Book Image

FreePBX 2.5 Powerful Telephony Solutions

By : Alex Robar
Book Image

FreePBX 2.5 Powerful Telephony Solutions

By: Alex Robar

Overview of this book

FreePBX is an easy-to-use GUI that controls and manages Asterisk. It gives you pre-programmed functionality accessible through user-friendly web interfaces that allows you to have a fully functional PBX pretty much straight away with no programming. With this book it's easy to master the many features of FreePBX, which will help you to save time and money as you set up your enterprise-class network. This book will guide you through these features to install, configure, and maintain a professional PBX with plenty of examples and screenshots. By the end of this book, you will have learned to create an enterprise-class VoIP PBX that features the stability and feature set of traditional telephony systems without the hefty price tag. This book will help its readers to roll out a robust, web-based, and inexpensive yet powerful telephony solution through the GUI. By following the practical examples in this book, you will learn how to install, configure, and manage an enterprise-class PBX using open source telephony tools Asterisk and FreePBX. From here on, this book takes a closer look at the open source telephony engine software, discussing a broad range of topics from how to build and deploy an enterprise-class VoIP PBX to creating VoIP trunks using SIP, IAX2, and ZAP technologies and setting up user extensions with voicemail. FreePBX 2.5 Powerful Telephony Solutions will introduce you to advanced options such as call routing, voicemail, and other calling features. Finally, this book will provide you with the relevant information to help you personalize and secure your PBX.
Table of Contents (20 chapters)
FreePBX 2.5 Powerful Telephony Solutions
Credits
About the Author
About the Reviewer
Preface
Voicemail.conf Options

Remote access and lock down


The point at which a system is opened up so it can be remotely administered is almost always the point of compromise in an intrusion. It is a good idea to close off the system as much as possible from the outside world, in addition to locking down all network access to the server in general.

Changing ports

Changing the default ports that various services run on is a quick way to ward off the "script kiddie" style of hackers. This process essentially amounts to the "security through obscurity" model of protection. While it may not provide enough protection on its own, it provides a good first layer of protection.

In order to change the port that the SSD daemon listens on, run the following commands (this example changes the port to 38000; you can adjust this number according to your liking):

sed -i "s/Port 22/Port 38000/" /etc/ssh/sshd_config
/etc/init.d/ssh restart

In order to change the port that Apache listens on, run the following commands (this example changes...