Server Hardening
Operating System Hardening
After 60 days, the user will be prompted to change his password. There is a
30 day grace period to do so before the account is locked.
To set the password age:
passwd -x 60 -w 14 -n 1 -i 30 <userid>
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
16 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
• Billing servers, billing clients, license servers, and other servers which
routinely transfer files to/from the OpenScape Voice system.
The OpenScape Voice IP addresses used for communication between
the nodes of the OpenScape Voice cluster are automatically added to the
“white list” during installation, and can also be added manually, if
necessary.
The administrator should carefully monitor the system after reducing the
threshold values and modify the threshold and “white list” to values for the
specific customer configuration.
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 17
003_Server_hardening.fm
Server Hardening
Operating System Hardening
Customer Comments
and Reasons
modifyParameter:
name : hiQ/Security/Filt/ICMPDefaultTypes
A31003-H8070-P102-1-76A9, 06/2012
18 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
3. Create ICMP packet filter rule(s) for remote host, subnet, or all hosts (CLI:
6,8,4,1):
Packet Filter Rule Name <Max Length 63 (max length: 63)>
(def: ) : SUBNET789_SIP1_FRAGMENT_ALLOWED
Description <Max Length 63 (max length: 63)> (def: ):
Allow ipsec fragmentation with remote SIP subnet
Remote FQDN <Max Length 63 (max length: 63)> (def: ):
Remote IP Address <Max Length 15 (max length: 15)> (def:):
<remote subnet for SIP endpoints>
Remote NetMask <Max Length 15 (max length: 15)> (def:
255.255.255.255) :
255.255.255.0
<remote subnet mask for SIP endpoints>
Transport Protocol <1=icmp, 2=udp, 3=tcp, 4=all, 5=esp,
6=ah, 7=sctp> (default: 4): 1
Direction <1=incoming, 2=outgoing, 3=bothways (default:
1): 1
Action <1 = Allow, 2 = Drop> (default: 1): 1
Do you want to execute this action <y/n> (default: yes):
Operation successful
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 19
003_Server_hardening.fm
Server Hardening
Operating System Hardening
Customer Comments
and Reasons
• Media Servers (to protect the MGCP protocol which only supports UDP).
This includes an OpenScape Branch deploying an on-board media
server.
OpenScape Voice comes with a default self-signed TLS Server Certificate. Even
when not integrated in a PKI infrastructure, the default TLS certificate of OSV
should be replaced with a new TLS certificate.
A31003-H8070-P102-1-76A9, 06/2012
20 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
Customer Comments
and Reasons
• Phones
• Proxies
• Gateways
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 21
003_Server_hardening.fm
Server Hardening
Operating System Hardening
Customer Comments
and Reasons
NOTE: The procedure might interrupt call processing and should be executed in
a timely manner (or low traffic periods). For a live system the best practice would
be to execute the procedure in a maintenance window.
Stop and start the ttud process on each node. Expert Cli examples follow:
CLI> procStopProcess "ttudProc1"
...wait a few seconds for it to shut down.
CLI> procStartConfiguredProcess " ttudProc1"
In a duplex configuration, be sure to restart the process in node2. Expert Cli
examples follow;
CLI> procStopProcess "ttudProc2"
...wait a few seconds for it to shut down.
CLI> procStartConfiguredProcess "ttudProc2"
A31003-H8070-P102-1-76A9, 06/2012
22 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
SNMPV1 and SNMPV2 use the notion of communities to establish trust between
managers and agents. Community names are essentially passwords. A
community name allows a level of access to Management Information Base (MIB)
data. Access levels are read-only (RO) for data retrieval and read-write (RW) for
data modification. Thus an SNMP Manager requires at least two community
names or passwords.
References
Needed Access Rights root
Executed Yes: No:
OpenScape SBC:
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 23
003_Server_hardening.fm
Server Hardening
Operating System Hardening
NOTE: Avoid using any UNIX special characters (e.g., ampersand (&), semi
colon (;), etc.) when changing the SNMP community string as these
characters may cause translation errors.
NOTE: To change the SNMP community name string to meet site security
requirements, it is strongly recommended that you contact your next level of
support before attempting the following procedures.
Return..................................99
A31003-H8070-P102-1-76A9, 06/2012
24 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
NOTE: Duplex OpenScape Voice systems must restart the master agent on
both nodes.
