<div dir="ltr"><div><div>IOS 12.4, which is odd, since some of the other ones are v15<br><br></div>Here's the dial peer stuff on the 2800 router: (masked IPs)<br><br>dial-peer voice 300 voip<br> destination-pattern 1...<br> voice-class codec 1<br> session target ipv4:192.168.xx.yy<br> dtmf-relay h245-alphanumeric<br> fax-relay ecm disable<br> fax rate disable<br> no vad<br>!<br>dial-peer voice 301 voip<br> destination-pattern 4...<br> voice-class codec 1<br> session target ipv4:192.168.xx.yy<br> dtmf-relay h245-alphanumeric<br> fax-relay ecm disable<br> fax rate disable<br> no vad<br><br></div>There are a couple others, but similar, just diff destination-pattern<br><br><br><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Sun, Sep 11, 2016 at 11:48 AM, Nick Britt <span dir="ltr"><<a href="mailto:nickolasjbritt@gmail.com" target="_blank">nickolasjbritt@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi David, <div><br></div><div>Can I ask Which version of IOS you are using?</div><div><br></div><div>Also could you post your incoming dial peer configuration or are you just using the default DP 0?</div><div><br></div><div>Ive experienced a similar issue before (luckily I didn't configure this particular deployment)</div><div><br></div><div>Before IOS 15 (I believe) direct in ward dial was not applied to the default dial peer. This allows people to call in on an unnnallocated number with in the DID range and receive a dial tone. (Check it out quite scary)</div><div><br></div><div>The resolution was to apply the command direct in wars dial to all incoming dial peers.</div><div><br></div><div>I will try and dig out the link from Cisco.<span></span></div><div class="HOEnZb"><div class="h5"><div><br></div><div><br><br>On Sunday, 11 September 2016, David Zhars <<a href="mailto:dzhars@gmail.com" target="_blank">dzhars@gmail.com</a>> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">So yesterday I was alerted by our landline company that some of our phone numbers that come in POTS on an H323 router, we being used for phone fraud. I am wondering how this happens with an H323 router (I am familiar with someone hacking Unity and setting up actions to route to Jamaica once someone leaves a voicemail or similar).<div><br></div><div>The odd part is that these numbers are almost NEVER used for calling out, unless the user presses a 7 for an outbound line (versus an 8 which puts the call out on ISDN).</div><div><br></div><div>I found a link on how to disable OffNet calling in UCM, but should I instead look at securing the H323 router? Or does the call blocking rule need to be done in UCM?</div><div><br></div><div>Thanks for any enlightenment you can provide.</div><div><br></div><div>PS- Client is in USA, call fraud to Jamaica which does not require a country code, so harder to block.</div></div>
</blockquote></div><br><br></div></div><span class="HOEnZb"><font color="#888888">-- <br>- Nick<br><br>
</font></span></blockquote></div><br></div>