We are running our head office on CUBE with 100session sip calls with UCM environment..Recently discovered that there is no security at sip provider side and hackers are hitting lot of traffic on CUBE interface so I was wondering what is the best practice security configuration to prevent rest of traffic on interface other than SIP traffic.
Any sugguestions and sample configuration will be great help and appricatiated please.
We tested by telnet public IP and ports and it is quite very open though.
CUBE is not behind firewall.10Meg Internet straight from provider to CUBE.
description *** SIP Interface To Provider ***
ip address 2XX.XXX.XX.XX 255.255.255.XXX PUBLIC IP
You have reached the Cisco Logistics Support Center.. To Check Status of
your RMA, visit Product Returns & Replacements (RMA). Need help? Contact
us by Phone or Email. North Americas Phone: 1800 553 2447 Option 4
Email: email@example.com Europe Phone: +3...
The short answer is that you don't.... That isn't entirely true while at
the same time it kind of is, but for the most part you don't configure
the softkeys. You enable or disable them via TCL. Here is the long
answer. Be sure to read the whole thing or e...
Topology: IP Phone > Switches > Microsoft NPS setup to forward 802.1x
proxy to > ISE 2.1 patch 3 Authentication: EAP-TLS using Cisco MIC SANs
Phone Models 802.1X support? 802.1x flavor Addtl Comment EAP-MD5 EAP-TLS
Cisco 3905 Y Y N Cisco 6911 Y Y N Cisco ...