Rule Name
Action
Type
Service
The new rule will be listed at the bottom of the page with sequence number, rule name, action, protocol,
type, source, destination and operation. Users can click on
the rule. Save the change and reboot the device for the configuration to take effect.
DYNAMIC
D EFENSE
Dynamic defense can blacklist hosts dynamically when the UCM6510 is set to "Route" under web
GUI->Settings->Network Settings->Basic Settings: Method. If enabled, the traffic via TCP connection
coming into the UCM6510 can be monitored, which helps prevent massive connection attempts or brute
force attacks to the device. The blacklist can be created and updated by the UCM6510 firewall, which will
then be displayed in the web page. Please refer to the following table for dynamic defense options on the
UCM6510.
Dynamic Defense
Enable
Firmware Version 1.0.2.5
Table 14: Firewall Rule Settings
Specify the Firewall rule name to identify the firewall rule.
Select the action for the Firewall to perform.
ACCEPT
•
REJECT
•
DROP
•
Select the traffic type.
IN
•
If selected, users will need specify the network interface "LAN", "WAN" or
"Both" for the incoming traffic.
OUT
•
Select the service type.
FTP
•
SSH
•
Telnet
•
TFTP
•
HTTP
•
LDAP
•
Custom
•
If selected, users will need specify Source (IP and port), Destination (IP and
port) and Protocol (TCP, UDP or Both) for the service. Please note if the
source or the destination field is left blank, it will be used as "Anywhere".
Table 15: UCM6510 Firewall Dynamic Defense
Enable dynamic defense. The default setting is disabled.
UCM6510 IP PBX User Manual
to edit the rule, or click on
to delete
Page 59 of 317
Need help?
Do you have a question about the UCM6510 and is the answer not in the manual?
Questions and answers