This are the unwanted users trying to make mailicious call through the VCS-exp.
check page 40 of below document to restrict the calls.
the example demonstrates call restriction to ISDN gateway but you can built addtional search rules to block this users.
also if you search the support forum you willl get cpl script which also can be used to block this users.
Alok is definitely right and the deployment guide is what I would also have linked.
There are a some threads around that here in the forum, its worth searching/browsing for them.
Some additional thoughts. Most scans are done today by sip/udp. New VCS setups have that disabled
by default as its not used in most TelePresence/Videoconferencing setups, so it would most likely not
harm you anyhow.
If you do not have an exposed isdn gw these calls just fill up your log and if you have an endpoint
which listens to that address it might get annoying if that rings all the time.
(that also happens with reachable endpoints on public ips)
If you have an ISDN gateway you definitly need to check how to secure it as it can generate high
costs if someone finds a way to dial out to premium numbers or expensive international destinations.
Besides that, what can affect you is that they might end up in some kind of (wanted or not) denial of service (dos)
as it might fill up your mcu or that some loop or many call attempts eat up your call licenses.
You should check why you get a call loop. Thats often caused by matching any search rules in both
directions, additional rewrites by transforms/searchrules, ...
Please remember to rate helpful responses and identify
I agree with Alok and Martin.
You have to block call from Internet-->VCSe-->VCSc-->ISDN or another location which hasn't reached from Internet.
If you ISDN dail plan is dialing 0XX XXX XX XX for example, you have to configure a Search Rule in VCSe to block these calls. I mean, create the following rule:
Rule Name: "Block Call To ISDN"
Priority: "1 o 10" low is better to match in a first time
Source Name: "DefaultZone"
Mode: "Alias pattern match"
Pattern Type: "Regex"
Pattern String: "0\d+"
Pattern Behavior: "Replace"
Replace String: "Do-not-route-this-call"
On Successful Match: "Stop"
Target: "To Traversal Sever or VCSc"
You have to configure only the Alias that you want to reach from Internet.