Try naming the empty file:
SEP0019E7D16CD6.tlv

Not
CTLSEP0019E7D16CD6.tlv

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
Christophorus Laube
Sent: Friday, January 04, 2008 10:26 AM
To: Asterisk Users Mailing List - Non-Commercial Discussion
Subject: Re: [asterisk-users] Cisco 7941G-GE with Asterisk and CTPSEP
odyssee

Thanks for the hint. I just tried that although I only see my worries
coming true: the CTLSEP<mac>.tlv file is the first one the phone
requests when booting, no possibility to set something different as the
SEP<mac>.cnf.xml should be loaded after the successful load of the CTL
file. And thus the phone is looping with "Configuring IP" and CTLFile
failure. Can I set this option by ssh?
Thanks a lot and in advance,

Christophorus 
> In your SEP<mac>.cnf.xml file look for the setting below and set it to
> 0:
> 
> <deviceSecurityMode>0</deviceSecurityMode>
> 
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Glenn
Cobb
> Sent: Friday, January 04, 2008 9:37 AM
> To: 'Asterisk Users Mailing List - Non-Commercial Discussion'
> Subject: Re: [asterisk-users] Cisco 7941G-GE with Asterisk and CTPSEP
> odyssee
> 
> Here is a little more info...
> 
> I hooked up the 7971G-GE to my pc and grabbed this with tera-term. Its
> the
> console output during the CTL update process. I am using SIP70.8-3-3.
> 
> NOT 09:28:45.969295 DHCP: Restart - delay = 1
> NOT 09:28:45.981198 DHCP: Sending Release...
> NOT 09:28:49.000449 DHCP:  dhcpSendReq: status 0x12301000
> NOT 09:28:49.001281 DHCP: Sending Request...
> NOT 09:28:49.015673 DHCP: ACK received
> NOT 09:28:49.016517 DHCP: Succeeded
> NOT 09:28:49.058273 DHCP: IP Address -- 10.10.10.247
> NOT 09:28:49.059129 DHCP: Subnet Mask - 255.255.255.0
> NOT 09:28:49.059960 DHCP: Default Gwy -
> NOT 09:28:49.073169 PAE: SIGIPCFG received...
> NOT 09:28:49.075897 ESP: send ADMIN, logging = 1, shell = 0, ipconfig
=
> 1
> WRN 09:28:49.120127 SECD: WARN:getCTLInfo: ** phone has no CTL
> WRN 09:28:49.127292 SECD: WARN:getCTLInfo: ** phone has no CTL
> NOT 09:28:49.140946 CDP-D: catchipcfg getdhcpinfo IP: a0a0af7  Chng:1
> NOT 09:28:49.152532 tftpClient: request server 0 ---> 10.10.10.10
> NOT 09:28:49.178685 tftpClient: request server 1 --->
> NOT 09:28:49.201261 tftpClient: request server 0 ---> 10.10.10.10
> NOT 09:28:49.204518 ESP: server 0 = 10.10.10.10
> NOT 09:28:49.228784 tftpClient: request server 1 --->
> NOT 09:28:49.233253 ESP: server 1 =
> NOT 09:28:49.319960 SECD: updateCTL: starting CTL update
> NOT 09:28:49.323284 SECD: ctlRequestFile: Socket 7 connected to
> /usr/tmp/tftpClientSock
> NOT 09:28:49.324525 SECD: ctlRequestFile: Request
CTLSEP0019E7D16CD6.tlv
> NOT 09:28:49.327942 tftpClient: tftp request rcv'd from
> /usr/tmp/ctlSock,
> srcFile = CTLSEP0019E7D16CD6.tlv, dstFile = /usr/tmp/CTLFile.tlv
> NOT 09:28:49.331598 tftpClient: auth server - tftpList[0] =
10.10.10.10
> NOT 09:28:49.332439 tftpClient: look up server - 0
> WRN 09:28:49.335498 SECD: WARN:lookupCTL: CTL update in progress, no
old
> CTL, assume TFTP 10.10.10.10 NONSECURE
> NOT 09:28:49.339140 tftpClient: secVal = 0xa
> NOT 09:28:49.340260 tftpClient: 10.10.10.10 is a NONsecure server
> NOT 09:28:49.341141 tftpClient: temp retval = SRVR_NONSECURE, keep
> looking
> NOT 09:28:49.341897 tftpClient: retval = 10
> NOT 09:28:49.342678 tftpClient: Non secure file requested
> NOT 09:28:49.356155 TFTP: [26]:Requesting CTLSEP0019E7D16CD6.tlv from
> 10.10.10.10
> NOT 09:28:49.359594 TFTP: [26]:Finished --> rcvd 1 bytes
> NOT 09:28:49.363943 SECD: ctlRequestFile: tftp Status 0 rcv'd
> ERR 09:28:49.365631 SECD: ctlVerifyFile: CTL file too small:
> /usr/tmp/CTLFile.tlv
> NOT 09:28:49.367522 SECD: updateCTL: finished CTL update
> ERR 09:28:49.368469 SECD: EROR:updateCTL: ** had NO CTL and CTL
> processing
> FAILED** ctl-err 12 (file is too small)
> NOT 09:28:53.768028 SECD: updateCTL: starting CTL update
> NOT 09:28:53.772517 SECD: ctlRequestFile: Socket 7 connected to
> /usr/tmp/tftpClientSock
