Grandstream Networks, Inc.: GXP IP Phones
Grandstream Networks, Inc.: GXP IP Phones
Grandstream Networks, Inc.: GXP IP Phones
GXP IP Phones
Security Guide
Table of Contents
OVERVIEW ..................................................................................................................... 3
Page | 1
GXP Security Guide
Table of Figures
Page | 2
GXP Security Guide
OVERVIEW
This document presents a summary of security measures, factors, and configurations that users are
recommended to consider when configuring and deploying our GXP series of IP Phones.
Note: We recommend using the latest firmware for latest security patches.
Reproduction or transmittal of the entire or any part, in any form or by any means, electronic or print, for
any purpose without the express written permission of Grandstream Networks, Inc. is not permitted.
Page | 3
GXP Security Guide
WEB UI/SSH ACCESS
Web UI Access
The GXP embedded web server responds to HTTP/HTTPS GET/POST requests. Embedded HTML pages
allow users to configure the device through a web browser such as Microsoft IE, Mozilla Firefox, Google
Chrome and etc. With this, administrators can access and configure all available GXP information and
settings. It is critical to understand the security risks involved when placing the IP Phones on public networks
and it’s recommended not to do so.
HTTP and HTTPS are supported to access the GXP’s web UI and can be configured under web UI →
Maintenance → Security settings → Security.
3. The GXP allow access via SSH for advanced troubleshooting purpose. This is usually not needed
unless the administrator or Grandstream support needs it for troubleshooting purpose. SSH access
on the device is enabled by default with port 22 used. It’s recommended to disable it for daily normal
usage. If SSH access needs to be enabled, changing the port to a different port other than the well-
known port 22 is a good practice.
Page | 4
GXP Security Guide
Admin Login
Username and password are required to log in the GXP’s web UI.
The factory default username for administrator level is “admin” and the default password is “admin”.
Changing the default password at first time login is highly recommended.
When accessing the GXP phones for the first time or after factory reset, users will be asked to change the
default administrator password before accessing GXP Web interface.
To change the password for default user "admin", navigate to Web GUI → Maintenance →Web Access
Page | 5
GXP Security Guide
The password length must be between 6 and 25 characters. Strong password with a combination of
numbers, uppercase letters, lowercase letters, and special characters is always recommended for security
purpose.
• Admin
• User
NOTES:
➢ It is recommended to keep admin login for administrator only. And user should be provided with
user level login only, if web UI access is needed.
➢ Change User Level Password upon the first login by following the below steps:
1. Access your GXP web UI by entering its IP address in your favorite browser.
2. Enter your admin password (default: admin).
3. Go to Basic Settings → New User Password and Enter the new password.
4. Confirm the new password.
5. Press “Save” at the bottom of the page to save your new settings.
Page | 6
GXP Security Guide
SECURITY FOR SIP ACCOUNTS AND CALLS
By default, after a factory reset, all the accounts are active. Knowing the default local SIP port (Account1:
5060; Account2 : 5062 … ) users can make direct IP call even if the accounts are not registered to any PBX.
Therefore, it is recommended to disable the unused ports. Under Web GUI → Accounts → Account X →
General Settings → Account Active: “No”
➢ Users can also disable Direct IP calls on all ports under Settings → Call Features: Set “Disable
Direct IP Call:” to “Yes”
SIP TLS certificate, private key and password can be configured under Maintenance → Security Settings
→ Security page:
Page | 7
GXP Security Guide
When SIP TLS is used, the GXP also offer additional configurations:
If the user would like to have anonymous calls blocked, please go to GXP’s Web GUI → Account X →
Call Settings and set “Anonymous Call Rejection “to “Yes” : The GXP will then reject all incoming calls
with anonymous caller ID by sending a “486 Busy here” message.
Page | 8
GXP Security Guide
• Additional SIP security settings:
Set “Yes” to enable checking the SIP User ID in the Request URI of incoming INVITE; if it doesn't match
the GXP SIP User ID, the call will be rejected. Direct IP calling will also be disabled if checked.
Set “Yes” to Challenge the incoming INVITE for authentication with “SIP/401 Unauthorized” message
Page | 9
GXP Security Guide
SRTP
To protect voice communication from eavesdropping, the GXP support SRTP for media traffic using AES
128&256. It is recommended to use SRTP if it’s supported by the SIP server (Or the service provider).
SRTP can be configured under Web GUI → Account X → Audio Settings.
Selects SRTP mode to choose (“No”, “Enabled but not forced”, “Enabled and forced”, or “Optional”).
Default is No. It uses SDP Security Description to exchange key.
SNMP
SNMP protocol is used for Network management. We recommend disabling it if it is not in use. Users can
do that from the GXP’s Web GUI, under Network → SNMP Settings page:
P a g e | 10
GXP Security Guide
SECURITY FOR GXP SERVICES
The GXP IP Phones support downloading configuration file via TFTP, HTTP/HTTPS, FTP/FTPS. Below
figure shows the related options under Web GUI → Maintenance → Upgrade and Provisioning
P a g e | 11
GXP Security Guide
We recommend users to consider the following options for added security when deploying the GXP with
provisioning.
TR-069
• Periodic Inform Interval: Sets frequency that the inform packets will be sent out to ACS.
the GXP.
P a g e | 12
GXP Security Guide
• CPE SSL Certificate: Configures the Cert File for the ATA to connect to the ACS via SSL.
• CPE SSL Private Key: Specifies the Cert Key for the ATA to connect to the ACS via SSL
P a g e | 13
GXP Security Guide
Syslog
The GXP supports sending Syslog to a remote syslog server. By default, it’s sent via UDP and we
recommend changing it to “SSL/TLS” so the syslog messages containing device information will be sent
securely over TLS connection.
P a g e | 14
GXP Security Guide
SECURITY GUIDELINES FOR GXP DEPLOYMENT
Often times the GXP are deployed behind NAT. The network administrator can consider following security
guidelines for the GXP to work properly and securely.
➢ Under web UI → Account x → SIP Settings → Basic Settings, the feature “Local SIP Port”
defines the local SIP port used to listen and transmit. The default value when using SIP transport
protocol UDP/TCP is 5060 for Account 1, 5062 for Account 2, 5064 for Account 3, 5066 for Account
4… When using TLS as SIP transport protocol the default value is 5061 for Account 1, 5063 for
Account 2, 5065 for Account 3, … The valid range is from 1 to 65535.
➢ Under web UI → Settings → General Settings, the feature “Local RTP Port” defines the local RTP
port used to listen and transmit. Local RTP port ranges from 1024 to 65400 and must be even. It is
the base RTP port for channel 0. When configured channel 0 will use this port_value for RTP, and
port_value+1 for RTCP. Channel 1 will use port_value+2 for RTP and so on, until reaching the limit
and then it will be reset to first port_value. The default value is 5004 for RTP and 5005 for RTCP.
For both GXP21XX and GXP16XX series it is possible to select a range for the Local RTP port from 48
to 10000. Default setting is 200.
Note: On the customer’s firewall, it’s recommended to ensure SIP port is opened for the SIP accounts
on the GXP. It’s not necessary to use the default port 5060/5062/… on the firewall. Instead, the network
administrator can consider mapping a different port on the firewall for GXP SIP port 5060 for security
purpose.
P a g e | 15
GXP Security Guide
• Use HTTPS for web UI access
GXP Web UI access should be equipped with strong administrator password in additional to using
HTTPS. Also, do not expose the GXP web UI access to public network for normal usage.
P a g e | 16
GXP Security Guide