04-12-2009 10:07 PM - edited 03-15-2019 05:26 PM
04-12-2009 11:22 PM
You can disable forwarding vvlan packets from phone to pc by going to ccm ip phone and changing the option there to disable.
What exactly you want to secure?
04-13-2009 03:12 AM
My security have found this vulnerability for CUCM:
TFTP file detection (Cisco CallManager)
The remote host has a TFTP server installed that is serving one or more Cisco CallManager files.
These files do not themselves include any sensitive information, but do identify the TFTP server as being part of a Cisco CallManager environment. The CCM TFTP server is an essential part of providing VOIP handset functionality, so should not be exposed to unnecessary scrutiny.
Solution: If it is not required, disable or uninstall the TFTP server.
Otherwise restrict access to trusted sources only.
Risk factor: Low
Nessus ID : 19507 <http://www.nessus.org/plugins/index.php?view=single&id=19507>
When I had consulted from Unified expert he said that I can restrict the access in CUCM with making Voice VLAN securer.
But I don't understand how I can do it.
Can somebody explain how I can do something like that I was explained above?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide