<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.innovaphone.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Flp</id>
	<title>innovaphone wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.innovaphone.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Flp"/>
	<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Special:Contributions/Flp"/>
	<updated>2026-05-08T07:19:26Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=MyPBX_para_Android_Ficha_t%C3%A9cnica_ES&amp;diff=52341</id>
		<title>MyPBX para Android Ficha técnica ES</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=MyPBX_para_Android_Ficha_t%C3%A9cnica_ES&amp;diff=52341"/>
		<updated>2019-05-31T17:20:13Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Requisitos */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Disclaimer ES}}&lt;br /&gt;
&lt;br /&gt;
==Foto==&lt;br /&gt;
&lt;br /&gt;
[[Image:mypbxandroid.png]]&lt;br /&gt;
&lt;br /&gt;
==Ficha técnica==&lt;br /&gt;
&lt;br /&gt;
===innovaphone myPBX para Android===&lt;br /&gt;
Teléfono IP basado en Android para la PBX innovaphone &lt;br /&gt;
&lt;br /&gt;
===Códec de voz===&lt;br /&gt;
G.711 A-law / μ-law, G.722&lt;br /&gt;
&lt;br /&gt;
G.729 (sin licencia a partir de la V11r2sr23/V12r1sr7)&lt;br /&gt;
&lt;br /&gt;
Opus-NB, Opus-WB (a partir de la V12)&lt;br /&gt;
&lt;br /&gt;
===Redes===&lt;br /&gt;
A través de connexión WLAN o datos (mín. 3G) &lt;br /&gt;
&lt;br /&gt;
Conexión con la PBX innovaphone (a través de dirección IP pública o VPN)&lt;br /&gt;
&lt;br /&gt;
===Características generales===&lt;br /&gt;
[[V11_Firmware_teléfonos_Ficha_técnica_ES#Datasheet|generic features V11 innovaphone phones]]&lt;br /&gt;
&lt;br /&gt;
[[V12_Firmware_teléfonos_Ficha_técnica_ES#Datasheet|generic features V12 innovaphone phones]]&lt;br /&gt;
&lt;br /&gt;
===Características especiales===&lt;br /&gt;
* Directorio telefónico con contactos de la PBX y personales del Smartphone &lt;br /&gt;
* Fallback a GSM configurable &lt;br /&gt;
&lt;br /&gt;
===Requisitos===&lt;br /&gt;
Terminal con sistema operativo Android 4.1 o superior&lt;br /&gt;
&lt;br /&gt;
Recomendamos testear el terminal móvil en cuestión antes de realizar el despliegue; debido a la dependencia existente entre el hardware de los terminales móviles y Android.&lt;br /&gt;
&lt;br /&gt;
===Cód. Art. / Licencias necesarias===&lt;br /&gt;
* Una licencia myPBX por cada usuario - Cód. Art. 02-00031-001&lt;br /&gt;
&lt;br /&gt;
[[Category:Fichas técnicas ES|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=MyPBX_para_Android_Ficha_t%C3%A9cnica_ES&amp;diff=52340</id>
		<title>MyPBX para Android Ficha técnica ES</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=MyPBX_para_Android_Ficha_t%C3%A9cnica_ES&amp;diff=52340"/>
		<updated>2019-05-31T17:19:51Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Requisitos */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Disclaimer ES}}&lt;br /&gt;
&lt;br /&gt;
==Foto==&lt;br /&gt;
&lt;br /&gt;
[[Image:mypbxandroid.png]]&lt;br /&gt;
&lt;br /&gt;
==Ficha técnica==&lt;br /&gt;
&lt;br /&gt;
===innovaphone myPBX para Android===&lt;br /&gt;
Teléfono IP basado en Android para la PBX innovaphone &lt;br /&gt;
&lt;br /&gt;
===Códec de voz===&lt;br /&gt;
G.711 A-law / μ-law, G.722&lt;br /&gt;
&lt;br /&gt;
G.729 (sin licencia a partir de la V11r2sr23/V12r1sr7)&lt;br /&gt;
&lt;br /&gt;
Opus-NB, Opus-WB (a partir de la V12)&lt;br /&gt;
&lt;br /&gt;
===Redes===&lt;br /&gt;
A través de connexión WLAN o datos (mín. 3G) &lt;br /&gt;
&lt;br /&gt;
Conexión con la PBX innovaphone (a través de dirección IP pública o VPN)&lt;br /&gt;
&lt;br /&gt;
===Características generales===&lt;br /&gt;
[[V11_Firmware_teléfonos_Ficha_técnica_ES#Datasheet|generic features V11 innovaphone phones]]&lt;br /&gt;
&lt;br /&gt;
[[V12_Firmware_teléfonos_Ficha_técnica_ES#Datasheet|generic features V12 innovaphone phones]]&lt;br /&gt;
&lt;br /&gt;
===Características especiales===&lt;br /&gt;
* Directorio telefónico con contactos de la PBX y personales del Smartphone &lt;br /&gt;
* Fallback a GSM configurable &lt;br /&gt;
&lt;br /&gt;
===Requisitos===&lt;br /&gt;
Terminal con sistema operativo Android 4.1 o superior&lt;br /&gt;
Recomendamos testear el terminal móvil en cuestión antes de realizar el despliegue; debido a la dependencia existente entre el hardware de los terminales móviles y Android.&lt;br /&gt;
&lt;br /&gt;
===Cód. Art. / Licencias necesarias===&lt;br /&gt;
* Una licencia myPBX por cada usuario - Cód. Art. 02-00031-001&lt;br /&gt;
&lt;br /&gt;
[[Category:Fichas técnicas ES|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:Protecci%C3%B3n_contra_los_ataques_de_fuerza_bruta_(SP)&amp;diff=36896</id>
		<title>Howto:Protección contra los ataques de fuerza bruta (SP)</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:Protecci%C3%B3n_contra_los_ataques_de_fuerza_bruta_(SP)&amp;diff=36896"/>
		<updated>2015-02-26T14:39:13Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Related Articles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Applies To==&lt;br /&gt;
This information applies to&lt;br /&gt;
&lt;br /&gt;
* innovaphone PBX having direct access to the internet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Keywords: enter keywords, foreign translations and/or synoyms not appearing in the article here for better search results --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
Protección contra Ataques de Fuerza Bruta&lt;br /&gt;
&lt;br /&gt;
Seguridad: ¿Tiene su PBX suficiente protección? &lt;br /&gt;
&lt;br /&gt;
En Internet existen siempre peligros latentes. Esto no es nada nuevo para usted, muestra de ello son los mecanimos apropiados de seguridad que utiliza para proteger sus sistemas. Un cortafuego protege su red de accesos no autorizados; un antivirus le protege de virus, gusanos, troyanos, etc., además de permitirle navegar y enviar emails de manera segura. &lt;br /&gt;
De igual modo, las instalaciones telefónicas han de ser protegidas con mecanismos de seguridad que prevengan de ataques o de daños. Éste es precisamente el caso que se da en las instalaciones que se conectan directamente a Internet y no tienen ninguna protección en la red interna de la empresa, haciéndolas accesibles desde el exterior. &lt;br /&gt;
&lt;br /&gt;
A lo largo de los últimos meses se han dado con más frecuencia ataques en sistemas telefónicos a través del método de “Ataques de Fuerza Bruta”. Un programa pirata comprueba combinaciones de contraseñas de usuarios al igual que accesos, de manera que realiza busquedas en fracciones de segundos. Si consiguen acceder al sistema, se denomina uso fraudulento o “Call Fraud”. El hacker podrá, por ejemplo, realizar llamadas gratuitas a expensas del propietario de la instalación telefónica. Uno de los peores ejemplos se da cuando los hackers instalan líneas de tarificación especial (900...) en la instalación del propietario para posteriormente llamarse a sí mismo desde esta instalación a las líneas mencionadas, de manera que se lucran del propietario de la instalación ya que generan elevadas facturas telefónicas. En otros casos, los ataques pretenden únicamente paralizar la infraestructura telefónica (Denial-of-Service o DOS).&lt;br /&gt;
&lt;br /&gt;
Existen múltiples mecanismos para proteger la PBX innovaphone. Sin embargo, siguiendo los siguientes pasos se podrá incrementar de una manera considerable la seguridad en ella.&lt;br /&gt;
&lt;br /&gt;
===Crear únicamente objetos que se utilicen===&lt;br /&gt;
A menudo se crean objetos en la PBX que no se usan activamente (por ejemplo, un trabajador que ya no trabaja en la empresa) y que probablemente no estén protegidos con contraseña. Cualquiera podría acceder desde una red externa a la instalación, probar con varios números y, cuando encuentre alguno inutilizado, causar el daño. Se aconseja que se protejan todos los objetos creados con una contraseña y establecer No. Of Regs w/o Pwd en 0.&lt;br /&gt;
&lt;br /&gt;
===Nombre de usuario corriente y protección con contraseña===&lt;br /&gt;
&lt;br /&gt;
Es muy común utilizar “admin” como nombre de usuario para registrarse. Simplemente con ser un poco creativos con el nombre le podemos complicar las cosas a los piratas informáticos (p. ej., PericoPalotes, VíctorTazo). Por lo general, una contraseña no garantiza la seguridad. Las contraseñas “abc” o “pbx” no le supone una gran dificultad a un hacker. En sólo dos minutos podrían piratear estas contraseñas de tres minúsculas. Igualmente, una contraseña de 3 caracteres, combinando mayúsculas y minúsculas, no le supondría al hacker más de media hora.&lt;br /&gt;
&lt;br /&gt;
La cosa cambia cuando nos encontramos con una contraseña de 8 caracteres. Incluso tratándose únicamente de minúsculas, un programa tardaría 37.968 días para comprobar todas las combinaciones posibles. Si combinamos minúsculas y mayúsculas, la busqueda tardaría fácilmente unos 97.400... ¡años! Cuidado también con el ataque “Diccionario” que supone el problema siguiente: si escogemos una de las 5000 palabras que alberga el vocabulario español e inglés, al hacker no le supondrá más de una hora. Igual ocurre con una fecha de cumpleaños, sea cual sea la forma cómo se escriba (01.01.1960 o 01.01.60).&lt;br /&gt;
&lt;br /&gt;
Por lo tanto, para estar bien protegidos, la contraseña ha de ser larga, que no sea ninguna de las palabras posibles en el ataque por diccionario y contener mayúsculas y minúsculas y/o dígitos. La probabilidad de que la contraseña sea robada disminuye proporcionalmente a su complejidad.&lt;br /&gt;
&lt;br /&gt;
===Desactivar “unknown registrations”===&lt;br /&gt;
&lt;br /&gt;
Hay diferentes funciones que ayudan al administrador a llevar a cabo la instalación telefónica simplificando el proceso, como la “Zero Configuration Deployment” que incluye también “unknown registrations” para ayudar al administrador a llevar a cabo accesos en el sistema sin haber introducido correctamente el nombre de usuario y contraseña. Esto es de gran ayuda para grandes instalaciones. La función se puede activar o desactivar, de manera que es importante que “unknown registrations” se desactive una vez que el proceso se haya completado, ya que si no cualquiera desde una red externa podría acceder sin tener un nombre de usuario o contraseña. &lt;br /&gt;
&lt;br /&gt;
Este artículo describe únicamente ciertos tipos de errores y algunos mecanismos de protección. Con la aplicación de algunos de estos mecanismos mencionados se puede mejorar en gran medida la seguridad de la instalación telefónica. Sin embargo, el asunto de la Seguridad es tratado en una lección de la Formación Avanzada (Advanced Training) de innovaphone. Le aconsejamos que vuelva a repasar dicha lección, donde encontrará información detallada al respecto.&lt;br /&gt;
&lt;br /&gt;
===Configurar el Filtro IP (IP Filter)===&lt;br /&gt;
&lt;br /&gt;
Se recomienda establecer filtros globales IP para evitar accesos no autorizados desde redes IP externas. Únicamente accesos bajo esta configuración de red con filtro IP serán permitidos. Desde la V8 HF8 hay 2 filtros IP diferentes. Uno para accesos sin conrtaseña y el otro con contraseña.&lt;br /&gt;
&lt;br /&gt;
===Utilizar H323/TLS con &#039;&#039;TLS Only&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Desde la V11r1 se recomienda utilizar H.323/TLS en lugar de H.323. Además de encriptar la señal de las llamadas, permite acceder teléfonos sin contraseña (Certificado). Marcando la casilla TLS Only en la sección Devices utilizada para el acceso, desactivaremos la indentificación por contraseña. De este modo, se evitarán accesos no deseados con contraseñas robadas o jaqueadas.&lt;br /&gt;
&lt;br /&gt;
== Related Articles == &lt;br /&gt;
&lt;br /&gt;
* Localized articles&lt;br /&gt;
&lt;br /&gt;
[[Howto:Protection against Brute Force Attacks]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Schutz vor Brute Force Attacken (D)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Bescherming tegen brute force attacks (NL)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protection contre les Attaques par Force Brute (FR)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protezione_da_Brute_Force_Attacks (I)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Howto|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:Protecci%C3%B3n_contra_los_ataques_de_fuerza_bruta_(SP)&amp;diff=36895</id>
