[asterisk-users] SIP Incoming / Inbound not working for Broadvoice (Asterisk PBX 1.6.1.6)
Qurba Joog
qurbajoog at gmail.com
Fri Dec 25 09:43:29 CST 2009
Thanks very much for your reply Nguyen. I read and re-read the url you
sent.. Sorry I'm new to this but are you saying the [incoming] context is
wrong? Please indicate what is wrong.
If you look at the SIP.conf [enter_broadvoice] I have [incoming] context
defined and that is the one I have called out in the extensions.conf
Thanks.
On Fri, Dec 25, 2009 at 5:20 AM, Nguyen Quang Tri <kihote.am at gmail.com>wrote:
> Wrong context for incoming,
> you can read
> http://www.voip-info.org/wiki/view/Asterisk+config+sip.conf
> and
> http://www.voip-info.org/wiki/view/IPKall
>
> 2009/12/25 --[ UxBoD ]-- <uxbod at splatnix.net>
>
>> ----- "Qurba Joog" <qurbajoog at gmail.com> wrote:
>> | Hello,
>> |
>> | Please forgive me if I'm repeating this post. I have searched and looked
>> for similar problem with a solution but have not see a similar one.
>> |
>> | My outgoing SIP and other channels work fine but the incoming/inbound
>> SIP call goes straight to Broadvoice voicemail. I see that Broadvoice is
>> registered when I look at the SIP registry. I have turned on SIP Debug and
>> it is below.
>> |
>> | Anyone know why even when SIP has registered I do not see incoming
>> calls?
>> |
>> | Thanks,
>> |
>> |
>> | ------extensions.conf----------------
>> | [global]
>> |
>> | [general]
>> | bindport=5060
>> | bindaddr = 0.0.0.0
>> | deny=*MailScanner has detected a possible fraud attempt from "0.0.0.0"
>> claiming to be* *MailScanner warning: numerical links are often
>> malicious:* 0.0.0.0/0.0.0.0 <http://0.0.0.0/0.0.0.0>
>> | externhost=xyz.dyndns.org
>> | localnet = *MailScanner has detected a possible fraud attempt from
>> "192.168.1.0" claiming to be* *MailScanner warning: numerical links are
>> often malicious:* 192.168.1.0/255.255.255.0<http://192.168.1.0/255.255.255.0>
>>
>> | disallow=all
>> | allow=ulaw
>> | allow=gsm
>> | delayreject=yes
>> | nochecksums=no
>> | allowguest=no
>> | delayreject=yes
>> | pedantic=no
>> |
>> | register => 703XXXYYYY at sip.broadvoice.com:s
>> ecurepassword:703XXXYYYY at sip.broadvoice.com/5000
>> |
>> | [5000]
>> | type=friend
>> | context=internal-phones
>> | secret=xxx
>> | qualify=yes
>> | host=dynamic ; behind nat
>> | dtmfmode=rfc2833
>> |
>> | [5002]
>> | type=friend
>> | context=internal-phones
>> | secret=test
>> | qualify=yes
>> | host=dynamic ; behind nat
>> | nat=yes
>> | dtmfmode=rfc2833
>> |
>> | [enter_broadvoice]
>> | type=peer
>> | user=phone
>> | host=sip.broadvoice.com
>> | fromdomain=sip.broadvoice.com
>> | fromuser=703XXXYYYY
>> | secret=securepassword
>> | username=703XXXYYYY
>> | insecure=very
>> | ;insecure=port,invite
>> | context=incoming
>> | authname=703XXXYYYY
>> | dtmfmode=inband
>> | dtmf=inband
>> | ;Disable canreinvite if you are behind a NAT
>> |
>> | canreinvite=no
>> |
>> | --------extensions.conf--------
>> |
>> | [globals]
>> |
>> | [general]
>> |
>> | autofallthrough=yes
>> |
>> |
>> | [incoming_calls]
>> |
>> | exten => 1703XXXYYYY,1,Dial(SIP/5000)
>> |
>> | [internal-phones]
>> |
>> | include => outgoing
>> | exten => 5000,1,Dial(SIP/5000,20)
>> | exten => 5002,1,Dial(SIP/5002,20)
>> |
>> |
>> | [outgoing]
>> |
>> | exten => _X.,1,NoOp()
>> | exten => _X.,n,Dial(SIP/enter_broadvoice/${EXTEN})
>> |
>> | --------SIP Registry------------------
>> | -*CLI> sip show registry
>> | Host dnsmgr Username Refresh
>> State Reg.Time
>> | sip.broadvoice.com:5060 N 703XXXYYYY at s 23
>> Registered Fri, 25 Dec 2009 01:14:03
>> |
>> | --------SIP Debug------------------
>> | -*CLI>
>> | REGISTER 11 headers, 0 lines
>> | Reliably Transmitting (no NAT) to *MailScanner has detected a possible
>> fraud attempt from "147.135.32.226:5060" claiming to be* *MailScanner
>> warning: numerical links are often malicious:* 147.135.32.226:5060<http://147.135.32.226:5060>
>> :
>>
>> | REGISTER sip:sip.broadvoice.com SIP/2.0
>> | Via: SIP/2.0/UDP 68.100.66.3:5060;branch=z9hG4bK4948ded8;rport
>> | Max-Forwards: 70
>> | From: <sip:703XXXYYYY at sip.broadvoice.com<sip%3A703XXXYYYY at sip.broadvoice.com>
>> >;tag=as376e46ae
