On Wed, Mar 10, 2010 at 8:19 AM, Burden, Mike <[email protected]> wrote:
> Polycom IP550 and Polycom IP650 phones
> Bootrom: 4.2.0.0310
> Firmware: 3.1.3.0439
>
> sipXecs: 4.0.4
>
> Phones are on the same subnet as the sipXecs server. Calls are placed
> through a SIP Trunk via an ITSP.
> The ITSP "is a CLEC with Class 4/5 switches (i.e. we can provide dial-tone
> just like the LEC).
> We don't interface at the FXO/FXS level, we have many hundreds of DS3
> level SS7 trunks into the PSTN."
>
> Wireshark traces taken outside the firewall show normal looking DTMF
> packets (to the best that I can tell)
> I've obfuscated the IP addresses in the trace. 192.168.1.1 is us, and
> 172.16.1.1 is the ITSP.
>
> No. Time Source Destination Protocol
> Info
> 177 12:44:07.305097 192.168.1.1 172.16.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0x61520DE1, Seq=44802, Time=3427727744
> 178 12:44:07.321504 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1449, Time=1042988751
> 179 12:44:07.324745 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 180 12:44:07.341535 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1450, Time=1042988911
> 181 12:44:07.344742 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 182 12:44:07.361505 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1451, Time=1042989071
> 183 12:44:07.364797 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 184 12:44:07.381571 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1452, Time=1042989231
> 185 12:44:07.384723 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 186 12:44:07.401583 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1453, Time=1042989391
> 187 12:44:07.404729 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 188 12:44:07.421565 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1454, Time=1042989551
> 189 12:44:07.424735 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 190 12:44:07.445174 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 191 12:44:07.450102 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1455, Time=1042989711
> 192 12:44:07.461546 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1456, Time=1042989871
> 193 12:44:07.464748 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 194 12:44:07.481501 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1457, Time=1042990031
> 195 12:44:07.484732 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 196 12:44:07.501554 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1458, Time=1042990191
> 197 12:44:07.504746 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 198 12:44:07.521734 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1459, Time=1042990351
> 199 12:44:07.524742 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 200 12:44:07.541784 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1460, Time=1042990511
> 201 12:44:07.544767 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 202 12:44:07.561713 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1461, Time=1042990671
> 203 12:44:07.564786 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 204 12:44:07.581647 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1462, Time=1042990831
> 205 12:44:07.584744 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9
> 206 12:44:07.599711 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1463, Time=1042990991
> 207 12:44:07.604724 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9 (end)
> 208 12:44:07.619888 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1464, Time=1042991151
> 209 12:44:07.624860 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9 (end)
> 210 12:44:07.639953 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1465, Time=1042991311
> 211 12:44:07.644716 192.168.1.1 172.16.1.1 RTP EVENT
> Payload type=RTP Event, DTMF Nine 9 (end)
> 212 12:44:07.659935 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1466, Time=1042991471
> 213 12:44:07.665032 192.168.1.1 172.16.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0x61520DE1, Seq=44820, Time=3427730624, Mark
> 214 12:44:07.679882 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1467, Time=1042991631
> 215 12:44:07.684951 192.168.1.1 172.16.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0x61520DE1, Seq=44821, Time=3427730784
> 216 12:44:07.699905 172.16.1.1 192.168.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0xB7FD9F32, Seq=1468, Time=1042991791
> 217 12:44:07.704979 192.168.1.1 172.16.1.1 RTP
> PT=ITU-T G.711 PCMU, SSRC=0x61520DE1, Seq=44822, Time=3427730944
>
>
> Mike Burden
> Lynk Systems, Inc
> e-mail: [email protected]
> Phone: 616-532-4985
>
>
>
>
> -----Original Message-----
> From: Scott Lawrence [mailto:[email protected]]
> Sent: Tuesday, March 09, 2010 6:24 PM
> To: Burden, Mike
> Cc: [email protected]
> Subject: Re: [sipx-users] DTMF Issues Revisited
>
> On Tue, 2010-03-09 at 17:05 -0500, Burden, Mike wrote:
> > OK, it looks like my understanding was way off base.
> >
> >
> >
> > On the advice of Dave D., Eric V. and Dave W., I’ve tried:
> >
> > - Locking the phones into G.711
> >
> > - Increasing the DTMF On/Off times from 50 to 150 (tested at 25ms
> > increments)
> >
> > - Increased the DTMF level from -15db to -7db
> >
> > - Verified that RFC2833Control is enabled
> >
> > - Verified that ViaRTP is enabled
> >
> > - Verified that RFC2833Payload is set to 101
>
> I've just gone back and looked through all of this thread and I don't
> see any message in which you describe what the configuration is.
>
> What phones are you using? What version?
> What is your interface to the PSTN?
> Is there anything between sipXecs and that PSTN interface?
>
> Network debugging based on trial and error is rarely successful.
> Trace the packets - looking at what is actually on the wire during your
> experimental calls will isolate where your DTMF is being lost.
>
>
>
> _______________________________________________
> sipx-users mailing list [email protected]
> List Archive: http://list.sipfoundry.org/archive/sipx-users
> Unsubscribe: http://list.sipfoundry.org/mailman/listinfo/sipx-users
> sipXecs IP PBX -- http://www.sipfoundry.org/
>
A real siptrace of a call that DTMF did not work properly on with a
description indicating what was pressed might actually be helpful.
Version of sipxecs?
Polycom Bootrom?
Polycom Firmware?
What ITSP?
I used to have this problem with my cellphone (independent if sipx) and I
had to enabled a function on my cellphone to allow me to control the
duration of a key press. The default setting for this in sipx 4.0.4 are:
<DTMF
tone.dtmf.level="-15"
tone.dtmf.onTime="50"
tone.dtmf.offTime="50"
tone.dtmf.chassis.masking="0"
tone.dtmf.stim.pac.offHookOnly="0"
tone.dtmf.viaRtp="1"
tone.dtmf.rfc2833Control="1"
tone.dtmf.rfc2833Payload="127"
/>
I am somewhat doubtful that the DTMF setting are at issue here. I say that
because whether through an Ingate, PRI or sipxbridge I have never seen this.
All the above does is indicate someone pressed a key a bunch of times.
Is a siptrace available?
Tony
_______________________________________________
sipx-users mailing list [email protected]
List Archive: http://list.sipfoundry.org/archive/sipx-users
Unsubscribe: http://list.sipfoundry.org/mailman/listinfo/sipx-users
sipXecs IP PBX -- http://www.sipfoundry.org/