X25 X25 allows an intruder to possibly gain access via an X25 network rather than through TCP/IP. This operation checks to see if an X25 gateway is running. Risk: Low
X25 allows an intruder to possibly gain access via an X25 network rather than through TCP/IP. This operation checks to see if an X25 gateway is running.
Risk: Low