GVC32XX Series - Video Conference System Security Guide

  • Updated on February 21, 2024

This document presents a summary of security measures, factors, and configurations that users are recommended to consider when configuring and deploying the GVC32XX.

Note:

We recommend using the latest firmware for latest security patches.

The following sections are covered in this document:

  • Web UI/SSH Access

Web UI access is protected by username/password and login timeout. Two-level user management is configurable. SSH access is supported for mainly troubleshooting purpose and it’s recommended to disable it in normal usage.

  • Device Control Security

The GVC32XX has multiple ways to limit the use for network settings, apps, and other settings if not necessary for the end user.

  • Security for SIP Account and Calls

The SIP account uses specific port for signaling and media stream transmission. It also offers configurable options to block anonymous calls and unsolicited calls.

  • Network Security

The GVC3200/GVC3202/GVC3210/GVC3220 supports VPN, with all the GVC32XX series products supporting 802.1X and Bluetooth for network access. VPN secures remote connection and 802.1X provides network access control. It’s recommended to turn Bluetooth off if not used.

  • Security for GVC32XX Services

The GVC3200/GVC3202/GVC3210/GVC3220 supports LDAP, with all the GVC32XX series products supporting other services such as HTTP/HTTPS/TFTP provisioning, TR-069, as well as allows ADB and FTP access. For provisioning, we recommend using HTTPS with username/password and using password-protected XML file. For services such as ADB, we recommend disabling them if not used to avoid potential port exposure

  • Deployment Guidelines for GVC32XX

This section introduces protocols and ports used on GVC32XX and recommendations for routers/firewall settings.

This document is subject to change without notice.

Reproduction or transmittal of the entire or any part, in any form or by any means, electronic or print, for any purpose without the express written permission of Grandstream Networks, Inc. is not permitted.

WEB UI/SSH ACCESS

GVC32XX Web UI Access

The GVC32XX embedded web server responds to HTTP/HTTPS GET/POST requests. Embedded HTML pages allow users to configure the device through a web browser such as Microsoft IE, Mozilla Firefox, Google Chrome etc. With this, administrators can access and configure all available GVC32XX information and settings. It is critical to understand the security risks involved when placing the GVC32XX phone on public networks and it’s recommended not to do so.

Web UI Access Protocols

HTTP and HTTPS are supported to access the GVC32XX web UI and can be configured under web UI: Settings 🡪 Security Settings 🡪 Web/SSH Access. To secure transactions and prevent unauthorized access, it is highly recommended to:

  1. Use HTTPS instead of HTTP.
  2. Avoid using well known port numbers such as 80 and 443.
Figure 1: Web UI Access Settings

User Login

Username and password are required to log in the GVC32XX web UI.

Figure 2: GVC32XX Web UI Login
Figure 3: Admin Password Change on GVC32XX

After logging in, the system will detect that the default password is used and requires users to change it.

Users can press on Change Password to change the password for default user “admin” or navigate to Settings 🡪 Security Settings🡪 Web/SSH access and change the Admin/User password. The password length must be between 6 and 32 characters. Strong password with a combination of numbers, uppercase letters, lowercase letters, and special characters is always recommended for security purpose.

User Management Levels

Two user privilege levels are currently supported:

  • Admin
  • User

Admin login has access to all of the GVC32XX’s web UI pages and can execute all available operations. User login has limited access to the web UI pages. With user login, the user is allowed to access and configure the following settings:

  • Call
  • Contacts
  • Device Control
  • Status
  • Settings: Network Settings, Peripheral, security settings
  • Maintenance: Recording, Time & Language, Troubleshooting.

It is recommended to keep admin login with administrator only. And end user should be provided with user-level login only, if web UI access is needed.

SSH Access

The GVC32XX allows access via SSH for advanced troubleshooting purpose. This is usually not needed unless the administrator or Grandstream support needs it for troubleshooting purpose. SSH access on GVC32XX is enabled by default and uses port number 22. It’s recommended to disable it for daily normal usage from web UI: Settings 🡪 Security settings 🡪 Web/SSH access 🡪 Disable SSH, changing this setting will require reboot to take effect.

