Re: [asterisk-users] dahdi and oslec

2010-03-03 Thread wins mallow
On Wed, 2010-03-03 at 11:31 +0530, Chandrakant Solanki wrote: > Hi All, > > I have followed below steps to enable echo cancellation. > > # cd /usr/src > # wget http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.28.tar.bz2 > # tar xjf linux-2.6.28.tar.bz2 > # tar zxvf dahdi-linux-2.1.0.4.tar.gz > #

Re: [asterisk-users] dahdi and oslec

2010-03-02 Thread wins mallow
On Wed, 2010-03-03 at 11:31 +0530, Chandrakant Solanki wrote: > Hi All, > > I have followed below steps to enable echo cancellation. > > # cd /usr/src > # wget http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.28.tar.bz2 > # tar xjf linux-2.6.28.tar.bz2 > # tar zxvf dahdi-linux-2.1.0.4.tar.gz > #

Re: [asterisk-users] dahdi and oslec

2010-03-02 Thread wins mallow
On Wed, 2010-03-03 at 11:31 +0530, Chandrakant Solanki wrote: > Hi All, > > I have followed below steps to enable echo cancellation. > > # cd /usr/src > # wget http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.28.tar.bz2 > # tar xjf linux-2.6.28.tar.bz2 > # tar zxvf dahdi-linux-2.1.0.4.tar.gz > #

Re: [asterisk-users] directrtp with SIP + H.323

2010-02-23 Thread wins mallow
On Tue, 2010-02-23 at 08:22 -0500, Michelle Dupuis wrote: > We're creating a SIP gateway for a client that will take one leg of a > call in via SIP, and out the other side via H.323. To minimize load > on the gateway, we would like to have the RTP stream bypass the > gatewayy altogether (directrtp

Re: [asterisk-users] SIP tunnel

2010-02-11 Thread wins mallow
See at: 1) openvpn / ipsec tunnels 2) IAX protocol Firewall defines the report not on ports, and traffic contents. Change of ports will not help hope it helps.. On Thu, 2010-02-11 at 14:37 +0100, mosbah.abdelkader wrote: > Hello, > > > > I have the following situation: A firewall is blocki

Re: [asterisk-users] Unregistred users can pass calls, peer being static

2010-01-27 Thread wins mallow
On Wed, 2010-01-27 at 11:47 +0100, Administrator TOOTAI wrote: > Hi, > > we had an attack on a server and we don't understand how it was > possible, Asterisk 1.4.28/Debian Lenny 5.1 Attacker came from PALTEL, > network 188.161.128.0/18 > > Hacked account had following setup: > > [111] > type=f