Direct Audits (IP, Dialup, VPN, Serial)

Direct Audits

Direct audits are any audits done remotely (or via Serial), this approach is often used

These audits can be carried out by MIT directly over Internet, VPN or Dial up from our network or directly on a customer network if UCentric is installed within their environment.

Installing within the customer environment and carrying out an audit via a screen-share, remote session or RDP/VPN, this option is often used when customers do not allow for direct access to their PBX platform over the internet/IP, have no VPN access or other security restrictions are in place.

Direct audits are also applicable for systems that do not support auditing via backup or extract. #

This section only contains details of systems that support direct audits, for systems that support backup only or our full supported list of vendors please visit either of the below sections:

Vendor

Model

Audit Method(s)

Ports Used (IP Audits Only)

Required Details

 

 

Vendor

Model

Audit Method(s)

Ports Used (IP Audits Only)

Required Details

 

 

Aastra/Mitel

MX-One/MD110

SSH, Modem

22

  • Modem/Dial-up details or IP Address

  • Engineer’s username/password

 

Alcatel

OmniPCX

SSH, Modem

22

  • Modem/Dial-up details or IP Address

  • Engineer’s username/password

 

Asterisk

FreePBX

SSH

22

  • IP Address

  • Engineer’s username/password

 

 

Avaya

 

CM, Definity

ASA and SSH

5022, 22

  • IP Address

  • Requires ASA login and optional SSH credentials for CM and VGW’s

 

 

 

IP Office

TFTP

69

  • IP Address/TFTP Details

  • Administrator username/password

 

Avaya / SDX

INDeX

Telnet / Modem

23

  • IP Address/Dial up details

  • Engineer’s username/password

 

Broadsoft

Broadworks

TCP/IP

2208

  • IP Address

 

GPT

BTeX

Modem

-

  • Modem/Dial up details

  • Engineer’s username/password

 

IBM/Siemens

ROLM, 9751

Modem

-

  • Modem/Dial up details

  • Engineer’s username/password

 

Intertel/Mitel

Axxess, 5000

HTTP and TCP/IP

80, 4000

  • IP address

  • Administrator username/password

 

Microsoft

Teams, Lync, Skype for Business,

PowerShell

-

  • Network administrator username/password

 

 

 

Mitel

 

3300, SX2000

MiVB (Non MSL)

Telnet, SSH, SNMP and TCP/IP

23, 22, 5022, 5023, 161

  • IP Address to Web Maintenance Console of Main Controller

  • Engineer’s username/password (that provides access to Web Maintenance Console)

 

Nortel (Avaya Blue)

Meridian, CS1K

rLogin, Telnet, Modem

513, 23

  • IP address or modem/Dial up details

  • Engineer’s username/password with all overlays read-only access

 

 

Siemens/Unify

HiPath, HiCom

File load

-

 

 

iSDX, Realitis

Telnet / Modem

23

  • Modem/Dial up details

  • Engineer’s username/password

 

 

Version Date Comment
Current Version (v. 6) Oct 18, 2023 15:01 Paul McGuinness
v. 5 Oct 13, 2023 10:19 Sean Millar
v. 4 Oct 13, 2023 10:18 Sean Millar
v. 3 Oct 06, 2022 16:28 Sean Millar
v. 2 Oct 06, 2022 16:04 Sean Millar
v. 1 Oct 06, 2022 14:56 Sean Millar