		<title>Howto:Protección contra los ataques de fuerza bruta (SP)</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:Protecci%C3%B3n_contra_los_ataques_de_fuerza_bruta_(SP)&amp;diff=36895"/>
		<updated>2015-02-26T14:37:15Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Utilizar H323/TLS con TLS Only */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Applies To==&lt;br /&gt;
This information applies to&lt;br /&gt;
&lt;br /&gt;
* innovaphone PBX having direct access to the internet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Keywords: enter keywords, foreign translations and/or synoyms not appearing in the article here for better search results --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
Protección contra Ataques de Fuerza Bruta&lt;br /&gt;
&lt;br /&gt;
Seguridad: ¿Tiene su PBX suficiente protección? &lt;br /&gt;
&lt;br /&gt;
En Internet existen siempre peligros latentes. Esto no es nada nuevo para usted, muestra de ello son los mecanimos apropiados de seguridad que utiliza para proteger sus sistemas. Un cortafuego protege su red de accesos no autorizados; un antivirus le protege de virus, gusanos, troyanos, etc., además de permitirle navegar y enviar emails de manera segura. &lt;br /&gt;
De igual modo, las instalaciones telefónicas han de ser protegidas con mecanismos de seguridad que prevengan de ataques o de daños. Éste es precisamente el caso que se da en las instalaciones que se conectan directamente a Internet y no tienen ninguna protección en la red interna de la empresa, haciéndolas accesibles desde el exterior. &lt;br /&gt;
&lt;br /&gt;
A lo largo de los últimos meses se han dado con más frecuencia ataques en sistemas telefónicos a través del método de “Ataques de Fuerza Bruta”. Un programa pirata comprueba combinaciones de contraseñas de usuarios al igual que accesos, de manera que realiza busquedas en fracciones de segundos. Si consiguen acceder al sistema, se denomina uso fraudulento o “Call Fraud”. El hacker podrá, por ejemplo, realizar llamadas gratuitas a expensas del propietario de la instalación telefónica. Uno de los peores ejemplos se da cuando los hackers instalan líneas de tarificación especial (900...) en la instalación del propietario para posteriormente llamarse a sí mismo desde esta instalación a las líneas mencionadas, de manera que se lucran del propietario de la instalación ya que generan elevadas facturas telefónicas. En otros casos, los ataques pretenden únicamente paralizar la infraestructura telefónica (Denial-of-Service o DOS).&lt;br /&gt;
&lt;br /&gt;
Existen múltiples mecanismos para proteger la PBX innovaphone. Sin embargo, siguiendo los siguientes pasos se podrá incrementar de una manera considerable la seguridad en ella.&lt;br /&gt;
&lt;br /&gt;
===Crear únicamente objetos que se utilicen===&lt;br /&gt;
A menudo se crean objetos en la PBX que no se usan activamente (por ejemplo, un trabajador que ya no trabaja en la empresa) y que probablemente no estén protegidos con contraseña. Cualquiera podría acceder desde una red externa a la instalación, probar con varios números y, cuando encuentre alguno inutilizado, causar el daño. Se aconseja que se protejan todos los objetos creados con una contraseña y establecer No. Of Regs w/o Pwd en 0.&lt;br /&gt;
&lt;br /&gt;
===Nombre de usuario corriente y protección con contraseña===&lt;br /&gt;
&lt;br /&gt;
Es muy común utilizar “admin” como nombre de usuario para registrarse. Simplemente con ser un poco creativos con el nombre le podemos complicar las cosas a los piratas informáticos (p. ej., PericoPalotes, VíctorTazo). Por lo general, una contraseña no garantiza la seguridad. Las contraseñas “abc” o “pbx” no le supone una gran dificultad a un hacker. En sólo dos minutos podrían piratear estas contraseñas de tres minúsculas. Igualmente, una contraseña de 3 caracteres, combinando mayúsculas y minúsculas, no le supondría al hacker más de media hora.&lt;br /&gt;
&lt;br /&gt;
La cosa cambia cuando nos encontramos con una contraseña de 8 caracteres. Incluso tratándose únicamente de minúsculas, un programa tardaría 37.968 días para comprobar todas las combinaciones posibles. Si combinamos minúsculas y mayúsculas, la busqueda tardaría fácilmente unos 97.400... ¡años! Cuidado también con el ataque “Diccionario” que supone el problema siguiente: si escogemos una de las 5000 palabras que alberga el vocabulario español e inglés, al hacker no le supondrá más de una hora. Igual ocurre con una fecha de cumpleaños, sea cual sea la forma cómo se escriba (01.01.1960 o 01.01.60).&lt;br /&gt;
&lt;br /&gt;
Por lo tanto, para estar bien protegidos, la contraseña ha de ser larga, que no sea ninguna de las palabras posibles en el ataque por diccionario y contener mayúsculas y minúsculas y/o dígitos. La probabilidad de que la contraseña sea robada disminuye proporcionalmente a su complejidad.&lt;br /&gt;
&lt;br /&gt;
===Desactivar “unknown registrations”===&lt;br /&gt;
&lt;br /&gt;
Hay diferentes funciones que ayudan al administrador a llevar a cabo la instalación telefónica simplificando el proceso, como la “Zero Configuration Deployment” que incluye también “unknown registrations” para ayudar al administrador a llevar a cabo accesos en el sistema sin haber introducido correctamente el nombre de usuario y contraseña. Esto es de gran ayuda para grandes instalaciones. La función se puede activar o desactivar, de manera que es importante que “unknown registrations” se desactive una vez que el proceso se haya completado, ya que si no cualquiera desde una red externa podría acceder sin tener un nombre de usuario o contraseña. &lt;br /&gt;
&lt;br /&gt;
Este artículo describe únicamente ciertos tipos de errores y algunos mecanismos de protección. Con la aplicación de algunos de estos mecanismos mencionados se puede mejorar en gran medida la seguridad de la instalación telefónica. Sin embargo, el asunto de la Seguridad es tratado en una lección de la Formación Avanzada (Advanced Training) de innovaphone. Le aconsejamos que vuelva a repasar dicha lección, donde encontrará información detallada al respecto.&lt;br /&gt;
&lt;br /&gt;
===Configurar el Filtro IP (IP Filter)===&lt;br /&gt;
&lt;br /&gt;
Se recomienda establecer filtros globales IP para evitar accesos no autorizados desde redes IP externas. Únicamente accesos bajo esta configuración de red con filtro IP serán permitidos. Desde la V8 HF8 hay 2 filtros IP diferentes. Uno para accesos sin conrtaseña y el otro con contraseña.&lt;br /&gt;
&lt;br /&gt;
===Utilizar H323/TLS con &#039;&#039;TLS Only&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Desde la V11r1 se recomienda utilizar H.323/TLS en lugar de H.323. Además de encriptar la señal de las llamadas, permite acceder teléfonos sin contraseña (Certificado). Marcando la casilla TLS Only en la sección Devices utilizada para el acceso, desactivaremos la indentificación por contraseña. De este modo, se evitarán accesos no deseados con contraseñas robadas o jaqueadas.&lt;br /&gt;
&lt;br /&gt;
== Related Articles == &lt;br /&gt;
&lt;br /&gt;
* Localized articles&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Schutz vor Brute Force Attacken (D)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Bescherming tegen brute force attacks (NL)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protection contre les Attaques par Force Brute (FR)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protezione_da_Brute_Force_Attacks (I)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Howto|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36892</id>
		<title>Howto:Protection against Brute Force Attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36892"/>
		<updated>2015-02-26T14:28:11Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Related Articles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Applies To==&lt;br /&gt;
This information applies to&lt;br /&gt;
&lt;br /&gt;
* innovaphone PBX having direct access to the internet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Keywords: enter keywords, foreign translations and/or synoyms not appearing in the article here for better search results --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
Protection against Brute Force Attacks&lt;br /&gt;
&lt;br /&gt;
Security: Does your PBX have sufficient protection?&lt;br /&gt;
There are dangers lurking in the internet. You know this which is why you protect your systems with appropriate security mechanisms. A firewall protects your network from unauthorised access; virus protection keeps viruses, worms, trojans etc. at bay and enabling carefree surfing and emailing. &lt;br /&gt;
Telephone systems also need to be equipped with security mechanisms to prevent them from being damaged or attacked. This is especially the case for systems directly connected to the internet which do not have a protected home in a company intranet, making them comparably accessible from the outside world. Over the past months there have been more and more attacks on telephone systems by means of the “Brute Force Attack” method. A hacker programme tests user-password combinations or registrations, making several parallel enquiries in a fraction of a second. &lt;br /&gt;
If they successfully access the system, then it is easy to abuse the system, also called Call Fraud. The hacker can, for example, make free phone calls at the cost of the telephone system owner. There have been especially grave situations where hackers have firstly set up expensive hotlines, then called them via the cracked telephone system, earning money themselves from the call fees. In some cases, attacks only aim to bring a telephone system to a stand-still – to cause damage without any further abuse (Denial-of-Sevice attacks, so-called DOS). &lt;br /&gt;
There are many other mechanisms which provide good protection for the innovaphone PBX. However, just following these steps can increase security many times over:&lt;br /&gt;
&lt;br /&gt;
===Only create used objects===&lt;br /&gt;
Sometimes objects are created in the PBX, which are then not used actively (e.g. employees leave the company) these may not even be password protected. Somebody could register externally to the system, try out several extension numbers, find an unused one and cause damage. It is advisable to protect all objects created with a password and set &#039;&#039;&#039;No. of Regs w/o Pwd&#039;&#039;&#039; to 0.&lt;br /&gt;
&lt;br /&gt;
===Conscientious user name and password protection===&lt;br /&gt;
 &lt;br /&gt;
The well-loved “admin” is often selected for a registration by default. Just a little creativity can make life harder for a hacker when this user is given a special name (e.g. “Fridolin”? or “FrauHolle”?). As a general rule, a password does not mean you are protected. The passwords “abc” or “pbx” are not a great obstacle for hackers. It would take a hacker just a couple of minutes to crack these three-figure, lower-case passwords. A three-figure password, combining a lower case letter with an upper case letter and a digit would stand up to the same attack for just half an hour. &lt;br /&gt;
An eight-figure password is a different kettle of fish. Even if only lower-case is used, a programme needs the grand total of about 37,968 days to try all the combinations. A mixture of lower-case, upper-case and digits would amount to 97,400 years. &lt;br /&gt;
It should be noted that this is not the case for the “dictionary approach”: if you select one of the 5,000 words which are included in the German and English basic vocabulary, then your password would stand for less than one hour. This is also the case for data such as own date of birth in any format (e.g. 01.01.1960 or 01.01.60). &lt;br /&gt;
In order to provide real protection, therefore, the password should be quite long, should not use the dictionary approach, should include upper-case and lower-case letters, and both special characters and/or digits. This increases the combination possibilities, thus reducing the probability that the password will be cracked.&lt;br /&gt;
