Is there any specific CF reader needed? Or any generic one will do?
Also you can block port 25 via the internal firewall on the webpage/diagnostics/firewall of the system. Be careful to not lock yourself out by accident. Make your first rule to allow all on the local network, Second rule your static IP From your office and then last the block 25 tcp for all.
After typing the first rule with seq 1 it will automatically become rule 3. rule 1/2 are auto generated by the system.
ex.
1 192.168.1.0 255.255.255.0 blank blank all allow
4 24.222.2.222 255.255.255.128 blank blank all allow
5 blank 0.0.0.0 25 25 tcp block
Yes be very careful with this. You must specify a protocol when blocking port 25. Do not use (all) set it to TCP. When you get locked out you can no longer connect via the Ethernet port. It's serial cable and a call to Mitel support to get that opened back up.
[/quote]
Grussel is correct,
You want to use caution when setting up these rules. I find its best practice to have my guys NEVER make their first rule a block. Always allow the pbx's local network, followed by your public IP (remote access public), Also any other public networks that you may need. After that then make your block rule.
On all of my systems that are being attacked I've been blocking 22,25,80,443,4000 tcp. Using netstat I can see that there are multiple connections to these ports from the attackers IP.
Resetting the IP tables via usb cable to the front of the HX isn't to complicated. Just need to make sure you have the drivers, connect via com and run the command "reset_iptables".