Security Recommendations
AudioCodes advises the below recommendations during device installation to ensure optimal security for your Mediant 9080C SBC. By following these recommendations, you can significantly enhance the security of your Mediant 9080C SBC. For additional recommendations, refer to the Recommended Security Guidelines document.
If you have any questions or need further assistance, please refer to the product's Release Notes or contact AudioCodes Support.
Security Recommendations
Description |
Recommended Action |
---|---|
Network Security |
|
Dedicated Management Network |
Connect the iDRAC to a separate, isolated management network. This network should be physically and logically isolated from the production network using firewalls and VLANs. |
Avoid Direct Internet Connection |
Do not connect the iDRAC directly to the internet. |
Access Control and Authentication |
|
Change Default iDRAC Password |
Change the default iDRAC password located on the pull-out service tag. Choose a strong, unique password that meets the complexity requirements. Keep the new password in a safe and known place for remote service support. |
iDRAC IP Range Filtering |
Limit access to authorized management stations only. Define specific IP ranges or subnets allowed to access the iDRAC. |
Use TLS Secured Versions for iDRAC |
Ensure all iDRAC network communications are encrypted using TLS 1.2 or higher to protect data in transit. |
Directory Service Integration |
Integrate with Microsoft Active Directory or LDAP to manage user accounts, roles, and permissions centrally. Configure iDRAC to use LDAPS (LDAP over SSL) for secure communication with the directory server. |
Multi-Factor Authentication |
Enable MFA using supported methods such as RSA SecurID or Smartcards (CAC/PIV). Configure iDRAC to require an additional authentication factor beyond the password for login. |
System Integrity |
|
Setup Password |
You can enable the Setup password option to prevent access to the device BIOS settings. It is recommended to use a strong password of at least 8 characters. Keep the new password in a safe and known place for service support. |
Secure Boot / Digitally signed Software Upgrades |
Do not Enable Secure Boot in the BIOS settings as it is not compatible with the SBC software installation. When upgrading the device software, all CMP files are digitally signed. This digital signature ensures that only files that have been verified and approved by AudioCodes can be loaded to the device. During the update process, the device verifies the digital signature of the CMP file. If the file is not signed or the signature does not match, the update is rejected. This ensures that only authentic and unaltered files are used. |
Chassis Intrusion Detection |
Enable chassis intrusion detection in the iDRAC settings. Configure alerts to notify administrators of any detected intrusion attempts. This provides an additional layer of security by alerting personnel to potential physical tampering with the server. |
User Accessible USB Ports |
USB Port Management is a security feature that allows administrators to selectively enable or disable USB ports on the device. This helps prevent unauthorized use of USB devices, which can be a potential security risk. It is recommended to disable the User Accessible USB Ports. |
Front Bezel Lock |
Lock the front bezel to prevent unauthorized access to the server's hard drives. |
Secure Rack Installation |
Ensure the server is securely mounted in a locked rack or cabinet to prevent unauthorized access. |
Firmware Management |
|
Regular Firmware Updates |
Regularly check for firmware updates on the AudioCodes Support website and install them promptly. For non-HA deployments, schedule these updates during maintenance windows. |
Device Recycling |
|
System Erase |
Before discarding the device, use System Erase to securely wipe data from storage drives. This ensures data is irrecoverable and protects against unauthorized access. |
Secure SBC Management Access |
|
Change Default Admin User Login Passwords |
Change the default Admin user login passwords immediately upon setup to prevent unauthorized access. |
Use Strong Authentication Passwords |
Ensure strong passwords for authentication. |
Implement LDAP-based User Authentication |
Use LDAP for centralized user authentication and authorization. |
Implement Two-Way Authentication with X.509 Certificates |
Use X.509 certificates for two-way authentication. |
Secure Access using HTTPS |
Ensure all management access is secured using HTTPS. |
Use TLS Secured Versions for Management |
Ensure all management network communications are encrypted using TLS 1.2 or later to protect data in transit. |
Secure Telnet Sessions |
Avoid using Telnet; if necessary, secure sessions. |
Secure CLI Sessions by SSH |
Use SSH for securing CLI sessions. |
Define Web, Telnet, and SSH Authorized Access List |
Define an authorized access list. |
Secure SNMP Interface Access |
Prefer SNMPv3 over SNMPv2 for secure SNMP interface access |
Secure SIP using TLS (SIPS) |
|
Use TLS for SIP Interfaces and Block TCP/UDP Ports |
Use TLS for SIP interfaces and block unnecessary TCP/UDP ports. |
Implement X.509 Certificates for SIPS (TLS) Sessions |
Use X.509 certificates for securing SIPS (TLS) sessions. |
Use TLS Secured Versions for SIP |
Ensure all network communications are encrypted using TLS 1.2 or later to protect data in transit. |
Use an NTP Server |
Configure an NTP server on the SBC application (not on iDRAC settings) to ensure accurate time synchronization. |