Академический Документы
Профессиональный Документы
Культура Документы
SecAst is a 100% software solution, communicating with Asterisk primarily through the Asterisk Management
Interface (AMI), but also monitoring Asterisk message/security logs for relevant information, and also
communicating with the Linux network interfaces. The data from these sources allows SecAst to monitor
connection and dial attempts with invalid credentials, the rate at which users/peers are dialing, the number of
channels in use by user/peer across all protocols, the source IP of remote users/peers, etc. By combining this data
SecAst can effectively stop attacks/fraud in its tracks, and alert the administrator with details of each attack.
SecAst offers detailed geographic allow/deny rules (geofencing) down to the city level without large or complex
firewall rules (all geofencing rules remain within SecAst). Use of geofencing dramatically reduces the number of,
and risk from, attacks, allowing administrators to quickly eliminate continents/countries/regions/cities where
their users would never be located.
SecAst offers extensive interfaces to interact with other programs, utilities, external firewalls, billing systems, etc.
allowing for considerable customization. For example, changes in Threat Level can trigger scripts which alert
administrators, shutdown interfaces, change firewall rules, etc.
Features
Asterisk Compatibility
SecAst is compatible with a broad range of Asterisk versions and distributions. SecAst works with
Asterisk versions 1.4 through 13, both 32-bit and 64-bit. SecAst is also compatible with a wide
range of Asterisk distributions, from Digium's plain old Asterisk, to FreePBX and PBX in a Flash
and TrixBox, to Thirdlane and more.
Telnet Interface
Administrators will be immediately comfortable with the simple and powerful telnet interface to
SecAst. The security system can be managed and controlled from a telnet interface, whether
from a PC, a tablet, or a cell phone. The interface includes online help, and user friendly rich
terminal output.
Browser Interface
Seasoned administrators and novices alike will be comfortable with the simple and powerful
browser (web) interface to SecAst. The security system can be managed and controlled from any
browser, including a PC, a tablet, or a cell phone. The interface includes blocking / unblocking
IP's, checking threat levels, viewing attack history, etc.
SecAst interfaces with a variety of subsystems to gather information about the state of the network, the state of
Asterisk, and activities performed by VoIP users (or attackers). This unique approach allows SecAst to look deep into
the specific actions performed by users, correlate them with network data, and compare them with responses
expected by Asterisk.
telium
P.O. Box 33032 Ira Needles, Waterloo, On, N2T 0A2, Canada
www.telium.ca
(519) 266-4357
info@telium.ca