>> | To: <sip:703XXXYYYY at sip.broadvoice.com<sip%3A703XXXYYYY at sip.broadvoice.com>
>> >
>> | Call-ID: 65a8d48738a00d121fc9050e4771d0b7 at 192.168.1.51
>> | CSeq: 147 REGISTER
>> | User-Agent: Asterisk PBX 1.6.1.6
>> | Expires: 120
>> | Contact: <sip:5000 at 68.100.65.3 <sip%3A5000 at 68.100.65.3>>
>> | Content-Length: 0
>> |
>> |
>> | ---
>> | Really destroying SIP dialog '
>> 65a8d48738a00d121fc9050e4771d0b7 at 192.168.1.51' Method: REGISTER
>> | Suuban*CLI>
>> | <--- SIP read from UDP://*MailScanner has detected a possible fraud
>> attempt from "147.135.32.225:5060" claiming to be* *MailScanner warning:
>> numerical links are often malicious:* 147.135.32.225:5060<http://147.135.32.225:5060>--->
>>
>> | SIP/2.0 200 OK
>> | Call-ID: 65a8d48738a00d121fc9050e4771d0b7 at 192.168.1.51
>> | CSeq: 147 REGISTER
>> | From: <sip:703XXXYYYY at sip.broadvoice.com<sip%3A703XXXYYYY at sip.broadvoice.com>
>> >;tag=as376e46ae
>> | To: <sip:703XXXYYYY at sip.broadvoice.com<sip%3A703XXXYYYY at sip.broadvoice.com>
>> >
>> | Via: SIP/2.0/UDP 68.100.66.3:5060;branch=z9hG4bK4948ded8
>> | Contact: <sip:5000 at 68.100.66.3 <sip%3A5000 at 68.100.66.3>>
>> | Expires: 30
>> | Content-Length: 0
>> |
>> |
>> | <------------->
>> | --- (9 headers 0 lines) ---
>> | Scheduling destruction of SIP dialog '
>> 65a8d48738a00d121fc9050e4771d0b7 at 192.168.1.51' in 32000 ms (Method:
>> REGISTER)
>> | [Dec 25 00:42:31] NOTICE[2898]: chan_sip.c:16740
>> handle_response_register: Outbound Registration: Expiry for
>> sip.broadvoice.com is 30 sec (Scheduling reregistration in 23 s)
>> |
>> |
>> | REGISTER 11 headers, 0 lines
>> | Reliably Transmitting (no NAT) to *MailScanner has detected a possible
>> fraud attempt from "147.135.32.226:5060" claiming to be* *MailScanner
>> warning: numerical links are often malicious:* 147.135.32.226:5060<http://147.135.32.226:5060>
>> :
>>
>> | REGISTER sip:sip.broadvoice.com SIP/2.0
>> | Via: SIP/2.0/UDP 68.100.66.3:5060;branch=z9hG4bK35a02655;rport
>> | Max-Forwards: 70
>> | From: <sip:703XXXYYYY at sip.broadvoice.com<sip%3A703XXXYYYY at sip.broadvoice.com>
>> >;tag=as54c6327a
>> | To: <sip:703XXXYYYY at sip.broadvoice.com<sip%3A703XXXYYYY at sip.broadvoice.com>
>> >
>> | Call-ID: 65a8d48738a00d121fc9050e4771d0b7 at 192.168.1.51
>> | CSeq: 148 REGISTER
>> | User-Agent: Asterisk PBX 1.6.1.6
>> | Expires: 120
>> | Contact: <sip:5000 at 68.100.66.3 <sip%3A5000 at 68.100.66.3>>
>> | Content-Length: 0
>> | ---
>> | Really destroying SIP dialog '
>> 65a8d48738a00d121fc9050e4771d0b7 at 192.168.1.51' Method: REGISTER
>> | Suuban*CLI>
>> | <--- SIP read from UDP://*MailScanner has detected a possible fraud
>> attempt from "147.135.32.226:5060" claiming to be* *MailScanner warning:
>> numerical links are often malicious:* 147.135.32.226:5060<http://147.135.32.226:5060>--->
>>
>> | SIP/2.0 200 OK
>> | Call-ID: 65a8d48738a00d121fc9050e4771d0b7 at 192.168.1.51
>> | CSeq: 148 REGISTER
>> | From: <sip:703XXXYYYY at sip.broadvoice.com<sip%3A703XXXYYYY at sip.broadvoice.com>
>> >;tag=as54c6327a
>> | To: <sip:703XXXYYYY at sip.broadvoice.com<sip%3A703XXXYYYY at sip.broadvoice.com>
>> >
>> | Via: SIP/2.0/UDP 68.100.66.3:5060;branch=z9hG4bK35a02655
>> | Contact: <sip:5000 at 68.100.66.3 <sip%3A5000 at 68.100.66.3>>
>> | Expires: 30
>> | Content-Length: 0
>> | ----------------------------------------------
>>
>> Within sip.conf you are using the context inbound; yet in extensions.conf
>> you have incoming_calls. so change extensions.conf to be:
>>
>> [incoming]
>>
>>
>> exten => 1703XXXYYYY,1,Dial(SIP/5000)
>>
>> _______________________________________________
>> -- Bandwidth and Colocation Provided by http://www.api-digital.com --
>>
>> asterisk-users mailing list
>> To UNSUBSCRIBE or update options visit:
>> http://lists.digium.com/mailman/listinfo/asterisk-users
>>
>
>
> _______________________________________________
> -- Bandwidth and Colocation Provided by http://www.api-digital.com --
>
> asterisk-users mailing list
> To UNSUBSCRIBE or update options visit:
> http://lists.digium.com/mailman/listinfo/asterisk-users
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20091225/23781461/attachment.htm
More information about the asterisk-users
mailing list