Security Recommendations

AudioCodes advises the below recommendations during device installation to ensure optimal security for your Mediant 9080C SBC. By following these recommendations, you can significantly enhance the security of your Mediant 9080C SBC. For additional recommendations, refer to the Recommended Security Guidelines document.

If you have any questions or need further assistance, please refer to the product's Release Notes or contact AudioCodes Support.

Security Recommendations

Description

Recommended Action

Network Security

Dedicated Management Network

Connect the iDRAC to a separate, isolated management network. This network should be physically and logically isolated from the production network using firewalls and VLANs.

Avoid Direct Internet Connection

Do not connect the iDRAC directly to the internet.

Access Control and Authentication

Change Default iDRAC Password

Change the default iDRAC password located on the pull-out service tag. Choose a strong, unique password that meets the complexity requirements. Keep the new password in a safe and known place for remote service support.

iDRAC IP Range Filtering

Limit access to authorized management stations only. Define specific IP ranges or subnets allowed to access the iDRAC.

Use TLS Secured Versions for iDRAC

Ensure all iDRAC network communications are encrypted using TLS 1.2 or higher to protect data in transit.

Directory Service Integration

Integrate with Microsoft Active Directory or LDAP to manage user accounts, roles, and permissions centrally. Configure iDRAC to use LDAPS (LDAP over SSL) for secure communication with the directory server.

Multi-Factor Authentication

Enable MFA using supported methods such as RSA SecurID or Smartcards (CAC/PIV). Configure iDRAC to require an additional authentication factor beyond the password for login.

System Integrity

Setup Password

You can enable the Setup password option to prevent access to the device BIOS settings. It is recommended to use a strong password of at least 8 characters. Keep the new password in a safe and known place for service support.

Secure Boot / Digitally signed Software Upgrades

Do not Enable Secure Boot in the BIOS settings as it is not compatible with the SBC software installation. When upgrading the device software, all CMP files are digitally signed. This digital signature ensures that only files that have been verified and approved by AudioCodes can be loaded to the device. During the update process, the device verifies the digital signature of the CMP file. If the file is not signed or the signature does not match, the update is rejected. This ensures that only authentic and unaltered files are used.

Chassis Intrusion Detection

Enable chassis intrusion detection in the iDRAC settings. Configure alerts to notify administrators of any detected intrusion attempts. This provides an additional layer of security by alerting personnel to potential physical tampering with the server.

User Accessible USB Ports

USB Port Management is a security feature that allows administrators to selectively enable or disable USB ports on the device. This helps prevent unauthorized use of USB devices, which can be a potential security risk. It is recommended to disable the User Accessible USB Ports.

Front Bezel Lock

Lock the front bezel to prevent unauthorized access to the server's hard drives.

Secure Rack Installation

Ensure the server is securely mounted in a locked rack or cabinet to prevent unauthorized access.

Firmware Management

Regular Firmware Updates

Regularly check for firmware updates on the AudioCodes Support website and install them promptly. For non-HA deployments, schedule these updates during maintenance windows.

Device Recycling

System Erase

Before discarding the device, use System Erase to securely wipe data from storage drives. This ensures data is irrecoverable and protects against unauthorized access.

Secure SBC Management Access

Change Default Admin User Login Passwords

Change the default Admin user login passwords immediately upon setup to prevent unauthorized access.

Use Strong Authentication Passwords

Ensure strong passwords for authentication.

Implement LDAP-based User Authentication

Use LDAP for centralized user authentication and authorization.

Implement Two-Way Authentication with X.509 Certificates

Use X.509 certificates for two-way authentication.

Secure Access using HTTPS

Ensure all management access is secured using HTTPS.

Use TLS Secured Versions for Management

Ensure all management network communications are encrypted using TLS 1.2 or later to protect data in transit.

Secure Telnet Sessions

Avoid using Telnet; if necessary, secure sessions.

Secure CLI Sessions by SSH

Use SSH for securing CLI sessions.

Define Web, Telnet, and SSH Authorized Access List

Define an authorized access list.

Secure SNMP Interface Access

Prefer SNMPv3 over SNMPv2 for secure SNMP interface access

Secure SIP using TLS (SIPS)

Use TLS for SIP Interfaces and Block TCP/UDP Ports

Use TLS for SIP interfaces and block unnecessary TCP/UDP ports.

Implement X.509 Certificates for SIPS (TLS) Sessions

Use X.509 certificates for securing SIPS (TLS) sessions.

Use TLS Secured Versions for SIP

Ensure all network communications are encrypted using TLS 1.2 or later to protect data in transit.

Use an NTP Server

Configure an NTP server on the SBC application (not on iDRAC settings) to ensure accurate time synchronization.