MA4000 Management System Security Guide PDF
MA4000 Management System Security Guide PDF
Security Guidelines
15.0
NEC Corporation
March 2018
Revision 23
i
Liability Disclaimer
NEC Corporation reserves the right to change the specifications, functions, or features, at any time,
without notice.
NEC Corporation has prepared this document for the exclusive use of its employees and customers. The
information contained herein is the property of NEC Corporation and shall not be reproduced without prior
written approval from NEC Corporation.
Microsoft®, Windows® and SQL Server® are registered trademarks of Microsoft Corporation. GOOGLE®
is a trademark of Google Inc.
All other brand or product names are or may be trademarks or registered trademarks of, and are used to
identify products or services of, their respective owners.
Table of Contents
Liability Disclaimer ....................................................................................................................i
Figures .....................................................................................................................................iii
Tables .......................................................................................................................................iii
Figures
Figure 2-1 Firewall Protection ......................................................................................................................... 2-1
Figure 6-1 SSH Encryption Between MA4000 and IP-PBX ............................................................................. 6-1
Figure 6-2 IP-PBX Configuration .................................................................................................................... 6-2
Figure 6-3 TCP/IP Settings - PBX ................................................................................................................... 6-2
Figure 6-4 MA4000 - External Application Configuration................................................................................. 6-3
Tables
Table 2-1 Configuring Firewall Port Restrictions ............................................................................................. 2-2
1
Introduction
In this document, unless otherwise stated, “MA4000” refers to MA4000
Management System application.
MA4000 is a web-based product designed to configure and manage communications systems using a
unified methodology.
It uses additional supporting applications to provide additional features allowing an IT administrator to
integrate the NEC Enterprise Communications system into the corporate business environment.
Installing the MA4000 Management System requires detailed planning, collaboration, and oversight from
key technology stakeholders.
Security is a primary concern with all web-based applications. The lack of strong security policies, out-of-
date anti-virus protection, or obsolete software can place your data at risk. NEC is aware of this risk and
strives to ship its products with the latest Operating Systems, Service Packs, and Critical Updates.
NEC promotes a secure solution which involves a layered approach. This includes the use of a firewall, a
secure database, and other readily available security practices, in conjunction with your current security
framework.
Customers should follow best practices as they relate to their business objectives and specific business
environment.
This guide contains recommendations to secure the MA4000 Management System. These
recommendations are offered for your convenience and should be tested thoroughly prior to deployment
or integration with your IT systems.
Service Conditions
Do not implement recommendations in this guide before testing in a test environment.
As it is the responsibility of the customer to secure their NEC (or third- party) applications, always
apply the latest Service Packs, Patches, and Critical Updates to your Operating System to maintain
system- wide security.
Chapter 3
Securing the This chapter provides recommendations for increasing the security of an
Operating operating system running MA4000.
System
This chapter lists the information that should be gathered and provided
Chapter 7 when reporting all issues encountered to NEC or one of its authorized
Reporting issues dealers or partners.
2
Securing the Network
A secure network environment is a critical security component. To protect a web server on the network
from unauthorized modification, destruction, or disclosure; develop network security policies to safeguard
data and equipment.
This chapter provides recommended security practices to create and enforce a secure network
environment.
Firewall Overview
A firewall is a combination of hardware and software that monitors and controls incoming and outgoing
network traffic. Potential intruders scan computers from the Internet or within the Local Area Network
(LAN), probing for an open port where they can break through and access a server.
To achieve the best results, place a firewall between the Internet and the MA4000 Web Server. See Figure
2-1.
To increase security, configure the firewall to allow specific types of traffic into and out of the internal
network. An external firewall is recommended for your MA4000 Web Server.
Connection Default IP
Type Use
Endpoint Port Version
MA4000
To 49300 TCP License Management IPv4
LMC
Connection Default IP
Type Use
Endpoint Port Version
MA4000
IPv4/IPv6
To 60000 TCP IP-PBX Management (IMAT Interface)
(Note 4)
IP-PBX
MA4000
To IP-PBX Management (SV8100
8020 TCP IPv4
SV8100 Connector Interface)
Connector
SV8100
Connector NEC SV8100 Connector Service to
8000 TCP IPv4
To SV8100
IP-PBX
MA4000
To 22 TCP IP-PBX SSH Proxy Interface IPv4
SSH Proxy
PCPro
IP-PBX Management (IMAT Proxy
To (Note 2) TCP IPv4
Interface)
MA4000
Connection Default IP
Type Use
Endpoint Port Version
MA4000
To
(Note 3) TCP Database Access IPv4
Database
Server
MA4000
To Alarm Notifications & Reports to Email
25 TCP IPv4
Email (SMTP )
Server
Note 1 Telnet is insecure by nature. Only allow this port if MA4000 Command Line Interface access is
required from outside the firewall.
