On 10/26/2010 05:41 PM, Andrew Latham wrote:
> You can provision over a WAN and access-lists or iptables can limit
> the networks allowed.  Define what level of security you need first.
> For further security you can use an inbound proxy and check the http
> headers for agent identification.  This can also be faked.
>
> Practice layers of security...

Well, what I'm really aiming for is this :

I let users make easy config files via web interface. This results in a 
config file with name MAC-address of the IP-phone. This config file is 
then available on the public server. User just needs to points his 
IP-phone to the provisioning URL.
Remarks :
- User from site A will want other configuration then user from site B.
- User from site A may not have access to or download config file of 
user from site B and vica versa.

Expand setup :
Also a phone book becomes available from the public server for the users...


Jonas.

-- 
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
               http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to