<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 10pt;
font-family:Tahoma
}
--></style></head>
<body class='hmmessage'><div dir='ltr'>
If you are only connecting to specified SIP providers, then you could specify those endpoints at the firewall level, which would help.<br><BR>Regards<BR><br>Bob<BR><div><div id="SkyDrivePlaceholder"></div>> Date: Thu, 14 Jun 2012 10:27:50 +0800<br>> From: ocset@the800group.com<br>> To: freeswitch-users@lists.freeswitch.org<br>> Subject: [Freeswitch-users] Brute-force attack<br>> <br>> Hi<br>> <br>> I have deployed Freeswiitch on windows 7 and since there is no fail2ban <br>> on windows, I was wondering what the real risk is with opening it up to <br>> the internet. If I was to ensure that all users and passwords were <br>> extremely difficult to guess (passwords like "2$53E_d7?^2!3s$"), what <br>> are the risks that I am exposing myself to? Is there a type of DoS for <br>> voip where hackers can just flood my system with requests simply to be <br>> malicious?<br>> <br>> There are VB windows scripts available that emulate what fail2ban does <br>> on Linux but I was just wondering whether I really need to implement <br>> this level of security if I can control the password complexity in <br>> Freeswitch.<br>> <br>> Thanks<br>> O<br></div>                                            </div></body>
</html>