Note 2 The IMAT Interface listens on a unique TCP port for each IP-PBX which can be defined in the IP-PBX
Configuration page of each IP-PBX within MA4000. See IMAT Command Proxy for details.
Note 3 For information about configuring a firewall to allow SQL Server access, please refer to
http://msdn.microsoft.com/en-us/library/cc646023.aspx.
Note 4 IPv6 is available for IP-PBX Management (IMAT Interface) only for SV8500 S05 or higher and
SV9500.
Note 5 FTP is only used for IP-PBX Backup and Restore tasks on SV8500 S1 through S5. SFTP is used for
IP-PBX Backup and Restore tasks on SV8500 S06 or higher and SV9500 IP-PBXs. Both FTP and
SFTP communication is all directed at the LAN1 IP address of the IP-PBX.
Windows Services
Isolation of Services
Disable any unnecessary Windows Services on the MA4000 server such as WINS and DHCP.
Disable NetBIOS
Network Basic Input/Output System (NetBIOS) provides a set of uniform commands from the low-level
services. Applications installed on a server use these low-level services to manage the services between
nodes on a network.
Windows Operating Systems have a known security issue which allows a hacker to find the server’s IP
address or computer name over a network. By disabling NetBIOS, a hacker is prevented from obtaining
network information.
MA4000 Management System Security Guidelines Revision 23
Securing the Network 2-5
Be sure to disable NetBIOS after the MA4000 installation is complete. Only a Network or System
Administrator should disable NetBIOS.
3
Securing the Operating System
This chapter provides recommendations to secure Windows operating systems.
Server Administration
Follow the recommendations below to ensure your operating system is secure. NEC recommends the
following basic server administration policies.
General
Enable the Automatic Updates service to receive Critical Update and Security Patch notices
Download and apply all Critical Updates for your server's operating system before you install
MA4000
Disable/Restrict remote access through Terminal Services and/or Remote Desktop
Do not install MA4000 on a server used as a Domain Controller.
Do not install Microsoft SQL Server on a Domain Controller.
Virus Detection
Maintaining a secure environment means scanning for viruses regularly. Most anti-virus software allows
you to automatically download anti-virus software updates and schedule scans at preset intervals.
It is recommended to scan your systems nightly to reduce the chance of infection.
Intrusion Detection
Intrusion detection software actively analyzes packets looking for vulnerabilities on your network.
To increase network security, closely monitor your network and use intrusion detection software.
4
Securing the Database
The database is a vital component of the MA4000 Management System and to your organization. Sensitive
data related to users, phones, and hardware is stored in a database. A hacker can use this data to launch
a malicious attack against your organization.
Any database server that is not kept up-to-date with the latest security patches and critical updates can
become infected with a worm.
A worm attacks vulnerabilities in database applications, which can cripple your network and render your
hardware useless. To avoid this type of attack, check nightly for software updates and enforce strong
passwords for all system administrator accounts.
Post Installation
The following post installation procedures are recommended:
Immediately after the database instance is installed, download and install the latest security
patches and critical updates.
Test security patches internally to understand the impact to your IT Systems.
As you install updates, you must delete the folders created as a result of any
database updates.
For database recovery purposes, store the certificate and private key backup
files along with the associated password in a secure location separate from the
database server. An encrypted database cannot be restored from a backup file
without these three items.
5
Securing the Application
The following configurations and settings are recommended to secure the MA4000 Management System.
General Recommendations
The following list is a set of basic recommendations that can be used to increase the security of NEC CAS.
Use a secure HTTPS connection between the NEC CAS server and its clients
Use a secure LDAPS connection between the NEC CAS server and an LDAP server
General Recommendations
The following list is a set of basic recommendations that can be used to increase the security of MA4000.
Lock or delete all inactive manager logins
Limit manager access rights via customized manager roles
Setup alarm notifications for all major alarms
Use a secure HTTPS connection between the MA4000 server and its clients
Use an SSH proxy to secure communications between the MA4000 server and compatible NEC IP-
PBX devices
Use a secure LDAPS connection between the MA4000 server and any LDAP servers
Back up all critical information regularly.
