[Serusers] 1 SER & 2 Providers
Kevin Brennan
kevin.brennan at redsquared.com
Sun Aug 28 18:43:57 CEST 2005
This will not fix incoming calls to the other provider, ie. this assumes
the other service providers PSTN gateway is forwarding to your SER a/c.
Asterisk would let you register as a UA with all service providers and
receive calls on the same extension. Br /Kev/
Juan Priotti wrote:
> Just add the DID's provided as alias of the user:
>
> serctl alias add <DID 1st provider> <customer's uri>
> serctl alias add <DID 2nd provider> <customer's uri>
>
> and calls made to bith DID's will be routed to the same customer.
>
> ----- Original Message -----
> *From:* Ozan Blotter <mailto:cosmocid at ispro.net.tr>
> *To:* serusers at lists.iptel.org <mailto:serusers at lists.iptel.org>
> *Sent:* Saturday, August 27, 2005 4:04 AM
> *Subject:* [Serusers] 1 SER & 2 Providers
>
> Dear List,
>
> Assume that there are two different service providers and one SER in
> middle of them. A client needs to use/connect SER but also he/she
> has accounts in both providers and both supplied him/her DDIs
> (landline phone). Now again assume that client registers both of
> phones into SER. But still he/she wants to receive calls from both
> providers, is it possible to receive calls from different providers
> to that client and/or how to i setup ?
>
> In current SER.CFG below, i only setup one prefix which is "0", but
> i can change it to any and/or add many prefixes, ex: 0049 (germany),
> 001 (usa), 0044 (uk), 0090 (turkey) to Provider 1 and 0033 (france),
> 0038 (italy) to Provider 2 and so on.
>
>
> debug=3
> fork=yes
> log_stderror=no
>
> listen=212.XXX.104.XXX # This is SER's Public IP
> port=5060
> children=4
>
> alias=212.XXX.104.XXX # This is SER's Public IP
>
> dns=no
> rev_dns=no
>
> fifo="/tmp/openser_fifo"
> fifo_db_url="mysql://openser:openserrw@localhost/openser"
>
> loadmodule "/usr/local/lib/openser/modules/mysql.so"
> loadmodule "/usr/local/lib/openser/modules/sl.so"
> loadmodule "/usr/local/lib/openser/modules/tm.so"
> loadmodule "/usr/local/lib/openser/modules/rr.so"
> loadmodule "/usr/local/lib/openser/modules/maxfwd.so"
> loadmodule "/usr/local/lib/openser/modules/usrloc.so"
> loadmodule "/usr/local/lib/openser/modules/registrar.so"
> loadmodule "/usr/local/lib/openser/modules/auth.so"
> loadmodule "/usr/local/lib/openser/modules/auth_db.so"
> loadmodule "/usr/local/lib/openser/modules/uri.so"
> loadmodule "/usr/local/lib/openser/modules/uri_db.so"
> loadmodule "/usr/local/lib/openser/modules/mediaproxy.so"
> loadmodule "/usr/local/lib/openser/modules/nathelper.so"
> loadmodule "/usr/local/lib/openser/modules/textops.so"
> loadmodule "/usr/local/lib/openser/modules/domain.so"
> loadmodule "/usr/local/lib/openser/modules/acc.so"
>
> modparam("auth_db", "calculate_ha1", 1)
> modparam("auth_db", "password_column", "password")
> modparam("auth_db", "use_domain", 1)
>
> modparam("domain", "db_mode", 1)
>
> modparam("nathelper", "rtpproxy_disable", 1)
> modparam("nathelper", "natping_interval", 180)
>
> modparam("mediaproxy","natping_interval", 30)
> modparam("mediaproxy","mediaproxy_socket", "/var/run/mediaproxy.sock")
> modparam("mediaproxy","sip_asymmetrics","/usr/local/etc/openser/sip-asymmetric-clients")
> modparam("mediaproxy","rtp_asymmetrics","/usr/local/etc/openser/rtp-asymmetric-clients")
>
> modparam("usrloc", "db_mode", 2)
> modparam("usrloc", "use_domain", 1)
>
> modparam("registrar", "default_expires", 60)
> modparam("registrar", "min_expires", 30)
> modparam("registrar", "nat_flag", 6)
> modparam("registrar", "use_domain", 1)
>
> modparam("rr", "enable_full_lr", 1)
>
> modparam("acc", "db_url", "mysql://openser:openserrw@localhost/openser")
> modparam("acc", "failed_transactions", 1)
> modparam("acc", "log_level", 1)
> modparam("acc", "log_flag", 1)
> modparam("acc", "db_flag", 1)
>
> route {
>
> #
> -----------------------------------------------------------------
> # Sanity Check Section
> #
> -----------------------------------------------------------------
> if (!mf_process_maxfwd_header("10")) {
> sl_send_reply("483", "Too Many Hops");
> break;
> };
>
> if (msg:len > max_len) {
> sl_send_reply("513", "Message Overflow");
> break;
> };
>
> #
