How are incoming Allstar Link connections authenticated?
Authentication is done by verifying source and destination node number and IP address and the intrinsic security features of the IAX2 protocol. A table of valid Allstar nodes is periodically downloaded from one of several Allstar Link servers. No call will be connected unless the IAX2 call is completed without failure, and the calling node number, called node number, and source IP address all match what is in the table.