> NOT 09:28:53.773673 SECD: ctlRequestFile: Request
CTLSEP0019E7D16CD6.tlv
> NOT 09:28:53.776093 tftpClient: tftp request rcv'd from
> /usr/tmp/ctlSock,
> srcFile = CTLSEP0019E7D16CD6.tlv, dstFile = /usr/tmp/CTLFile.tlv
> NOT 09:28:53.778770 tftpClient: auth server - tftpList[0] =
10.10.10.10
> NOT 09:28:53.779616 tftpClient: look up server - 0
> WRN 09:28:53.782887 SECD: WARN:lookupCTL: CTL update in progress, no
old
> CTL, assume TFTP 10.10.10.10 NONSECURE
> NOT 09:28:53.786443 tftpClient: secVal = 0xa
> NOT 09:28:53.787250 tftpClient: 10.10.10.10 is a NONsecure server
> NOT 09:28:53.788022 tftpClient: temp retval = SRVR_NONSECURE, keep
> looking
> NOT 09:28:53.788777 tftpClient: retval = 10
> NOT 09:28:53.789616 tftpClient: Non secure file requested
> NOT 09:28:53.802285 TFTP: [19]:Requesting CTLSEP0019E7D16CD6.tlv from
> 10.10.10.10
> NOT 09:28:53.805356 TFTP: [19]:Finished --> rcvd 1 bytes
> NOT 09:28:53.809435 SECD: ctlRequestFile: tftp Status 0 rcv'd
> ERR 09:28:53.816549 SECD: ctlVerifyFile: CTL file too small:
> /usr/tmp/CTLFile.tlv
> NOT 09:28:53.818805 SECD: updateCTL: finished CTL update
> ERR 09:28:53.819756 SECD: EROR:updateCTL: ** had NO CTL and CTL
> processing
> FAILED** ctl-err 12 (file is too small)
> NOT 09:28:58.199464 SECD: updateCTL: starting CTL update
> NOT 09:28:58.202780 SECD: ctlRequestFile: Socket 7 connected to
> /usr/tmp/tftpClientSock
> NOT 09:28:58.203933 SECD: ctlRequestFile: Request
CTLSEP0019E7D16CD6.tlv
> NOT 09:28:58.205791 tftpClient: tftp request rcv'd from
> /usr/tmp/ctlSock,
> srcFile = CTLSEP0019E7D16CD6.tlv, dstFile = /usr/tmp/CTLFile.tlv
> NOT 09:28:58.208403 tftpClient: auth server - tftpList[0] =
10.10.10.10
> NOT 09:28:58.209244 tftpClient: look up server - 0
> WRN 09:28:58.215701 SECD: WARN:lookupCTL: CTL update in progress, no
old
> CTL, assume TFTP 10.10.10.10 NONSECURE
> NOT 09:28:58.219254 tftpClient: secVal = 0xa
> NOT 09:28:58.220320 tftpClient: 10.10.10.10 is a NONsecure server
> NOT 09:28:58.221096 tftpClient: temp retval = SRVR_NONSECURE, keep
> looking
> NOT 09:28:58.221849 tftpClient: retval = 10
> NOT 09:28:58.222629 tftpClient: Non secure file requested
> NOT 09:28:58.235315 TFTP: [16]:Requesting CTLSEP0019E7D16CD6.tlv from
> 10.10.10.10
> NOT 09:28:58.238209 TFTP: [16]:Finished --> rcvd 1 bytes
> NOT 09:28:58.241145 SECD: ctlRequestFile: tftp Status 0 rcv'd
> ERR 09:28:58.242856 SECD: ctlVerifyFile: CTL file too small:
> /usr/tmp/CTLFile.tlv
> NOT 09:28:58.244754 SECD: updateCTL: finished CTL update
> ERR 09:28:58.245704 SECD: EROR:updateCTL: ** had NO CTL and CTL
> processing
> FAILED** ctl-err 12 (file is too small)
> NOT 09:29:02.648053 SECD: updateCTL: starting CTL update
> NOT 09:29:02.651331 SECD: ctlRequestFile: Socket 7 connected to
> /usr/tmp/tftpClientSock
> NOT 09:29:02.652499 SECD: ctlRequestFile: Request
CTLSEP0019E7D16CD6.tlv
> NOT 09:29:02.658547 tftpClient: tftp request rcv'd from
> /usr/tmp/ctlSock,
> srcFile = CTLSEP0019E7D16CD6.tlv, dstFile = /usr/tmp/CTLFile.tlv
> NOT 09:29:02.661503 tftpClient: auth server - tftpList[0] =
10.10.10.10
> NOT 09:29:02.662335 tftpClient: look up server - 0
> WRN 09:29:02.665405 SECD: WARN:lookupCTL: CTL update in progress, no
old
> CTL, assume TFTP 10.10.10.10 NONSECURE
> NOT 09:29:02.668874 tftpClient: secVal = 0xa
> NOT 09:29:02.669746 tftpClient: 10.10.10.10 is a NONsecure server
> NOT 09:29:02.671475 tftpClient: temp retval = SRVR_NONSECURE, keep
> looking
> NOT 09:29:02.672277 tftpClient: retval = 10
> NOT 09:29:02.673060 tftpClient: Non secure file requested
> NOT 09:29:02.684870 TFTP: [25]:Requesting CTLSEP0019E7D16CD6.tlv from
> 10.10.10.10
> NOT 09:29:02.687805 TFTP: [25]:Finished --> rcvd 1 bytes
> NOT 09:29:02.691794 SECD: ctlRequestFile: tftp Status 0 rcv'd
> ERR 09:29:02.693428 SECD: ctlVerifyFile: CTL file too small:
> /usr/tmp/CTLFile.tlv
> NOT 09:29:02.695315 SECD: updateCTL: finished CTL update
> ERR 09:29:02.696335 SECD: EROR:updateCTL: ** had NO CTL and CTL
