[asterisk-users] Cisco 7941G-GE with Asterisk and CTPSEP odyssee

Christophorus Laube christophorus.laube at SemanticEdge.de
Mon Jan 7 05:15:26 CST 2008


Update and revision:
I now downloaded the oldest gettable SIP firmware for 7941/61, i.e.
8.0.2. I always get the same behaviour. But I realized it never got to
the SIP image completely loaded status.
I bought this phone and it had - no wonder - an SCCP image installed.
When plugging that into an ethernet port the first thing it does is
requesting an IP address and afterwards the CTLSEP<mac>.tlv file. In the
status section I see an SCCP firmware entry. When I do a factory reset
(that should be the right way to get the SIP firmware on such a phone,
right?) it now loads the term41.default.loads and some other files and
then reboots and requests the CTLSEP<mac>.tlv file. The firmware entry
in the status section now says "term41.default.loads". Getting over this
CTLSEP step should bring the phone to load the SIP41XXX.loads file, I
assume. 
But as I am not getting over this step it stays in the
term41.default.loads step, unfortunately. 
Does that ring a bell to anyone? Does anyone of you have had the same
situation? In which state did you get the 7961G? SCCP? And how did you
manage to load SIP firmware onto it?

Christophorus
> I do have to answer to your suggestion of renaming the CTLSEP<mac>.tlv
> to SEP<mac>. The phone is still requesting CTLSEP<mac>.tlv and as it
> cannot find that it goes into a loop. I also let the phone do that the
> whole weekend so there should be no iterative process in requesting the
> files as I read in some howtos. Any further ideas?
> I also read that it is possible to connect and configure the phone by
> ssh. So after flashing the phone with a SIP image there should be some
> default username/password combination which I did not manage to find out
> yet. Does anyone know?
> I now am going to revert to an older release to try that. I will report
> any success as well as misses.
> Thanks again, Christophorus
> 
> > This should result in the same problem. The CTLSEP<mac> file is the
> > first that is requested on the TFTP server. But I am going to try that.
> > Regards and thanks,
> > 
> > Christophorus
> > > Try naming the empty file:
> > > SEP0019E7D16CD6.tlv
> > > 
> > > Not
> > > CTLSEP0019E7D16CD6.tlv
> > > 
> > > -----Original Message-----
> > > From: asterisk-users-bounces at lists.digium.com
> > > [mailto:asterisk-users-bounces at lists.digium.com] On Behalf Of
> > > Christophorus Laube
> > > Sent: Friday, January 04, 2008 10:26 AM
> > > To: Asterisk Users Mailing List - Non-Commercial Discussion
> > > Subject: Re: [asterisk-users] Cisco 7941G-GE with Asterisk and CTPSEP
> > > odyssee
> > > 
> > > Thanks for the hint. I just tried that although I only see my worries
> > > coming true: the CTLSEP<mac>.tlv file is the first one the phone
> > > requests when booting, no possibility to set something different as the
> > > SEP<mac>.cnf.xml should be loaded after the successful load of the CTL
> > > file. And thus the phone is looping with "Configuring IP" and CTLFile
> > > failure. Can I set this option by ssh?
> > > Thanks a lot and in advance,
> > > 
> > > Christophorus 
> > > > In your SEP<mac>.cnf.xml file look for the setting below and set it to
> > > > 0:
> > > > 
> > > > <deviceSecurityMode>0</deviceSecurityMode>
> > > > 
> > > > -----Original Message-----
> > > > From: asterisk-users-bounces at lists.digium.com
> > > > [mailto:asterisk-users-bounces at lists.digium.com] On Behalf Of Glenn
> > > Cobb
> > > > Sent: Friday, January 04, 2008 9:37 AM
> > > > To: 'Asterisk Users Mailing List - Non-Commercial Discussion'
> > > > Subject: Re: [asterisk-users] Cisco 7941G-GE with Asterisk and CTPSEP
> > > > odyssee
> > > > 
> > > > Here is a little more info...
> > > > 
> > > > I hooked up the 7971G-GE to my pc and grabbed this with tera-term. Its
> > > > the
> > > > console output during the CTL update process. I am using SIP70.8-3-3.
> > > > 
> > > > NOT 09:28:45.969295 DHCP: Restart - delay = 1
> > > > NOT 09:28:45.981198 DHCP: Sending Release...
