Solved

Ghost Calls on Cisco Video Conference System

Posted on 2016-08-11
5
39 Views
Last Modified: 2016-10-25
I had this question after viewing Cisco Access-List Ghost calls.

I get a lot of anonymous calls on my Cisco Video Conferencing System(SX20, SX80, C90)  Is there a way to block these calls.

Currently, all I can do is to set the systems to DnD when I am in a VC Call.  But when the VC is idle, we get about 50 - 100 anonymous calls per day.
0
Comment
Question by:Antzs
  • 2
  • 2
5 Comments
 
LVL 3

Expert Comment

by:Steven Roman
ID: 41753140
Hello,

You would have to either

A: Sounds like a Cisco CUCM, work with Telco on Blocking numbers if they are repeat numbers.

B: Work on your Voice Gateway and configure translates and such to block the numbers yourself.  Not 100% but works.  Better if your Gateway is H.323.  MGCP less limited as it is controlled yb CUCM.

Hope this helps.

Thanks
0
 
LVL 5

Author Comment

by:Antzs
ID: 41755822
My systems are all H.323 and they are all independent of each other.  They are connected directly to an internet connection with a public IP address.

I dont have a voice gateway which I can use to configure any blocking.  

Thanks for the suggestions anyway.
0
 
LVL 22

Expert Comment

by:eeRoot
ID: 41769713
Using an ACL or firewall to block unwanted traffic would be the best option.  Do you have a managed switch, router, or firewall between the conferencing system and the internet connection?
0
 
LVL 5

Author Comment

by:Antzs
ID: 41769716
No I don't.  The VC is directly connected to an internet connection and it is configured with a public IP address.  This is because we have consultants company call from different parts of the world and having a public ip makes it easy for them to call.

I do have a Cisco VCS in my Data Center but even registering it on the VCS does not help with the spam calls.
0
 
LVL 22

Accepted Solution

by:
eeRoot earned 500 total points
ID: 41771189
Does your system have an option for setting up a  basic passcode for access?  If not, you can try setting up the automated intrusion protection (see page 25 on this doc)

http://www.cisco.com/c/dam/en/us/td/docs/telepresence/infrastructure/vcs/admin_guide/Cisco-VCS-Administrator-Guide-X8-6.pdf
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Tired of waiting for your show or movie to load?  Are buffering issues a constant problem with your internet connection?  Check this article out to see if these simple adjustments are the solution for you.
What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now