Ok, this is the 3rd RMA replacement I've gotten from Cisco. None of the phones were bad, but I have been trying to upgrade them to SIP firmware from Skinny and I've always managed to turn them into doorstops because I've factory reset them and afterwards realize I can't do anything with them unless I have Call Manager to restore the firmware (or so Cisco says).

So, I just powered on the latest replacement, checked the firmware in the settings menu, and it appears to have be using 5.0.3.0S Skinny code on it (Load File: TERM70.5-0-3-0S).

Checking in the TFTP logs (using utftpd from FreeBSD Ports) after the phone boots and gets an IP from DHDP,and sure enough, it's looking for the SEP<MAC>.cnf.xml file as expected, but it doesn't download it:

==> /var/log/tftpd.log <==
Sep 10 15:41:21 bubbles  utftpd[64385]: did chdir/root to /tftpboot
Sep 10 15:41:21 bubbles  utftpd[64386]: connect from 192.168.100.246
Sep 10 15:41:21 bubbles  utftpd[64386]: CONFIG uid=65534
Sep 10 15:41:21 bubbles  utftpd[64386]: CONFIG dir=/
Sep 10 15:41:21 bubbles  utftpd[64386]: CONFIG read=/
Sep 10 15:41:21 bubbles  utftpd[64386]: CONFIG write=/
Sep 10 15:41:21 bubbles  utftpd[64386]: CONFIG create=/
Sep 10 15:41:21 bubbles  utftpd[64386]: did chdir to /
Sep 10 15:41:21 bubbles utftpd[64386]: peer requests SEP00131A4D39F4.cnf.xml, conversion octet Sep 10 15:41:21 bubbles utftpd[64386]: unterminated option value in init packet Sep 10 15:41:21 bubbles utftpd[64386]: unterminated option value in init packet

This file *DOES* actually exist and *IS* readable by the TFTP server:

[EMAIL PROTECTED] /tftpboot]# file /tftpboot/SEP00131A4D39F4.cnf.xml
/tftpboot/SEP00131A4D39F4.cnf.xml: ASCII text
[EMAIL PROTECTED] /tftpboot]# wc -l /tftpboot/SEP00131A4D39F4.cnf.xml
     229 /tftpboot/SEP00131A4D39F4.cnf.xml
[EMAIL PROTECTED] /tftpboot]# ls -al /tftpboot/SEP00131A4D39F4.cnf.xml
-rw-r--r-- 1 root wheel 7644 Sep 10 11:32 /tftpboot/ SEP00131A4D39F4.cnf.xml
[EMAIL PROTECTED] /tftpboot]#

The SEP<MAC>.xml.cnf file does include the tags for the SIP code:

<[EMAIL PROTECTED] /tftpboot]# grep loadInformation /tftpboot/ SEP00131A4D39F4.cnf.xml
<loadInformation>SIP70.8-0-2SR1S</loadInformation>
[EMAIL PROTECTED] /tftpboot]#

Even though the phone isn't asking for it, I've also verified the / tftpboot/XMLDefault.cnf.xml file:

[EMAIL PROTECTED] /tftpboot]# more XMLDefault.cnf.xml
<Default>
<callManagerGroup>
    <members>
       <member priority="0">
          <callManager>
             <ports>
                <ethernetPhonePort>2000</ethernetPhonePort>
                <mgcpPorts>
                   <listen>2427</listen>
                   <keepAlive>2428</keepAlive>
                </mgcpPorts>
             </ports>
             <processNodeName></processNodeName>
          </callManager>
       </member>
    </members>
</callManagerGroup>
<loadInformation7 model="IP Phone 7960">P0S3-08-4-00</loadInformation7>
<loadInformation30006 model="IP Phone 7970">SIP70.8-0-2SR1S</ loadInformation30006>
<authenticationURL></authenticationURL>
<directoryURL></directoryURL>
<idleURL></idleURL>
<informationURL></informationURL>
<messagesURL></messagesURL>
<servicesURL></servicesURL>
</Default>
[EMAIL PROTECTED] /tftpboot]#

The firmware exists as well.  I've verified it a gazillion times:

[EMAIL PROTECTED] /tftpboot]# tar -zxvf cmterm-7970_7971-sip.8-0-2SR1.cop
x SIP70.8-0-2SR1S.loads
x apps70.1-1-1-15.sbn
x cnu70.3-1-1-15.sbn
x copstart.sh
x cvm70sip.8-0-1-18.sbn
x dsp70.1-1-1-15.sbn
x jar70sip.8-0-1-18.sbn
x load119.txt
x load30006.txt
x signed/
x signed/cmterm-7970_7971-sip.8-0-2SR1.cop
x term70.default.loads
x term71.default.loads
[EMAIL PROTECTED] /tftpboot]#

I'm stumped. I seem to be doing everything the wiki is telling me to, but I'm obviously dense and missing something somewhere.

Anyone have any ideas here?
_______________________________________________
--Bandwidth and Colocation provided by Easynews.com --

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to