beautypg.com

Grandstream UCM6100 Security Manual User Manual

Page 3

background image

UCM6100 Security Manual Page 2 of 23

Table of Figures

Figure 1: UCM6102 Web UI Login .............................................................................................................. 4

Figure 2: Strategy

– Local Subnet Only ...................................................................................................... 8

Figure 3: Registration Failed From Subnet Not Allowed For Registration ................................................... 9

Figure 4: Registration Successful From Allowed Subnet ............................................................................ 9

Figure 5: Outbound Rule Permissions .......................................................................................................11

Figure 6: Source Caller ID Filter ................................................................................................................ 12

Figure 7: IVR Dial Trunk ............................................................................................................................ 13

Figure 8: PBX->SIP Settings->TCP/TLS ................................................................................................... 14

Figure 9: Firewall Rule Custom Configuration........................................................................................... 17

Figure 10: Static Defense Blocking Host 192.168.40.142 Using TCP Connection .................................... 17

Figure 11: Host blocked by UCM6100....................................................................................................... 18

Figure 12: UCM6100 SSH Access ............................................................................................................ 18

Figure 13: Block SSH Connection ............................................................................................................. 19

Figure 14: Putty Setup for SSH Connection .............................................................................................. 19

Figure 15: SSH Connection Blocked by UCM6100 ................................................................................... 20

Figure 16: Fail2Ban Default Configuration ................................................................................................ 21

Figure 17: Asterisk Service Fail2Ban setting ............................................................................................. 22

This document is subject to change without notice. The latest electronic version of this document is

available for download here:

http://www.grandstream.com/support

Reproduction or transmittal of the entire or any part, in any form or by any means, electronic or print, for

any purpose without the express written permission of Grandstream Networks, Inc. is not permitted.