In this section, we will discuss some topics regarding security in our Elastix Unified Communications System. We will share some recommendations to ensure our system's availability, privacy, and correct performance. Attackers' objectives may vary from damaging data, to data stealing, to telephonic fraud, to denial of service. This list is intended to minimize any type of attack, but remember that there are no definitive arguments about security; it is a constantly changing subject with new types of attacks, challenges, and opportunities.
The recipes covered in this chapter are as follows:
Knowing the best practices when installing Elastix—Physical security
Knowing the best practices when installing Elastix—Logical security
Installing Fail2ban
Using Elastix's embedded firewall
Using the Security Advanced Settings menu to enable security features
Recording and monitoring calls
Recording MeetMe rooms (conference rooms)
Recording queues' calls
Monitoring recordings...