Figure 4: SSH Access on GVC32XX

DEVICE CONTROL SECURITY

Screen Lock

The GVC3200/GVC3202/GVC3210 Screen lock setting is under LCD: Settings 🡪 System 🡪 Security 🡪 Screen Security, and on the GVC3220 LCD: Settings 🡪 Advanced 🡪 Security, Set password for screen lock. Enter a 6-digit password for screen lock. When the GVC3200/GVC302/GVC3210/GVC3220 boots up again, a screen lock code will be required. The users can unlock the screen by entering the code using the GVC remote control.

Note:

The GVC3212 does not support screen lock.

Install Apps from Unknown Sources

“Unknown Sources” setting on the GVC3200/GVC3202/GVC3210 is under LCD: Settings 🡪 System 🡪 Security 🡪 Device administration. It is recommended to disable “Unknown source” to prevent installing apps from unknown sources if the device is used at public properties.

GUI Config Tool Settings

The GUI config tool is a tool designed to customize the GUI desktop layout as well as GUI configuration for devices. Here is the link to download the GUI config tool:

https://www.grandstream.com/hubfs/IoT%20Team/gui_customization_tool_v3.9.0.zip

From there, the administrator can build a customized file to display/hide certain applications, configure parameters on the phone with specific configuration items, and enable/disable some applications and much more. The tool would generate a file “GVC320xcust” which should be uploaded to a HTTP/TFTP server. Then the user needs to configure the server address as GUI Customization File URL under web UI: Maintenance 🡪 Upgrade 🡪 Cust file 🡪 GUI customization file URL to download the file to GVC320X.

Note:

This is available for the GVC3200 and GVC3202 only.

Figure 5: Cust File Provision Page

For more details, please refer to the guide:

https://f.hubspotusercontent10.net/hubfs/3781415/Grandstream_Feb_2021/Pdf/gvc320x_gui_customization_guide.pdf

SECURITY FOR SIP ACCOUNTS AND CALLS

Protocols and Ports

By default, after factory reset, the SIP account is active. Since the default local SIP port is 5060 for account 1, this allows user to make direct IP call even if the account is not registered to any PBX. If the user is not using any account, it is recommended to uncheck the settings in the GVC3200/GVC3202/GVC3210 web UI: Settings 🡪 SIP 🡪 General 🡪 Account, and GVC3220 web UI: Account 🡪 SIP 🡪 General settings from Active to deactivate account.

Note:

The GVC3212 does not support SIP account.

  • SIP transport protocol:

The GVC32XX supports SIP transport protocol “UDP” “TCP” and “TLS”. By default, it’s set to “UDP”. It’s recommended to use “TLS” so the SIP signaling is encrypted. SIP transport protocol can be configured in the GVC3200/GVC3202/GVC3210 under web UI: Settings🡪SIP🡪SIP transport, and in the GVC3220 under web UI: Account 🡪 SIP 🡪SIP Settings 🡪 SIP Transport. When “TLS” is used, we recommend using “sips” instead of “sip” for SIP URI scheme to ensure the entire SIP transaction is secured instead of “best-effort”.

Figure 6: Configure TLS as SIP Transport

On GVC3200/GVC3202/GVC3210, SIP TLS certificate, private key and password can be configured under web UI: Settings 🡪 Security Settings 🡪 SIP.

Figure 7: SIP TLS Settings on GVC3200/GVC3202/GVC3210

For the GVC3220 in can be found in the web UI: System Settings 🡪 Security Settings 🡪 SIP TLS.

Figure 8: SIP TLS Settings on GVC3220

When SIP TLS is used, the GVC32XX also offers additional configurations to check domain certificate and validate certificate chain. These settings can be found under web UI 🡪 Settings 🡪 SIP 🡪 SIP in the GVC3200/GVC3202/GVC3210.

  • Check Domain Certificate:

If enabled, the GVC32XX will check the domain certificate when TLS/TCP is used for SIP transport. The default setting is “No”.

  • Validate Certification Chain:

If enabled, the GVC32XX will validate server’s certification chain when TLS/TCP is used for SIP transport. The default setting is “No”.

Figure 9: Additional SIP TLS Settings on GVC3200/3202/3210

Additional SIP TLS configurations on the GVC3220 can be found under web UI: System Settings 🡪 Security Settings 🡪 SIP TLS plus Account 🡪 SIP 🡪 SIP settings.

Figure 10: Additional SIP TLS Settings on GVC3220

  • Local SIP port when using UDP/TCP:

Default SIP port used is 5060. The local SIP port can be configured under Settings🡪SIP🡪SIP🡪 Local SIP port.

