文档介绍:Elastix® Network &
Security Guide
First revision – January 2011
Bob Fryer
Elastix & Network
Security Guide
Author Bob Fryer
Organisation Blue Packets (ACT, Australia)
Date 09/01/2011
Revision 1. 0
Level Beginner/Intermediate/Advanced
Date for Review 30/0 3/2011 or Elastix Release
Relates to Elastix – and some earlier versions
Licenc e GNU/FDL
Contributors
Introduction
Security is a very broad subject and rightly so. It is a very subjective topic as well, and to a certain
degree it is a subject that will never have a definitive end. That’s why I generally dismiss any book
that claims to be a Definitive Guide to Security. It is a constant living subject, with improvements,
changes, retractions and even changes in thinking and direction every year.
There is also no subject like security that stirs up the emotions, especially when statements are
made as everyone has their own views and ideas.
Security is also not going to be fixed by one device that fixes everything. It is a set of tools, backed up
by procedures, and ultimately backed up by diligent review and monitoring.
Security is only as good as the weakest link in the chain, which is why this guide work as
well, but no matter how well you follow this guide, implement its measures, follow procedures, it
will e undone by something very basic, something you have never considered to be an
issue or a link in the chain of security.
This document is not a definitive guide on Security. I won’t even promise you that by following this
guide that your Elastix system will not be hacked. Only you can continue to work on this side of
things, learning more about security, implementing new measures as you feel are needed.
Likewise, Security is as much as you want to make it. You may be able to secure your system to cover
70% of your system using tools/products that you have and no further hardware, you may be able to
cover 95% of your system with