Encryption
MA4000 uses the following encryption algorithms for increased security.
RC2 The RC2 algorithm is used with a 128-bit key to encode passwords stored in the MA4000
database.
SSH The SSH protocol can be used with third-party libraries to encode IP-PBX communications
sent between MA4000 and an external SSH proxy server. All keys are handled by the SSH proxy
server.
MD5 An MD5 hash is used to encode passwords stored in the NEC CAS database. There are no
keys used for this process.
MA4000 Services
Configure Windows to automatically start only the services needed to meet the site's requirements. Not all
services will be needed at all sites. If a NEC MA4000 Windows Service is disabled, such as Authorizer
service, be sure to disable the internal notifications for it and avoid problems with database change
notifications. For detailed instructions, refer to Manage Database Change Notifications topic in the MA4000
Online Help.
NEC MA4000 Alarm Engine - Used to process all alarms and distribute any related notifications.
(Required)
NEC MA4000 Arena - Used by MA4000 services to coordinate with each other. (Required)
NEC MA4000 Authorizer - Used to process authorization codes via OAI connection to Voice
Systems.
Alarm Notifications
The MA4000 Management System can notify MA4000 managers when an alarm is triggered. These
notifications can be sent to managers as a Windows event and/or e-mail.
For more information on setting up Alarm Notifications, please refer to the MA4000 Setup and Alarm
Setup information found under the Administration section of the MA4000 Online Help system.
To configure the E-Mail notification feature, your MA4000 server must have
access to a SMTP e-mail server.
Call Audit
The MA4000 Call Audit feature collects and reports call records from IP- PBXs. It is separately installed as
a plugin to MA4000.
To obtain installation procedures, refer to the Call Audit Installation Guide.
General Recommendations
The following list is a set of basic recommendations that can be used to increase the security of the
MA4000 Call Audit feature.
The Call Audit feature plugin should only be installed if it is licensed and being used
Limit access via customized MA4000 manager roles
Use a secure HTTPS connection between the MA4000 server and its clients
Back up the Call Audit database regularly. For details please refer to the Call Audit Installation
Guide.
Internet Explorer
The server and client PC access the MA4000 Manager via Internet Explorer. To view the applications
correctly, it is recommended to:
Add the MA4000 server(s) URLs to the list of Trusted Sites on all client browsers to avoid problems
with unwanted security prompts and blocked file downloads.
Allow pop-up windows from the MA4000 server(s) on all client browsers.
At minimum, use the default Internet Explorer security settings on the MA4000 server(s).
Limit Internet browsing activities from the MA4000 server to limit the server's exposure to
spyware, viruses, and other Internet-based threats.
6
Securing the IP-PBX
The following configurations and settings are recommended to increase the security of IP-PBX devices
managed by the MA4000 Management System. Detailed information regarding these topics can also be
found within the MA4000 Manager Online Help.
MAT commands are sent to the proxy server through this tunnel, where they are unencrypted and
forwarded to the appropriate IP-PBX. The link between the SSH server and the IP-PBX is not encrypted,
therefore this segment of the network should be as direct and secure as possible. A single SSH proxy
server can be used to encrypt communications between MA4000 and multiple IP-PBX devices.
Enabling this feature can affect MA4000 performance significantly due to the
processing overhead required to encrypt and decrypt data.
Do not use TCP ports that are used by other applications or conflicts may
occur that could affect communications for both the MA4000 and the other
applications.
Once this has been done you can modify the external application to point to the IP address of the MA4000
server using the port defined in MA4000 for the IP-PBX as shown in Figure 6-3.
After MA4000 and the external application have been configured the final result should look similar to
Figure 6-4.
Authorization Codes
Authorization Code Management tracks and monitors authorization codes as well as grants permissions at
the time of a call. Use authorization codes to define limits and access for specific users.
This feature works with NEC IP-PBX devices over an Open Application Interface (OAI).
You can create and maintain the authorization codes by accessing the Authorization Code Management or
you can create and assign authorization codes from the Edit User screen.
Authorization Code Management provides:
Integration with the call accounting database
Easy enable/disable of authorization codes
Configurable security lockout on any extension for failed authorization code entries
Toll fraud prevention
7
Reporting Issues
Promptly report all issues encountered to NEC or one of its authorized dealers or partners. Please include
the following information:
NEC application name and version
Windows Operating System and version
Database software and version
MA4000 application log files
Call Audit feature log files
Hardware specifications
Specific details of how to reproduce the problem whenever possible