 &lt;br /&gt;
===Deactivate “unknown registrations”===&lt;br /&gt;
&lt;br /&gt;
There are various functions which support an administrator when commissioning a telephone system thus simplifying the rollout. These are called “Zero Configuration Deployment”. This also includes “unknown registrations”, which help the administrator to carry out registrations on the system without having to enter the appropriate user and password. This is a real relief especially for larger installations. This function can be activated or deactivated. Therefore, it is important that “unknown registrations” are deactivated once the rollout has been completed, as otherwise, anyone from outside could register without needing a user name and password. &lt;br /&gt;
Only selected error sources and appropriate security mechanisms have been described. Applying these mechanisms can significantly improve your telephone system’s security. A lesson in the innovaphone Advanced training course has been dedicated to the topic of Security. We recommend you to think about working through this lesson again! More detailed information can be found in the training course documents.&lt;br /&gt;
&lt;br /&gt;
===Configure IP Filter===&lt;br /&gt;
&lt;br /&gt;
It is recommended to define global IP address filters to protect the innovaphone PBX from unauthorised access. Only the configured IP subnets are allowed to register at the PBX.&lt;br /&gt;
Starting from V8 HF8 you have 2 different filters. One filter is for registrations without password, and the other filter is for registrations with password.&lt;br /&gt;
&lt;br /&gt;
=== Use H323/TLS with &#039;&#039;TLS Only&#039;&#039; ===&lt;br /&gt;
From V11r1, it is recommended to use H.323/TLS instead of plain H.323.  In addition to call signalling encryption, this allows phones to be registered without any password (certificate based).  By setting the &#039;&#039;TLS Only&#039;&#039; check-mark in the &#039;&#039;Devices&#039; entry used for registration, password based registration is disabled.  This way, no malicious registration is possible with a leaked or hacked user password.&lt;br /&gt;
&lt;br /&gt;
== Related Articles == &lt;br /&gt;
&lt;br /&gt;
* Localized articels&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Schutz vor Brute Force Attacken (D)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Bescherming tegen brute force attacks (NL)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protection contre les Attaques par Force Brute (FR)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protezione_da_Brute_Force_Attacks (I)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto:Protección contra los ataques de fuerza bruta (SP)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Howto|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:Protecci%C3%B3n_contra_los_ataques_de_fuerza_bruta_(SP)&amp;diff=36891</id>
		<title>Howto:Protección contra los ataques de fuerza bruta (SP)</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:Protecci%C3%B3n_contra_los_ataques_de_fuerza_bruta_(SP)&amp;diff=36891"/>
		<updated>2015-02-26T14:26:48Z</updated>

		<summary type="html">&lt;p&gt;Flp: New page: ==Applies To== This information applies to  * innovaphone PBX having direct access to the internet   &amp;lt;!-- Keywords: enter keywords, foreign translations and/or synoyms not appearing in the...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Applies To==&lt;br /&gt;
This information applies to&lt;br /&gt;
&lt;br /&gt;
* innovaphone PBX having direct access to the internet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Keywords: enter keywords, foreign translations and/or synoyms not appearing in the article here for better search results --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
Protección contra Ataques de Fuerza Bruta&lt;br /&gt;
&lt;br /&gt;
Seguridad: ¿Tiene su PBX suficiente protección? &lt;br /&gt;
&lt;br /&gt;
En Internet existen siempre peligros latentes. Esto no es nada nuevo para usted, muestra de ello son los mecanimos apropiados de seguridad que utiliza para proteger sus sistemas. Un cortafuego protege su red de accesos no autorizados; un antivirus le protege de virus, gusanos, troyanos, etc., además de permitirle navegar y enviar emails de manera segura. &lt;br /&gt;
De igual modo, las instalaciones telefónicas han de ser protegidas con mecanismos de seguridad que prevengan de ataques o de daños. Éste es precisamente el caso que se da en las instalaciones que se conectan directamente a Internet y no tienen ninguna protección en la red interna de la empresa, haciéndolas accesibles desde el exterior. &lt;br /&gt;
&lt;br /&gt;
A lo largo de los últimos meses se han dado con más frecuencia ataques en sistemas telefónicos a través del método de “Ataques de Fuerza Bruta”. Un programa pirata comprueba combinaciones de contraseñas de usuarios al igual que accesos, de manera que realiza busquedas en fracciones de segundos. Si consiguen acceder al sistema, se denomina uso fraudulento o “Call Fraud”. El hacker podrá, por ejemplo, realizar llamadas gratuitas a expensas del propietario de la instalación telefónica. Uno de los peores ejemplos se da cuando los hackers instalan líneas de tarificación especial (900...) en la instalación del propietario para posteriormente llamarse a sí mismo desde esta instalación a las líneas mencionadas, de manera que se lucran del propietario de la instalación ya que generan elevadas facturas telefónicas. En otros casos, los ataques pretenden únicamente paralizar la infraestructura telefónica (Denial-of-Service o DOS).&lt;br /&gt;
&lt;br /&gt;
Existen múltiples mecanismos para proteger la PBX innovaphone. Sin embargo, siguiendo los siguientes pasos se podrá incrementar de una manera considerable la seguridad en ella.&lt;br /&gt;
&lt;br /&gt;
===Crear únicamente objetos que se utilicen===&lt;br /&gt;
A menudo se crean objetos en la PBX que no se usan activamente (por ejemplo, un trabajador que ya no trabaja en la empresa) y que probablemente no estén protegidos con contraseña. Cualquiera podría acceder desde una red externa a la instalación, probar con varios números y, cuando encuentre alguno inutilizado, causar el daño. Se aconseja que se protejan todos los objetos creados con una contraseña y establecer No. Of Regs w/o Pwd en 0.&lt;br /&gt;
&lt;br /&gt;
===Nombre de usuario corriente y protección con contraseña===&lt;br /&gt;
&lt;br /&gt;
Es muy común utilizar “admin” como nombre de usuario para registrarse. Simplemente con ser un poco creativos con el nombre le podemos complicar las cosas a los piratas informáticos (p. ej., PericoPalotes, VíctorTazo). Por lo general, una contraseña no garantiza la seguridad. Las contraseñas “abc” o “pbx” no le supone una gran dificultad a un hacker. En sólo dos minutos podrían piratear estas contraseñas de tres minúsculas. Igualmente, una contraseña de 3 caracteres, combinando mayúsculas y minúsculas, no le supondría al hacker más de media hora.&lt;br /&gt;
&lt;br /&gt;
La cosa cambia cuando nos encontramos con una contraseña de 8 caracteres. Incluso tratándose únicamente de minúsculas, un programa tardaría 37.968 días para comprobar todas las combinaciones posibles. Si combinamos minúsculas y mayúsculas, la busqueda tardaría fácilmente unos 97.400... ¡años! Cuidado también con el ataque “Diccionario” que supone el problema siguiente: si escogemos una de las 5000 palabras que alberga el vocabulario español e inglés, al hacker no le supondrá más de una hora. Igual ocurre con una fecha de cumpleaños, sea cual sea la forma cómo se escriba (01.01.1960 o 01.01.60).&lt;br /&gt;
&lt;br /&gt;
Por lo tanto, para estar bien protegidos, la contraseña ha de ser larga, que no sea ninguna de las palabras posibles en el ataque por diccionario y contener mayúsculas y minúsculas y/o dígitos. La probabilidad de que la contraseña sea robada disminuye proporcionalmente a su complejidad.&lt;br /&gt;
&lt;br /&gt;
===Desactivar “unknown registrations”===&lt;br /&gt;
&lt;br /&gt;
Hay diferentes funciones que ayudan al administrador a llevar a cabo la instalación telefónica simplificando el proceso, como la “Zero Configuration Deployment” que incluye también “unknown registrations” para ayudar al administrador a llevar a cabo accesos en el sistema sin haber introducido correctamente el nombre de usuario y contraseña. Esto es de gran ayuda para grandes instalaciones. La función se puede activar o desactivar, de manera que es importante que “unknown registrations” se desactive una vez que el proceso se haya completado, ya que si no cualquiera desde una red externa podría acceder sin tener un nombre de usuario o contraseña. &lt;br /&gt;
&lt;br /&gt;
Este artículo describe únicamente ciertos tipos de errores y algunos mecanismos de protección. Con la aplicación de algunos de estos mecanismos mencionados se puede mejorar en gran medida la seguridad de la instalación telefónica. Sin embargo, el asunto de la Seguridad es tratado en una lección de la Formación Avanzada (Advanced Training) de innovaphone. Le aconsejamos que vuelva a repasar dicha lección, donde encontrará información detallada al respecto.&lt;br /&gt;
&lt;br /&gt;
===Configurar el Filtro IP (IP Filter)===&lt;br /&gt;
&lt;br /&gt;
Se recomienda establecer filtros globales IP para evitar accesos no autorizados desde redes IP externas. Únicamente accesos bajo esta configuración de red con filtro IP serán permitidos. Desde la V8 HF8 hay 2 filtros IP diferentes. Uno para accesos sin conrtaseña y el otro con contraseña.&lt;br /&gt;
&lt;br /&gt;
===Utilizar H323/TLS con TLS Only===&lt;br /&gt;
&lt;br /&gt;
Desde la V11r1 se recomienda utilizar H.323/TLS en lugar de H.323. Además de encriptar la señal de las llamadas, permite acceder teléfonos sin contraseña (Certificado). Marcando la casilla TLS Only en la sección Devices utilizada para el acceso, desactivaremos la indentificación por contraseña. De este modo, se evitarán accesos no deseados con contraseñas robadas o jaqueadas. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Articles == &lt;br /&gt;
&lt;br /&gt;
* Localized articles&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Schutz vor Brute Force Attacken (D)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Bescherming tegen brute force attacks (NL)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protection contre les Attaques par Force Brute (FR)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protezione_da_Brute_Force_Attacks (I)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Howto|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36890</id>
		<title>Howto:Protection against Brute Force Attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36890"/>
		<updated>2015-02-26T14:26:43Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Related Articles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Applies To==&lt;br /&gt;
This information applies to&lt;br /&gt;
&lt;br /&gt;
* innovaphone PBX having direct access to the internet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Keywords: enter keywords, foreign translations and/or synoyms not appearing in the article here for better search results --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
Protection against Brute Force Attacks&lt;br /&gt;
&lt;br /&gt;
Security: Does your PBX have sufficient protection?&lt;br /&gt;
There are dangers lurking in the internet. You know this which is why you protect your systems with appropriate security mechanisms. A firewall protects your network from unauthorised access; virus protection keeps viruses, worms, trojans etc. at bay and enabling carefree surfing and emailing. &lt;br /&gt;
Telephone systems also need to be equipped with security mechanisms to prevent them from being damaged or attacked. This is especially the case for systems directly connected to the internet which do not have a protected home in a company intranet, making them comparably accessible from the outside world. Over the past months there have been more and more attacks on telephone systems by means of the “Brute Force Attack” method. A hacker programme tests user-password combinations or registrations, making several parallel enquiries in a fraction of a second. &lt;br /&gt;
