Solved

Cisco 2901 line 2 port 2002

Posted on 2014-01-03
4
3,036 Views
Last Modified: 2014-01-03
I have a vulnerability scan performed by an outside vendor. My Cisco 2901 keeps getting flagged for having port 2002 open, which is a common port for some worms or something.

After doing some research I think that port 2002 is associated with line 2. Does anyone know how to close/remove this port and make some changes to line 2 so this port doesnt show up on my vuln scans?? Thanks so much for any help.

line 2
 no activation-character
 no exec
 transport preferred none
 transport input all
 transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
 stopbits 1
0
Comment
Question by:cb_it
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 11

Expert Comment

by:Miftaul
ID: 39753816
We can not close only port 2002 on Line2.

Either we have to disable line2 completely or limit access to it defining an access-list.

Please check This
0
 

Author Comment

by:cb_it
ID: 39753824
Thanks for the quick reply. I dont think I'm using line 2, how would I find out if I'm using it. How would I disable it?
0
 
LVL 11

Accepted Solution

by:
Miftaul earned 500 total points
ID: 39753850
"Show Run" output will display the Line 2 configuration.
"Show Line" displays Line2 to details.

To disable Line 2 completely.
R1(config)#line 2
R1(config-line)#transport input none
R1(config-line)#end

Open in new window

Your config will look like
line 2
 transport input none

Open in new window

0
 

Author Comment

by:cb_it
ID: 39753886
That worked, thanks very much for the help. I'm familiar with all of those commands but wasnt sure it would be that simple for line 2. I was not that familiar with line 2. Thanks again!
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Lotus Notes – formerly IBM Notes – is an email client application, while IBM Domino (earlier Lotus Domino) is an email server. The client possesses a set of features that are even more advanced as compared to that of Outlook. Likewise, IBM Domino is…
After hours on line I found a solution which pointed to the inherited Active Directory permissions . You have to give/allow permissions to the "Exchange trusted subsystem" for the user in the Active Directory...
In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…
how to add IIS SMTP to handle application/Scanner relays into office 365.
Suggested Courses
Course of the Month10 days, 15 hours left to enroll

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question