P a g e
|
77
UCM6510 IP PBX User Manual
Version 1.0.20.31
Figure 25: Using Domain Name to Connect to UCM6510
Security Settings
The UCM offers several methods of protection against malicious attacks and unauthorized access such as
firewall rules, connection thresholds, and Fail2ban.
To get started on configuring security settings, navigate to the
System Settings
Security Settings
page.
Static Defense
On the Static Defense page, users can configure firewall rules and view the ports used by various UCM
services and processes.
The following table shows a few examples of the information available on the Static Defense page.
Summary of Contents for UCM6510
Page 1: ...Grandstream Networks Inc UCM6510 IP PBX User Manual ...
Page 83: ...P a g e 82 UCM6510 IP PBX User Manual Version 1 0 20 31 Figure 28 Fail2ban Settings ...
Page 273: ...P a g e 272 UCM6510 IP PBX User Manual Version 1 0 20 31 Figure 163 Black White List ...
Page 327: ...P a g e 326 UCM6510 IP PBX User Manual Version 1 0 20 31 Figure 213 Fax Sending in Web GUI ...
Page 331: ...P a g e 330 UCM6510 IP PBX User Manual Version 1 0 20 31 Figure 216 Presence Status CDR ...
Page 470: ...P a g e 469 UCM6510 IP PBX User Manual Version 1 0 20 31 Figure 334 Cleaner ...