Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Cisco 2901 line 2 port 2002

Posted on 2014-01-03
4
Medium Priority
?
3,148 Views
Last Modified: 2014-01-03
I have a vulnerability scan performed by an outside vendor. My Cisco 2901 keeps getting flagged for having port 2002 open, which is a common port for some worms or something.

After doing some research I think that port 2002 is associated with line 2. Does anyone know how to close/remove this port and make some changes to line 2 so this port doesnt show up on my vuln scans?? Thanks so much for any help.

line 2
 no activation-character
 no exec
 transport preferred none
 transport input all
 transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
 stopbits 1
0
Comment
Question by:cb_it
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 11

Expert Comment

by:Miftaul
ID: 39753816
We can not close only port 2002 on Line2.

Either we have to disable line2 completely or limit access to it defining an access-list.

Please check This
0
 

Author Comment

by:cb_it
ID: 39753824
Thanks for the quick reply. I dont think I'm using line 2, how would I find out if I'm using it. How would I disable it?
0
 
LVL 11

Accepted Solution

by:
Miftaul earned 2000 total points
ID: 39753850
"Show Run" output will display the Line 2 configuration.
"Show Line" displays Line2 to details.

To disable Line 2 completely.
R1(config)#line 2
R1(config-line)#transport input none
R1(config-line)#end

Open in new window

Your config will look like
line 2
 transport input none

Open in new window

0
 

Author Comment

by:cb_it
ID: 39753886
That worked, thanks very much for the help. I'm familiar with all of those commands but wasnt sure it would be that simple for line 2. I was not that familiar with line 2. Thanks again!
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

After hours on line I found a solution which pointed to the inherited Active Directory permissions . You have to give/allow permissions to the "Exchange trusted subsystem" for the user in the Active Directory...
There are times when we need to generate a report on the inbox rules, where users have set up forwarding externally in their mailbox. In this article, I will be sharing a script I wrote to generate the report in CSV format.
In this video we show how to create an Address List in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Organization >> Ad…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question