Home > UCXN > UCXN – Stopping Toll Fraud and Breaches of a Unity Connection System

UCXN – Stopping Toll Fraud and Breaches of a Unity Connection System

Hi All

The following restriction tables can be applied to a Unity Connection system to ensure that the UCXN system can’t make outbound calls, this is key to reducing malicious activities like Toll Fraud or IDD calling without IDD access on a Cisco Unity Connection deployment.

Please note the default parameters for these restrictions in most deployments are  using US numbering plans therefore the below restrictions apply for all Australian based sources.

Default Transfer – Call Patterns (in order)
0001* Block
01* Block
002* Block
003* Block
005* Block
007* Block
* Allow
Default FAX – Call Patterns (in order)
0001* Block
01* Block
002* Block
003* Block
005* Block
007* Block
* Allow
Default outdial – Call Patterns (in order)
0001* Block
01* Block
002* Block
003* Block
005* Block
007* Block
* Allow
Default Alt ext – Call Patterns (in order)
0001* Block
01* Block
002* Block
003* Block
005* Block
007* Block
* Allow
CS Default system Transfer – Call Patterns (in order)
0001* Block
01* Block
002* Block
003* Block
005* Block
007* Block
* Allow

Applying these restriction does have some drawbacks, the main one being that users of the system cant make outbound transfers through the system however most clients and or deployments I have seen dont want this as a feature.

Enjoy….

The Voice Man

Advertisements
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: