Table Of Contents - Grandstream Networks UCM6100 Manual Manual

Hide thumbs Also See for UCM6100:
Table of Contents

Advertisement

OVERVIEW ................................................................................................ 3
WEB UI ACCESS ....................................................................................... 4
UCM6100 HTTP SERVER ACCESS ..................................................................................................... 4
PROTOCOL TYPE ................................................................................................................................. 4
USER LOGIN ......................................................................................................................................... 4
LOGIN TIMEOUT ................................................................................................................................... 5
TWO-LEVEL USER MANAGEMENT .................................................................................................... 5
EXTENSION SECURITY ............................................................................ 7
SIP/IAX PASSWORD ............................................................................................................................. 7
STRATEGY OF IP ACCESS CONTROL ............................................................................................... 7
EXAMPLE: LOCAL SUBNET ONLY ............................................................................................... 7
SRTP .................................................................................................................................................... 10
TRUNK SECURITY .................................................................................. 11
OUTBOUND RULE PERMISSIONS .................................................................................................... 11
PRIVILEGE LEVEL....................................................................................................................... 11
SOURCE CALLER ID FILTER ..................................................................................................... 12
IVR DIAL TRUNK ................................................................................................................................. 12
ALLOW GUEST CALLS ....................................................................................................................... 13
TLS ........................................................................................................... 14
FIREWALL ............................................................................................... 16
STATIC DEFENSE ............................................................................................................................... 16
DYNAMIC DEFENSE .......................................................................................................................... 20
FAIL2BAN ............................................................................................................................................ 20
AMI ........................................................................................................... 23
Index

Table of Contents

UCM6100 Security Manual
Page 1 of 23

Advertisement

Table of Contents
loading

Table of Contents