Have a look at: http://malphx.free.fr/dotclear/index.php?post/2010/08/17/Playing-with-SIP-NMAP-and-NSE
Needs nmap 5.0 or greater: http://nmap.org/download.html Works with/without sipxecs running. No need to stop it. Starting Nmap 5.21 ( http://nmap.org ) at 2010-12-28 08:27 EST NSE: Script Scanning completed. Nmap scan report for newyork.voip.ms (74.63.41.218) Host is up (0.036s latency). rDNS record for 74.63.41.218: us4.voipinterface.net PORT STATE SERVICE VERSION 5060/udp open sip VoIPMS/SERAST (SIP end point; Status: 200 OK) |_sip-map: SIP 2.0 compliant device detected Nmap done: 1 IP address (1 host up) scanned in 8.34 seconds Probably the easiest way: traceroute -U newyork.voip.ms With the UDP trace you will see if any routers/firewalls are blocking UDP traffic very quickly. -- Regards -------------------------------------- Gerald Drouillard Technology Architect Drouillard & Associates, Inc. http://www.Drouillard.biz _______________________________________________ sipx-users mailing list [email protected] List Archive: http://list.sipfoundry.org/archive/sipx-users/
