Moderators: gerski, enjay, williamconley, Op3r, Staydog, gardo, mflorell, MJCoate, mcargile, Kumba, Michael_N
sip set debug peer PEERNAME
ngrep-sip IPADDRESS
ngrep-sip PHONENUMBER
[TESTCPD]
host=172.24.98.13
username=paraxip
secret=paraxip
disallow=all
allow=ulaw
type=peer
insecure=very
outboundproxy=172.24.98.86
[paraxip]
;canreinvite=no
type=peer ; Friends place calls and receive calls
context=vicidial ; Context for incoming calls from this user
secret=paraxip
host=dynamic ; This peer register with us
dtmfmode=rfc2833 ; Choices are inband, rfc2833, or info
username=paraxip ; Username to use in INVITE until peer registers
; Normally you do NOT need to set this parameter
disallow=all
allow=ulaw ; dtmfmode=inband only works with ulaw or alaw!
;progressinband=no ; Polycom phones don't work properly with "neve$
# Sangoma Netborder Engine for Call Analyzer configuration file
# Do not use leading zeros in IP address numbers when using dot notation or they
# will be interpreted as octal numbers
netborder.sip.userAgent.IPAddress=INADDR_ANY:5063/udp
# Primary IP address must be set if multiple IP addresses are available on host
# Do not use leading zeros in numbers or they will be interpreted as octal numbers
netborder.net.primaryIPAddress=172.24.98.86
netborder.cpa.runtime.model.country=usa
# Adjust to the number of logical CPUs on the system minus 1
# For a Dual core processor this should be equal to 1
netborder.cpa.runtime.numThreads=3
# Which port range to use for RTP & RTCP transport (should be greater than
# twice the number of maximum simultaneous calls allowed).
netborder.media.rtp.udpPortRange=19000:22000
# recorder settings
netborder.cpa.runtime.recordAudio=true
netborder.recorder.outputDirectory=logs/call-logs
netborder.recorder.outputDirectory.dateTime=true
# Set to true to use a=sendrecv in initial SDP offer instead of default a=recvonly
netborder.cpa.runtime.sendrecvSDPOffer=false
# Ordered list of codecs that will be offered for the first phase of the call (where Answering machine detection is performed)
#
# Only the two variants of G.711 (mu-law: "ulaw" and A-law: "alaw") are supported, so the valid combinations are:
#
# ulaw,alaw (Default)
# alaw,ulaw
# ulaw
# alaw
#
netborder.rtp.encodingList=ulaw,alaw
################################################################################
# Internal parameters
netborder.LicenseFile=config/call-analyzer-license.txt
netborder.cpa.package.filename=data/cpa-package.dat
netborder.media.toneDB.dir=data/tone-db
netborder.media.toneDB.schemaFile=tone-set.rng
# Deactivate CPU monitoring
netborder.system.cpu.monitor.monitoringPeriodInMs=0
# Use the pychecker module to check for Python errors (messages output to stdout)
netborder.python.useChecker=false
# NetBorder application class
netborder.sip.ua.python.appClass=cpa.Engine
# Name of the media engine to use
netborder.sip.mediaLibName=netborder-cpa
# Use to generate a dump file if the program crashed
netborder.infra.coreDump.writeOnCrash=true
netborder.infra.coreDump.writeOnCrash.path=logs/call-analyzer-engine.dmp
# Shutdown
netborder.killTimeoutSec=40
netborder.exitTimeoutSec=45
# END - Internal parameters
################################################################################
# Paraxip Netborder Call Analyzer Service configuration file
# Do not use leading zeros in IP address numbers when using dot notation or
# they will be interpreted as octal numbers
netborder.sip.userAgent.IPAddress=INADDR_ANY:5060/udp