> > > > NOT 09:28:49.000449 DHCP:  dhcpSendReq: status 0x12301000
> > > > NOT 09:28:49.001281 DHCP: Sending Request...
> > > > NOT 09:28:49.015673 DHCP: ACK received
> > > > NOT 09:28:49.016517 DHCP: Succeeded
> > > > NOT 09:28:49.058273 DHCP: IP Address -- 10.10.10.247
> > > > NOT 09:28:49.059129 DHCP: Subnet Mask - 255.255.255.0
> > > > NOT 09:28:49.059960 DHCP: Default Gwy -
> > > > NOT 09:28:49.073169 PAE: SIGIPCFG received...
> > > > NOT 09:28:49.075897 ESP: send ADMIN, logging = 1, shell = 0, ipconfig
> > > =
> > > > 1
> > > > WRN 09:28:49.120127 SECD: WARN:getCTLInfo: ** phone has no CTL
> > > > WRN 09:28:49.127292 SECD: WARN:getCTLInfo: ** phone has no CTL
> > > > NOT 09:28:49.140946 CDP-D: catchipcfg getdhcpinfo IP: a0a0af7  Chng:1
> > > > NOT 09:28:49.152532 tftpClient: request server 0 ---> 10.10.10.10
> > > > NOT 09:28:49.178685 tftpClient: request server 1 --->
> > > > NOT 09:28:49.201261 tftpClient: request server 0 ---> 10.10.10.10
> > > > NOT 09:28:49.204518 ESP: server 0 = 10.10.10.10
> > > > NOT 09:28:49.228784 tftpClient: request server 1 --->
> > > > NOT 09:28:49.233253 ESP: server 1 =
> > > > NOT 09:28:49.319960 SECD: updateCTL: starting CTL update
> > > > NOT 09:28:49.323284 SECD: ctlRequestFile: Socket 7 connected to
> > > > /usr/tmp/tftpClientSock
> > > > NOT 09:28:49.324525 SECD: ctlRequestFile: Request
> > > CTLSEP0019E7D16CD6.tlv
> > > > NOT 09:28:49.327942 tftpClient: tftp request rcv'd from
> > > > /usr/tmp/ctlSock,
> > > > srcFile = CTLSEP0019E7D16CD6.tlv, dstFile = /usr/tmp/CTLFile.tlv
> > > > NOT 09:28:49.331598 tftpClient: auth server - tftpList[0] =
> > > 10.10.10.10
> > > > NOT 09:28:49.332439 tftpClient: look up server - 0
> > > > WRN 09:28:49.335498 SECD: WARN:lookupCTL: CTL update in progress, no
> > > old
> > > > CTL, assume TFTP 10.10.10.10 NONSECURE
> > > > NOT 09:28:49.339140 tftpClient: secVal = 0xa
> > > > NOT 09:28:49.340260 tftpClient: 10.10.10.10 is a NONsecure server
> > > > NOT 09:28:49.341141 tftpClient: temp retval = SRVR_NONSECURE, keep
> > > > looking
> > > > NOT 09:28:49.341897 tftpClient: retval = 10
> > > > NOT 09:28:49.342678 tftpClient: Non secure file requested
> > > > NOT 09:28:49.356155 TFTP: [26]:Requesting CTLSEP0019E7D16CD6.tlv from
> > > > 10.10.10.10
> > > > NOT 09:28:49.359594 TFTP: [26]:Finished --> rcvd 1 bytes
> > > > NOT 09:28:49.363943 SECD: ctlRequestFile: tftp Status 0 rcv'd
> > > > ERR 09:28:49.365631 SECD: ctlVerifyFile: CTL file too small:
> > > > /usr/tmp/CTLFile.tlv
> > > > NOT 09:28:49.367522 SECD: updateCTL: finished CTL update
> > > > ERR 09:28:49.368469 SECD: EROR:updateCTL: ** had NO CTL and CTL
> > > > processing
> > > > FAILED** ctl-err 12 (file is too small)
> > > > NOT 09:28:53.768028 SECD: updateCTL: starting CTL update
> > > > NOT 09:28:53.772517 SECD: ctlRequestFile: Socket 7 connected to
> > > > /usr/tmp/tftpClientSock
> > > > NOT 09:28:53.773673 SECD: ctlRequestFile: Request
> > > CTLSEP0019E7D16CD6.tlv
> > > > NOT 09:28:53.776093 tftpClient: tftp request rcv'd from
> > > > /usr/tmp/ctlSock,
> > > > srcFile = CTLSEP0019E7D16CD6.tlv, dstFile = /usr/tmp/CTLFile.tlv
