2 Copy Right Copyright 2014 Allo.com. All rights reserved. No part of this publication may be copied, distributed, transmitted, transcribed, stored in a retrieval system, or translated into any human or computer language without the prior written permission of Allo.com. This document has been prepared for use by professional and properly trained personnel, and the customer assumes full responsibility when using it. Proprietary Rights The information in this document is Confidential to Allo.com and is legally privileged. The information and this document are intended solely for the addressee. Use of this document by anyone else for any other purpose is unauthorized. If you are not the intended recipient, any disclosure, copying, or distribution of this information is prohibited and unlawful. Disclaimer Information in this document is subject to change without notice and should not be construed as a commitment on the part of Allo.com. And does not assume any responsibility or make any warranty against errors. It may appear in this document and disclaims any implied warranty of merchantability or fitness for a particular purpose. Version 2.0 2
3 About this manual This manual describes the Allo product application and explains how to work and use it major features. It serves as a means to describe the user interface and how to use it to accomplish common tasks. This manual also describes the underlying assumptions and users make the underlying data model. Document Conventions In this manual, certain words are represented in different fonts, typefaces, sizes, and weights. This highlighting is systematic; different words are represented in the same style to indicate their inclusion in a specific category. Additionally, this document has different strategies to draw User attention to certain pieces of information. In order of how critical the information is to your system, these items are marked as a note, tip, important, caution, or warning. Icon Purpose Note Tip/Best Practice Important Caution Warning Bold indicates the name of the menu items, options, dialog boxes, windows and functions. The color blue with underline is used to indicate cross-references and hyperlinks. Numbered Paragraphs - Numbered paragraphs are used to indicate tasks that need to be carried out. Text in paragraphs without numbering represents ordinary information. The Courier font indicates a command sequence, file type, URL, Folder/File name e.g. Support Information Every effort has been made to ensure the accuracy of the document. If you have comments, questions, or ideas regarding the document contact online support: Version 2.0 3
4 Table of Contents About this manual... 3 Document Conventions Overview Notification LEDs (On the Front Panel of the STM) Deployment Considerations Initial Setup & Configuration Accessing the WebUI Version 2.0 4
5 1. Overview Congratulations on your purchase of the allo STM appliance to protect your SIP based PBX, VOIP Gateway deployments. This Quick Start Guide describes the steps involved in setting up the allo STM Appliance. It comes with 1 fast Ethernet LAN interface and 1 fast Ethernet WAN interface. An additional USB port has been provided for adding the secondary USB storage that will be used by the appliance for archiving the security alert lock. The factory reset button is located next to the USB Power socket. 1.2 Notification LEDs (On the Front Panel of the STM) STM Rear View: Figure 1: Front Panel LED Notifications Figure 2: STM Rear View Version 2.0 5
6 2. Deployment Considerations The STM has been made to protect the SIP based PBX/Gateway Servers against SIP based network threats and anomalies. Thus it is recommended to deploy the STM along with the PBX/Gateway deployment as given in the following scenarios based on what is applicable in the user s setup. Scenario 1 Scenario 2 Figure 3: Scenario 1 In the case of PBX deployed in the LAN Setup, the following setup is recommended as it would help to protect against the threats from both Internal Network as well as the threats from the Public Cloud penetrated the Non SIP aware Corporate Firewall. Figure 4: Scenario 2 Version 2.0 6
7 Scenario 3 In the case of multiple IPPBX/ VOIP Gateways are deployed in the LAN Setup, the following setup is recommended as it would help to protect against the threats from both Internal Network as well as the threats from the Public Cloud penetrated the Non SIP aware Corporate Firewall. The STM package includes: Figure 5: Scenario 3 1 STM Appliance 1 USB Power Adapter 1 Serial Console Cable 2 Ethernet Cables 3. Initial Setup & Configuration 1. Unpack the items from the box 2. Check that you have all the items listed in the package content. 3. Connect the LAN port of the STM to the PBX/VOIP Gateway. 4. Connect the WAN port of the STM to the untrusted/public network. 5. Connect the appliance to the power socket using the USB power cable. 6. The device will take about a minute to boot up & will be fully functional with the default configuration. Version 2.0 7
8 Some of the PBX/Gateway devices may have an exclusive LAN/Mgmt Interface for device management purpose other than the Data Interface (also referred as the WAN/Public Interface). In such cases LAN port of the STM should be connected to the Data Interface (WAN/Public Interface). The device operates as a transparent bridging firewall with Deep Packet Inspection enabled on the SIP traffic. By default, the appliance has been configured with static IP of (Net mask ). The device has been made to be fully functional with the default configuration. However if the user needs to tune the device settings & the DPI policies, they can tune the configuration via the Device WebUI. The device also provides the command line interface accessible via SSH, which will allow configuring the basic settings and viewing device status. Management Access Web GUI SSH CLI admin/admin Login Credentials admin/stmadmin Management Vlan IP / Default Device IP / Accessing the WebUI The user can connect to the device via management Vlan to access WebUI during initial setup. The management Vlan configured on the device, is accessible via the LAN/WAN ports & is made assigned to the default IP address Use the procedure given below to access the WebUI, 1. Connect the LAN port of the STM to a PC. 2. Assign the IP Address to the PC. Set the Net mask as Version 2.0 8
