Overview - Grandstream Networks UCM6100 Manual Manual

Hide thumbs Also See for UCM6100:
Table of Contents

Advertisement

This document presents a summary of security concerns on UCM6100. It covers the security risks and
related configurations that users need to consider when deploying the UCM6100.
The following sections are covered in this document:
Web UI access
Web UI is secured by user login and login timeout mechanism. Two-level user management is
configurable. Admin with limited access can be created by the default super administrator.
Extension security
This includes SIP/IAX password for authentication, IP access control and SRTP.
Trunk security
Trunk security is achieved mainly by setting the privilege level, configuring source caller ID filter to filter
out outbound call requests from unwanted source
TLS
This is to secure the SIP signaling.
Firewall mechanism
Three types of firewall mechanism can be configured to protect UCM6100 against malicious attacks:
Static Defense, Dynamic Defense (UCM6510 and UCM6102 only) and Fail2ban.
AMI
Using AMI feature comes with security concerns for UCM6100 administrators to consider.

OVERVIEW

UCM6100 Security Manual
Page 3 of 23

Advertisement

Table of Contents
loading

Table of Contents