> > > > NOT 09:28:53.778770 tftpClient: auth server - tftpList[0] =
> > > 10.10.10.10
> > > > NOT 09:28:53.779616 tftpClient: look up server - 0
> > > > WRN 09:28:53.782887 SECD: WARN:lookupCTL: CTL update in progress, no
> > > old
> > > > CTL, assume TFTP 10.10.10.10 NONSECURE
> > > > NOT 09:28:53.786443 tftpClient: secVal = 0xa
> > > > NOT 09:28:53.787250 tftpClient: 10.10.10.10 is a NONsecure server
> > > > NOT 09:28:53.788022 tftpClient: temp retval = SRVR_NONSECURE, keep
> > > > looking
> > > > NOT 09:28:53.788777 tftpClient: retval = 10
> > > > NOT 09:28:53.789616 tftpClient: Non secure file requested
> > > > NOT 09:28:53.802285 TFTP: [19]:Requesting CTLSEP0019E7D16CD6.tlv from
> > > > 10.10.10.10
> > > > NOT 09:28:53.805356 TFTP: [19]:Finished --> rcvd 1 bytes
> > > > NOT 09:28:53.809435 SECD: ctlRequestFile: tftp Status 0 rcv'd
> > > > ERR 09:28:53.816549 SECD: ctlVerifyFile: CTL file too small:
> > > > /usr/tmp/CTLFile.tlv
> > > > NOT 09:28:53.818805 SECD: updateCTL: finished CTL update
> > > > ERR 09:28:53.819756 SECD: EROR:updateCTL: ** had NO CTL and CTL
> > > > processing
> > > > FAILED** ctl-err 12 (file is too small)
> > > > NOT 09:28:58.199464 SECD: updateCTL: starting CTL update
> > > > NOT 09:28:58.202780 SECD: ctlRequestFile: Socket 7 connected to
> > > > /usr/tmp/tftpClientSock
> > > > NOT 09:28:58.203933 SECD: ctlRequestFile: Request
> > > CTLSEP0019E7D16CD6.tlv
> > > > NOT 09:28:58.205791 tftpClient: tftp request rcv'd from
> > > > /usr/tmp/ctlSock,
> > > > srcFile = CTLSEP0019E7D16CD6.tlv, dstFile = /usr/tmp/CTLFile.tlv
> > > > NOT 09:28:58.208403 tftpClient: auth server - tftpList[0] =
> > > 10.10.10.10
> > > > NOT 09:28:58.209244 tftpClient: look up server - 0
> > > > WRN 09:28:58.215701 SECD: WARN:lookupCTL: CTL update in progress, no
> > > old
> > > > CTL, assume TFTP 10.10.10.10 NONSECURE
> > > > NOT 09:28:58.219254 tftpClient: secVal = 0xa
> > > > NOT 09:28:58.220320 tftpClient: 10.10.10.10 is a NONsecure server
> > > > NOT 09:28:58.221096 tftpClient: temp retval = SRVR_NONSECURE, keep
> > > > looking
> > > > NOT 09:28:58.221849 tftpClient: retval = 10
> > > > NOT 09:28:58.222629 tftpClient: Non secure file requested
> > > > NOT 09:28:58.235315 TFTP: [16]:Requesting CTLSEP0019E7D16CD6.tlv from
> > > > 10.10.10.10
> > > > NOT 09:28:58.238209 TFTP: [16]:Finished --> rcvd 1 bytes
> > > > NOT 09:28:58.241145 SECD: ctlRequestFile: tftp Status 0 rcv'd
> > > > ERR 09:28:58.242856 SECD: ctlVerifyFile: CTL file too small:
> > > > /usr/tmp/CTLFile.tlv
> > > > NOT 09:28:58.244754 SECD: updateCTL: finished CTL update
> > > > ERR 09:28:58.245704 SECD: EROR:updateCTL: ** had NO CTL and CTL
> > > > processing
> > > > FAILED** ctl-err 12 (file is too small)
> > > > NOT 09:29:02.648053 SECD: updateCTL: starting CTL update
> > > > NOT 09:29:02.651331 SECD: ctlRequestFile: Socket 7 connected to
> > > > /usr/tmp/tftpClientSock
> > > > NOT 09:29:02.652499 SECD: ctlRequestFile: Request
> > > CTLSEP0019E7D16CD6.tlv
> > > > NOT 09:29:02.658547 tftpClient: tftp request rcv'd from
> > > > /usr/tmp/ctlSock,
> > > > srcFile = CTLSEP0019E7D16CD6.tlv, dstFile = /usr/tmp/CTLFile.tlv