9 Now you can access the device from the browser using the URL https://< > Configure the STM Device IP Address from the Device Settings Page as per your local network range. Verify the IP address set to STM from the dashboard page. Once the user assigns the STM Device IP Address successfully, he can access the device using that IP address further. Now he can disconnect the PC and connect the LAN Port to the PBX/PBX Network that needs to be protected. The WebUI has been made accessible only via HTTPS. The recommended browser for accessing STM WebUI is Mozilla Firefox. The UI allows the administrator to configure the management Vlan IP addresses. In case if the user has changed the management Vlan IP address, they need to assign the corresponding network address to his PC for the management access subsequently. Alternatively the user can access the device via the static IP and configure the network settings during first time installation. Connect a PC to the LAN port of the STM and assign the IP address / to the PC. Now you can access the device from the browser using the URL https ://< > If the device is not accessible after configuring the new network configuration, Try rebooting the device and check the device dashboard accessing via Management Vlan. On launching the STM WebUI, the web application will prompt to enter the administrator credentials to login. Version 2.0 9
10 Figure 6: Login Page THE FULL VERSION MANUAL WILL PROVIDE YOU DETAILED INSTRUCTIONS ABOUT THE FULL FEATURE SET OF THE SIP THREAT MANAGER Any Technical assistance required, Kindly contact the support at THANK YOU! Version
Bandwidth Management Gateway BM-500 User s Manual Copyright Copyright (C) 2004 PLANET Technology Corp. All rights reserved. The products and programs described in this User s Manual are licensed products
Copyright 2007 Pirelli Broadband Solutions S.p.A. All rights reserved. This document contains Pirelli proprietary and confidential information. No part of this document may be copied, reprinted or reproduced
Trouble Shooting SiteManager to GateManager access If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection issues, this document
Iomega EZ Media and Backup Center User Guide Table of Contents Setting up Your Device... 1 Setup Overview... 1 Set up My Iomega StorCenter If It's Not Discovered... 2 Discovering with Iomega Storage Manager...
16-Channel VoIP Gateway Card Getting Started Model No. KX-TDA0490 Thank you for purchasing a Panasonic 16-Channel VoIP Gateway Card. Please read this manual carefully before using this product and save
ORiNOCO AP-600 User Guide Copyright 2003 Proxim Corporation. All rights reserved. Covered by one or more of the following U.S. patents: 5,231,634; 5,875,179; 6,006,090; 5,809,060; 6,075,812; 5,077,753.
INR-410 INR-420 System Administrator s Manual For V3.0.06 Version 2013/11/20 About This Manual Target Audience This manual is intended for System Administrators who are responsible for installing and setting
ADMINISTRATORS GUIDE Software 4.1.4 March 2013 1725-49091-401 Rev A Polycom VVX 300, 310, 400 and 410 Business Media Phone Addendum to the Polycom UC Software 4.1.0 Administrators Guide i Polycom VVX 300,
RSA Authentication Manager 8.1 Planning Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks
Cloud Deployment Guide Product Version: 1.2 Doc Rev 1.3 Last Updated: 15-Jan-15 Good Work TM Table of Contents Introduction What is the Cloud? 1 The Private Cloud 1 Good Work in the Cloud 1 Environment
Remote IP Feature Phone Installation Manual 0450-0450 Rev. A About ESI ESI (Estech Systems, Inc.) is a privately held corporation based in Plano, Texas. Founded in 1987, ESI designs and builds innovative
User Manual OMNINAS KD20 CHAPTER TITLE TABLE OF CONTENTS TABLE OF CONTENTS Product Overview Features................................. 1-2 Package Contents........................... 1-2 System Requirements........................
Office NAS 3.5 IDE/SATA Network Attached Storage Model # ANAS350 User s Manual Ver. 2.3 Table of Contents 1. Introduction... 3 1.1 Package Contents... 3 1.2 Features... 3 1.3 NAS Diagram... 4 2. Hard Drive
Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE
SMARTSTOR NS4300N Product Manual Version 1.4 SmartStor NS4300N Product Manual Copyright 2007 Promise Technology, Inc. All Rights Reserved. Copyright by Promise Technology, Inc. (Promise Technology). No
DocuSign Quick Start Guide In Person Signing Overview The In Person Signing feature lets you use the DocuSign Service for electronic signatures even if the signer does not have access to email or a computer.
Avaya one-x Quick Edition Release 1.0.0 Telephone User Guide 16-600795 Release 1.0.0 March 2006 Issue 1 2006 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the
SRA 6.0 User s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to hardware
vshield Manager 5.0.1 vshield App 5.0.1 vshield Edge 5.0.1 vshield Endpoint 5.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Mediatrix 4400 Digital Gateway VoIP Trunking with a Legacy PBX June 21, 2011 Proprietary 2011 Media5 Corporation Table of Contents Table of Contents... 2 Introduction... 3 Mediatrix 4400 Digital Gateway
COMPREHENSIVE INTERNET SECURITY SonicWALL Internet Security Appliances SonicWALL SSL-VPN 2.1 User s Guide Using This Guide About this Guide...................................................... 5 Organization
Deployment Guide for the Polycom SoundStructure VoIP Interface for Cisco Unified Communications Manager (SIP) UC Software 4.0.1 December 2011 1725-33223-001 Rev. A Trademark Information POLYCOM, the Polycom
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SSL VPN 5.0 User s Guide Table of Contents Using This Guide About this Guide......................................................