On Wed, 2010-03-03 at 11:31 +0530, Chandrakant Solanki wrote:
Hi All,
I have followed below steps to enable echo cancellation.
# cd /usr/src
# wget http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.28.tar.bz2
# tar xjf linux-2.6.28.tar.bz2
# tar zxvf dahdi-linux-2.1.0.4.tar.gz
# ln -s
On Wed, 2010-03-03 at 11:31 +0530, Chandrakant Solanki wrote:
Hi All,
I have followed below steps to enable echo cancellation.
# cd /usr/src
# wget http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.28.tar.bz2
# tar xjf linux-2.6.28.tar.bz2
# tar zxvf dahdi-linux-2.1.0.4.tar.gz
# ln -s
On Wed, 2010-03-03 at 11:31 +0530, Chandrakant Solanki wrote:
Hi All,
I have followed below steps to enable echo cancellation.
# cd /usr/src
# wget http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.28.tar.bz2
# tar xjf linux-2.6.28.tar.bz2
# tar zxvf dahdi-linux-2.1.0.4.tar.gz
# ln -s
On Tue, 2010-02-23 at 08:22 -0500, Michelle Dupuis wrote:
We're creating a SIP gateway for a client that will take one leg of a
call in via SIP, and out the other side via H.323. To minimize load
on the gateway, we would like to have the RTP stream bypass the
gatewayy altogether
See at:
1) openvpn / ipsec tunnels
2) IAX protocol
Firewall defines the report not on ports, and traffic contents. Change
of ports will not help
hope it helps..
On Thu, 2010-02-11 at 14:37 +0100, mosbah.abdelkader wrote:
Hello,
I have the following situation: A firewall is blocking
On Wed, 2010-01-27 at 11:47 +0100, Administrator TOOTAI wrote:
Hi,
we had an attack on a server and we don't understand how it was
possible, Asterisk 1.4.28/Debian Lenny 5.1 Attacker came from PALTEL,
network 188.161.128.0/18
Hacked account had following setup:
[111]
type=friend