If they successfully access the system, then it is easy to abuse the system, also called Call Fraud. The hacker can, for example, make free phone calls at the cost of the telephone system owner. There have been especially grave situations where hackers have firstly set up expensive hotlines, then called them via the cracked telephone system, earning money themselves from the call fees. In some cases, attacks only aim to bring a telephone system to a stand-still – to cause damage without any further abuse (Denial-of-Sevice attacks, so-called DOS). &lt;br /&gt;
There are many other mechanisms which provide good protection for the innovaphone PBX. However, just following these steps can increase security many times over:&lt;br /&gt;
&lt;br /&gt;
===Only create used objects===&lt;br /&gt;
Sometimes objects are created in the PBX, which are then not used actively (e.g. employees leave the company) these may not even be password protected. Somebody could register externally to the system, try out several extension numbers, find an unused one and cause damage. It is advisable to protect all objects created with a password and set &#039;&#039;&#039;No. of Regs w/o Pwd&#039;&#039;&#039; to 0.&lt;br /&gt;
&lt;br /&gt;
===Conscientious user name and password protection===&lt;br /&gt;
 &lt;br /&gt;
The well-loved “admin” is often selected for a registration by default. Just a little creativity can make life harder for a hacker when this user is given a special name (e.g. “Fridolin”? or “FrauHolle”?). As a general rule, a password does not mean you are protected. The passwords “abc” or “pbx” are not a great obstacle for hackers. It would take a hacker just a couple of minutes to crack these three-figure, lower-case passwords. A three-figure password, combining a lower case letter with an upper case letter and a digit would stand up to the same attack for just half an hour. &lt;br /&gt;
An eight-figure password is a different kettle of fish. Even if only lower-case is used, a programme needs the grand total of about 37,968 days to try all the combinations. A mixture of lower-case, upper-case and digits would amount to 97,400 years. &lt;br /&gt;
It should be noted that this is not the case for the “dictionary approach”: if you select one of the 5,000 words which are included in the German and English basic vocabulary, then your password would stand for less than one hour. This is also the case for data such as own date of birth in any format (e.g. 01.01.1960 or 01.01.60). &lt;br /&gt;
In order to provide real protection, therefore, the password should be quite long, should not use the dictionary approach, should include upper-case and lower-case letters, and both special characters and/or digits. This increases the combination possibilities, thus reducing the probability that the password will be cracked.&lt;br /&gt;
 &lt;br /&gt;
===Deactivate “unknown registrations”===&lt;br /&gt;
&lt;br /&gt;
There are various functions which support an administrator when commissioning a telephone system thus simplifying the rollout. These are called “Zero Configuration Deployment”. This also includes “unknown registrations”, which help the administrator to carry out registrations on the system without having to enter the appropriate user and password. This is a real relief especially for larger installations. This function can be activated or deactivated. Therefore, it is important that “unknown registrations” are deactivated once the rollout has been completed, as otherwise, anyone from outside could register without needing a user name and password. &lt;br /&gt;
Only selected error sources and appropriate security mechanisms have been described. Applying these mechanisms can significantly improve your telephone system’s security. A lesson in the innovaphone Advanced training course has been dedicated to the topic of Security. We recommend you to think about working through this lesson again! More detailed information can be found in the training course documents.&lt;br /&gt;
&lt;br /&gt;
===Configure IP Filter===&lt;br /&gt;
&lt;br /&gt;
It is recommended to define global IP address filters to protect the innovaphone PBX from unauthorised access. Only the configured IP subnets are allowed to register at the PBX.&lt;br /&gt;
Starting from V8 HF8 you have 2 different filters. One filter is for registrations without password, and the other filter is for registrations with password.&lt;br /&gt;
&lt;br /&gt;
=== Use H323/TLS with &#039;&#039;TLS Only&#039;&#039; ===&lt;br /&gt;
From V11r1, it is recommended to use H.323/TLS instead of plain H.323.  In addition to call signalling encryption, this allows phones to be registered without any password (certificate based).  By setting the &#039;&#039;TLS Only&#039;&#039; check-mark in the &#039;&#039;Devices&#039; entry used for registration, password based registration is disabled.  This way, no malicious registration is possible with a leaked or hacked user password.&lt;br /&gt;
&lt;br /&gt;
== Related Articles == &lt;br /&gt;
&lt;br /&gt;
* Localized articels&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Schutz vor Brute Force Attacken (D)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Bescherming tegen brute force attacks (NL)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protection contre les Attaques par Force Brute (FR)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protezione_da_Brute_Force_Attacks (I)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Howto|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36889</id>
		<title>Howto:Protection against Brute Force Attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36889"/>
		<updated>2015-02-26T14:07:18Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Related Articles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Applies To==&lt;br /&gt;
This information applies to&lt;br /&gt;
&lt;br /&gt;
* innovaphone PBX having direct access to the internet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Keywords: enter keywords, foreign translations and/or synoyms not appearing in the article here for better search results --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
Protection against Brute Force Attacks&lt;br /&gt;
&lt;br /&gt;
Security: Does your PBX have sufficient protection?&lt;br /&gt;
There are dangers lurking in the internet. You know this which is why you protect your systems with appropriate security mechanisms. A firewall protects your network from unauthorised access; virus protection keeps viruses, worms, trojans etc. at bay and enabling carefree surfing and emailing. &lt;br /&gt;
Telephone systems also need to be equipped with security mechanisms to prevent them from being damaged or attacked. This is especially the case for systems directly connected to the internet which do not have a protected home in a company intranet, making them comparably accessible from the outside world. Over the past months there have been more and more attacks on telephone systems by means of the “Brute Force Attack” method. A hacker programme tests user-password combinations or registrations, making several parallel enquiries in a fraction of a second. &lt;br /&gt;
If they successfully access the system, then it is easy to abuse the system, also called Call Fraud. The hacker can, for example, make free phone calls at the cost of the telephone system owner. There have been especially grave situations where hackers have firstly set up expensive hotlines, then called them via the cracked telephone system, earning money themselves from the call fees. In some cases, attacks only aim to bring a telephone system to a stand-still – to cause damage without any further abuse (Denial-of-Sevice attacks, so-called DOS). &lt;br /&gt;
There are many other mechanisms which provide good protection for the innovaphone PBX. However, just following these steps can increase security many times over:&lt;br /&gt;
&lt;br /&gt;
===Only create used objects===&lt;br /&gt;
Sometimes objects are created in the PBX, which are then not used actively (e.g. employees leave the company) these may not even be password protected. Somebody could register externally to the system, try out several extension numbers, find an unused one and cause damage. It is advisable to protect all objects created with a password and set &#039;&#039;&#039;No. of Regs w/o Pwd&#039;&#039;&#039; to 0.&lt;br /&gt;
&lt;br /&gt;
===Conscientious user name and password protection===&lt;br /&gt;
 &lt;br /&gt;
The well-loved “admin” is often selected for a registration by default. Just a little creativity can make life harder for a hacker when this user is given a special name (e.g. “Fridolin”? or “FrauHolle”?). As a general rule, a password does not mean you are protected. The passwords “abc” or “pbx” are not a great obstacle for hackers. It would take a hacker just a couple of minutes to crack these three-figure, lower-case passwords. A three-figure password, combining a lower case letter with an upper case letter and a digit would stand up to the same attack for just half an hour. &lt;br /&gt;
An eight-figure password is a different kettle of fish. Even if only lower-case is used, a programme needs the grand total of about 37,968 days to try all the combinations. A mixture of lower-case, upper-case and digits would amount to 97,400 years. &lt;br /&gt;
It should be noted that this is not the case for the “dictionary approach”: if you select one of the 5,000 words which are included in the German and English basic vocabulary, then your password would stand for less than one hour. This is also the case for data such as own date of birth in any format (e.g. 01.01.1960 or 01.01.60). &lt;br /&gt;
In order to provide real protection, therefore, the password should be quite long, should not use the dictionary approach, should include upper-case and lower-case letters, and both special characters and/or digits. This increases the combination possibilities, thus reducing the probability that the password will be cracked.&lt;br /&gt;
 &lt;br /&gt;
===Deactivate “unknown registrations”===&lt;br /&gt;
&lt;br /&gt;
There are various functions which support an administrator when commissioning a telephone system thus simplifying the rollout. These are called “Zero Configuration Deployment”. This also includes “unknown registrations”, which help the administrator to carry out registrations on the system without having to enter the appropriate user and password. This is a real relief especially for larger installations. This function can be activated or deactivated. Therefore, it is important that “unknown registrations” are deactivated once the rollout has been completed, as otherwise, anyone from outside could register without needing a user name and password. &lt;br /&gt;
Only selected error sources and appropriate security mechanisms have been described. Applying these mechanisms can significantly improve your telephone system’s security. A lesson in the innovaphone Advanced training course has been dedicated to the topic of Security. We recommend you to think about working through this lesson again! More detailed information can be found in the training course documents.&lt;br /&gt;
&lt;br /&gt;
===Configure IP Filter===&lt;br /&gt;
&lt;br /&gt;
It is recommended to define global IP address filters to protect the innovaphone PBX from unauthorised access. Only the configured IP subnets are allowed to register at the PBX.&lt;br /&gt;
Starting from V8 HF8 you have 2 different filters. One filter is for registrations without password, and the other filter is for registrations with password.&lt;br /&gt;
&lt;br /&gt;
=== Use H323/TLS with &#039;&#039;TLS Only&#039;&#039; ===&lt;br /&gt;
From V11r1, it is recommended to use H.323/TLS instead of plain H.323.  In addition to call signalling encryption, this allows phones to be registered without any password (certificate based).  By setting the &#039;&#039;TLS Only&#039;&#039; check-mark in the &#039;&#039;Devices&#039; entry used for registration, password based registration is disabled.  This way, no malicious registration is possible with a leaked or hacked user password.&lt;br /&gt;
&lt;br /&gt;
== Related Articles == &lt;br /&gt;
&lt;br /&gt;
* Localized articels&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Schutz vor Brute Force Attacken (D)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Bescherming tegen brute force attacks (NL)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protection contre les Attaques par Force Brute (FR)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protezione_da_Brute_Force_Attacks (I)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto:Protección contra los ataques de fuerza bruta]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Howto|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36888</id>
		<title>Howto:Protection against Brute Force Attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36888"/>
		<updated>2015-02-26T14:06:03Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Related Articles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Applies To==&lt;br /&gt;
This information applies to&lt;br /&gt;
&lt;br /&gt;
* innovaphone PBX having direct access to the internet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Keywords: enter keywords, foreign translations and/or synoyms not appearing in the article here for better search results --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
Protection against Brute Force Attacks&lt;br /&gt;
&lt;br /&gt;
Security: Does your PBX have sufficient protection?&lt;br /&gt;
There are dangers lurking in the internet. You know this which is why you protect your systems with appropriate security mechanisms. A firewall protects your network from unauthorised access; virus protection keeps viruses, worms, trojans etc. at bay and enabling carefree surfing and emailing. &lt;br /&gt;
Telephone systems also need to be equipped with security mechanisms to prevent them from being damaged or attacked. This is especially the case for systems directly connected to the internet which do not have a protected home in a company intranet, making them comparably accessible from the outside world. Over the past months there have been more and more attacks on telephone systems by means of the “Brute Force Attack” method. A hacker programme tests user-password combinations or registrations, making several parallel enquiries in a fraction of a second. &lt;br /&gt;
If they successfully access the system, then it is easy to abuse the system, also called Call Fraud. The hacker can, for example, make free phone calls at the cost of the telephone system owner. There have been especially grave situations where hackers have firstly set up expensive hotlines, then called them via the cracked telephone system, earning money themselves from the call fees. In some cases, attacks only aim to bring a telephone system to a stand-still – to cause damage without any further abuse (Denial-of-Sevice attacks, so-called DOS). &lt;br /&gt;
There are many other mechanisms which provide good protection for the innovaphone PBX. However, just following these steps can increase security many times over:&lt;br /&gt;
&lt;br /&gt;
===Only create used objects===&lt;br /&gt;
Sometimes objects are created in the PBX, which are then not used actively (e.g. employees leave the company) these may not even be password protected. Somebody could register externally to the system, try out several extension numbers, find an unused one and cause damage. It is advisable to protect all objects created with a password and set &#039;&#039;&#039;No. of Regs w/o Pwd&#039;&#039;&#039; to 0.&lt;br /&gt;
&lt;br /&gt;
===Conscientious user name and password protection===&lt;br /&gt;
 &lt;br /&gt;
The well-loved “admin” is often selected for a registration by default. Just a little creativity can make life harder for a hacker when this user is given a special name (e.g. “Fridolin”? or “FrauHolle”?). As a general rule, a password does not mean you are protected. The passwords “abc” or “pbx” are not a great obstacle for hackers. It would take a hacker just a couple of minutes to crack these three-figure, lower-case passwords. A three-figure password, combining a lower case letter with an upper case letter and a digit would stand up to the same attack for just half an hour. &lt;br /&gt;
An eight-figure password is a different kettle of fish. Even if only lower-case is used, a programme needs the grand total of about 37,968 days to try all the combinations. A mixture of lower-case, upper-case and digits would amount to 97,400 years. &lt;br /&gt;
It should be noted that this is not the case for the “dictionary approach”: if you select one of the 5,000 words which are included in the German and English basic vocabulary, then your password would stand for less than one hour. This is also the case for data such as own date of birth in any format (e.g. 01.01.1960 or 01.01.60). &lt;br /&gt;
In order to provide real protection, therefore, the password should be quite long, should not use the dictionary approach, should include upper-case and lower-case letters, and both special characters and/or digits. This increases the combination possibilities, thus reducing the probability that the password will be cracked.&lt;br /&gt;
 &lt;br /&gt;
===Deactivate “unknown registrations”===&lt;br /&gt;
&lt;br /&gt;
There are various functions which support an administrator when commissioning a telephone system thus simplifying the rollout. These are called “Zero Configuration Deployment”. This also includes “unknown registrations”, which help the administrator to carry out registrations on the system without having to enter the appropriate user and password. This is a real relief especially for larger installations. This function can be activated or deactivated. Therefore, it is important that “unknown registrations” are deactivated once the rollout has been completed, as otherwise, anyone from outside could register without needing a user name and password. &lt;br /&gt;
Only selected error sources and appropriate security mechanisms have been described. Applying these mechanisms can significantly improve your telephone system’s security. A lesson in the innovaphone Advanced training course has been dedicated to the topic of Security. We recommend you to think about working through this lesson again! More detailed information can be found in the training course documents.&lt;br /&gt;
&lt;br /&gt;
===Configure IP Filter===&lt;br /&gt;
&lt;br /&gt;
It is recommended to define global IP address filters to protect the innovaphone PBX from unauthorised access. Only the configured IP subnets are allowed to register at the PBX.&lt;br /&gt;
Starting from V8 HF8 you have 2 different filters. One filter is for registrations without password, and the other filter is for registrations with password.&lt;br /&gt;
&lt;br /&gt;
=== Use H323/TLS with &#039;&#039;TLS Only&#039;&#039; ===&lt;br /&gt;
From V11r1, it is recommended to use H.323/TLS instead of plain H.323.  In addition to call signalling encryption, this allows phones to be registered without any password (certificate based).  By setting the &#039;&#039;TLS Only&#039;&#039; check-mark in the &#039;&#039;Devices&#039; entry used for registration, password based registration is disabled.  This way, no malicious registration is possible with a leaked or hacked user password.&lt;br /&gt;
&lt;br /&gt;
== Related Articles == &lt;br /&gt;
&lt;br /&gt;
* Localized articels&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Schutz vor Brute Force Attacken (D)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Bescherming tegen brute force attacks (NL)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protection contre les Attaques par Force Brute (FR)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protezione_da_Brute_Force_Attacks (I)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto:Protección contra los ataques de fuerza bruta (SP)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Howto|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36887</id>
		<title>Howto:Protection against Brute Force Attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36887"/>
		<updated>2015-02-26T14:05:14Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Related Articles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Applies To==&lt;br /&gt;
This information applies to&lt;br /&gt;
&lt;br /&gt;
* innovaphone PBX having direct access to the internet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Keywords: enter keywords, foreign translations and/or synoyms not appearing in the article here for better search results --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
Protection against Brute Force Attacks&lt;br /&gt;
&lt;br /&gt;
Security: Does your PBX have sufficient protection?&lt;br /&gt;
There are dangers lurking in the internet. You know this which is why you protect your systems with appropriate security mechanisms. A firewall protects your network from unauthorised access; virus protection keeps viruses, worms, trojans etc. at bay and enabling carefree surfing and emailing. &lt;br /&gt;
Telephone systems also need to be equipped with security mechanisms to prevent them from being damaged or attacked. This is especially the case for systems directly connected to the internet which do not have a protected home in a company intranet, making them comparably accessible from the outside world. Over the past months there have been more and more attacks on telephone systems by means of the “Brute Force Attack” method. A hacker programme tests user-password combinations or registrations, making several parallel enquiries in a fraction of a second. &lt;br /&gt;
If they successfully access the system, then it is easy to abuse the system, also called Call Fraud. The hacker can, for example, make free phone calls at the cost of the telephone system owner. There have been especially grave situations where hackers have firstly set up expensive hotlines, then called them via the cracked telephone system, earning money themselves from the call fees. In some cases, attacks only aim to bring a telephone system to a stand-still – to cause damage without any further abuse (Denial-of-Sevice attacks, so-called DOS). &lt;br /&gt;
There are many other mechanisms which provide good protection for the innovaphone PBX. However, just following these steps can increase security many times over:&lt;br /&gt;
&lt;br /&gt;
===Only create used objects===&lt;br /&gt;
Sometimes objects are created in the PBX, which are then not used actively (e.g. employees leave the company) these may not even be password protected. Somebody could register externally to the system, try out several extension numbers, find an unused one and cause damage. It is advisable to protect all objects created with a password and set &#039;&#039;&#039;No. of Regs w/o Pwd&#039;&#039;&#039; to 0.&lt;br /&gt;
&lt;br /&gt;
===Conscientious user name and password protection===&lt;br /&gt;
 &lt;br /&gt;
The well-loved “admin” is often selected for a registration by default. Just a little creativity can make life harder for a hacker when this user is given a special name (e.g. “Fridolin”? or “FrauHolle”?). As a general rule, a password does not mean you are protected. The passwords “abc” or “pbx” are not a great obstacle for hackers. It would take a hacker just a couple of minutes to crack these three-figure, lower-case passwords. A three-figure password, combining a lower case letter with an upper case letter and a digit would stand up to the same attack for just half an hour. &lt;br /&gt;
An eight-figure password is a different kettle of fish. Even if only lower-case is used, a programme needs the grand total of about 37,968 days to try all the combinations. A mixture of lower-case, upper-case and digits would amount to 97,400 years. &lt;br /&gt;
