Data sheet
Table Of Contents
- DOCUMENT PURPOSE
- CHANGE LOG
- Firmware Version 1.0.19.27
- Firmware Version 1.0.19.21
- Firmware Version 1.0.18.13
- Firmware Version 1.0.18.12
- Firmware Version 1.0.18.9
- Firmware Version 1.0.17.16
- Firmware Version 1.0.16.20
- Firmware Version 1.0.16.18
- Firmware Version 1.0.15.16
- Firmware Version 1.0.14.24
- Firmware Version 1.0.14.23
- Firmware Version 1.0.14.21
- Firmware Version 1.0.13.14
- Firmware Version 1.0.12.19
- Firmware Version 1.0.11.27
- Firmware Version 1.0.0.7
- WELCOME
- PRODUCT OVERVIEW
- INSTALLATION
- GETTING STARTED
- SYSTEM SETTINGS
- PROVISIONING
- EXTENSIONS
- EXTENSION GROUPS
- ANALOG TRUNKS
- VOIP TRUNKS
- SLA STATION
- CALL ROUTES
- CONFERENCE
- VIDEO CONFERENCE
- IVR
- LANGUAGE SETTINGS FOR VOICE PROMPT
- VOICEMAIL
- RING GROUP
- PAGING AND INTERCOM GROUP
- CALL QUEUE
- PICKUP GROUPS
- MUSIC ON HOLD
- FAX SERVER
- BUSY CAMP-ON
- PRESENCE
- FOLLOW ME
- SPEED DIAL
- DISA
- EMERGENCY
- CALLBACK
- BLF AND EVENT LIST
- DIAL BY NAME
- ACTIVE CALLS AND MONITOR
- CALL FEATURES
- PBX SETTINGS
- SIP SETTINGS
- IAX SETTINGS
- INTERFACE SETTINGS
- API Configuration
- CTI SERVER
- ASTERISK MANAGER INTERFACE (RESTRICTED ACCESS)
- CRM INTEGRATION
- PMS INTEGRATION
- WAKEUP SERVICE
- ANNOUNCEMENTS CENTER
- STATUS AND REPORTING
- USER PORTAL
- MAINTENANCE
- EXPERIENCING THE UCM6200 SERIES IP PBX
P a g e | 68
UCM6200 Series User Manual
Version 1.0.19.27
The following table shows a sample current service status running on the UCM6200.
Table 12: UCM6200 Firewall→Static Defense→Current Service
Port
Process
Type
Protocol or Service
7777
Asterisk
TCP/IPv4
SIP
389
Slapd
TCP/IPv4
LDAP
2000
Asterisk
TCP/IPv4
SCCP
22
Dropbear
TCP/IPv4
SSH
80
Lighthttpd
TCP/IPv4
HTTP
8089
Lighthttpd
TCP/IPv4
HTTPS
69
Opentftpd
UDP/IPv4
TFTP
9090
Asterisk
UDP/IPv4
SIP
6060
zero_config
UDP/IPv4
UCM6200 zero_config service
5060
Asterisk
UDP/IPv4
SIP
4569
Asterisk
UDP/IPv4
SIP
5353
zero_config
UDP/IPv4
UCM6200 zero_config service
37435
Syslogd
UDP/IPv4
Syslog
For typical firewall settings, users could configure the following options on the UCM6200.
Table 13: Typical Firewall Settings
Ping Defense
Enable
If enabled, ICMP response will not be allowed for Ping request. The default
setting is disabled. To enable or disable it, click on the check box for the LAN or
WAN (UCM6200) interface.
SYN-Flood
Defense Enable
Allows the UCM6200 to handle excessive amounts of SYN packets from one
source and keep the web portal accessible. There are two options available and
only one of these options may be enabled at one time.
• eth(0)LAN defends against attacks directed to the LAN IP address of the
UCM6200.
• eth(1)WAN defends against attacks directed to the WAN IP address of the
UCM6200.
SYN Flood Defense will limit the amount of SYN packets accepted by the UCM
from one source to 10 packets per second. Any excess packets from that source
will be discarded.