EasyManua.ls Logo

Grandstream Networks UCM Series User Manual

Grandstream Networks UCM Series
32 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Grandstream Networks, Inc.
UCM series IP PBX
Security Manual

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Grandstream Networks UCM Series and is the answer not in the manual?

Grandstream Networks UCM Series Specifications

General IconGeneral
Call RecordingYes
Humidity10% to 90% Non-condensing
SeriesUCM
CategoryNetwork Hardware
TypeIP PBX Appliance
VoIP ProtocolsSIP, RTP, RTCP, SRTP, TLS, STUN
Voice CodecsG.711, G.722, G.723.1, G.726, G.729A/B, iLBC
Fax over IPT.38
Maximum Concurrent CallsVaries by model (e.g., UCM6301 supports up to 50, UCM6308 supports up to 150)
Maximum Registered SIP DevicesVaries by model
Max SIP AccountsVaries by model
FXS PortsVaries by model (e.g., UCM6301: 2, UCM6302/6304: 2, UCM6308: 8)
FXO PortsDepends on model (some models have none)
Analog TrunksDepends on model (some models have none)
Network InterfacesVaries by model (Typically Gigabit Ethernet ports)
PoEVaries by model (Some models support PoE)
USB PortsYes (varies by model)
SD Card SlotYes
DisplayVaries by model (Some models have LCD display)
Local StorageYes (Internal storage for recordings, voicemail, etc. Size varies by model)
Automated AttendantYes
Call Center FeaturesYes
SecurityTLS/SRTP/HTTPS encryption, access control
ManagementWeb GUI
Power SupplyVaries by model
Operating Temperature0°C to 45°C (32°F to 113°F)
Storage Temperature-4°F to 140°F (-20°C to 60°C)
DimensionsVaries by model
WeightVaries by model

Summary

Web UI Access

User Login

Details the requirement for username and password for web UI access and default credentials.

User Management Levels

Describes the four privilege levels (Super Admin, Admin, Custom, Consumer) for web UI users.

Extension Security

SIP/IAX Password

Explains configuring secure SIP/IAX passwords for extension registration authentication.

Strategy of IP Access Control

Details controlling extension registration by IP address using "Local Subnet Only" or "Specific IP Address".

Trunk Security

Firewall

Static Defense

Configures filtering rules (ACCEPT, REJECT, DROP) based on IP addresses, ports, and protocols.

Fail2ban

Detects and prevents intrusion from authentication errors by banning IP addresses.

Related product manuals