Solved

Need to block offnet call transfers - Cisco Callmanager Express

Posted on 2010-08-12
2
860 Views
Last Modified: 2012-08-13
Please excuse my ignorance but I have a client with Callmanager Express and Unity VM? Someone is routing calls through it to Jamaica and I want to block the ability to transfer calls outside of the system. I think someone is calling in and then routing back out through external transfer but I am not sure. Under the call log it reports Originating Number =       918765628831 Terminating number = 918768778631. I found there is a setting to block offNet to Offnet Transfer service paramenter, but it says to go to the Cisco CallManager Administration, this is where I am lost. I have an IP and link to Unity, but I think that is just for VM, not the Callpilot module or interface? I will perform a netscan but what is the normal method to get into CM administration?

http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/admin/4_1_3/ccmfeat/fsxfer.html#wp1048448

http://www.cisco.com/en/US/docs/voice_ip_comm/cucme/gui/user/guide/cmegui_user.pdf

I am not able to find or log into Cisco Unified Call Manager Express GUI to make this change, if in fact, that is where I should do so.



Thanks in Advance
Jason
0
Comment
Question by:ccpd
  • 2
2 Comments
 
LVL 9

Accepted Solution

by:
Alex Bahar earned 500 total points
ID: 33512064
Marking calls as "off net" is a Call Manager feature.
On call manager express you need to use COR lists to manage Class Of Restrictions. You can simply permit "only" IP phones to make PSTN calls. This will deny PSTN to PSTN, and Unity to PSTN calls.
http://www.cisco.com/en/US/tech/tk652/tk90/technologies_configuration_example09186a008019d649.shtml
http://www.cisco.com/en/US/docs/voice_ip_comm/uc_system/UC7.0.1/iptsmb_system_arch/medium/voicemail_unified_msging/RCvmmCUE.pdf
0
 
LVL 9

Expert Comment

by:Alex Bahar
ID: 34172296
Did you have a chance to try the COR list?
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
IP Phones 5 71
Prioritize voice on Cisco ASA? 4 61
MItel 3300 Forward Voicemail to Office 365 1 78
CISCO IP phone 7940 Series 10 49
In my office we had 10 Cisco 7940G IP phones that were useless as they were showing PROTOCOL APPLICATION INVALID when started. I searched through Google and worked for a week continuously on those phones, and finally got them working. This is a di…
Hey there Heard about jingle, the add on for XMPP that enables point to point audio between two XMPP clients. No server config necessary. Actually quite a cool feature. However, how good is it if you can not use those voice capabilities to do a P…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now