> http://www.voip-info.org/tiki-index.php?page=Asterisk+IAX+authentication
> 
> After struggling to understand IAX2 inbound authentication, I figured 
> I'd document what I learned so others can benefit :-)
> 
> All comments welcome, especially if I misunderstood or improperly 
> explained anything.

Kevin,

Goog job. Is the ordering of the "if... then..." text based on analysis 
of the code?

Rich


_______________________________________________
Asterisk-Users mailing list
[EMAIL PROTECTED]
http://lists.digium.com/mailman/listinfo/asterisk-users
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to