It should be noted that this is not the case for the “dictionary approach”: if you select one of the 5,000 words which are included in the German and English basic vocabulary, then your password would stand for less than one hour. This is also the case for data such as own date of birth in any format (e.g. 01.01.1960 or 01.01.60). &lt;br /&gt;
In order to provide real protection, therefore, the password should be quite long, should not use the dictionary approach, should include upper-case and lower-case letters, and both special characters and/or digits. This increases the combination possibilities, thus reducing the probability that the password will be cracked.&lt;br /&gt;
 &lt;br /&gt;
===Deactivate “unknown registrations”===&lt;br /&gt;
&lt;br /&gt;
There are various functions which support an administrator when commissioning a telephone system thus simplifying the rollout. These are called “Zero Configuration Deployment”. This also includes “unknown registrations”, which help the administrator to carry out registrations on the system without having to enter the appropriate user and password. This is a real relief especially for larger installations. This function can be activated or deactivated. Therefore, it is important that “unknown registrations” are deactivated once the rollout has been completed, as otherwise, anyone from outside could register without needing a user name and password. &lt;br /&gt;
Only selected error sources and appropriate security mechanisms have been described. Applying these mechanisms can significantly improve your telephone system’s security. A lesson in the innovaphone Advanced training course has been dedicated to the topic of Security. We recommend you to think about working through this lesson again! More detailed information can be found in the training course documents.&lt;br /&gt;
&lt;br /&gt;
===Configure IP Filter===&lt;br /&gt;
&lt;br /&gt;
It is recommended to define global IP address filters to protect the innovaphone PBX from unauthorised access. Only the configured IP subnets are allowed to register at the PBX.&lt;br /&gt;
Starting from V8 HF8 you have 2 different filters. One filter is for registrations without password, and the other filter is for registrations with password.&lt;br /&gt;
&lt;br /&gt;
=== Use H323/TLS with &#039;&#039;TLS Only&#039;&#039; ===&lt;br /&gt;
From V11r1, it is recommended to use H.323/TLS instead of plain H.323.  In addition to call signalling encryption, this allows phones to be registered without any password (certificate based).  By setting the &#039;&#039;TLS Only&#039;&#039; check-mark in the &#039;&#039;Devices&#039; entry used for registration, password based registration is disabled.  This way, no malicious registration is possible with a leaked or hacked user password.&lt;br /&gt;
&lt;br /&gt;
== Related Articles == &lt;br /&gt;
&lt;br /&gt;
* Localized articels&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Schutz vor Brute Force Attacken (D)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Bescherming tegen brute force attacks (NL)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protection contre les Attaques par Force Brute (FR)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protezione_da_Brute_Force_Attacks (I)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-Protección contra los ataques de fuerza bruta (ES)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Howto|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36886</id>
		<title>Howto:Protection against Brute Force Attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36886"/>
		<updated>2015-02-26T14:04:31Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Related Articles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Applies To==&lt;br /&gt;
This information applies to&lt;br /&gt;
&lt;br /&gt;
* innovaphone PBX having direct access to the internet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Keywords: enter keywords, foreign translations and/or synoyms not appearing in the article here for better search results --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
Protection against Brute Force Attacks&lt;br /&gt;
&lt;br /&gt;
Security: Does your PBX have sufficient protection?&lt;br /&gt;
There are dangers lurking in the internet. You know this which is why you protect your systems with appropriate security mechanisms. A firewall protects your network from unauthorised access; virus protection keeps viruses, worms, trojans etc. at bay and enabling carefree surfing and emailing. &lt;br /&gt;
Telephone systems also need to be equipped with security mechanisms to prevent them from being damaged or attacked. This is especially the case for systems directly connected to the internet which do not have a protected home in a company intranet, making them comparably accessible from the outside world. Over the past months there have been more and more attacks on telephone systems by means of the “Brute Force Attack” method. A hacker programme tests user-password combinations or registrations, making several parallel enquiries in a fraction of a second. &lt;br /&gt;
If they successfully access the system, then it is easy to abuse the system, also called Call Fraud. The hacker can, for example, make free phone calls at the cost of the telephone system owner. There have been especially grave situations where hackers have firstly set up expensive hotlines, then called them via the cracked telephone system, earning money themselves from the call fees. In some cases, attacks only aim to bring a telephone system to a stand-still – to cause damage without any further abuse (Denial-of-Sevice attacks, so-called DOS). &lt;br /&gt;
There are many other mechanisms which provide good protection for the innovaphone PBX. However, just following these steps can increase security many times over:&lt;br /&gt;
&lt;br /&gt;
===Only create used objects===&lt;br /&gt;
Sometimes objects are created in the PBX, which are then not used actively (e.g. employees leave the company) these may not even be password protected. Somebody could register externally to the system, try out several extension numbers, find an unused one and cause damage. It is advisable to protect all objects created with a password and set &#039;&#039;&#039;No. of Regs w/o Pwd&#039;&#039;&#039; to 0.&lt;br /&gt;
&lt;br /&gt;
===Conscientious user name and password protection===&lt;br /&gt;
 &lt;br /&gt;
The well-loved “admin” is often selected for a registration by default. Just a little creativity can make life harder for a hacker when this user is given a special name (e.g. “Fridolin”? or “FrauHolle”?). As a general rule, a password does not mean you are protected. The passwords “abc” or “pbx” are not a great obstacle for hackers. It would take a hacker just a couple of minutes to crack these three-figure, lower-case passwords. A three-figure password, combining a lower case letter with an upper case letter and a digit would stand up to the same attack for just half an hour. &lt;br /&gt;
An eight-figure password is a different kettle of fish. Even if only lower-case is used, a programme needs the grand total of about 37,968 days to try all the combinations. A mixture of lower-case, upper-case and digits would amount to 97,400 years. &lt;br /&gt;
It should be noted that this is not the case for the “dictionary approach”: if you select one of the 5,000 words which are included in the German and English basic vocabulary, then your password would stand for less than one hour. This is also the case for data such as own date of birth in any format (e.g. 01.01.1960 or 01.01.60). &lt;br /&gt;
In order to provide real protection, therefore, the password should be quite long, should not use the dictionary approach, should include upper-case and lower-case letters, and both special characters and/or digits. This increases the combination possibilities, thus reducing the probability that the password will be cracked.&lt;br /&gt;
 &lt;br /&gt;
===Deactivate “unknown registrations”===&lt;br /&gt;
&lt;br /&gt;
There are various functions which support an administrator when commissioning a telephone system thus simplifying the rollout. These are called “Zero Configuration Deployment”. This also includes “unknown registrations”, which help the administrator to carry out registrations on the system without having to enter the appropriate user and password. This is a real relief especially for larger installations. This function can be activated or deactivated. Therefore, it is important that “unknown registrations” are deactivated once the rollout has been completed, as otherwise, anyone from outside could register without needing a user name and password. &lt;br /&gt;
Only selected error sources and appropriate security mechanisms have been described. Applying these mechanisms can significantly improve your telephone system’s security. A lesson in the innovaphone Advanced training course has been dedicated to the topic of Security. We recommend you to think about working through this lesson again! More detailed information can be found in the training course documents.&lt;br /&gt;
&lt;br /&gt;
===Configure IP Filter===&lt;br /&gt;
&lt;br /&gt;
It is recommended to define global IP address filters to protect the innovaphone PBX from unauthorised access. Only the configured IP subnets are allowed to register at the PBX.&lt;br /&gt;
Starting from V8 HF8 you have 2 different filters. One filter is for registrations without password, and the other filter is for registrations with password.&lt;br /&gt;
&lt;br /&gt;
=== Use H323/TLS with &#039;&#039;TLS Only&#039;&#039; ===&lt;br /&gt;
From V11r1, it is recommended to use H.323/TLS instead of plain H.323.  In addition to call signalling encryption, this allows phones to be registered without any password (certificate based).  By setting the &#039;&#039;TLS Only&#039;&#039; check-mark in the &#039;&#039;Devices&#039; entry used for registration, password based registration is disabled.  This way, no malicious registration is possible with a leaked or hacked user password.&lt;br /&gt;
&lt;br /&gt;
== Related Articles == &lt;br /&gt;
&lt;br /&gt;
* Localized articels&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Schutz vor Brute Force Attacken (D)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Bescherming tegen brute force attacks (NL)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protection contre les Attaques par Force Brute (FR)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protezione_da_Brute_Force_Attacks (I)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto:Protección contra los ataques de fuerza bruta]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Howto|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36885</id>
		<title>Howto:Protection against Brute Force Attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36885"/>
		<updated>2015-02-26T14:03:39Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Related Articles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Applies To==&lt;br /&gt;
This information applies to&lt;br /&gt;
&lt;br /&gt;
* innovaphone PBX having direct access to the internet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Keywords: enter keywords, foreign translations and/or synoyms not appearing in the article here for better search results --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
Protection against Brute Force Attacks&lt;br /&gt;
&lt;br /&gt;
Security: Does your PBX have sufficient protection?&lt;br /&gt;
There are dangers lurking in the internet. You know this which is why you protect your systems with appropriate security mechanisms. A firewall protects your network from unauthorised access; virus protection keeps viruses, worms, trojans etc. at bay and enabling carefree surfing and emailing. &lt;br /&gt;