> -----------------------------------------------------------------
> # Record Route Section and Acc section
> #
> -----------------------------------------------------------------
> if (method=="INVITE" && client_nat_test("3")) {
>
> record_route_preset("212.XXX.104.XXX:5060;nat=yes"); # This
> is SER's Public IP
> } else if (method!="REGISTER") {
> if!(uri=~"^sip:833[0-9]*@") { # I do not want to make
> accounting if clients' prefix is beginning with 833
> record_route();
> setflag(1);
> }
> };
>
> #
> -----------------------------------------------------------------
> # Call Tear Down Section
> #
> -----------------------------------------------------------------
> if (method=="BYE" || method=="CANCEL") {
> end_media_session();
> };
>
> #
> -----------------------------------------------------------------
> # Loose Route Section
> #
> -----------------------------------------------------------------
> if (loose_route()) {
>
> if (has_totag() && (method=="INVITE" ||
> method=="ACK")) {
>
> if (client_nat_test("3") ||
> search("^Route:.*;nat=yes")) {
> setflag(6);
> use_media_proxy();
> };
> };
>
> route(1);
> break;
> };
>
> #
> -----------------------------------------------------------------
> # Call Type Processing Section
> #
> -----------------------------------------------------------------
>
> if (uri!=myself) {
> route(1);
> break;
> };
>
> if (uri==myself) {
>
> if (method=="CANCEL") {
> route(3);
> break;
> } else if (method=="INVITE") {
> route(3);
> break;
> } else if (method=="REGISTER") {
> route(2);
> break;
> };
>
> lookup("aliases");
> if (uri!=myself) {
> route(1);
> break;
> };
>
> if (!lookup("location")) {
> sl_send_reply("404", "User Not Found");
> break;
> };
> };
>
> route(1);
> }
>
> route[1] {
>
> #
> -----------------------------------------------------------------
> # Default Message Handler
> #
> -----------------------------------------------------------------
>
> t_on_reply("1");
>
> if (!t_relay()) {
>
> if (method=="INVITE" || method=="ACK") {
> end_media_session();
> };
>
> sl_reply_error();
> };
> }
>
> route[2] {
>
> #
> -----------------------------------------------------------------
> # REGISTER Message Handler
> #
> ----------------------------------------------------------------
>
> if (!search("^Contact:\ +\*") && client_nat_test("7")) {
> setflag(6);
> fix_nated_register();
> force_rport();
> };
>
> sl_send_reply("100", "Trying");
>
> if (!www_authorize("","subscriber")) {
> www_challenge("","0");
> break;
> };
>
> if (!check_to()) {
> sl_send_reply("401", "Unauthorized");
> break;
> };
>
> consume_credentials();
>
> if (!save("location")) {
> sl_reply_error();
> };
> }
>
> route[3] {
>
> #
> -----------------------------------------------------------------
> # CANCEL and INVITE Message Handler
> #
> -----------------------------------------------------------------
>
> if (client_nat_test("3")) {
> setflag(7);
> force_rport();
> fix_nated_contact();
> };
>
> lookup("aliases");
> if (uri!=myself) {
> route(1);
> break;
> };
>
> if (uri=~"^sip:0[0-9]*@*") { # If calling number is
> beginning with prefix 0, route it to PSTN
> rewritehost("195.XXX.122.XXX"); # This is PSTN
> Gateway's Public IP
> route(1);
> break;
> };
>
> if (!lookup("location")) {
> sl_send_reply("404", "User Not Found");
> break;
> };
>
> if (method=="CANCEL") {
> route(1);
> break;
> };
>
> if (!proxy_authorize("","subscriber")) {
> proxy_challenge("","0");
> break;
> } else if (!check_from()) {
> sl_send_reply("403", "Use From=ID");
> break;
> };
>
> consume_credentials();
>
> if (isflagset(6) || isflagset(7)) {
> use_media_proxy();
> };
>
> route(1);
> }
>
> onreply_route[1] {
>
> if ((isflagset(6) || isflagset(7)) &&
> (status=~"(180)|(183)|2[0-9][0-9]")) {
>
> if (!search("^Content-Length:\ +0")) {
> use_media_proxy();
> };
> };
>
> if (client_nat_test("1")) {
> fix_nated_contact();
> };
> }
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> Serusers mailing list
> serusers at lists.iptel.org
> http://lists.iptel.org/mailman/listinfo/serusers
>
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> Serusers mailing list
> serusers at lists.iptel.org
> http://lists.iptel.org/mailman/listinfo/serusers
More information about the sr-users
mailing list