Dynamic Defense; Figure 23: Ssh Connection Blocked By Ucm - Grandstream Networks UCM Series Security Manual

Ip pbx
Table of Contents

Advertisement

Figure 22: SSH Connection Blocked by UCM

Dynamic Defense

Dynamic defense is supported on UCM6102/UCM6202/UCM6204/UCM6208 and UCM6510 when LAN
mode is set to "Route". It can be configured from Web UISystem SettingsSecurity SettingsDynamic
Defense. Once enabled, it will try to blacklist massive connection attempts or brute force attacks made by
individual host.
The UCM Dynamic Defense model also allows users to customize the connection threshold and time
interval, meaning users can manually set the period for the max connection made by individual IP address.
In addition, whitelist is supported so that certain hosts will not be blocked by Dynamic Defense.
For more configuration details, please refer to
UCM User
Manual.
Fail2ban
Fail2Ban is mainly designed to detect and prevent intrusion for authentication errors in SIP REGISTER,
INVITE and SUBSCRIBE method. It can be configured from Web UISystem SettingsSecurity
SettingsFail2ban. Users can customize the maximum retry times that one host can attempt in a period of
time. If a host initiates attempts which exceed maximum retry times, it will be banned by UCM for a certain
amount of time. User can also add a whitelist for the host that will not be punished by this defensive
mechanism.
Fail2Ban can be enabled in the UCM web UISystem SettingsSecurity SettingsFail2Ban. By default,
Fail2Ban is disabled (see figure below).
P a g e
|
28
UCM Security Manual

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ucm6202Ucm6204Ucm6208Ucm6102Ucm6510

Table of Contents