> > > > NOT 09:29:02.661503 tftpClient: auth server - tftpList[0] =
> > > 10.10.10.10
> > > > NOT 09:29:02.662335 tftpClient: look up server - 0
> > > > WRN 09:29:02.665405 SECD: WARN:lookupCTL: CTL update in progress, no
> > > old
> > > > CTL, assume TFTP 10.10.10.10 NONSECURE
> > > > NOT 09:29:02.668874 tftpClient: secVal = 0xa
> > > > NOT 09:29:02.669746 tftpClient: 10.10.10.10 is a NONsecure server
> > > > NOT 09:29:02.671475 tftpClient: temp retval = SRVR_NONSECURE, keep
> > > > looking
> > > > NOT 09:29:02.672277 tftpClient: retval = 10
> > > > NOT 09:29:02.673060 tftpClient: Non secure file requested
> > > > NOT 09:29:02.684870 TFTP: [25]:Requesting CTLSEP0019E7D16CD6.tlv from
> > > > 10.10.10.10
> > > > NOT 09:29:02.687805 TFTP: [25]:Finished --> rcvd 1 bytes
> > > > NOT 09:29:02.691794 SECD: ctlRequestFile: tftp Status 0 rcv'd
> > > > ERR 09:29:02.693428 SECD: ctlVerifyFile: CTL file too small:
> > > > /usr/tmp/CTLFile.tlv
> > > > NOT 09:29:02.695315 SECD: updateCTL: finished CTL update
> > > > ERR 09:29:02.696335 SECD: EROR:updateCTL: ** had NO CTL and CTL
> > > > processing
> > > > FAILED** ctl-err 12 (file is too small)
> > > > NOT 09:29:03.227508 DHCP: Restart - delay = 1
> > > > 
> > > > 
> > > > > -----Original Message-----
> > > > > From: asterisk-users-bounces at lists.digium.com 
> > > > > [mailto:asterisk-users-bounces at lists.digium.com] On Behalf Of 
> > > > > Anciso, Roy
> > > > > Sent: Friday, January 04, 2008 8:43 AM
> > > > > To: Asterisk Users Mailing List - Non-Commercial Discussion
> > > > > Subject: Re: [asterisk-users] Cisco 7941G-GE with Asterisk 
> > > > > and CTPSEP odyssee
> > > > > 
> > > > > I've upgraded from SCCP to SIP 8.x.x branch on 7961g and 
> > > > > 7911g without any problems. 
> > > > > 
> > > > > As far as the CTLSEP File (Straight from Cisco): 
> > > > > http://www.cisco.com/univercd/cc/td/doc/product/voice/c_ipphon
> > > > > /english/i
> > > > > pp7960/addprot/mgcp/frmwrup.htm#wp1047292
> > > > > 
> > > > > The CTLSEP MAC file is a certificate trust list, which if 
> > > > > populated, contains information about the servers to which 
> > > > > the phone is attempting to connect and whether the server 
> > > > > connection will be secure or nonsecure. 
> > > > > 
> > > > > Based on the information above an empty file will work just fine.  
> > > > > 
> > > > > -----Original Message-----
> > > > > From: asterisk-users-bounces at lists.digium.com
> > > > > [mailto:asterisk-users-bounces at lists.digium.com] On Behalf Of
> > > Patrick
> > > > > Sent: Friday, January 04, 2008 5:02 AM
> > > > > To: Asterisk Users Mailing List - Non-Commercial Discussion
> > > > > Subject: Re: [asterisk-users] Cisco 7941G-GE with Asterisk 
> > > > > and CTPSEP odyssee
> > > > > 
> > > > > 
> > > > > On Fri, 2008-01-04 at 09:11 +0100, Christophorus Laube wrote:
> > > > > > Hi list,
> > > > > > 
> > > > > > I have bought some Cisco 7941G-GE IP phones and want to use 
> > > > > them with 
> > > > > > asterisk. Before bying I tested the whole setup with three 
> > > > > different 
> > > > > > models of the old 79X0 series (a 7912, 7940 and a 7960). 
