Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Note

While the practice of allowing provisioning files to be reachable unauthenticated may seem to be a security risk, we have taken precautions to thwart abuse by malicious users. Specifically, we monitor all IP addresses that scan the provisioning server, and automatically block any endpoint that makes fraudulent attempts to reach provisioning files. In addition, we monitor the source IP address from which devices register, and automatically limit dialing access if we detect suspicious activity.   We have found that this practice achieves the optimal balance of protection and ease of provisioning.

...