> http://www.voip-info.org/tiki-index.php?page=Asterisk+IAX+authentication > > After struggling to understand IAX2 inbound authentication, I figured > I'd document what I learned so others can benefit :-) > > All comments welcome, especially if I misunderstood or improperly > explained anything.
Kevin, Goog job. Is the ordering of the "if... then..." text based on analysis of the code? Rich _______________________________________________ Asterisk-Users mailing list [EMAIL PROTECTED] http://lists.digium.com/mailman/listinfo/asterisk-users To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
