Dear Kamailio'ns,
I am working on Kamailio server (V 4.1.2) with RTPproxy (1.2.1) integrated, in a standalone intranet infrastructure (no any connection with internet). I dont have any NAT settings in my network set-up. even though i will not get Audio/video calls through some times. So in that concern I have installed RTPproxy, now all the audio/Video calls are fine (with some Pixelled). I have the Following Kamailio configuration script, in which it suppose to invoke RTPproxy service when the SIP clients behind NAT. But every time when i do Audio/Video calls, they are proxying through RTPproxy server only. I analysed SIP captures of Audio/video call, i didnt found any IP/port changes in the whole SIP session and with this i assumed that there is no NAT issue in my Network. But why all the Audio/Video calls are proxying through RTPproxy everytime ?
Is there any Wrong placement of function call in Kamailio configuration script (below) ? #----------------------------------------------------------------- #!ifdef WITH_NAT # ----- rtpproxy params ----- modparam("rtpproxy", "rtpproxy_sock", "udp:127.0.0.1:7722")
# ----- nathelper params ----- modparam("nathelper", "natping_interval", 30) modparam("nathelper", "ping_nated_only", 1) modparam("nathelper", "sipping_bflag", 7) modparam("nathelper", "sipping_from", "sip:pinger@192.168.2.52") modparam("nathelper", "sipping_method", "INFO")
# ----- NAT_traversal ----- modparam("nat_traversal", "keepalive_interval", 60) modparam("nat_traversal", "keepalive_method", "NOTIFY") modparam("nat_traversal", "keepalive_state_file", "/var/run/kamailio/keepalive_state")
# ----- params needed for NAT traversal in other modules ----- modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)") modparam("usrloc", "nat_bflag", 6) #!endif
#Routing Script # ----------------------------------------------------------------- # Sanity Check Section # ----------------------------------------------------------------- route { if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); break; }; #if (msg:len > max_len) { if (msg:len >= 8192 ) { sl_send_reply("513", "Message too big"); break; };
# ----------------------------------------------------------------- # Record Route Section # ----------------------------------------------------------------- #if (method!="REGISTER") { if (!method=="REGISTER") { record_route(); }; if (method=="BYE" || method=="CANCEL") { # unforce_rtp_proxy(); rtpproxy_answer(); }
# ----------------------------------------------------------------- # Loose Route Section # ----------------------------------------------------------------- if (loose_route()) {
if ((method=="INVITE" || method=="REFER") && !has_totag()) { sl_send_reply("403", "Forbidden"); break; };
if (method=="INVITE") { if (!proxy_authorize("192.168.2.52","subscriber")) { # proxy_challenge("","0"); proxy_challenge("192.168.2.52", "0"); # break; }
else if (!check_from()) { sl_send_reply("403", "Use From=ID"); break; };
consume_credentials(); if (nat_uac_test("19")) { setflag(6); force_rport(); fix_nated_contact(); }; rtpproxy_offer("l"); }; route(1); break; };
# ----------------------------------------------------------------- # Call Type Processing Section # ----------------------------------------------------------------- # if (uri!=myself) { if (!uri==myself) { route(4);
route(1); break; };
if (method=="ACK") { route(1); break; }
if (method=="CANCEL") { route(1); break; }
else if (method=="INVITE") { route(3); break; } else if (method=="REGISTER") { route(2); break; };
lookup("aliases"); if (uri!=myself) { route(4);
route(1); break; };
if (!lookup("location")) { sl_send_reply("404", "User Not Found"); break; }; route(1); }
# ----------------------------------------------------------------- # Default Message Handler # ----------------------------------------------------------------- route[1] { t_on_reply("1");
if (!t_relay()) {
if (method=="INVITE" && isflagset(6)) { rtpproxy_answer();; };
sl_reply_error(); }; }
# ----------------------------------------------------------------- # REGISTER Message Handler # ----------------------------------------------------------------- route[2] { if (!search("^Contact:[ ]**") && nat_uac_test("19")) { setflag(6); fix_nated_register(); force_rport(); }; sl_send_reply("100", "Trying");
if (!www_authorize("192.168.2.52","subscriber")) { www_challenge("192.168.2.52","0"); break; };
if (!check_to()) { sl_send_reply("401", "Unauthorized"); break; };
consume_credentials(); if (!save("location")) { sl_reply_error(); }; }
# ----------------------------------------------------------------- # INVITE Message Handler # ----------------------------------------------------------------- route[3] { if (!proxy_authorize("192.168.2.52","subscriber")) { proxy_challenge("192.168.2.52","0"); break; } else if (!check_from()) { sl_send_reply("403", "Use From=ID"); break; }; consume_credentials(); if (nat_uac_test("19")) { setflag(6); }
lookup("aliases"); if (uri!=myself) { route(4);
route(1); break; };
if (!lookup("location")) { sl_send_reply("404", "User Not Found"); break; };
route(4); route(1); }
# ----------------------------------------------------------------- # NAT Traversal Section # ----------------------------------------------------------------- route[4] { if (isflagset(6)) { force_rport(); fix_nated_contact(); # force_rtp_proxy(); rtpproxy_offer(); } }
onreply_route[1] { if (isflagset(6) && status=~"(180)|(183)|2[0-9][0-9]") { if (!search("^Content-Length:[ ]*0")) { # force_rtp_proxy(); rtpproxy_offer(); }; };
if (nat_uac_test("1")) { fix_nated_contact(); }; }
Please find the Attachment for Tcpdump based Video call Sip capture for your better Understanding.
PS: Both Kamailio and RTPproxy are running on same IP (host), i.e 192.168.2.52.
Please anybody help me in resolving this issue.
Any help will greatly appreciate.
Regards, Ravi.