Re: [asterisk-users] dahdi and oslec

2010-03-03 Thread wins mallow
On Wed, 2010-03-03 at 11:31 +0530, Chandrakant Solanki wrote: Hi All, I have followed below steps to enable echo cancellation. # cd /usr/src # wget http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.28.tar.bz2 # tar xjf linux-2.6.28.tar.bz2 # tar zxvf dahdi-linux-2.1.0.4.tar.gz # ln -s

Re: [asterisk-users] dahdi and oslec

2010-03-02 Thread wins mallow
On Wed, 2010-03-03 at 11:31 +0530, Chandrakant Solanki wrote: Hi All, I have followed below steps to enable echo cancellation. # cd /usr/src # wget http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.28.tar.bz2 # tar xjf linux-2.6.28.tar.bz2 # tar zxvf dahdi-linux-2.1.0.4.tar.gz # ln -s

Re: [asterisk-users] dahdi and oslec

2010-03-02 Thread wins mallow
On Wed, 2010-03-03 at 11:31 +0530, Chandrakant Solanki wrote: Hi All, I have followed below steps to enable echo cancellation. # cd /usr/src # wget http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.28.tar.bz2 # tar xjf linux-2.6.28.tar.bz2 # tar zxvf dahdi-linux-2.1.0.4.tar.gz # ln -s

Re: [asterisk-users] directrtp with SIP + H.323

2010-02-23 Thread wins mallow
On Tue, 2010-02-23 at 08:22 -0500, Michelle Dupuis wrote: We're creating a SIP gateway for a client that will take one leg of a call in via SIP, and out the other side via H.323. To minimize load on the gateway, we would like to have the RTP stream bypass the gatewayy altogether

Re: [asterisk-users] SIP tunnel

2010-02-11 Thread wins mallow
See at: 1) openvpn / ipsec tunnels 2) IAX protocol Firewall defines the report not on ports, and traffic contents. Change of ports will not help hope it helps.. On Thu, 2010-02-11 at 14:37 +0100, mosbah.abdelkader wrote: Hello, I have the following situation: A firewall is blocking

Re: [asterisk-users] Unregistred users can pass calls, peer being static

2010-01-27 Thread wins mallow
On Wed, 2010-01-27 at 11:47 +0100, Administrator TOOTAI wrote: Hi, we had an attack on a server and we don't understand how it was possible, Asterisk 1.4.28/Debian Lenny 5.1 Attacker came from PALTEL, network 188.161.128.0/18 Hacked account had following setup: [111] type=friend