Telephone systems also need to be equipped with security mechanisms to prevent them from being damaged or attacked. This is especially the case for systems directly connected to the internet which do not have a protected home in a company intranet, making them comparably accessible from the outside world. Over the past months there have been more and more attacks on telephone systems by means of the “Brute Force Attack” method. A hacker programme tests user-password combinations or registrations, making several parallel enquiries in a fraction of a second. &lt;br /&gt;
If they successfully access the system, then it is easy to abuse the system, also called Call Fraud. The hacker can, for example, make free phone calls at the cost of the telephone system owner. There have been especially grave situations where hackers have firstly set up expensive hotlines, then called them via the cracked telephone system, earning money themselves from the call fees. In some cases, attacks only aim to bring a telephone system to a stand-still – to cause damage without any further abuse (Denial-of-Sevice attacks, so-called DOS). &lt;br /&gt;
There are many other mechanisms which provide good protection for the innovaphone PBX. However, just following these steps can increase security many times over:&lt;br /&gt;
&lt;br /&gt;
===Only create used objects===&lt;br /&gt;
Sometimes objects are created in the PBX, which are then not used actively (e.g. employees leave the company) these may not even be password protected. Somebody could register externally to the system, try out several extension numbers, find an unused one and cause damage. It is advisable to protect all objects created with a password and set &#039;&#039;&#039;No. of Regs w/o Pwd&#039;&#039;&#039; to 0.&lt;br /&gt;
&lt;br /&gt;
===Conscientious user name and password protection===&lt;br /&gt;
 &lt;br /&gt;
The well-loved “admin” is often selected for a registration by default. Just a little creativity can make life harder for a hacker when this user is given a special name (e.g. “Fridolin”? or “FrauHolle”?). As a general rule, a password does not mean you are protected. The passwords “abc” or “pbx” are not a great obstacle for hackers. It would take a hacker just a couple of minutes to crack these three-figure, lower-case passwords. A three-figure password, combining a lower case letter with an upper case letter and a digit would stand up to the same attack for just half an hour. &lt;br /&gt;
An eight-figure password is a different kettle of fish. Even if only lower-case is used, a programme needs the grand total of about 37,968 days to try all the combinations. A mixture of lower-case, upper-case and digits would amount to 97,400 years. &lt;br /&gt;
It should be noted that this is not the case for the “dictionary approach”: if you select one of the 5,000 words which are included in the German and English basic vocabulary, then your password would stand for less than one hour. This is also the case for data such as own date of birth in any format (e.g. 01.01.1960 or 01.01.60). &lt;br /&gt;
In order to provide real protection, therefore, the password should be quite long, should not use the dictionary approach, should include upper-case and lower-case letters, and both special characters and/or digits. This increases the combination possibilities, thus reducing the probability that the password will be cracked.&lt;br /&gt;
 &lt;br /&gt;
===Deactivate “unknown registrations”===&lt;br /&gt;
&lt;br /&gt;
There are various functions which support an administrator when commissioning a telephone system thus simplifying the rollout. These are called “Zero Configuration Deployment”. This also includes “unknown registrations”, which help the administrator to carry out registrations on the system without having to enter the appropriate user and password. This is a real relief especially for larger installations. This function can be activated or deactivated. Therefore, it is important that “unknown registrations” are deactivated once the rollout has been completed, as otherwise, anyone from outside could register without needing a user name and password. &lt;br /&gt;
Only selected error sources and appropriate security mechanisms have been described. Applying these mechanisms can significantly improve your telephone system’s security. A lesson in the innovaphone Advanced training course has been dedicated to the topic of Security. We recommend you to think about working through this lesson again! More detailed information can be found in the training course documents.&lt;br /&gt;
&lt;br /&gt;
===Configure IP Filter===&lt;br /&gt;
&lt;br /&gt;
It is recommended to define global IP address filters to protect the innovaphone PBX from unauthorised access. Only the configured IP subnets are allowed to register at the PBX.&lt;br /&gt;
Starting from V8 HF8 you have 2 different filters. One filter is for registrations without password, and the other filter is for registrations with password.&lt;br /&gt;
&lt;br /&gt;
=== Use H323/TLS with &#039;&#039;TLS Only&#039;&#039; ===&lt;br /&gt;
From V11r1, it is recommended to use H.323/TLS instead of plain H.323.  In addition to call signalling encryption, this allows phones to be registered without any password (certificate based).  By setting the &#039;&#039;TLS Only&#039;&#039; check-mark in the &#039;&#039;Devices&#039; entry used for registration, password based registration is disabled.  This way, no malicious registration is possible with a leaked or hacked user password.&lt;br /&gt;
&lt;br /&gt;
== Related Articles == &lt;br /&gt;
&lt;br /&gt;
* Localized articels&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Schutz vor Brute Force Attacken (D)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Bescherming tegen brute force attacks (NL)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protection contre les Attaques par Force Brute (FR)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protezione_da_Brute_Force_Attacks (I)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Howto|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36884</id>
		<title>Howto:Protection against Brute Force Attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:Protection_against_Brute_Force_Attacks&amp;diff=36884"/>
		<updated>2015-02-26T14:03:05Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Related Articles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Applies To==&lt;br /&gt;
This information applies to&lt;br /&gt;
&lt;br /&gt;
* innovaphone PBX having direct access to the internet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Keywords: enter keywords, foreign translations and/or synoyms not appearing in the article here for better search results --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
Protection against Brute Force Attacks&lt;br /&gt;
&lt;br /&gt;
Security: Does your PBX have sufficient protection?&lt;br /&gt;
There are dangers lurking in the internet. You know this which is why you protect your systems with appropriate security mechanisms. A firewall protects your network from unauthorised access; virus protection keeps viruses, worms, trojans etc. at bay and enabling carefree surfing and emailing. &lt;br /&gt;
Telephone systems also need to be equipped with security mechanisms to prevent them from being damaged or attacked. This is especially the case for systems directly connected to the internet which do not have a protected home in a company intranet, making them comparably accessible from the outside world. Over the past months there have been more and more attacks on telephone systems by means of the “Brute Force Attack” method. A hacker programme tests user-password combinations or registrations, making several parallel enquiries in a fraction of a second. &lt;br /&gt;
If they successfully access the system, then it is easy to abuse the system, also called Call Fraud. The hacker can, for example, make free phone calls at the cost of the telephone system owner. There have been especially grave situations where hackers have firstly set up expensive hotlines, then called them via the cracked telephone system, earning money themselves from the call fees. In some cases, attacks only aim to bring a telephone system to a stand-still – to cause damage without any further abuse (Denial-of-Sevice attacks, so-called DOS). &lt;br /&gt;
There are many other mechanisms which provide good protection for the innovaphone PBX. However, just following these steps can increase security many times over:&lt;br /&gt;
&lt;br /&gt;
===Only create used objects===&lt;br /&gt;
Sometimes objects are created in the PBX, which are then not used actively (e.g. employees leave the company) these may not even be password protected. Somebody could register externally to the system, try out several extension numbers, find an unused one and cause damage. It is advisable to protect all objects created with a password and set &#039;&#039;&#039;No. of Regs w/o Pwd&#039;&#039;&#039; to 0.&lt;br /&gt;
&lt;br /&gt;
===Conscientious user name and password protection===&lt;br /&gt;
 &lt;br /&gt;
The well-loved “admin” is often selected for a registration by default. Just a little creativity can make life harder for a hacker when this user is given a special name (e.g. “Fridolin”? or “FrauHolle”?). As a general rule, a password does not mean you are protected. The passwords “abc” or “pbx” are not a great obstacle for hackers. It would take a hacker just a couple of minutes to crack these three-figure, lower-case passwords. A three-figure password, combining a lower case letter with an upper case letter and a digit would stand up to the same attack for just half an hour. &lt;br /&gt;
An eight-figure password is a different kettle of fish. Even if only lower-case is used, a programme needs the grand total of about 37,968 days to try all the combinations. A mixture of lower-case, upper-case and digits would amount to 97,400 years. &lt;br /&gt;
It should be noted that this is not the case for the “dictionary approach”: if you select one of the 5,000 words which are included in the German and English basic vocabulary, then your password would stand for less than one hour. This is also the case for data such as own date of birth in any format (e.g. 01.01.1960 or 01.01.60). &lt;br /&gt;
In order to provide real protection, therefore, the password should be quite long, should not use the dictionary approach, should include upper-case and lower-case letters, and both special characters and/or digits. This increases the combination possibilities, thus reducing the probability that the password will be cracked.&lt;br /&gt;
 &lt;br /&gt;
===Deactivate “unknown registrations”===&lt;br /&gt;
&lt;br /&gt;
There are various functions which support an administrator when commissioning a telephone system thus simplifying the rollout. These are called “Zero Configuration Deployment”. This also includes “unknown registrations”, which help the administrator to carry out registrations on the system without having to enter the appropriate user and password. This is a real relief especially for larger installations. This function can be activated or deactivated. Therefore, it is important that “unknown registrations” are deactivated once the rollout has been completed, as otherwise, anyone from outside could register without needing a user name and password. &lt;br /&gt;
Only selected error sources and appropriate security mechanisms have been described. Applying these mechanisms can significantly improve your telephone system’s security. A lesson in the innovaphone Advanced training course has been dedicated to the topic of Security. We recommend you to think about working through this lesson again! More detailed information can be found in the training course documents.&lt;br /&gt;
&lt;br /&gt;
===Configure IP Filter===&lt;br /&gt;
&lt;br /&gt;
It is recommended to define global IP address filters to protect the innovaphone PBX from unauthorised access. Only the configured IP subnets are allowed to register at the PBX.&lt;br /&gt;
Starting from V8 HF8 you have 2 different filters. One filter is for registrations without password, and the other filter is for registrations with password.&lt;br /&gt;
&lt;br /&gt;
=== Use H323/TLS with &#039;&#039;TLS Only&#039;&#039; ===&lt;br /&gt;
