beautypg.com

Dynamic defense, Table 14: firewall rule settings, Table 15: ucm6510 firewall dynamic defense – Grandstream UCM6510 User Manual User Manual

Page 59

background image

Firmware Version 1.0.2.5

UCM6510 IP PBX User Manual

Page 58 of 313

Table 14: Firewall Rule Settings

Rule Name

Specify the Firewall rule name to identify the firewall rule.

Action

Select the action for the Firewall to perform.
• ACCEPT
• REJECT
• DROP

Type

Select the traffic type.
• IN

If selected, users will need specify the network interface "LAN", "WAN" or

"Both" for the incoming traffic.

• OUT

Service

Select the service type.
• FTP
• SSH
• Telnet
• TFTP
• HTTP
• LDAP
• Custom

If selected, users will need specify Source (IP and port), Destination (IP and

port) and Protocol (TCP, UDP or Both) for the service. Please note if the

source or the destination field is left blank, it will be used as "Anywhere".

The new rule will be listed at the bottom of the page with sequence number, rule name, action, protocol,

type, source, destination and operation. Users can click on

to edit the rule, or click on

to delete

the rule. Save the change and reboot the device for the configuration to take effect.

DYNAMIC DEFENSE

Dynamic defense can blacklist hosts dynamically when the UCM6510 is set to "Route" under web

GUI->Settings->Network Settings->Basic Settings: Method. If enabled, the traffic via TCP connection

coming into the UCM6510 can be monitored, which helps prevent massive connection attempts or brute

force attacks to the device. The blacklist can be created and updated by the UCM6510 firewall, which will

then be displayed in the web page. Please refer to the following table for dynamic defense options on the

UCM6510.

Table 15: UCM6510 Firewall Dynamic Defense

Dynamic Defense

Enable

Enable dynamic defense. The default setting is disabled.