Hi Bogdan,

I had tried both.  I'm compiling the latest 1.6; when that completes I'll
try again.  Which way is recommended?

I have a functioning configuration otherwise.  If I simply want topology
hiding between the UAC and UAS, it is as simple as invoking the b2bua at
some point and the rest will simply work as it did previously?  or am I
missing something?


- Jeff



On 9/15/09 11:03 AM, "Bogdan-Andrei Iancu" <[email protected]> wrote:

> Hi Jeff,
> 
> How are the auth and b2bua chained ? you first do auth and after that
> invoke the b2bua ? or?
> 
> Regards,
> Bogdan
> 
> Jeff Pyle wrote:
>> Hello,
>> 
>> What impact does authentication have on the b2bua modules?  When I put
>> b2b_init_request("top hiding") into my otherwise functioning script, very
>> strange things happen.
>> 
>> In order to achieve topology hiding, is it as simple as inserting this init
>> line at some point, or is there more to it?
>> 
>> 
>> - Jeff
>> 
>> 
>> _______________________________________________
>> Users mailing list
>> [email protected]
>> http://lists.opensips.org/cgi-bin/mailman/listinfo/users
>> 
>>   
> 
> 
> _______________________________________________
> Users mailing list
> [email protected]
> http://lists.opensips.org/cgi-bin/mailman/listinfo/users


_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

Reply via email to