• Secure the connection between the SOAP client and the SOAP server via
IPsec. This allows connecting to the TCP SOAP server ports.
• Secure the connection between the SOAP client and the SOAP server by
connecting to the TLS SOAP server ports.
NOTE: The OpenScape Voice firewall must be opened to allow SOAP clients
other than the Assistant to connect.
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 25
003_Server_hardening.fm
Server Hardening
Operating System Hardening
SOAP Clients that do not support TLS can connect to OpenScape Voice via TCP
with a secure IPsec connection.
Customer Comments
and Reasons
The ports can be checked using the CLI or the Display of Rtp parameters using
the Assistant:
When changing any of the above RTP parameters the soapserver process on
each node needs to be stopped and started. Expert Cli examples follow:
CLI> procStopProcess "soapServer01"
A31003-H8070-P102-1-76A9, 06/2012
26 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
SOAP Clients that support TLS can connect to OpenScape Voice via TLS instead
of TCP with IPsec connection.
Customer Comments
and Reasons
The starting port for SOAP TLS can be verified via the CLI (CLI: 1,1).
Use Option 2 to verify the value for RTP Parameter:
Srx/Subp/StartingPortForTLS
The number can be changed using CLI (to up to 4 ports) or via the Assistant:
• Srx/Subp/NumberOfInstancesWithTLS
• Srx/Subp/StartingPortWithTLS
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 27
003_Server_hardening.fm
Server Hardening
Operating System Hardening
When changing any of the above Rtp parameters, the soapserver process on
each node needs to be restarted (CLI: 98)
CLI> procStopProcess "soapServer01"
...wait a few seconds for it to shut down.
CLI> procStartConfiguredProcess "soapServer01"
In a duplex configuration also:
CLI> procStopProcess "soapServer02"
...wait a few seconds for it to shut down.
CLI> procStartConfiguredProcess "soapServer02"
Customer Comments
and Reasons
• Use Option 2 to verify that the value for RTP Parameter Srx/Subp/
Authorization is set to RtpTrue.
A31003-H8070-P102-1-76A9, 06/2012
28 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 29
003_Server_hardening.fm
Server Hardening
Operating System Hardening
By default, the IMM/iRMC card is shipped with well known and well documented
default passwords.
Customer Comments
and Reasons
Change the User ID and Password to the user name and password configured
for the IMM/iRMC on the specified node. This must be complete for each node of
the cluster.
CAUTION: Failure to complete this update for each cluster configuration
will result in Communication Failure alarms and could cause a failure event
resulting in one of the nodes in the cluster being shutdown.
Overview
The iRMC User's Guide can be used as another reference for this procedure. To
find the latest version of this document go to:
http://manuals.ts.fujitsu.com/
At this URL a 'Quick Access' feature can be employed by entering irmc in the
Search by product parameter field. This typically results in 'Integrated Remote
Management Controller (iRMC)' being displayed for selection.
A31003-H8070-P102-1-76A9, 06/2012
30 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
The procedure requires an rsa ip parameter from each node or node in the case
of a simplex (or Low Cost) system.
NOTE: The node.cfg rsa ip parameter should only be changed by using the IFgui
Update tool. For more details on the IFgui Update tool refer to the OSV Service
Manual: Installation and Upgrades, Appendix titled, “Updating the Node.cfg File
(Also Known as EZIP)”.
a) Log into the iRMC by starting a Web browser and navigating to either
HTTPS://<iRMC_address>
Or, if HTTPS is not enabled, you will have to navigate to
HTTP://<iRMC_address>
where <iRMC_address> is the IP address that is specified in node.cfg by
the rsa_1_ip parameter.
Hint: Remember to repeat the procedure for node 2 of a duplex system.
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 31
003_Server_hardening.fm
Server Hardening
Operating System Hardening
A31003-H8070-P102-1-76A9, 06/2012
32 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 33
003_Server_hardening.fm
Server Hardening
Operating System Hardening
f) For an OSV cluster, you will have to repeat the same actions using the IP
address specified in node.cfg by the rsa_2_ip parameter.
