Chapter 11. Securing your Elastix System

In this section, we will discuss some topics regarding security in our Elastix Unified Communications System. We will share some recommendations to ensure our system's availability, privacy, and correct performance. Attackers' objectives may vary from damaging data, to data stealing, to telephonic fraud, to denial of service. This list is intended to minimize any type of attack, but remember that there are no definitive arguments about security; it is a constantly changing subject with new types of attacks, challenges, and opportunities.

The recipes covered in this chapter are as follows:

  • Knowing the best practices when installing Elastix—Physical security
  • Knowing the best practices when installing Elastix—Logical ...

Get Elastix Unified Communications Server Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.