Overview - Grandstream Networks UCM Series Security Manual

Ip pbx
Table of Contents

Advertisement

This document presents a summary of security concerns on UCM. It covers the security risks and related
configurations that users need to consider when deploying the UCM.
The following sections are covered in this document:
Web UI access
Web UI is secured by user login and login timeout mechanism. Two-level user management is
configurable. Admin with limited access can be created by the default super administrator.
Extension security
This includes SIP/IAX password for authentication, IP access control and SRTP.
Trunk security
Trunk security is achieved mainly by setting the privilege level, configuring source caller ID filter to filter
out outbound call requests from unwanted source
TLS
This is to secure the SIP signaling.
Firewall mechanism
Three types of firewall mechanism can be configured to protect UCM against malicious attacks: Static
Defense, Dynamic Defense (UCM6510 and UCM6102/UCM6202/UCM6204/UCM6208 only) and
Fail2ban.
AMI
Using AMI feature comes with security concerns for UCM administrators to consider.
This document is subject to change without notice. The latest electronic version of this document is available
for download here:
http://www.grandstream.com/support
Reproduction or transmittal of the entire or any part, in any form or by any means, electronic or print, for
any purpose without the express written permission of Grandstream Networks, Inc. is not permitted.

OVERVIEW

UCM Security Manual
P a g e
|
4

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ucm6202Ucm6204Ucm6208Ucm6102Ucm6510

Table of Contents