Showing results for 
Search instead for 
Did you mean: 





This document covers some of the best practices methodologies you should put into operation to secure and prevent Toll fraud on Cisco Unified Communications Manager Express and the IP Phones connected to the network.


How to secure Cisco Unified CME and IP Phones?


  • After-hours calling Restrictions
  • Call Transfer Restrictions
  • Call Forward Restrictions
  • Class of Restrictions (COR)
  • Securing GUI access on CME
  • Strict ephone Registration
  • Deny external traffic on Voice signaling ports
  • Disable ephone Auto-registration


Configuration examples are based on Cisco Unified CME Version 8.6.


1. After-hours Calling Restrictions

Cisco Unified CME enables you to configure toll restriction policies based on time and date. You can configure the calling policies so that the users are not allowed to make calls to predefined numbers during certain hours of the day and outside business hours.


Sample configuration


CME1(config)# telephony-service

CME1(config-telephony)#  after-hours day Mon 20:00 08:00

CME1(config-telephony)#  after-hours day Tue 20:00 08:00

CME1(config-telephony)#  after-hours day Wed 20:00 08:00

CME1(config-telephony)#  after-hours day Thu 20:00 08:00

CME1(config-telephony)#  after-hours day Fri    20:00 08:00

CME1(config-telephony)#  after-hours day Sat   12:00 12:00

CME1(config-telephony)#  after-hours day Sun 12:00 12:00


Blocks calls outside of business hours, Monday to Friday before 8 am and after 8 pm.


CME1(config-telephony)#  after-hours block pattern 1 91900 7-24

CME1(config-telephony)#  after-hours block pattern 2 91

CME1(config-telephony)#  after-hours block pattern 3 9011


Calls to premium numbers, say 900 numbers are blocked all the time irrespective of the day.



2. Call Transfer Restrictions

Call transfer to VOIP or POTS ie PSTN numbers can be allowed explicitly but this may open doors for toll fraud. You can use the call transfer restriction to secure the CME.


Sample configuration



CME1(config)# telephony-service

CME1(config-telephony) # transfer-pattern 91919.......$


This limits the call transfer to numbers in area code 919 and bar transfers to any other numbers.



CME1(config)# ephone-template 1

CME1(config-ephone-template)# transfer-pattern blocked


This command disables the call transfer to any destination POTS or VOIP.


CME1(config)# ephone-template 2

CME1(config-ephone-template)#  transfer max-length 4


This command specifies the maximum number of digits a user can dial when a call is transferred.


CME1(config)# ephone 10

CME1(config-ephone)# ephone-template 1

CME1(config)# ephone  20

CME1(config-ephone)# ephone-template 2



3. Call Forward Restrictions

For an attacker, the most convenient way to exploit a phone system for toll fraud is to have an insider do a call-forward to certain destinations. To restrict the number of digits that can be dialed by CME, you can use the call forward restriction feature.

Sample configuration


CME1(config)# ephone-dn 60

CME1(config-ephone-dn)# number 5001

CME1(config-ephone-dn)# no forward local-calls


This feature restricts the call forward to local calls



CME1(config)# ephone-dn-template 10

CME1(config-ephone-template)# call-forward max-length 4


This restricts the number of digits that can be dialed by CME during Call forward.



4. Class of Restrictions (COR)

Class of Restriction (COR) in CME is identical to voice gateways. You can apply the COR list in ephone-dn in addition to dial-peers.


Sample configuration


CME1(config)# ephone-dn 10

CME1(config-ephone-dn)# number 1001

CME1(config-ephone-dn)# cor incoming internal

CME1(config-ephone-dn)# cor outgoing local



5. Securing GUI access on CME

SSL for HTTP (HTTPS) provides server authentication, encryption and message integrity to allow secure HTTP communications. SSL also provides HTTP client authentication. It is highly recommended to have Cisco Unified CME GUI interface secured with HTTPS access.


Sample configuration


CME1(config)# crypto key generate rsa exportable label httpkeys usage-keys 1024

CME1(config)# ip http server

CME1(config)# ip http secure-server

CME1(config)# ip http secure-port <port-number>

CME1(config)# ip http authentication AAA | TACACS | local


Default HTTPS port is 443, which can be changed to a higher port (none-1024) port number.



5. Strict ephone Registration

CME should be configured to enable only Cisco Unified IP Phones in the trusted domain (inside zone) for registration. You can use the strict-match option in ip source-address command so that only locally attached IP Phones can get register to CME.


Sample configuration


CME1(config-telephony)# ip source-address port <2000/5060> strict-match


In addition block TCP ports 2000-2002 and 5060 from the WAN to prevent external SCCP/SIP phone registration with CME.




6. Deny External Traffic on Voice signaling ports


Sample configuration


CME1(config)# ip access-list extended BlockTraffic


CME1(config-ext-nac1) deny tcp any any range 2000 2002

CME1(config-ext-nac1) deny tcp any any eq 5060

CME1(config-ext-nac1) permit ip any any log


CME1(config)# interface FastEtherner 1/0

CME1(config-if)# ip access-group BlockTraffic in



7. Disable ephone Auto-Registration

CME enables auto-registration of ephones by default. This implies that new Cisco Unified IP Phones that try to register with CME are auto-registered with DN auto-assigned and are able to make calls immediately. You can disable auto-registration to prevent toll fraud.


Sample configuration


CME1(config)# telephony-service

CME1(config-telephony)# no auto-reg-ephone


Restricting SIP Phone Auto Registration : For SIP Phones you must configure the system so that the SIP endpoints must authenticate with a username and password


CME1(config)# voice register global

CME1(config-register-global)# mode cme

CME1(config-register-global)# source-address port 5060

CME1(config-register-global)# authenticate register



Related Information


Level 8
Level 8

Nice Examples...

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: