OVERVIEW ................................................................................................ 3
WEB UI ACCESS ....................................................................................... 4
UCM6100 HTTP SERVER ACCESS ..................................................................................................... 4
PROTOCOL TYPE ................................................................................................................................. 4
USER LOGIN ......................................................................................................................................... 4
LOGIN TIMEOUT ................................................................................................................................... 5
TWO-LEVEL USER MANAGEMENT .................................................................................................... 5
EXTENSION SECURITY ............................................................................ 7
SIP/IAX PASSWORD ............................................................................................................................. 7
SRTP .................................................................................................................................................... 10
TRUNK SECURITY .................................................................................. 11
OUTBOUND RULE PERMISSIONS .................................................................................................... 11
PRIVILEGE LEVEL....................................................................................................................... 11
SOURCE CALLER ID FILTER ..................................................................................................... 12
IVR DIAL TRUNK ................................................................................................................................. 12
ALLOW GUEST CALLS ....................................................................................................................... 13
TLS ........................................................................................................... 14
FIREWALL ............................................................................................... 16
STATIC DEFENSE ............................................................................................................................... 16
DYNAMIC DEFENSE .......................................................................................................................... 20
FAIL2BAN ............................................................................................................................................ 20
AMI ........................................................................................................... 23
Index
Table of Contents
UCM6100 Security Manual
Page 1 of 23