If you own or operate an Asterisk PBX, trust us, security will be a priority for you... either now or later! If you only do one thing to secure your PBX, take this next piece of advice seriously! What ever you do, no matter how tempting it may be, Never, Never, Never...
How to reset a root password in PIAF and generic RHEL(Red Hat Enterprise Linux) based systems.
Having the ability to reset your PIAF password in-case of a lock-out is very vital when it's necessary to keep an open communication. Resetting a password may take a few minutes.
EndPoint Manager is a module within FreePBX®, that can be used to install and provision IP phones as well as manage firmware updates. This is a very useful tool that works with the most of the major brands. As an example we will setup a Cisco phone, to begin select Install on Cisco. Next, you will see available models for that brand, select Enable for your current model. Next, go to the Advanced Settings and set the IP Address of the PBX, and set the directory where phones will update the firmware from.
The current build was done on Ubuntu 12.04.3 LTS. This should world on Debian Wheezy and Higher.
This is a vanilla install of Asterisk 13, with no Web Interface or extra features.
IPComms allows two types of SIP trunking when connecting to our network. Our default registration method and by far the most common, is basic SIP Registration. This method uses a SIP username and password with a registration string to connect to our SIP network. The second methog, which is less common, but useful in many scenarios, is SIP IP Authentication.
This article will cover registering your Asterisk PBX to IPComms using SIP IP Authentication.
The first step in making and receiving phone calls using the IPComms SIP trunking network is registering your SIP device to our network using SIP registration. This article will cover registering your Asterisk PBX to IPComms using SIP IP Authentication.
If you are reading this, you're probably like most of us... after many hours, or even several days of downloading software, setting up servers, configuring trunks and cracking open firewall ports, you finally achieve success - your PBX is working, and calls are passing. So, you wipe the sweat from your forehead, push away your ergonomic mesh-backed office chair (with lumbar support) and walk away pleased - not giving a second thought to security. Until one day, you log into your PBX and see the skull-and-boned call sign of a hacker that has decided to pay you’re perfectly running PBX a visit.