h1. Security {{toc}} In modern world of telecommunications the security question is of a great concern, because a single security hole can cause significant financial losses. *Notice!* All attack types described below took place in real life, therefore don't think that they could never relate to you! h2. Popular attack types. * [[Password brute-force]] * [[A hack of your partner-originator and launch of parallel VoIP proxy]] * [[Stolen password]] * [[A hack of permanently attached IP-KVM and access to server through physical console]] * [[Web-interface password interception]] * [[IP spoofing]] h2. Protection from attacks. * [[Fail2Ban application|Fail2Ban]] * [[Password strength check system]] * [[Limited SSH access]] * [[Originator's SIP port authentication]] * [[Origination control]] * [[Balance cutoff]] * [[HTTP blocked, HTTPS is used]] * [[Encrypted passwords]] [[Безопасность|Русский перевод]]