UCM6100 Security Manual Page 1 of 23
Index
Table of Contents
OVERVIEW ................................................................................................ 3
WEB UI ACCESS ....................................................................................... 4
UCM6100 HTTP SERVER ACCESS ..................................................................................................... 4
PROTOCOL TYPE ................................................................................................................................. 4
USER LOGIN ......................................................................................................................................... 4
LOGIN TIMEOUT ................................................................................................................................... 5
TWO-LEVEL USER MANAGEMENT .................................................................................................... 5
EXTENSION SECURITY ............................................................................ 7
SIP/IAX PASSWORD ............................................................................................................................. 7
STRATEGY OF IP ACCESS CONTROL ............................................................................................... 7
EXAMPLE: LOCAL SUBNET ONLY ............................................................................................... 7
SRTP .................................................................................................................................................... 10
TRUNK SECURITY .................................................................................. 11
OUTBOUND RULE PERMISSIONS .................................................................................................... 11
PRIVILEGE LEVEL....................................................................................................................... 11
SOURCE CALLER ID FILTER ..................................................................................................... 12
IVR DIAL TRUNK ................................................................................................................................. 12
ALLOW GUEST CALLS ....................................................................................................................... 13
TLS ........................................................................................................... 14
FIREWALL ............................................................................................... 16
STATIC DEFENSE ............................................................................................................................... 16
STATIC DEFENSE EXAMPLE: BLOCKING TCP CONNECTION FROM A SPECIFIC HOST .... 17
STATIC DEFENSE EXAMPLE: BLOCKING SSH CONNECTION TO UCM6100 ........................ 18
DYNAMIC DEFENSE .......................................................................................................................... 20
FAIL2BAN ............................................................................................................................................ 20
AMI ........................................................................................................... 23