Re: [Fwd: Re: [Asterisk-Users] IAX config documentation]

2004-04-20 Thread Philipp von Klitzing
Hi!

 Boy after really digging into this, I have discovered that there is more 
 information about each of these topics than I previously realized. 
 Strangely, searching the wiki on iax returns exactly nothing. But 
 searching on iax2 does start to dig up some good stuff.

Unfortunately the Wiki indexer doesn't treat anything shorter than 4 
characters.

Cheers, Philipp


___
Asterisk-Users mailing list
[EMAIL PROTECTED]
http://lists.digium.com/mailman/listinfo/asterisk-users
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


[Fwd: Re: [Asterisk-Users] IAX config documentation]

2004-04-19 Thread Brian Cuthie
Boy after really digging into this, I have discovered that there is more 
information about each of these topics than I previously realized. 
Strangely, searching the wiki on iax returns exactly nothing. But 
searching on iax2 does start to dig up some good stuff.

Sorry for the hassle. Tough day.

-brian

 Original Message 
Subject: 	Re: [Asterisk-Users] IAX config documentation
Date: 	Mon, 19 Apr 2004 21:22:44 -0400
From: 	Brian Cuthie [EMAIL PROTECTED]
To: 	[EMAIL PROTECTED]
References: 	[EMAIL PROTECTED] 
[EMAIL PROTECTED]



I know that this stuff is. What I'm looking for is an overview of how 
these features work in the context of IAX. For instance, trunking is a 
concept I think we all get. But how do you use IAX to establish trunking 
between two switches?  What's the effect of turning the transfer 
option on? How are dialplans shared between switches that are connected 
via IAX? What kinds of authentication are supported? How are keys managed?

-brian

Steven Critchfield wrote:

On Mon, 2004-04-19 at 16:08, Brian Cuthie wrote:
 

Is there any documentation on configuring IAX between * machines?  I've 
noticed references to many topics in the config files, including:

- dialplans
   

This is extensions.conf work. Some of it can be shared via the switch
command.
 

- trunking
   

Trunking is easy, think of it kind of like a channelized t1. It combines
many calls into one packet with call data so as to reduce the overhead
of each individual call having it's own resources. Specifically it cuts
down on the overhead in IP, and allows you to reclaim some of the
bandwidth for more calls.
 

- authentication
   

You do want to know who is trying to call you don't you?

 

- transfers
   

Allows you to get out of the middle of a call. My office loves these as
our trunk lines are remote, and when we forward a call out to another
trunk line, our local asterisk machine transfers the call back to the
machine with trunk lines and removes the VoIP part of the loop.
 

But before I go and try to grok 8000 lines of source (in one file, no 
less) I was hoping that somewhere there exists even something like a man 
page that describes the configuration options.
   

There is plenty of banter on the list and info scattered about that
google will find for you than reading the source. Of course, you are
free to bludgen yourself with the code if you so wish. 

 

There's the beginnings of a whitepaper on wiki, but it's 
self-contradictory in some places, largely incomplete, and just kind of 
ends abruptly. Yet, it mentions that growing contingent of IAX devices. Huh.
   

Jump in and help finish it when you have read some and start to
understand the missing parts.
 



___
Asterisk-Users mailing list
[EMAIL PROTECTED]
http://lists.digium.com/mailman/listinfo/asterisk-users
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users