Security Rules

The following security guidelines must be adhered to in order to maintain the approved mode of operation:

Telnet must be disabled.
HTTPS must always be used instead of HTTP.
A TLS session must be enabled for SIP. 
SNMPv3 keys must be entered in hexadecimal (password derivation must not be used).
Keys must only be imported through a dedicated physical link or a secure tunnel.
Configured passwords must contain at least eight characters.
The configured RADIUS secret must contain at least eight characters.
The module must be configured to restrict the number of failed authentication attempts to three per minute.
MD5, HMAC MD5, and 3DES are not to be used, unless mandated by an Acceptable Key Establishment Protocol.
TLS Context configuration:
Ciphers of Server/Client should be configured not to use specific ciphers, as follows:
DEFAULT:!RC4:!aNULL:!eNULL:!AECDH:!ADH:!CAMELLIA:!ARIA128:!SEED:!kRSA:!3DES.
TLS1.3 Cipher of Server/Client should not use TLS_HACHA20_POLY1305_SHA256.
Key Exchange Groups should not use X25519 and X448 group.
DH Key size should be 2048.
PKEY file should not be encrypted with a passphrase.
PKEY file of PKCS12 format should not be used.
Only the following algorithms are allowed:
KexAlgorithms = "diffie-hellman-group-exchange-sha256:diffie-hellman-group14-sha1"
Ciphers = "aes128-ctr:aes128-cbc:aes256-ctr:aes256-cbc"
MAC = "hmac-sha1:hmac-sha2-256”