Overview
The IBM Integrated Management Module User's Guide can be used as another
reference for this procedure. To find the latest version of this document or the IBM
white paper Transitioning to UEFI and IMM, go to:
http://www-947.ibm.com/systems/support/supportsite.wss/
docdisplay?lndocid=MIGR-5079770&brandind=5000008
NOTE: Changes are made periodically to the IBM Web site. Procedures for
locating firmware and documentation might vary slightly from what is described in
this document.
1. Go to http://www.ibm.com/systems/support/.
3. From the Product family list, select your server and click Go.
The procedure requires an rsa ip parameter from each node or node in the case
of a simplex (or Low Cost) system.
NOTE: The node.cfg rsa ip parameter should only be changed by using the IFgui
Update tool. For more details on the IFgui Update tool refer to the OSV Service
Manual: Installation and Upgrades, Appendix titled, “Updating the Node.cfg File
(Also Known as EZIP.)
A31003-H8070-P102-1-76A9, 06/2012
34 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
root@bocast4a:[/etc/hiq8000] #116
# grep -i rsa_1_ip node.cfg
rsa_1_ip: 10.235.54.20
root@bocast4a:[/etc/hiq8000] #117
#
To resolve the node2 IP (rsa_2_ip);
root@bocast4a:[/etc/hiq8000] #117
# grep -i rsa_2_ip node.cfg
rsa_2_ip: 10.235.54.21
root@bocast4a:[/etc/hiq8000] #118
#
Procedure for the IBM x3250M3, x3550M2 and x3550M3 platforms
a) Log into the IMM by starting a Web browser and navigating to either:
HTTPS://<IMM_address>
Or, if HTTPS is not enabled, you will have to navigate to:
HTTP://<IMM_address>
where <IMM_address> is the IP address that is specified in node.cfg by
the rsa_1_ip parameter.
• If the options are not displayed similar to what is shown below, set the
HTTPS Server drop-down box to Disabled and click the Save button
to the right of the box. The Certificate options should then be
displayed.
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 35
003_Server_hardening.fm
Server Hardening
Operating System Hardening
d) Use the snapshot that follows as a reference for this step. After the
Certificate has been generated or imported, use the drop-down box to set
the HTTPS Server option to Enabled and click the Save button to the right
of the box.
e) Use the snapshot that follows as a reference for this step. Select IMM
Control then Network Protocols in the left-hand pane as shown. In the
Network Protocols display scroll down to the Telnet Protocol. Select
A31003-H8070-P102-1-76A9, 06/2012
36 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
Disable from the drop down menu list for the Telnet connection count.
Scroll to the bottom of the window and select the Save button (located in
the bottom right hand corner).
f) For an OSV cluster, you will have to repeat the same actions using the IP
address specified in node.cfg by the rsa_2_ip parameter.
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 37
003_Server_hardening.fm
Server Hardening
Operating System Hardening
By default, SIP subscribers are generated using SIP signaling in clear-text via
TCP or UDP. Signaling should be encrypted using TLS provided the SIP
subscriber supports it.
References
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
38 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
Customer Comments
and Reasons
3. Click Save
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 39
003_Server_hardening.fm
Server Hardening
Operating System Hardening
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
40 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 41
003_Server_hardening.fm
Server Hardening
Operating System Hardening
and Password. Local is used for challenges received from the peer
endpoint and Remote is used for creating challenges towards the
peer endpoint. > Save
To set digest authentication for a global endpoint:
Global Translation and Routing > Endpoint Management >
Endpoints > Select Endpoint, click Edit > SIP tab / Security / Add …
or Edit > Set Local and Remote Realm, User Name and Password.
Local is used for challenges received from the peer endpoint and
Remote is used for creating challenges towards the peer endpoint.
> Save
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
42 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Operating System Hardening
Customer Comments
and Reasons
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 43
003_Server_hardening.fm
Server Hardening
Securing the Billing Interface
Customer Comments
and Reasons
Turn on SFTP for pushing billing files to a billing server. When a billing client pulls
billing files from OpenScape Voice, it must be configured to set up an SFTP
session using the "cdr" account’s credentials.
A31003-H8070-P102-1-76A9, 06/2012
44 OpenScape Voice V7, Planning Guide
003_Server_hardening.fm
Server Hardening
Security Patches
Customer Comments
and Reasons
Customer Comments
and Reasons
A31003-H8070-P102-1-76A9, 06/2012
OpenScape Voice V7, Planning Guide 45