Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Service detection --> Category: infos

Inter-Asterisk eXchange Protocol Detection Vulnerability Scan


Vulnerability Scan Summary
Checks if the remote system is running the IAX2 protocol

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote system is running a server that speaks the Inter-Asterisk
eXchange Protocol.

Description :

The Inter-Asterisk eXchange protocol (IAX2) is used by the Asterisk
PBX Server and other IP Telephony clients/servers to enable voice
communication between them.

See also :

http://en.wikipedia.org/wiki/IAX

Solution :

If possible, filter incoming connections to the port so that it is
used by trusted sources only.

Threat Level:

None

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.