beautypg.com

Index, Overview, Web ui access – Grandstream UCM6100 Security Manual User Manual

Page 2: Extension security, Trunk security, Firewall

background image

UCM6100 Security Manual Page 1 of 23

Index

Table of Contents

OVERVIEW .................................................................................................... 3

WEB UI ACCESS .......................................................................................... 4

UCM6100 HTTP SERVER ACCESS ................................................................................................... 4

PROTOCOL TYPE ............................................................................................................................... 4

USER LOGIN ....................................................................................................................................... 4

LOGIN TIMEOUT................................................................................................................................. 5

TWO-LEVEL USER MANAGEMENT ................................................................................................... 5

EXTENSION SECURITY ............................................................................... 7

SIP/IAX PASSWORD ........................................................................................................................... 7

STRATEGY OF IP ACCESS CONTROL.............................................................................................. 7

EXAMPLE: LOCAL SUBNET ONLY ............................................................................................. 7

SRTP ................................................................................................................................................. 10

TRUNK SECURITY ...................................................................................... 11

OUTBOUND RULE PERMISSIONS ...................................................................................................11

PRIVILEGE LEVEL......................................................................................................................11

SOURCE CALLER ID FILTER .................................................................................................... 12

IVR DIAL TRUNK ............................................................................................................................... 12

ALLOW GUEST CALLS ..................................................................................................................... 13

TLS ............................................................................................................... 14

FIREWALL ................................................................................................... 16

STATIC DEFENSE ............................................................................................................................. 16

STATIC DEFENSE EXAMPLE: BLOCKING TCP CONNECTION FROM A SPECIFIC HOST ... 17

STATIC DEFENSE EXAMPLE: BLOCKING SSH CONNECTION TO UCM6100 ....................... 18

DYNAMIC DEFENSE ........................................................................................................................ 20

FAIL2BAN .......................................................................................................................................... 20

AMI ............................................................................................................... 23