While not technically a security hole, or a problem with the hardware/software, it's more of a configuration issue. As mentioned in other forum threads on ISDN Toll Fraud, there are different ways of preventing this, and a single rule is not always enough to fully prevent these types of issues. The solution you have provided may work in your environment, but will not in many others. For some good examples of how to do it, see Paulo's posts in this ISDN thread.
Please remember to rate responses and to mark your question as answered if appropriate.
SIP traces provide key information in troubleshooting SIP Trunks, SIP
endpoints and other SIP related issues. Even though these traces are in
clear text, these texts can be gibberish unless you understand fully
what they mean. This document attempts to br...
Please find the attached HTML document, download and open it on your PC.
This provides an easy to use form where you simply answer a few
questions and it will render the proper jabber-config.xml file for you
to copy/paste. There is built in logic to verif...
[toc:faq]CUCM Database Replication is an area in which Cisco customers
and partners have asked for more in-depth training in being able to
properly assess a replication problem and potentially resolve an issue
without involving TAC. This document discusse...