> > > > > Flashing the 
> > > > > > formerly provided SCCP-Image to SIP was no problem, but now it
> > > > > complains
> > > > > > about a nonexistent CTLSEP<mac>.tlv file. Most of the howtos say 
> > > > > > something about an empty file but that does not suit to me. Does
> > > > > anyone
> > > > > > of you have experience in getting these phones to work or 
> > > > > can point me 
> > > > > > to any information bringing me back in the game?
> > > > > > Thanks in advance,
> > > > > 
> > > > > I don't remember if I had this same problem with a 7961G but 
> > > > > I did figure out that you can not do an upgrade from factory 
> > > > > default SCCP to the latest SIP 8.x.x firmware. In my case the 
> > > > > phone just did not work properly. To make it work I 
> > > > > downgraded the phone back to SIP 7.x firmware (iirc I used 
> > > > > 7.5) and then upgraded to the latest SIP 8.x.x firmware.
> > > > > 
> > > > > Hope this helps.
> > > > > 
> > > > > Regards,
> > > > > Patrick
> > > > > 
> > > > > 
> > > > > _______________________________________________
> > > > > --Bandwidth and Colocation Provided by http://www.api-digital.com--
> > > > > 
> > > > > asterisk-users mailing list
> > > > > To UNSUBSCRIBE or update options visit:
> > > > >    http://lists.digium.com/mailman/listinfo/asterisk-users
> > > > > 
> > > > > _______________________________________________
> > > > > --Bandwidth and Colocation Provided by http://www.api-digital.com--
> > > > > 
> > > > > asterisk-users mailing list
> > > > > To UNSUBSCRIBE or update options visit:
> > > > >    http://lists.digium.com/mailman/listinfo/asterisk-users
> > > > > 
> > > > 
> > > > 
> > > > _______________________________________________
> > > > --Bandwidth and Colocation Provided by http://www.api-digital.com--
> > > > 
> > > > asterisk-users mailing list
> > > > To UNSUBSCRIBE or update options visit:
> > > >    http://lists.digium.com/mailman/listinfo/asterisk-users
> > > > 
> > > > _______________________________________________
> > > > --Bandwidth and Colocation Provided by http://www.api-digital.com--
> > > > 
> > > > asterisk-users mailing list
> > > > To UNSUBSCRIBE or update options visit:
> > > >    http://lists.digium.com/mailman/listinfo/asterisk-users
> > > 
> > > 
> > > 
> > > _______________________________________________
> > > --Bandwidth and Colocation Provided by http://www.api-digital.com--
> > > 
> > > asterisk-users mailing list
> > > To UNSUBSCRIBE or update options visit:
> > >    http://lists.digium.com/mailman/listinfo/asterisk-users
> > > 
> > > _______________________________________________
> > > --Bandwidth and Colocation Provided by http://www.api-digital.com--
> > > 
> > > asterisk-users mailing list
> > > To UNSUBSCRIBE or update options visit:
> > >    http://lists.digium.com/mailman/listinfo/asterisk-users
> > -- 
> > Dipl.-Ling. Christophorus Laube
> > Systemadministrator
> > SemanticEdge GmbH
> > Kaiserin-Augusta-Allee 10-11
> > 10553 Berlin
> > Deutschland
> > Tel  +49-30-345077-0
> > Fax +49-30-345077-77
> > christophorus.laube at semanticedge.de
> > Geschäftsführer : Dr.Ralf Köhrbrück, Dr. Lupo Pape
> > HRB 84682
> > 
> > 
> > _______________________________________________
> > --Bandwidth and Colocation Provided by http://www.api-digital.com--
> > 
> > asterisk-users mailing list
> > To UNSUBSCRIBE or update options visit:
> >    http://lists.digium.com/mailman/listinfo/asterisk-users
> 
> 
> _______________________________________________
> --Bandwidth and Colocation Provided by http://www.api-digital.com--
> 
> asterisk-users mailing list
> To UNSUBSCRIBE or update options visit:
>    http://lists.digium.com/mailman/listinfo/asterisk-users
-- 
Dipl.-Ling. Christophorus Laube
Systemadministrator
SemanticEdge GmbH
Kaiserin-Augusta-Allee 10-11
10553 Berlin
Deutschland
Tel  +49-30-345077-0
Fax +49-30-345077-77
christophorus.laube at semanticedge.de
Geschäftsführer : Dr.Ralf Köhrbrück, Dr. Lupo Pape
HRB 84682




More information about the asterisk-users mailing list