Dear list
I am facing strange issue. i have 16 PRI setup. out of 16 there are 2
cables which are giving me yellow alarm in if they are in card number 1 and
works fine if i put in card2
what could be the error is it card faulty??
--
Akib Sayyed
Matrix-Shell
akibsay...@gmail.com
Hi
It's possible verify the Reverse Charging Indication on mfcr2 link directly
con dialplan?
Thank's
Att,
*Rafael dos Santos Saraiva*
Tel: (51) 8174-7956
*Digium Certified Asterisk Administrator (dCCA)*
http://www.astdocs.com | http://br.linkedin.com/pub/rafael-saraiva/52/aab/230
--
Hello Steve,
Sunday, August 18, 2013, 3:35:54 PM, you wrote:
On Sun, 18 Aug 2013, Ira wrote:
[2013-08-18 05:56:29] NOTICE[17089][C-00a8] chan_sip.c:
Failed to authenticate device 390sip:3...@xx.xx.xxx.xxx;tag=2762c06e
I keep getting messages like this where the IP,
he,
some bad boys trying to guess configured extensions.
in sip config in general set alwaysauthreject = yes .
in cli sip set debug on and watch ip and block in firewall, iptables.
On Mon, Aug 19, 2013 at 7:50 PM, Ira i...@extrasensory.com wrote:
Hello Steve,
Sunday, August 18, 2013,
One of Asterisk's dirty little secrets is that it does not show the source IP
when a device or hacker tries sending a call without registering. The
rejection message in the logs do not show the IP of the attacker. Yes it
sucks, yes it has been that way for many many years.
-Original
They are sending requests from his own public ip huh? Trade secrets
H, IPTaibles, Fail2Ban (as a preventative), there is something
I am missing What the f is it called again? Oh yeah Pike!!!
alwaysauthreject = yes
I don't know about that However, using the mac address of the
On 08/19/2013 08:10 PM, Eric Wieling wrote:
One of Asterisk's dirty little secrets is that it does not show the source IP
when a device or hacker tries sending a call without registering. The
rejection message in the logs do not show the IP of the attacker. Yes it
sucks, yes it has been
On Mon, 19 Aug 2013, Ira wrote:
[2013-08-18 05:56:29] NOTICE[17089][C-00a8] chan_sip.c:
Failed to authenticate device 390sip:3...@xx.xx.xxx.xxx;tag=2762c06e
xx.xx.xxx.xxx is my public I.P.
What kind of filtering are you doing? Iptables?
Rather than playing 'wack-a-mole' with
On 08/19/2013 08:55 PM, Steve Edwards wrote:
On Mon, 19 Aug 2013, Ira wrote:
[2013-08-18 05:56:29] NOTICE[17089][C-00a8] chan_sip.c:
Failed to authenticate device
390sip:3...@xx.xx.xxx.xxx;tag=2762c06e
xx.xx.xxx.xxx is my public I.P.
What kind of filtering are you doing?
No.
-Original Message-
From: asterisk-users-boun...@lists.digium.com
[mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Patrick Lists
Sent: Monday, August 19, 2013 2:41 PM
To: asterisk-users@lists.digium.com
Subject: Re: [asterisk-users] Am I being hacked?
On 08/19/2013 08:10
Actually, you can try enabling the security logging destination in
logger.conf. I believe that may contain the info, but it is new in Asterisk
11. 1.8 and earlier does not have this.
-Original Message-
From: asterisk-users-boun...@lists.digium.com
On 08/19/2013 09:29 PM, Eric Wieling wrote:
Actually, you can try enabling the security logging destination in
logger.conf. I believe that may contain the info, but it is new in Asterisk 11. 1.8 and
earlier does not have this.
Thanks I'll give that a try.
Regards,
Patrick
--
Hello Steve,
Monday, August 19, 2013, 11:55:54 AM, you wrote:
[2013-08-18 05:56:29] NOTICE[17089][C-00a8] chan_sip.c:
Failed to authenticate device
390sip:3...@xx.xx.xxx.xxx;tag=2762c06e
xx.xx.xxx.xxx is my public I.P.
What kind of filtering are you doing? Iptables?
#!/bin/bash
IPTABLES='/sbin/iptables'
#Set interface values
INTIF1='eth0'
# Set Limits
LIMIT=2/sec
LOGLIMIT=5/min
LIMITBURST=5
#flush rules and delete chains
$IPTABLES -F
$IPTABLES -X
#echo -e- Dropping Forward Requests
$IPTABLES -P FORWARD DROP
#echo -e- Dropping Input
On Mon, Aug 19, 2013 at 2:40 PM, Patrick Lists
asterisk-l...@puzzled.xs4all.nl wrote:
On 08/19/2013 08:10 PM, Eric Wieling wrote:
One of Asterisk's dirty little secrets is that it does not show the
source IP when a device or hacker tries sending a call without registering.
The rejection
On Mon, Aug 19, 2013 at 2:29 PM, Eric Wieling ewiel...@nyigc.com wrote:
Actually, you can try enabling the security logging destination in
logger.conf. I believe that may contain the info, but it is new in
Asterisk 11. 1.8 and earlier does not have this.
Nitpick: it was a new feature in
On Fri, Aug 16, 2013 at 2:22 AM, Olivier oza_4...@yahoo.fr wrote:
Hi,
After Googling, I found information on how you can read the status of an
outgoing call but I didn't find anything on tunning reply to incoming calls.
My question is :
I've got a system receiving SIP calls from different
Sent from my Verizon Wireless 4G LTE DROID
Dan Austin dan_aus...@phoenix.com wrote:
--
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every
18 matches
Mail list logo