  • Local SIP port when using TLS:

The SIP TLS port is the UDP SIP port plus 1. For example, if local SIP port is 5060, its TLS port would be 5061.

  • Local RTP port:

The default port value is 5004. This parameter can be configured from web UI: Settings 🡪 General Settings 🡪 Local RTP port on GVC3200/3202/3210 and from web UI: Call Features 🡪 General Settings 🡪 Local RTP port on GVC3220. This parameter defines the local RTP-RTCP port pair used to listen and transmit. It is the base RTP port for channel 0. When configured, for audio, channel 0 will use this port_value for RTP and the port_value+1 for its RTCP; channel 1 will use port_value+6 for RTP and port_value+7 for its RTCP. For video, channel 0 will use port_value+2 for RTP and port_value+3 for its RTCP; channel 1 will use port_value+8 for RTP and port_value+9 for RTCP.

Anonymous/Unsolicited Calls Protection

If the user would like to have anonymous SIP calls blocked, please go to GVC3200/3202/3210 web UI: Settings 🡪 SIP 🡪 Call Settings and enable option “Reject anonymous call”. This will automatically block the SIP call if the caller ID is anonymous.

Additionally, the GVC32XX has built-in mechanism that detects and stops the spam SIP calls from ringing the devices. Please see below web UI: Settings 🡪 SIP 🡪 SIP. It is recommended to enable highlighted options to validate incoming SIP requests.

Figure 11: Settings to Block Unwanted Calls on GVC3200/3202/3210

On the GVC3220 anonymous SIP calls can be blocked from web UI: Account 🡪 SIP 🡪 Call Settings and enable option “Reject anonymous call”.

Figure 12: Settings to Block Unwanted Calls on GVC3220

  • Only Accept SIP Requests from Known Servers:

When set to “Yes”, the GVC32XX will answer the SIP request from saved servers and only the SIP requests from saved servers will be accepted. The SIP requests from the unregistered server will be rejected. The default setting is “No”.

  • Check SIP User ID for Incoming INVITE:

This configures the GVC32XX to check the SIP User ID in the Request URI of the SIP INVITE message from the remote party. If it doesn’t match the phone’s SIP User ID, the call will be rejected. The default setting is “No”.

  • Validate Incoming INVITE:

This configures the GVC32XX to authenticate the SIP INVITE message from the remote party. If set to “Yes”, the phone will challenge the incoming INVITE for authentication with SIP 401 Unauthorized response. The default setting is “No”.

  • SIP Realm Used for Challenge INVITE & NOTIFY:

Configure this item to validate incoming INVITE and NOTIFY. To use this feature, “Validate Incoming INVITE” must be enabled first for it to take effect for INVITE. For NOTIFY, “Disable SIP NOTIFY Authentication” must be unchecked first under web UI: Maintenance 🡪 Upgrade 🡪 Advanced Settings. The SIP NOTIFY message information for the provision includes check- sync, re-sync and reboot.

SRTP

To protect voice communication from eavesdropping, the GVC32XX phones support SRTP for media traffic using AES 128&256. It is recommended to use SRTP if server supports it. SRTP can be configured in web UI: SIP 🡪 Codec on GVC3200/3202/3210, and in web UI: Account 🡪 SIP 🡪 Codec Settings on GVC3220.

Figure 13: SRTP Settings

NETWORK SECURITY

VPN

For GVC3200/GVC3202/GVC3210: Users can add VPN using different protocols (PPTP, L2TP/IPSec PSK, L2TP/IPSec RSA, IPSec Xauth PSK, IPSeXauth RSA and IPSec Hybrid RSA). VPN settings can be configured from GVC3200/3202/3210 LCD menu: Applications 🡪 Settings 🡪 Network 🡪 VPN and Tap on “Add VPN file” to access configuration page as shown below:

Figure 14: VPN profile configuration

On GVC3220: OpenVPN settings can be configured from GVC3220 web UI: Network Settings 🡪 OpenVPN Settings as shown below:

Figure 15: VPN configuration

802.1X

GVC32XX supports EAPOL where access to switchports can be controlled with identity/password and certificate. By default, it is disabled. When it is enabled, there are 3 different mode for selection: EAP-MD5, EAP-TLS and EAP-PEAP. Network administrators can set this up accordingly for media access control and network security purpose.

