beautypg.com

Overview – Grandstream UCM6100 Security Manual User Manual

Page 4

background image

UCM6100 Security Manual Page 3 of 23

OVERVIEW

This document presents a summary of security concerns on UCM6100. It covers the security risks and

related configurations that users need to consider when deploying the UCM6100.

The following sections are covered in this document:

Web UI access

Web UI is secured by user login and login timeout mechanism. Two-level user management is

configurable. Admin with limited access can be created by the default super administrator.

Extension security

This includes SIP/IAX password for authentication, IP access control and SRTP.

Trunk security

Trunk security is achieved mainly by setting the privilege level, configuring source caller ID filter to filter

out outbound call requests from unwanted source

TLS

This is to secure the SIP signaling.

Firewall mechanism

Three types of firewall mechanism can be configured to protect UCM6100 against malicious attacks:

Static Defense, Dynamic Defense (UCM6510 and UCM6102 only) and Fail2ban.

AMI

Using AMI feature comes with security concerns for UCM6100 administrators to consider.