I don't know, it was designed specifically for the B and B+ models. http://www.raspberry-asterisk.org/
Casey On Fri, Jan 30, 2015 at 9:37 AM, Scott Reed <[email protected]> wrote: > Maybe using the wrong distribution so it did not have the correct drivers > for the interfaces? > > > On 1/30/2015 8:22 AM, Casey Mills wrote: > >> Yes Nathan, everything in your first paragraph is correct. >> >> I also agree with your statements about the VPN and UDP. >> >> I ended up resetting my router back to the default configuration and >> v6.19. Then only added the bare minimum to get traffic flowing again. My >> FreePBX server still wouldn't connect. I was using a distribution created >> for the Raspberry Pi. I went to the FreePBX website and downloaded the >> full >> ISO and installed on a test machine. This distribution had no issues >> connecting to the SIP trunk provider SIP.US. Maybe the issues wasn't my >> firewall after all, but it sure looked like it. >> >> I'm still really curious what the issue was. I would prefer to use a >> small, >> low power, inexpensive device. Anyone know of a good low power device that >> might be Atom processor based to run the full distribution? >> >> Thanks for all of your help everyone! >> Casey >> >> >> >> On Thu, Jan 29, 2015 at 9:03 PM, Nathan Anderson <[email protected]> wrote: >> >> (...replying to myself...) >>> >>> Ignore my comments about the dst-nat rules. I misread your posts and >>> thought you had said that you successfully managed to connect directly to >>> your SIP trunk provider *from your Android phone* and *from within your >>> network*. Now I see that you are using those dst-nat rules to make your >>> FreePBX server accessible to remote extensions from the outside, and that >>> your Android phone is set up as an extension, *not* that you were >>> registering to your SIP provider from your handheld. >>> >>> My only comment on that would be that requiring a VPN connection rather >>> than doing the port-forwarding might be safer and better protect you from >>> toll fraud. :) But at least I see what you are doing with those now. >>> >>> I haven't tested this theory, but the reason why I suggest you try >>> temporarily disabling that drop rule for forwarded traffic with an >>> invalid >>> connection state is that everything I've read so far seems to suggest >>> that >>> anything is considered an "invalid" connection if it A) doesn't already >>> have an entry in connection tracking, and B) it is not a "new" >>> connection, >>> which basically means TCP SYN. Unlike TCP, my understanding is that UDP >>> really doesn't have easily definable connection "states", so I'm not >>> actually sure that the "connection-state" firewall matcher is compatible >>> with anything other than TCP (or that it makes sense to apply it to >>> anything other than TCP). Again, I have not tested or verified this. >>> But >>> if this is the case, then it's possible that rather than ignoring UDP >>> traffic, the filter rule might be blindly tossing anything UDP that is >>> being forwarded. (You did say that you see the packets being received >>> from >>> the FreePBX box, but that they were being dropped b >>> efore being forwarded...) >>> >>> If disabling that rule fixes your problem, and you want to keep a rule >>> like that in place, you might try making it more specific by adding >>> additional matchers, such as "protocol=tcp" and perhaps even >>> "in-interface=<WAN>". >>> >>> -- >>> Nathan Anderson >>> First Step Internet, LLC >>> [email protected] >>> >>> On Thursday, January 29, 2015 5:30 PM, Nathan Anderson wrote: >>> >>> Are you doing SIP over TCP or UDP from FreePBX? (Guessing UDP.) >>>> >>>> Are you doing SIP over TCP or UDP from your Android phone that works? >>>> (Guessing TCP.) >>>> >>>> Can you try either disabling the last rule in your firewall filters list >>>> (action=drop chain=forward connection-state=invalid), and/or also >>>> setting >>>> protocol=tcp on it, and then try to originate SIP traffic from your >>>> FreePBX server again? >>>> >>>> They probably aren't harming anything, but unless your SIP trunk >>>> provider >>>> isn't requiring you to send SIP REGISTER to them and instead uses >>>> IP-based authentication, you don't need all of those dst-nat rules >>>> pointed at your FreePBX box. The kernel's connection tracking should be >>>> able to figure all of that out. >>>> >>> _______________________________________________ >>> Mikrotik mailing list >>> [email protected] >>> http://mail.butchevans.com/mailman/listinfo/mikrotik >>> >>> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik >>> RouterOS >>> >>> -------------- next part -------------- >> An HTML attachment was scrubbed... >> URL: <http://mail.butchevans.com/pipermail/mikrotik/ >> attachments/20150130/b6568c01/attachment.html> >> _______________________________________________ >> Mikrotik mailing list >> [email protected] >> http://mail.butchevans.com/mailman/listinfo/mikrotik >> >> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik >> RouterOS >> >> >> ----- >> No virus found in this message. >> Checked by AVG - www.avg.com >> Version: 2015.0.5646 / Virus Database: 4273/9025 - Release Date: 01/30/15 >> >> >> > -- > Scott Reed > Owner > NewWays Networking, LLC > Wireless Networking > Network Design, Installation and Administration > Mikrotik Advanced Certified > www.nwwnet.net > (765) 855-1060 (765) 439-4253 Toll-free (855) 231-6239 > > > _______________________________________________ > Mikrotik mailing list > [email protected] > http://mail.butchevans.com/mailman/listinfo/mikrotik > > Visit http://blog.butchevans.com/ for tutorials related to Mikrotik > RouterOS > -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.butchevans.com/pipermail/mikrotik/attachments/20150130/7a9d0639/attachment.html> _______________________________________________ Mikrotik mailing list [email protected] http://mail.butchevans.com/mailman/listinfo/mikrotik Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS

