Table Of Contents - Grandstream Networks UCM Series Security Manual

Ip pbx
Table of Contents

Advertisement

OVERVIEW ..................................................................................................................... 4
WEB UI ACCESS ........................................................................................................... 5
UCM HTTP Server Access .................................................................................................................... 5
Protocol Type ......................................................................................................................................... 5
User Login .............................................................................................................................................. 6
Login Settings ........................................................................................................................................ 8
User Management Levels ...................................................................................................................... 9
EXTENSION SECURITY .............................................................................................. 11
SIP/IAX Password ................................................................................................................................ 11
Strategy of IP Access Control .............................................................................................................. 11
Example: Local Subnet Only ........................................................................................................ 11
SRTP .................................................................................................................................................... 14
TRUNK SECURITY ....................................................................................................... 15
Outbound Rule Permissions ................................................................................................................ 15
Privilege Level .............................................................................................................................. 15
Source Caller ID Filter .................................................................................................................. 16
Password protection ..................................................................................................................... 16
PIN Groups ................................................................................................................................... 17
IVR Dial Trunk ...................................................................................................................................... 19
Allow Guest Calls ................................................................................................................................. 20
TLS ............................................................................................................................... 21
FIREWALL .................................................................................................................... 23
Static Defense ...................................................................................................................................... 23
Static Defense Example: Blocking SSH Connection to UCM ...................................................... 25
Dynamic Defense ................................................................................................................................. 28

Table of Contents

UCM Security Manual
P a g e
|
1

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ucm6202Ucm6204Ucm6208Ucm6102Ucm6510

Table of Contents