User's Manual

Firmware Version 1.0.0.5
UCM6510 IP PBX User Manual
Page 33 of 192
DYNAMIC DEFENSE
Dynamic defense can blacklist hosts dynamically when the UCM6510 is set to "Route" under web
GUI->Settings->Network Settings->Basic Settings: Method. If enabled, the traffic coming into the
UCM6510 can be monitored, which helps prevent massive connection attempts or brute force attacks to the
device. The blacklist can be created and updated by the UCM6510 firewall, which will then be displayed in
the web page. Please refer to the following table for dynamic defense options on the UCM6510.
Table 11: UCM6510 Firewall Dynamic Defense
Dynamic Defense
Enable
Enable dynamic defense. The default setting is disabled.
Periodical Time
Interval
Configure the dynamic defense periodic time interval (in minutes). If the
number of TCP connections from a host exceeds the connection threshold
within this period, this host will be added into Blacklist. The valid value is
between 1 to 59 when dynamic defense is turned on. The default setting is
59.
Blacklist Update
Interval
Configure the blacklist update time interval (in seconds). The default setting is
120.
Connection
Threshold
Configure the connection threshold. Once the number of connections from
the same host reaches the threshold, it will be added into the blacklist. The
default setting is 100.
Dynamic Defense
Whitelist
Configure the dynamic defense whitelist.
For example,
192.168.1.3
192.168.1.4
FAIL2BAN
Fail2Ban feature on the UCM6510 provides intrusion detection and prevention for authentication errors in
SIP REGISTER, INVITE and SUBSCRIBE. Once the entry is detected within "Max Retry Duration", the
UCM6510 will take action to forbid the host for certain period as defined in "Banned Duration". This feature
helps prevent SIP brute force attacks to the PBX system.