FW: [Serusers] Ser+RTPproxy+Asterisk
Sanjay Duggal
Sanjayd at Pressis.com
Wed Jun 9 11:33:53 CEST 2004
Im also sending my new ser.cfg file
I have started ptpproxy with -l and my outside ip
SD
#d: ser.cfg,v 1.21.4.1 2003/11/10 15:35:15 andrei Exp $
#
# simple quick-start config script
#
# ----------- global configuration parameters ------------------------
#debug=3 # debug level (cmd line: -dddddddddd)
#fork=yes
#log_stderror=no # (cmd line: -E)
# Uncomment these lines to enter debugging mode
debug=9
#fork=no
log_stderror=yes
#alias="mydomain.com"
alias="mydomain.com"
alias="192.168.0.100"
alias="192.168.0.200"
check_via=no # (cmd. line: -v)
dns=no # (cmd. line: -r)
rev_dns=no # (cmd. line: -R)
#port=5060
#children=4
fifo="/tmp/ser_fifo"
# ------------------ module loading ----------------------------------
# Uncomment this if you want to use SQL database
loadmodule "/usr/local/lib/ser/modules/mysql.so"
loadmodule "/usr/local/lib/ser/modules/sl.so"
loadmodule "/usr/local/lib/ser/modules/tm.so"
loadmodule "/usr/local/lib/ser/modules/rr.so"
loadmodule "/usr/local/lib/ser/modules/maxfwd.so"
loadmodule "/usr/local/lib/ser/modules/usrloc.so"
loadmodule "/usr/local/lib/ser/modules/registrar.so"
loadmodule "/usr/local/lib/ser/modules/textops.so"
# accounting
#loadmodule "/usr/local/lib/ser/modules/acc.so"
# Uncomment this if you want digest authentication
# mysql.so must be loaded !
loadmodule "/usr/local/lib/ser/modules/auth.so"
loadmodule "/usr/local/lib/ser/modules/auth_db.so"
#loadmodule "/usr/local/lib/ser/modules/auth_radius.so"
# Nathelper
loadmodule "/usr/local/lib/ser/modules/nathelper.so"
# ----------------- setting module-specific parameters ---------------
# -- usrloc params --
#modparam("usrloc", "db_mode", 0)
# Uncomment this if you want to use SQL database
# for persistent storage and comment the previous line
modparam("usrloc", "db_mode", 2)
# -- auth params --
# Uncomment if you are using auth module
#
modparam("auth_db", "calculate_ha1", yes)
#
# If you set "calculate_ha1" parameter to yes (which true in this config),
# uncomment also the following parameter)
#
modparam("auth_db", "password_column", "password")
# -- rr params --
# add value to ;lr param to make some broken UAs happy
modparam("rr", "enable_full_lr", 1)
# -- nathelper params --
modparam("registrar", "nat_flag", 6)
modparam("nathelper", "natping_interval", 30)
modparam("nathelper", "ping_nated_only", 1)
# -- acc params --
#modparam("acc", "radius_config",
#"/usr/local/etc/radiusclient/radiusclient.conf")
#modparam("acc", "log_level", 1)
#modparam("acc", "radius_flag", 1)
#modparam("acc", "report_ack", 0)
# ------------------------- request routing logic -------------------
# main routing logic
route{
# initial sanity checks -- messages with
# max_forwards==0, or excessively long requests
if (!mf_process_maxfwd_header("10")) {
sl_send_reply("483","Too Many Hops");
break;
};
if ( msg:len > max_len ) {
sl_send_reply("513", "Message too big");
break;
};
if (method=="REGISTER")
log(1, "REGISTER message received\n");
if (method=="INVITE")
log(1, "INVITE message received\n");
if (method=="ACK")
log(1, "ACK message received\n");
if (method=="BYE")
log(1, "BYE message received\n");
if (method=="CANCEL")
log(1, "CANCEL message received\n");
if (method=="SUBSCRIBE")
log(1, "SUBSCRIBE message received\n");
if (method=="NOTIFY")
log(1, "NOTIFY message received\n");
if (method=="OPTIONS")
log(1, "OPTIONS message received\n");
if (method=="INFO")
log(1, "INFO message received\n");
if (method=="MESSAGE")
log(1, "MESSAGE message received\n");
if (method=="REFER")
log(1, "REFER message received\n");
if (nat_uac_test("3")) {
if (method == "REGISTER" || !search("^Record-Route:")) {
log("LOG: Kolejny NATowiec...\n");
fix_nated_contact();
if (method == "INVITE") {
fix_nated_sdp("1");
};
force_rport();
setflag(6);
};
};
record_route();
if (loose_route()) {
route(1);
#t_relay();
break;
};
if (method=="REGISTER") {
# if (!radius_www_authorize("xxx.xxx.xxx.xxx")) {
# www_challenge("xxx.xxx.xxx.xxx", "0");
# break;
# };
save("location");
break;
};
if (uri=~"sip:*@my.iptelefoni.no" || uri=~"sip:2153*") {
if (!lookup("location")) {
sl_send_reply("404", "Not Found");
break;
};
# going to pstn
} else {
if (search("(f|From): .*3267940@*")) { # fax numbers
# forward to fax gw
rewritehostport("192.168.0.250:5060");
} else {
# forward to voice gw
rewritehostport("192.168.0.200:5070");
};
};
setflag(1);
route(1);
}
route[1]
{
if (isflagset(6)){
force_rtp_proxy();
};
t_on_reply("1");
if (!t_relay()){
sl_reply_error();
};
}
onreply_route[1]
{
# nated ?
if (isflagset(6) && status =~ "(183)|2[0-9][0-9]"){
fix_nated_contact();
force_rtp_proxy();
} else if (nat_uac_test("1")) {
fix_nated_contact();
};
}
---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.701 / Virus Database: 458 - Release Date: 07.06.2004
More information about the sr-users
mailing list