Have a look at:
http://malphx.free.fr/dotclear/index.php?post/2010/08/17/Playing-with-SIP-NMAP-and-NSE

Needs nmap 5.0 or greater: http://nmap.org/download.html
Works with/without sipxecs running.  No need to stop it.

        Starting Nmap 5.21 ( http://nmap.org ) at 2010-12-28 08:27 EST
        NSE: Script Scanning completed.
        Nmap scan report for newyork.voip.ms (74.63.41.218)
        Host is up (0.036s latency).
        rDNS record for 74.63.41.218: us4.voipinterface.net
        PORT     STATE SERVICE VERSION
        5060/udp open  sip     VoIPMS/SERAST (SIP end point; Status: 200 OK)
        |_sip-map: SIP 2.0 compliant device detected

        Nmap done: 1 IP address (1 host up) scanned in 8.34 seconds

Probably the easiest way:
traceroute -U newyork.voip.ms

With the UDP trace you will see if any routers/firewalls are blocking 
UDP traffic very quickly.

-- 
Regards
--------------------------------------
Gerald Drouillard
Technology Architect
Drouillard & Associates, Inc.
http://www.Drouillard.biz
_______________________________________________
sipx-users mailing list
[email protected]
List Archive: http://list.sipfoundry.org/archive/sipx-users/

Reply via email to