Just thinking out loud. I am wondering that if carefuly done, the
proxy maybe able to simply forward trunk calls made through 5060 towards
5080. Proxy must not record-route so that mid-dialog requests could be
handed off straight to the bridge. Any idea why this wasn't considered
instead of kludging it via firewall port forwarding?
On 8/20/10 10:54 PM, Michael Scheidell wrote:
my testing now, with level3 (they currently are sending to port 5080,
sending EVERYTHING to port 5080, I think. maybe I am wrong?)
you are right.
I can't just take ANYTHING from the ITSP coming in on udp port 5060
and fwd to port 5080.
here was an outbound call (itsp is sending to my port 5080.. but calls
are still on udp 5060)
tcpdump -n -p not host 10.70.3.3 and not arp and not host
10.70.255.255 and not host 255.255.255.255 and host 4.55.34.48 and
port 5060
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
I ASSUME that with tcp we could have used packet stats to only port
forward new packets?
does this packet trace suggest that this won't work?
I don't have any rules in place right now, except that I asked L3 to
FWD to my udp port 5080.
when I make an outbound call (udp 5060), they respond on udp 5060.
with the REDIRECT rules in place, this would break the call path,
wouldn't it?
10:51:37.138591 IP 10.72.0.2.5080 > 4.55.34.48.sip: SIP, length: 1072
10:51:37.171915 IP 4.55.34.48.sip > 10.72.0.2.5080: SIP, length: 294
10:51:39.087239 IP 4.55.34.48.sip > 10.72.0.2.5080: SIP, length: 924
10:51:39.330646 IP 4.55.34.48.sip > 10.72.0.2.5080: SIP, length: 965
10:51:39.376380 IP 10.72.0.2.5080 > 4.55.34.48.sip: SIP, length: 459
10:51:43.651919 IP 10.72.0.2.5080 > 4.55.34.48.sip: SIP, length: 897
10:51:43.688742 IP 4.55.34.48.sip > 10.72.0.2.5080: SIP, length: 345
On 8/20/10 10:46 AM, M. Ranganathan wrote:
It is workable if you do not have remote workers configured.
We tested (successfully) against AT&T but without remote workers
following that strategy.
Ranga
--
Michael Scheidell, CTO
o: 561-999-5000
d: 561-948-2259
ISN: 1259*1300
> *| *SECNAP Network Security Corporation
* Certified SNORT Integrator
* 2008-9 Hot Company Award Winner, World Executive Alliance
* Five-Star Partner Program 2009, VARBusiness
* Best in Email Security,2010: Network Products Guide
* King of Spam Filters, SC Magazine 2008
------------------------------------------------------------------------
This email has been scanned and certified safe by SpammerTrap®.
For Information please see http://www.secnap.com/products/spammertrap/
------------------------------------------------------------------------
_______________________________________________
sipx-users mailing list
sipx-users@list.sipfoundry.org
List Archive: http://list.sipfoundry.org/archive/sipx-users/
_______________________________________________
sipx-users mailing list
sipx-users@list.sipfoundry.org
List Archive: http://list.sipfoundry.org/archive/sipx-users/