text
stringlengths
0
152
defining, 175
returning from, 177
securing media, 54
securing SIP, 50
challenges of VoIP security, 49
configuring call limits, 374
dialplan vulnerabilities, 371
encrypted media, 371
Fail2ban
benefits of, 368
configuration, 369
installation, 369
need for diligence regarding, 375
non-numeric VoIP account names, 367
permit and deny options, 373
provided by contexts, 80
securing Asterisk network APIs, 373
security advisory documents, 375
SIPVicious audit tool, 375
SQL injection attacks, 261
strong passwords, 368
validation of voicemail passwords, 133
self-signed certificates, 51
SELinux, 41
server-based provisioning, 59
session handling, 308
set provisioning, 59
SIP (Session Initiation Protocol)
certificates for endpoint security
formal certificate authorities, 54
importance of SIP security, 50
LetsEncrypt certificates, 52
secure SIP signalling, 51
self-signed certificates, 51
subscriber names, 50
firewall tweaks during installation, 42
user device configuration
SIP and, 58
SIP dialogs occurring, 74
SIP endpoints and, 57
SIPVicious audit tool, 375
softphones
advantages and disadvantages of, 63
defined, 62
sound files, 86
speech recognition, 296
speech synthesis, 296
390
|
Index
sudo make samples command, 45
Swagger (OpenAPI Specification), 334
T
telephone naming beset practices, 60
telephony
bridging gap between traditional and net‐
work, 2
future of, 377
Zapata Telephony Project, 3
testing
basic dialplan for, 73
device registration, 72
test modules, 19
text-to-speech, 296
time/date stamps, 159
timeouts, 92, 229
toll fraud
avoiding in NANP countries, 103
avoiding with contexts, 81
transferring calls, 312
U
unified messaging, 146
user device configuration
Asterisk extensions, 61
basic dialplan for device testing, 73
configuring Asterisk