Table of Contents
OVERVIEW.....................................................................................................................4
WEB UI ACCESS ...........................................................................................................5
UCM HTTP Server Access ....................................................................................................................5
Protocol Type .........................................................................................................................................5
User Login..............................................................................................................................................6
Login Settings ........................................................................................................................................8
User Management Levels ......................................................................................................................9
EXTENSION SECURITY .............................................................................................. 11
SIP/IAX Password................................................................................................................................11
Strategy of IP Access Control .............................................................................................................. 11
Example: Local Subnet Only ........................................................................................................ 11
SRTP....................................................................................................................................................14
TRUNK SECURITY.......................................................................................................15
Outbound Rule Permissions ................................................................................................................15
Privilege Level ..............................................................................................................................15
Source Caller ID Filter ..................................................................................................................16
Password protection .....................................................................................................................16
PIN Groups ...................................................................................................................................17
IVR Dial Trunk......................................................................................................................................19
Allow Guest Calls.................................................................................................................................20
TLS ...............................................................................................................................21
FIREWALL....................................................................................................................23
Static Defense......................................................................................................................................23
Static Defense Example: Blocking TCP Connection from a Specific Host...................................24
Static Defense Example: Blocking SSH Connection to UCM ......................................................25
Dynamic Defense.................................................................................................................................28