Book Image

Asterisk 1.6

Book Image

Asterisk 1.6

Overview of this book

Asterisk is a powerful and flexible open source framework for building feature-rich telephony systems. As a Private Branch Exchange (PBX) which connects one or more telephones, and usually connects to one or more telephone lines, Asterisk offers very advanced features, including extension-to-extension calls, queues, ring groups, line trunking, call distribution, call detail rerecords, and call recording. This book will show you how to build a telephony system for your home or business using this open source application. 'Asterisk 1.6' takes you step-by-step through the process of installing and configuring Asterisk. It covers everything from establishing your deployment plan to creating a fully functional PBX solution. Through this book you will learn how to connect employees from all over the world as well as streamline your callers through Auto Attendants (IVR) and Ring Groups.This book is all you need to understand and use Asterisk to build the telephony system that meets your need. You will learn how to use the many features that Asterisk provides you with. It presents example configurations for using Asterisk in three different scenarios: for small and home offices, small businesses, and Hosted PBX. Over the course of ten chapters, this book introduces you to topics as diverse as Public Switched Telephony Network (PSTN), Voice over IP Connections (SIP / IAX), DAHDI, libpri, through to advanced call distribution, automated attendants, FreePBX, and asterCRM. With an engaging style and excellent way of presenting information, this book makes a complicated subject very easy to understand.
Table of Contents (15 chapters)
Asterisk 1.6
Credits
About the Authors
About the Reviewer
Preface

Asterisk server security


Before we cover external security and think of putting the Asterisk server onto our production network, we must consider the internal security of the system to ensure that it fits with our security policy and meets good security practice at least.

Internal host security can be achieved in a variety of ways and there are many applications and tools that we can use to aid us in this. We will not discuss all of the tools and add-ons we can use for generic system security. However, we will cover basic operating system hardening with Asterisk in mind, as well as the further steps we can take to ensure that the Asterisk system is running as securely as possible.

It is also important to consider the physical security of the Asterisk system. We may want to have it under lock and key along with our other important infrastructure devices.

Internal access control

One of the most important and most overlooked aspects of host-level security is physical security. Our Asterisk server...