> processing
> FAILED** ctl-err 12 (file is too small)
> NOT 09:29:03.227508 DHCP: Restart - delay = 1
> 
> 
> > -----Original Message-----
> > From: [EMAIL PROTECTED] 
> > [mailto:[EMAIL PROTECTED] On Behalf Of 
> > Anciso, Roy
> > Sent: Friday, January 04, 2008 8:43 AM
> > To: Asterisk Users Mailing List - Non-Commercial Discussion
> > Subject: Re: [asterisk-users] Cisco 7941G-GE with Asterisk 
> > and CTPSEP odyssee
> > 
> > I've upgraded from SCCP to SIP 8.x.x branch on 7961g and 
> > 7911g without any problems. 
> > 
> > As far as the CTLSEP File (Straight from Cisco): 
> > http://www.cisco.com/univercd/cc/td/doc/product/voice/c_ipphon
> > /english/i
> > pp7960/addprot/mgcp/frmwrup.htm#wp1047292
> > 
> > The CTLSEP MAC file is a certificate trust list, which if 
> > populated, contains information about the servers to which 
> > the phone is attempting to connect and whether the server 
> > connection will be secure or nonsecure. 
> > 
> > Based on the information above an empty file will work just fine.  
> > 
> > -----Original Message-----
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED] On Behalf Of
Patrick
> > Sent: Friday, January 04, 2008 5:02 AM
> > To: Asterisk Users Mailing List - Non-Commercial Discussion
> > Subject: Re: [asterisk-users] Cisco 7941G-GE with Asterisk 
> > and CTPSEP odyssee
> > 
> > 
> > On Fri, 2008-01-04 at 09:11 +0100, Christophorus Laube wrote:
> > > Hi list,
> > > 
> > > I have bought some Cisco 7941G-GE IP phones and want to use 
> > them with 
> > > asterisk. Before bying I tested the whole setup with three 
> > different 
> > > models of the old 79X0 series (a 7912, 7940 and a 7960). 
> > Flashing the 
> > > formerly provided SCCP-Image to SIP was no problem, but now it
> > complains
> > > about a nonexistent CTLSEP<mac>.tlv file. Most of the howtos say 
> > > something about an empty file but that does not suit to me. Does
> > anyone
> > > of you have experience in getting these phones to work or 
> > can point me 
> > > to any information bringing me back in the game?
> > > Thanks in advance,
> > 
> > I don't remember if I had this same problem with a 7961G but 
> > I did figure out that you can not do an upgrade from factory 
> > default SCCP to the latest SIP 8.x.x firmware. In my case the 
> > phone just did not work properly. To make it work I 
> > downgraded the phone back to SIP 7.x firmware (iirc I used 
> > 7.5) and then upgraded to the latest SIP 8.x.x firmware.
> > 
> > Hope this helps.
> > 
> > Regards,
> > Patrick
> > 
> > 
> > _______________________________________________
> > --Bandwidth and Colocation Provided by http://www.api-digital.com--
> > 
> > asterisk-users mailing list
> > To UNSUBSCRIBE or update options visit:
> >    http://lists.digium.com/mailman/listinfo/asterisk-users
> > 
> > _______________________________________________
> > --Bandwidth and Colocation Provided by http://www.api-digital.com--
> > 
> > asterisk-users mailing list
> > To UNSUBSCRIBE or update options visit:
> >    http://lists.digium.com/mailman/listinfo/asterisk-users
> > 
> 
> 
> _______________________________________________
> --Bandwidth and Colocation Provided by http://www.api-digital.com--
> 
> asterisk-users mailing list
> To UNSUBSCRIBE or update options visit:
>    http://lists.digium.com/mailman/listinfo/asterisk-users
> 
> _______________________________________________
> --Bandwidth and Colocation Provided by http://www.api-digital.com--
> 
> asterisk-users mailing list
> To UNSUBSCRIBE or update options visit:
>    http://lists.digium.com/mailman/listinfo/asterisk-users



_______________________________________________
--Bandwidth and Colocation Provided by http://www.api-digital.com--

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

_______________________________________________
--Bandwidth and Colocation Provided by http://www.api-digital.com--

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to