beautypg.com

Dynamic defense, Fail2ban, Figure 15: ssh connection blocked by ucm6100 – Grandstream UCM6100 Security Manual User Manual

Page 21

background image

UCM6100 Security Manual Page 20 of 23

Figure 15: SSH Connection Blocked by UCM6100

DYNAMIC DEFENSE

Dynamic defense

is supported on UCM6102 and UCM6510 when LAN mode is set to “Route”. It can be

configured from Web UI->Settings->Firewall->Dynamic Defense. Once enabled, it will try to blacklist

massive connection attempts or brute force attacks made by individual host.

The UCM6100 Dynamic Defense model also allows users to customize the connection threshold and time

interval, meaning users can manually set the period for the max connection made by individual IP address.

In addition, whitelist is supported so that certain hosts will not be blocked by Dynamic Defense.

For more configuration details, please refer to

UCM6100 User Manual

.

FAIL2BAN

Fail2Ban is mainly designed to detect and prevent intrusion for authentication errors in SIP REGISTER,

INVITE and SUBSCRIBE method. It can be configured from Web UI->Settings->Firewall->Fail2ban. Users

can customize the maximum retry times that one host can attempt in a period of time. If a host initiates

attempts which exceed maximum retry times, it will be banned by UCM6100 for a certain amount of time.

User can also add a whitelist for the host that will not be punished by this defensive mechanism.

Fail2Ban can be enabled in the UCM61xx web UI->Firewall->Fail2Ban. By default Fail2Ban is disabled