Table of Contents
OVERVIEW ..................................................................................................................... 3
Security Bulletins ................................................................................................................................... 4
WEB UI ACCESS ........................................................................................................... 5
UCM HTTP Server Access .................................................................................................................... 5
Protocol Type ......................................................................................................................................... 5
User Login .............................................................................................................................................. 6
Login Settings ........................................................................................................................................ 8
User Management Levels ...................................................................................................................... 9
EXTENSION SECURITY .............................................................................................. 11
SIP/IAX Password ................................................................................................................................ 11
Strategy of IP Access Control .............................................................................................................. 11
Example: Local Subnet Only ........................................................................................................ 11
SRTP .................................................................................................................................................... 14
TRUNK SECURITY ....................................................................................................... 15
Outbound Rule Permissions ................................................................................................................ 15
Privilege Level .............................................................................................................................. 15
Source Caller ID Filter .................................................................................................................. 15
Password Protection ..................................................................................................................... 16
PIN Groups ................................................................................................................................... 17
IVR Dial Trunk ...................................................................................................................................... 18
Allow Guest Calls ................................................................................................................................. 19
TLS ............................................................................................................................... 20
FIREWALL .................................................................................................................... 22
Static Defense ...................................................................................................................................... 22
Static Defense Example: Blocking TCP Connection from a Specific Host ................................... 23
Dynamic Defense ................................................................................................................................. 24
Fail2ban ............................................................................................................................................... 24
AMI ................................................................................................................................ 27