-
15
- #1
Time to share some more...![[smile] [smile] [smile]](/data/assets/smilies/smile.gif)
We are constantly under attack from hackers that want access to our phone lines!
Too many IPO's are virtually unprotected, hooked up to the internet directly with routing that welcomes everyone to the party.
Remember: Changing the password is simply not enough.
Having a proper protection should be a top priority for everyone that deals with telephony systems.
Failing at this will sooner or later attract a talented hacker.
A successful attack could potentially ruin a business; either the customer, the maintainer or the provider.
Lately we have even seen attacks coming from the inside, an infected company computer making way for the outside attacker.
It might be a good idea to start looking at your setup. If you have no idea on how to do this, there are plenty of talented techs here that will do it for a fee.
But, you came for the IPO Firewall...
I've spent a few evenings "cracking" the code, resulting in a tool to help you utilize this forsaken feature.
Avaya has not made any good documentation on this, so I've provided instructions as well.
Warning: The built-in firewall is not meant as a primary protection, but it sure is better than nothing at all.
I use it as a buffer on the inside, keeping nosy employees away and blocking infected computers out.
The Calculator
Don't forget to
if you find this helpful ![[smile] [smile] [smile]](/data/assets/smilies/smile.gif)
Stay safe!
Kind regards
Gunnar
__________________________________________________________________
Hippos have bad eyesight, but considering their weight, it’s hardly their problem
![[smile] [smile] [smile]](/data/assets/smilies/smile.gif)
We are constantly under attack from hackers that want access to our phone lines!
Too many IPO's are virtually unprotected, hooked up to the internet directly with routing that welcomes everyone to the party.
Remember: Changing the password is simply not enough.
Having a proper protection should be a top priority for everyone that deals with telephony systems.
Failing at this will sooner or later attract a talented hacker.
A successful attack could potentially ruin a business; either the customer, the maintainer or the provider.
Lately we have even seen attacks coming from the inside, an infected company computer making way for the outside attacker.
It might be a good idea to start looking at your setup. If you have no idea on how to do this, there are plenty of talented techs here that will do it for a fee.
But, you came for the IPO Firewall...
I've spent a few evenings "cracking" the code, resulting in a tool to help you utilize this forsaken feature.
Avaya has not made any good documentation on this, so I've provided instructions as well.
Warning: The built-in firewall is not meant as a primary protection, but it sure is better than nothing at all.
I use it as a buffer on the inside, keeping nosy employees away and blocking infected computers out.
The Calculator
Don't forget to

![[smile] [smile] [smile]](/data/assets/smilies/smile.gif)
Stay safe!
Kind regards
Gunnar
__________________________________________________________________
Hippos have bad eyesight, but considering their weight, it’s hardly their problem
