Figure 11: Host blocked by UCM6100
STATIC DEFENSE EXAMPLE: BLOCKING SSH CONNECTION TO UCM6100
The UCM6100 can be accessed via SSH connection by default. The SSH access provides device status
information, reboot, reset and limited configuration capabilities.
It is recommended to disable it once the
UCM6100 is deployed for security purpose. This can be done using static defense.
Figure 12: UCM6100 SSH Access
UCM6100 Security Manual
Page 18 of 23