Security

Taking a Fresh Look at the Asterisk, FreePBX, and Incredible PBX Security Models

Taking a Fresh Look at the Asterisk, FreePBX, and Incredible PBX Security Models

Monday, April 18, 2016

Comments are Disabled

Embed from Getty Images About once a year, we try to shine the spotlight on Asterisk® security in hopes of saving lots of organizations and individuals a little bit (or a lot) of money. In light of last week’s major security lapse in the Asterisk® dialplan of those using FreePBX® since the Asterisk@Home days, now seemed like a good time for a review. As we’ve noted before, the problem with open source phone systems is they’re open source phone systems.… Read More ›

It’s Back: $10.50 Buys an Incredible PBX in the Cloud For Life… If You Hurry

It’s Back: $10.50 Buys an Incredible PBX in the Cloud For Life… If You Hurry

Monday, March 14, 2016

1 comment

Embed from Getty Images In January, we began our new series on Cloud Computing by documenting how to build an awesome LAMP server in the Cloud using Linux. Today we’re again going to show you how to use the same Cloud platform and take advantage of the $10.50 coupon code TAKE70 to build an Incredible PBX in the Cloud FOR LIFE. When you’re finished, you’ll have a state-of-the-art Incredible PBX 13 server with hundreds of PBX features including free calling… Read More ›

FCC and Asterisk Now Provide The Tools Needed to Put an End to Robocalls

FCC and Asterisk Now Provide The Tools Needed to Put an End to Robocalls

Monday, November 2, 2015

2 comments

View image | gettyimages.com One of the biggest jokes in the U.S. telecommunications industry has been the FCC’s Do Not Call List, a convenient source of working phone numbers for all the spammers on Planet Earth to use. Despite the threat of heavy fines, the FCC received 215,000 complaints in 2014 regarding unwanted robocalls and spam texts. In June, the FCC promulgated new rules clarifying that service providers could offer robocall-blocking technologies to consumers and implement market-based solutions that consumers… Read More ›

Sleep Well: Deploy Certified Incredible PBX Builds for Mission Critical Systems

Sleep Well: Deploy Certified Incredible PBX Builds for Mission Critical Systems

Monday, October 26, 2015

Comments are Disabled

View image | gettyimages.com 2015 marks the year we finally settled upon an Asterisk® platform that was not only feature rich but also easy to deploy and maintain. Incredible PBX™ began as an add-on feature set for PBX in a Flash™. But we really wanted a pure open source platform that was built from the ground up. So we introduced a number of stand-alone installers that could be deployed using existing Linux platforms: CentOS, Ubuntu, Debian, Raspbian, and even FreePBX®… Read More ›

Introducing the FUD-Free Firewall for FreePBX Distro and AsteriskNOW

Introducing the FUD-Free Firewall for FreePBX Distro and AsteriskNOW

Monday, August 10, 2015

Comments are Disabled

View image | gettyimages.com After frequent complaints from our FreePBX® users, we introduced a firewall application for the PBX in a Flash™ and Incredible PBX™ platforms that protected FreePBX resources. That was over 5 years ago. The product became Travelin’ Man™ 3, an IPtables-based WhiteList that totally eliminated access to your Asterisk® server unless a WhiteList entry had been authorized by the administrator. The application was further embellished over the years to facilitate access by remote users. First, we introduced… Read More ›

Firewalls 101: Why Every Asterisk Server Should Have a Functioning Firewall

Firewalls 101: Why Every Asterisk Server Should Have a Functioning Firewall

Monday, August 3, 2015

1 comment

View image | gettyimages.com Part of our fundamental disagreement with the FreePBX® design can be summed up in one word: FIREWALL or the lack of a functioning firewall in the FreePBX Distro and in the functionally identical Digium product, AsteriskNOW®.1 Most of the other design choices including the controversial, non-GPL compliant Module Signature Checking mechanism are touted as failsafe ways to detect altered systems even though changes in FreePBX MySQL tables and Asterisk config files can be modified easily without… Read More ›

Top 3 Asterisk Security Tips for 2014: WhiteLists, WhiteLists, and WhiteLists

Top 3 Asterisk Security Tips for 2014: WhiteLists, WhiteLists, and WhiteLists

Wednesday, May 21, 2014

2 comments

We’ve devoted a lot of energy to Asterisk security over the years with our Primer on Avoiding the $100,000 Phone Bill and our 20 Failsafe Tips and our SIP Navigation Guide plus numerous tutorials on deployment of Virtual Private Networks to secure your servers and phones including NeoRouter, PPTP, and Easy OpenVPN among others. But, when it comes to ease of installation and use with rock-solid security, nothing comes close to deployment of WhiteLists with the IPtables Linux firewall that’s… Read More ›