Finger
The finger service can allow remote users to find out who is logged into the router. It can provide sensitive information that includes valid login names for the router. Traditionally, finger services have served hackers much more than administrators. Therefore, finger should be disabled on all routers to prevent information leakage.
Finger can be easily disabled with the no service finger command. This command disables the router only from replying to finger requests; it doesn't block all finger requests into your network. To do that, you would need to use an ACL that blocks TCP port 79 inbound on all external interfaces. To keep the router itself from responding to finger requests, use these commands:
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.Router(config)#no service finger
Router(config)#^Z
Newer versions of IOS use the no ip finger command to disable finger. If the no service finger command doesn't work for you, try:
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.Router(config)#no ip finger
Router(config)#^Z