From V11r1, it is recommended to use H.323/TLS instead of plain H.323.  In addition to call signalling encryption, this allows phones to be registered without any password (certificate based).  By setting the &#039;&#039;TLS Only&#039;&#039; check-mark in the &#039;&#039;Devices&#039; entry used for registration, password based registration is disabled.  This way, no malicious registration is possible with a leaked or hacked user password.&lt;br /&gt;
&lt;br /&gt;
== Related Articles == &lt;br /&gt;
&lt;br /&gt;
* Localized articels&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Schutz vor Brute Force Attacken (D)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Bescherming tegen brute force attacks (NL)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protection contre les Attaques par Force Brute (FR)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protezione_da_Brute_Force_Attacks (I)]]&lt;br /&gt;
&lt;br /&gt;
[[Howto-localized:Protección contra los ataques de fuerza bruta (SP)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Howto|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:How_to_create_new_articles&amp;diff=36872</id>
		<title>Howto:How to create new articles</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:How_to_create_new_articles&amp;diff=36872"/>
		<updated>2015-02-26T10:36:26Z</updated>

		<summary type="html">&lt;p&gt;Flp: /* Templates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Create a new article ==&lt;br /&gt;
&lt;br /&gt;
Please read the following rules, before creating an article.&lt;br /&gt;
&lt;br /&gt;
=== Search the existing articles ===&lt;br /&gt;
&lt;br /&gt;
Before creating a new article, look first if your subject has been already covered in another article. It is always better to edit an existing article, than to create a new one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Templates ===&lt;br /&gt;
&lt;br /&gt;
There are different templates for new articles available. To use an template you must first choose the right category for your new article. &lt;br /&gt;
&lt;br /&gt;
Here a short example:&lt;br /&gt;
You want to write a new Howto article. Go to the wiki page [[ Create_New_Page | Create New Page]] and use the textbox howto to type in your new article name. Please do not delete the already inserted &amp;quot;Howto: &amp;quot; . This detemines in which namespace your new article will be created. Click on the create article button and you will be directed to your new page. &lt;br /&gt;
However keep in mind that the templates are not obligatory. If you think your new articles doesn&#039;t need all the points inserted by the template, feel free to modify them.&lt;br /&gt;
&lt;br /&gt;
If you feel no template is appropriate for your new article, your are of course free to start it from scratch.  However, make sure that your new article is in the right namespace and that it is categorized correctly.&lt;br /&gt;
&lt;br /&gt;
=== The article title ===&lt;br /&gt;
&lt;br /&gt;
Article names should contain normal words or phrases. For example use &amp;quot;SIP Provider Compatibility Report&amp;quot; instead of an abbreviated form like &amp;quot;SIPCompatRep&amp;quot;. Normally a user will look for keywords like &amp;quot;Provider&amp;quot; or &amp;quot;Compatibility&amp;quot;. If you use an abreviated title the mediawiki search engine will not find a matching article.&lt;br /&gt;
&lt;br /&gt;
=== The article text ===&lt;br /&gt;
&lt;br /&gt;
Don&#039;t use abbreviations shorter than three letters. For example use &amp;quot;compact flash&amp;quot; instead of &amp;quot;CF&amp;quot;. The mediawiki search engine will not search strings shorter than three characters.&lt;br /&gt;
&lt;br /&gt;
=== wiki links ===&lt;br /&gt;
&lt;br /&gt;
If you want to link to other articles in this wiki, use if possible intra-wiki links instead of externeal links.&lt;br /&gt;
Example: &lt;br /&gt;
* Good&lt;br /&gt;
&amp;lt;pre&amp;gt;[[ Create_New_Page | Create New Page]]&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Bad&lt;br /&gt;
&amp;lt;pre&amp;gt;[http://wiki.innovaphone.com/index.php?title=Create_New_Page Create New Page]&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In some cases you might find it usefull to link to a entire category of pages. You can do this by using category links.&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;pre&amp;gt;[[:Category:Compat|Compatibility Articles here]]&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Embedding Images/Screenshots ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Resize application window&#039;&#039;&#039; that you want to show ([[Media:How to create new articles screenshots good 01.PNG|good example]],  [[Media:How to create new articles screenshots bad 01.PNG|bad example]])&lt;br /&gt;
* &#039;&#039;&#039;Cut&#039;&#039;&#039; unnecessary picture areas&lt;br /&gt;
* Pressing &#039;&#039;&#039;Alt-PrintScreen&#039;&#039;&#039; places an image of the frontmost window on the clipboard. Pressing PrintScreen by itself places an image of the entire desktop on the clipboard.&lt;br /&gt;
* Open MS-Paint. (From Start/Run, issue the command &amp;quot;mspaint&amp;quot;.) Create a new empty image, and use Edit/Paste to bring in the screenshot you just took. (If the screenshot is smaller than the default Paint canvas, [[Media:How to create new articles screenshots bad 02.PNG|you&#039;ll end up with white areas]]. Start over: create a new empty image, change its dimensions to 1x1, and Paste again. The canvas will grow for the Paste, but it doesn&#039;t shrink.)&lt;br /&gt;
* &#039;&#039;&#039;Do not scale&#039;&#039;&#039; screenshots, this make it [[Media:How to create new articles screenshots bad 04.png|unreadable]]&lt;br /&gt;
* Use MS-Paint to Save As, using &#039;&#039;&#039;PNG&#039;&#039;&#039; as the file format (it is superior to all the rest, [[Media:How to create new articles screenshots bad 03.jpg|JPG is bad choice]])&lt;br /&gt;
&lt;br /&gt;
For files that are relevant for the current article only, please follow the image naming scheme.  That is, prefix the name with the article name and add a sequential number.  This will make sure that file names related to different articles do not conflict.  So, instead of using &#039;&#039;screenshot1.png&#039;&#039;, rather use e.g. &#039;&#039;How to create new articles 03.png&#039;&#039;.  &lt;br /&gt;
&lt;br /&gt;
Screenshots are included using the &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;[[Image:xyz.png]]&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039; syntax.&lt;br /&gt;
&lt;br /&gt;
[http://www.irfanview.de IrfanView] - usefull free tool for making large number of screenshots:&lt;br /&gt;
&lt;br /&gt;
*install&lt;br /&gt;
*run&lt;br /&gt;
*press c to configure and start capture&lt;br /&gt;
**set capture area(Foreground window - Client area)&lt;br /&gt;
**set output folder&lt;br /&gt;
**set PNG as output file format&lt;br /&gt;
*press Ctrl+F11 to make screenshot&lt;br /&gt;
&lt;br /&gt;
====Screenshots (Screen Dumps) from innovaphone Phones LCD Displays====&lt;br /&gt;
&lt;br /&gt;
 http://192.168.0.1/lcd_dump.bmp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Network Diagrams ====&lt;br /&gt;
&lt;br /&gt;
In some cases it is easier to draw a simple network diagram to describe some networking scenario. For this purpose a free graph editor [http://www.yworks.com/en/products_yed_about.html yEd] from yWorks can be used to create network diagrams including shapes for innovaphone devices.&lt;br /&gt;
&lt;br /&gt;
Installation procedure&lt;br /&gt;
*download yEd diagram editor from [http://www.yworks.com yWorks homepage], install and run it once&lt;br /&gt;
*download innovaphone-pictograms from &amp;lt;dfslink&amp;gt;\\inno-sifi\dfs\Interne Dokumente\Präsentationen\inno_master\yEd_Shapes&amp;lt;/dfslink&amp;gt;&lt;br /&gt;
*unpack file and extract innovaphone.grapml into &lt;br /&gt;
** WinXP/Vista: &amp;lt;code&amp;gt;C:\documents and settings\USERNAME\.yed3&amp;lt;/code&amp;gt;&lt;br /&gt;
** Win7: &amp;lt;code&amp;gt;C:\Users\USERNAME\AppData\Roaming\yWorks\yEd\&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;C:\Users\USERNAME\.yed3&amp;lt;/code&amp;gt; &lt;br /&gt;
* Exact location depends on where yEd stores its runtime data. Look for a directory that contains &amp;lt;code&amp;gt;realizers.xml&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;settings.xml&amp;lt;/code&amp;gt;. &lt;br /&gt;
* Recent version of yEd (version 3.7 will do) supports direct import of the user defined palettes. In this case right click on any existing palette and import innovaphone.grapml&lt;br /&gt;
&lt;br /&gt;
Recommend practice to use shapes&lt;br /&gt;
* Adaption of existing drawings&lt;br /&gt;
** Open drawing in yed&lt;br /&gt;
** Mark shape to be replaced&lt;br /&gt;
** Right click on marked shape&lt;br /&gt;
** Select Properties/SVG&lt;br /&gt;
** Select More..., choose new shape out of the ones included in the package&lt;br /&gt;
* Creation of new drawings&lt;br /&gt;
** use shapes from palette innovaphone&lt;br /&gt;
** one can hide the embedded description by right click on shape, properties, label, uncheck visible checkbox&lt;br /&gt;
&lt;br /&gt;
yEd can export diagrams in PNG file format that should be used to upload on wiki. Innovaphone employees should check [http://wiki-intern.innovaphone.com/index.php?title=Wiki_Implementation#Network_diagrams notes regarding network diagram source files storage].&lt;br /&gt;
&lt;br /&gt;
=== Uploading Files ===&lt;br /&gt;
&lt;br /&gt;
Generally, the inno-wiki is not a download site.  If you still feel it appropriate to provide downloads on a page, you can upload the file just like you would for screen shots.&lt;br /&gt;
&lt;br /&gt;
We support uploading of Images, &#039;&#039;txt&#039;, &#039;&#039;pdf&#039;&#039; and &#039;&#039;zip&#039;&#039; files.&lt;br /&gt;
&lt;br /&gt;
Downloads are included using the &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;[[Media:xyz.zip]]&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039; syntax.  &lt;br /&gt;
&lt;br /&gt;
=== Keywords ===&lt;br /&gt;
&lt;br /&gt;
In some cases you may want that your article should be found if the search function is looking for certain keywords. However this keywords don&#039;t fit in your article context, because they are in a  foreign language or simply synoyms of used technical terms.&lt;br /&gt;
In this case just use the Keyword paragraph, to insert the desired keywords in your article.&lt;br /&gt;
&lt;br /&gt;
== Editing an existing article ==&lt;br /&gt;
&lt;br /&gt;
Often people make just small changes to a page, for example typing errors. Mediawiki offers the posibility to mark changes as minor. You will find the checkbox &amp;quot;This is a minor edit&amp;quot; just over the &amp;quot;Save page&amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
[[Image: How_to_create_new_articles_2.PNG‎ | minor edit checkbox]]&lt;br /&gt;
&lt;br /&gt;
This will make sure people watching a page (see below) do not get notified just because of such a minor update.&lt;br /&gt;
&lt;br /&gt;
== Staying up-to-date with articles ==&lt;br /&gt;
&lt;br /&gt;
If you think an article has very essential content and want to stay informed about every change made to this page, you can use the watchlist feature. To add a page to your watchlist, just use the link &amp;quot;watch&amp;quot; on top of the page.&lt;br /&gt;
&lt;br /&gt;
[[ Image:How_to_create_new_articles_1.PNG | watch link]]&lt;br /&gt;
&lt;br /&gt;
In order to be automatical informed by mail about recent changes to pages on your watchlist, you have to make some adjustments to your preferences. By using the Specialpage &amp;quot;Preferences&amp;quot; [[Special:Preferences | My Preferences ]] you can enable the feature &#039;&#039;E-mail me when a page I&#039;m watching is changed&#039;&#039; .&lt;br /&gt;
&lt;br /&gt;
== Related Articles ==&lt;br /&gt;
&lt;br /&gt;
[[Create_New_Page | Create New Page by using templates]]&lt;br /&gt;
&lt;br /&gt;
[[Help:Contents | General help on working with mediawiki]]&lt;/div&gt;</summary>
		<author><name>Flp</name></author>
	</entry>
</feed>