Oracle SBC Security Guide
Part 4: Appendices
Appendix A: Secure Deployment Checklist
The following security checklist includes guidelines that help secure your system:
1. Do NOT connect your system to any untrusted networks, especially the Internet, until all
protections have been configured. Customers have reported systems under configuration
compromised in minutes due to incomplete configurations.
2. Harden the management environment.
a. Install HA connections between units over a direct cable vs. a network.
b. Make sure all equipment is in locked cabinets or at least in a secure room.
c. Configure console timeouts.
d. Ensure that the wancom0 management port is connected to a private management LAN
with an IP address that is not Internet routable.
e. Set strong passwords for all default accounts prior to configuration.
f. Disable telnet and FTP if they are enabled.
g. Configure system ACLs to limit management traffic to users that really need access.
h. If implementing SNMP, change the default community string and follow the SNMP
configuration recommendations in Appendix H:
i. Use strong ciphers for HTTPS web management connection.
3. Practice the principle of least privilege.
a. Carefully consider who has access to the admin password.
b. Implement RADIUS or TACACS+ authentication if available.
4. Restrict network access.
a. Use services ACLs where possible.
b. Refrain from configuring host-in-path addresses.
c. Ensure that users coming from an untrusted network have to register prior to providing
service.
d. Implement DoS and CAC protections.
e. Mitigate known fraud schemes by implementing sipShield or HMRs.
f. Use strong ciphers for any TLS connections.
5. Monitor the system for unusual events.
a. Configure the SNMP trap receiver and syslog receiver.
b. Send either CDRs or RADIUS accounting records to a fraud management system or
implement a solution that can actively monitor SIP signaling.
Comentarios a estos manuales