# Primary IP address must be set if multiple IP addresses are available on host
# Do not use leading zeros in numbers or they will be interpreted as octal numbers
netborder.net.primaryIPAddress=172.24.98.86
# NetBorder application class
# Call Analysis performed on callee when cpd=on present in request URL
# Possible values:
# cpa.CallAnalyzerAsOutboundProxy
# cpa.CallAnalyzerGenesysOCS
netborder.sip.ua.python.appClass=cpa.CallAnalyzerAsOutboundProxy
################################################################################
# Internal parameters
# Port used for Web Service OAM interface
netborder.oam.webServicePort=18082
# Deactivate CPU monitoring
netborder.system.cpu.monitor.monitoringPeriodInMs=0
# Use the pychecker module to check for Python errors (messages output to stdout)
netborder.python.useChecker=false
# Use to generate a dump file if the program crashed
netborder.infra.coreDump.writeOnCrash=true
netborder.infra.coreDump.writeOnCrash.path=logs/call-analyzer.dmp
# Shutdown
netborder.killTimeoutSec=40
netborder.exitTimeoutSec=45
# END - Internal parameters
################################################################################
vici-ast1:~ # ngrep-sip 6269171754
interface: any
filter: (ip) and ( port 5060 )
match: 6269171754
#####################################################################################################
U 2013/03/20 14:04:02.636885 172.24.98.84:5060 -> 172.24.98.86:5060
INVITE sip:991116269171754@172.24.98.13;cpd=on SIP/2.0
Via: SIP/2.0/UDP 172.24.98.84:5060;branch=z9hG4bK3bbd0d01;rport
From: "V3201404020000168264" <sip:9999999999@172.24.98.84>;tag=as037d77e7
To: <sip:991116269171754@172.24.98.13;cpd=on>
Contact: <sip:9999999999@172.24.98.84>
Call-ID: 6f27b4bd2787e2dc49b817900bbe8710@172.24.98.84
CSeq: 102 INVITE
User-Agent: Asterisk PBX
Max-Forwards: 70
Remote-Party-ID: "V3201404020000168264" <sip:9999999999@172.24.98.84>;privacy=off;screen=no
Date: Wed, 20 Mar 2013 19:04:02 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO
Supported: replaces
Content-Type: application/sdp
Content-Length: 211
v=0
o=root 1893 1893 IN IP4 172.24.98.84
s=session
c=IN IP4 172.24.98.84
t=0 0
m=audio 19198 RTP/AVP 0 101
a=rtpmap:0 PCMU/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-16
a=ptime:20
a=sendrecv
#
U 2013/03/20 14:04:02.726119 172.24.98.86:5060 -> 172.24.98.84:5060
SIP/2.0 100 Trying
Via: SIP/2.0/UDP 172.24.98.84:5060;branch=z9hG4bK3bbd0d01;rport=5060
To: <sip:991116269171754@172.24.98.13;cpd=on>
From: "V3201404020000168264" <sip:9999999999@172.24.98.84>;tag=as037d77e7
Call-ID: 6f27b4bd2787e2dc49b817900bbe8710@172.24.98.84
CSeq: 102 INVITE
Content-Length: 0
###############
U 2013/03/20 14:04:05.975359 172.24.98.86:5060 -> 172.24.98.84:5060
SIP/2.0 183 Session Progress
Via: SIP/2.0/UDP 172.24.98.84:5060;branch=z9hG4bK3bbd0d01;rport=5060
Contact: <sip:NetBorder@172.24.98.86:5060>
To: <sip:991116269171754@172.24.98.13;cpd=on>;tag=b5569369
From: "V3201404020000168264"<sip:9999999999@172.24.98.84>;tag=as037d77e7
Call-ID: 6f27b4bd2787e2dc49b817900bbe8710@172.24.98.84
CSeq: 102 INVITE
Content-Length: 0
####################################################################################################
U 2013/03/20 14:04:50.975862 172.24.98.86:5060 -> 172.24.98.84:5060
SIP/2.0 408 Request Timeout
Via: SIP/2.0/UDP 172.24.98.84:5060;branch=z9hG4bK3bbd0d01;rport=5060
To: <sip:991116269171754@172.24.98.13;cpd=on>;tag=b5569369
From: "V3201404020000168264"<sip:9999999999@172.24.98.84>;tag=as037d77e7
Call-ID: 6f27b4bd2787e2dc49b817900bbe8710@172.24.98.84
CSeq: 102 INVITE
Content-Length: 0
CPD-Result: No-Answer
X-Netborder-Detailed-CPD-Result-v2-0: No-Answer
X-Netborder-Call-ID: 1363806242-312500-20924-68
#
U 2013/03/20 14:04:50.976270 172.24.98.84:5060 -> 172.24.98.86:5060
ACK sip:991116269171754@172.24.98.13;cpd=on SIP/2.0
Via: SIP/2.0/UDP 172.24.98.84:5060;branch=z9hG4bK3bbd0d01;rport
From: "V3201404020000168264" <sip:9999999999@172.24.98.84>;tag=as037d77e7
To: <sip:991116269171754@172.24.98.13;cpd=on>;tag=b5569369
Contact: <sip:9999999999@172.24.98.84>
Call-ID: 6f27b4bd2787e2dc49b817900bbe8710@172.24.98.84
CSeq: 102 ACK
User-Agent: Asterisk PBX
Max-Forwards: 70
Remote-Party-ID: "V3201404020000168264" <sip:9999999999@172.24.98.84>;privacy=off;screen=no
Content-Length: 0
vici-ast1:~ # iptables --list
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate ESTABLISHED
ACCEPT icmp -- anywhere anywhere ctstate RELATED
input_ext all -- anywhere anywhere
LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix "SFW2-IN-ILL-TARGET "
DROP all -- anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix "SFW2-FWD-ILL-ROUTING "
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain forward_ext (0 references)
target prot opt source destination
Chain input_ext (1 references)
target prot opt source destination
DROP all -- anywhere anywhere PKTTYPE = broadcast
ACCEPT icmp -- anywhere anywhere icmp source-quench
ACCEPT icmp -- anywhere anywhere icmp echo-request
reject_func tcp -- anywhere anywhere tcp dpt:ident ctstate NEW
LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:httpflags: FIN,SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix "SFW2-INext-ACC-TCP "
ACCEPT tcp -- anywhere anywhere tcp dpt:http
LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:httpflags: FIN,SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix "SFW2-INext-ACC-TCP "
ACCEPT tcp -- anywhere anywhere tcp dpt:http
LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:httpsflags: FIN,SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix "SFW2-INext-ACC-TCP "
ACCEPT tcp -- anywhere anywhere tcp dpt:https
LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:sshflags: FIN,SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix "SFW2-INext-ACC-TCP "
ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
ACCEPT udp -- anywhere anywhere udp dpt:iax
ACCEPT udp -- anywhere anywhere udp dpt:sip
ACCEPT udp -- anywhere anywhere udp dpts:ndmp:dnp
ACCEPT udp -- anywhere anywhere udp dpt:http
ACCEPT udp -- anywhere anywhere udp dpt:https
DROP all -- anywhere anywhere PKTTYPE = multicast
DROP all -- anywhere anywhere PKTTYPE = broadcast
LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcpflags: FIN,SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix "SFW2-INext-DROP-DEFLT "
LOG icmp -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix "SFW2-INext-DROP-DEFLT "
LOG udp -- anywhere anywhere limit: avg 3/min burst 5 ctstate NEW LOG level warning tcp-options ip-options prefix "SFW2-INext-DROP-DEFLT "
DROP all -- anywhere anywhere
Chain reject_func (1 references)
target prot opt source destination
REJECT tcp -- anywhere anywhere reject-with tcp-reset
REJECT udp -- anywhere anywhere reject-with icmp-port-unreachable
REJECT all -- anywhere anywhere reject-with icmp-proto-unreachable
Users browsing this forum: Bing [Bot], Google [Bot] and 130 guests