I have IP Phones with model 7945G and Cisco Unified Communications Manager versoin 7.1. Is there any way to lock every phone with a password dedicated to the owner of the phone so that no one not authorized to use the phone can make an outgoing calls, but at the same time the phone can still receive calls?
... View more
I have a router with IOS version 12.4 (22). why the telnet is still listening at the router even I disable it in the "Line" configuration: line vty 0 1 access-class 23 in exec-timeout 15 0 password cisco logging synchronous transport input ssh line vty 2 4 access-class 23 in exec-timeout 15 0 privilege level 15 password cisco logging synchronous transport input ssh line vty 5 15 access-class 23 in exec-timeout 15 0 password cisco logging synchronous transport input ssh When I issue the command "s how control-plane host open-ports" , the result be like this: Prot Local Address Foreign Address Service State tcp *:22 *:0 SSH-Server LISTEN tcp *:23 *:0 Telnet LISTEN tcp *:22 X.X.X.X:53964 SSH-Server ESTABLIS tcp *:443 *:0 HTTP CORE LISTEN tcp *:443 *:0 HTTP CORE LISTEN udp *:58357 Y.Y.Y.Y:162 IOS host service ESTABLIS udp *:123 *:0 NTP LISTEN udp *:4500 *:0 ISAKMP LISTEN udp *:161 *:0 IP SNMP LISTEN udp *:162 *:0 IP SNMP LISTEN I used also the Port-filter Policy feature of the Control Plane Protection as below: ! class-map type port-filter match-all Telnet_Port match port tcp 23 ! ! policy-map type port-filter Block_Telnet class Telnet_Port drop ! ! control-plane host service-policy type port-filter input Block_Telnet ! but the result still the same! Note: By doing all above, the telnet is not allowed on the router, but in addition, the company's policy states that the listening to the telnet port is not allowed!! Please I need your help to prevent the router from "LISTEN" to the Telnet Port (23). Thanks in advance
... View more