Figure 16: 802.1X Settings

Figure 17: 802.1X for GVC32xx Deployment

Bluetooth

GVC32XX supports Bluetooth for Bluetooth headset connection, file transferring and for connecting external speakers to be used as audio input and output. By default, Bluetooth is disabled and it can be enabled from LCD settings 🡪 Network 🡪 Bluetooth on GVC3200/3202/3210, it’s recommended to turn off Bluetooth so it’s not discoverable by nearly Bluetooth devices.

Figure 18: Bluetooth on GVC3200/3202/3210

The same settings can be found on the GVC3212/GVC3220 LCD: Settings 🡪 Basic 🡪 Bluetooth.

E:\GS_doc\GVC32XX\GVC3220_UserManual\Screenshots\Screenshot_20200511-134301.png
Figure 19: Bluetooth on GVC3212/GVC3220

SECURITY FOR GVC32XX SERVICES

Provisioning via Configuration File

GVC32XX supports downloading configuration file via HTTP/HTTPS/TFTP. Below figure shows the options for config file provisioning.

Figure 20: GVC32XX Config File Provisioning

We recommend users to consider the following options for added security when deploying the GVC32XX with provisioning.

  • Config Upgrade Via: HTTPS:

By default, HTTPS is selected. This is recommended so the traffic is encrypted while travelling through the network.

  • HTTP/HTTPS User Name and Password:

This can be set up as required on the provisioning server when HTTP/HTTPS is used. Only when the GVC32XX has the correct username and password configured, it can be authenticated by the provisioning server and the config file can be downloaded.

  • Authenticate Config file:

This sets the GVC32XX to authenticate configuration file before applying it. When set to “Yes”, the configuration file must include P value P2 with GVC32XX’s administration password. If it is missed or does not match the password, the GVC32XX will not apply the config file.

  • XML Config File Password:

The GVC32XX XML config file can be encrypted using OpenSSL. When it’s encrypted, the GVC32XX must supply the correct password in this field so it can decrypt XML configuration file after downloading it. Then the configuration can be applied to the GVC32XX. Please note this feature is supported on XML config file instead of the binary config file. Therefore, it’s recommended to use XML config file format and encrypt it with this feature.

  • Validate Certificate Chain:

This configures whether to validate the server certificate when downloading the firmware/config file. If set to “Yes”, the phone will download the firmware/config file only from the legitimate server.

Figure 21: Validate Certification Chain

GVC32XX supports uploading CA certificate to validate the server certificate and this setting is under GVC32XX web UI: Settings 🡪 Security Settings on GVC3200/3202/3210.

Figure 22: Certificate Management on GVC3200/3202/3210

The same settings for the GVC3212/3220 can be found under System Settings 🡪 Security Settings 🡪 Certificate Management.

Figure 23: Certificate Management on GVC3220

Firmware Upgrading

Similar to configuration file provisioning, GVC32XX supports downloading firmware file via HTTP/HTTPS/TFTP. The firmware file is encrypted and GVC32XX ensures only authentic, signed and untampered firmware file can run. Here are the recommended settings for firmware downloading.

Figure 24: Firmware Upgrade Configuration
  • Firmware Upgrade Mode: HTTPS.

HTTPS is recommended so the traffic is encrypted while travelling through the network.

  • HTTP/HTTPS User Name and Password:

This can be set up as required on the provisioning server when HTTP/HTTPS is used. Only when the GVC32XX has the correct username and password configured, it can be authenticated by the firmware server and the firmware file will be downloaded.

  • Validate Certificate Chain:

This configures whether to validate the server certificate when downloading the firmware/config file. If set to “Yes”, the GVC32XX will download the firmware/config file only from the legitimate server.

Figure 25: Validate Certification Chain

The GVC32XX supports uploading CA certificate to validate the server certificate and this setting is under GVC32XX web UI: Settings 🡪 Security Settings on GVC3200/3202/3210 and under System Settings 🡪 Security Settings 🡪 SIP TLS.

Figure 26: Certificate Management on GVC3200/3202/3210

The same settings for the GVC3212/3220 can be found under System Settings 🡪 Security Settings 🡪 Certificate Management.

Figure 27: Certificate Management on GVC3220

TR-069

TR-069 is enabled by default on the GVC3200/3202/3210, which means the connection request port 86400 is open for TR-069 session. If the user does not need TR-069 service, it’s recommended to disable it. When TR-069 is enabled and the service is to be used, users can also consider using a different connection request port other than the well-known port 86400 for security purpose.

Figure 28: TR-069 Connection Settings Page

ADB Service

Android Debug Bridge (ADB) is a versatile command-line tool that allows users to communicate with GVC32XX for installing apps, debugging apps and running specific commands. To enable ADB connection, users must turn on developer mode from WEB UI: Maintenance 🡪 Troubleshooting 🡪 Developer Mode.

The port number used for ADB connection is 5555. It is not recommended to enable developer mode if ADB connection is not needed.

Figure 29: Enabling Developer Mode

LDAP

GVC32XX supports LDAP to obtain enterprise contacts from LDAP server. It’s recommended to change the default connection mode “LDAP” to “LDAPS” to protect and encrypt LDAP queries and responses using SSL/TLS.

Figure 30: GVC32XX LDAP Settings

Note:

The GVC3212 does not support LDAP.

Syslog

GVC32XX supports sending Syslog to a remote syslog server. By default, it’s sent via UDP and we recommend to change it to “SSL/TLS” so the syslog messages containing device information will be sent securely over TLS connection.

Figure 31: Syslog Protocol on GVC3200/GVC3202/3210
Figure 32: Syslog Protocol on GVC3212/GVC3220

SECURITY GUIDELINES FOR GVC32XX DEPLOYMENT

Often times the GVC32XXs are deployed behind NAT. The network administrator can consider following security guidelines for the GVC32XX to work properly and securely.

  • Turn off SIP ALG on the router

On the customer’s router, it’s recommended to turn off SIP ALG (Application Layer Gateway). SIP ALG is common in many routers intending to prevent some problems caused by router firewalls by inspecting VoIP packets and modifying it if necessary. Even though SIP ALG intends to prevent issues for VoIP devices, it can be implemented imperfectly causing problems, especially in some cases SIP ALG modifies SIP packets improperly which might cause VoIP devices fail to register or establish calls.

  • Use TLS and SRTP for SIP calls

On the GVC32XX, it’s recommended to use TLS for SIP transport with “sips” in SIP URL scheme for SIP signaling encryption, and use SRTP for media encryption. Below are the SIP ports and RTPs port used on the GVC32XX if the network administrator needs to create firewall rules.

  1. Users can configure the local SIP port to be used for sip calls under Settings🡪SIP🡪SIP🡪 Local SIP port. The default SIP port used is 5060 for the GVC3200/3202/3210 or under Account🡪SIP🡪SIP Settings🡪 Local SIP port for GVC3220.
  2. Users can configure the local RTP port under web UI 🡪 Settings 🡪 General Settings 🡪 Local RTP port for GVC3200/3202/3210 and under web UI 🡪 Call Features🡪 General Settings 🡪 Local RTP port for GVC3220.The default port value is 5004. This parameter defines the local RTP-RTCP port pair used to listen and transmit. It is the base RTP port for channel 0. When configured, for audio, channel 0 will use this port_value for RTP and the port_value+1 for its RTCP; channel 1 will use port_value+6 for RTP and port_value+7 for its RTCP. For video, channel 0 will use port_value+2 for RTP and port_value+3 for its RTCP; channel 1 will use port_value+8 for RTP and port_value+9 for RTCP.

Note:

On the customer’s firewall, it’s recommended to ensure SIP port is opened for the SIP accounts on the GVC32XX. It’s not necessary to use the default port 5060 on the firewall. Instead, the network administrator can consider mapping a different port on the firewall for GVC32XX SIP port 5060 for security purpose.

  • Use HTTPS for web UI access

GVC32XX Web UI access should be equipped with strong administrator password in additional to using HTTPS. Also, do not expose the GVC32XX web UI access to public network for normal usage.

  • Use HTTPS for firmware downloading and config file downloading

Use HTTPS for firmware downloading and provisioning. Besides that, set up username and password for the HTTP/HTTPS server to require authentication. It’s also recommended to turn on “Validate Certification Chain” so the GVC32XX will validate server certificate when downloading the firmware or config file.

Was this article helpful?

Related Articles

Need Support?
Can’t find the answer you’re looking for? Don’t worry we’re here to help!
Contact Support

Leave a Comment