Data sheet

Table Of Contents
P a g e | 68
UCM6200 Series User Manual
Version 1.0.19.27
The following table shows a sample current service status running on the UCM6200.
Table 12: UCM6200 FirewallStatic DefenseCurrent Service
Port
Process
Type
Protocol or Service
7777
Asterisk
TCP/IPv4
SIP
389
Slapd
TCP/IPv4
LDAP
2000
Asterisk
TCP/IPv4
SCCP
22
Dropbear
TCP/IPv4
SSH
80
Lighthttpd
TCP/IPv4
HTTP
8089
Lighthttpd
TCP/IPv4
HTTPS
69
Opentftpd
UDP/IPv4
TFTP
9090
Asterisk
UDP/IPv4
SIP
6060
zero_config
UDP/IPv4
UCM6200 zero_config service
5060
Asterisk
UDP/IPv4
SIP
4569
Asterisk
UDP/IPv4
SIP
5353
zero_config
UDP/IPv4
UCM6200 zero_config service
37435
Syslogd
UDP/IPv4
Syslog
For typical firewall settings, users could configure the following options on the UCM6200.
Table 13: Typical Firewall Settings
Ping Defense
Enable
If enabled, ICMP response will not be allowed for Ping request. The default
setting is disabled. To enable or disable it, click on the check box for the LAN or
WAN (UCM6200) interface.
SYN-Flood
Defense Enable
Allows the UCM6200 to handle excessive amounts of SYN packets from one
source and keep the web portal accessible. There are two options available and
only one of these options may be enabled at one time.
eth(0)LAN defends against attacks directed to the LAN IP address of the
UCM6200.
eth(1)WAN defends against attacks directed to the WAN IP address of the
UCM6200.
SYN Flood Defense will limit the amount of SYN packets accepted by the UCM
from one source to 10 packets per second. Any excess packets from that source
will be discarded.