π Security Overview
IZT Cloud Voice provides robust security options to ensure a secure and reliable phone service for your business operations.
Allowed IPs
- You can set up Allowed IPs to let specific IP addresses or domain names access the PBX, preventing unauthorized access from other sources.
More information, see Allowed IPs.
Blocked IPs
- IP addresses can be listed as Blocked IP Addresses. If a trusted IP address was blocked, you can go to Blocked IPs to delete it and ensure the PBX is accessible.
More information, see Blocked IPs.
Outbound Call Frequency Restriction
- Outbound Call Frequency Restriction reduces the risk of PBX misuse by limiting the number of outbound calls over a specific period.
The PBX has a default rule that restricts outbound call frequency. You can add and adjust rules based on service needs.
More information, see Outbound Call Frequency Restriction.
Console/SSH Access
- IZT Cloud Voice supports Console/SSH Access for technical support engineers to establish a temporary SSH connection to the PBX to check and rectify issues.
More information, see Console/SSH Access.
Allowed Country IPs
- You can set up Allowed Country IPs to only allow the PBX system to be accessed from specific countries or regions, preventing operations from unauthorized territories.
More information, see Allowed Country IPs.
Allowed Country Codes
- You can set up Allowed Country Codes to restrict users from making international calls to specific countries or regions, thus effectively preventing toll fraud.
More information, see Allowed Country Codes.
Note: It is essential to review and adjust security settings periodically to maintain the integrity and security of your IZT Cloud Voice system.