Joegen
I think a possible solution close to what you are suggesting is captured here. This would likely be the most elegant solution. http://track.sipfoundry.org/browse/XX-5010 Solving the problem described here might be easier and get us part of the way. Eventually we will need to address both. http://track.sipfoundry.org/browse/XX-4818 http://track.sipfoundry.org/browse/XX-8692 --martin From: sipx-users-boun...@list.sipfoundry.org [mailto:sipx-users-boun...@list.sipfoundry.org] On Behalf Of Joegen Baclor Sent: Friday, August 20, 2010 7:14 PM To: Michael Scheidell Cc: sipx-users@list.sipfoundry.org Subject: Re: [sipx-users] SIMPLE SOLUTION FOR ITSP'S WHO SEND TO PORT 5060 Re: iptables experts: port forwarding. Just thinking out loud. I am wondering that if carefuly done, the proxy maybe able to simply forward trunk calls made through 5060 towards 5080. Proxy must not record-route so that mid-dialog requests could be handed off straight to the bridge. Any idea why this wasn't considered instead of kludging it via firewall port forwarding? On 8/20/10 10:54 PM, Michael Scheidell wrote: my testing now, with level3 (they currently are sending to port 5080, sending EVERYTHING to port 5080, I think. maybe I am wrong?) you are right. I can't just take ANYTHING from the ITSP coming in on udp port 5060 and fwd to port 5080. here was an outbound call (itsp is sending to my port 5080.. but calls are still on udp 5060) tcpdump -n -p not host 10.70.3.3 and not arp and not host 10.70.255.255 and not host 255.255.255.255 and host 4.55.34.48 and port 5060 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes I ASSUME that with tcp we could have used packet stats to only port forward new packets? does this packet trace suggest that this won't work? I don't have any rules in place right now, except that I asked L3 to FWD to my udp port 5080. when I make an outbound call (udp 5060), they respond on udp 5060. with the REDIRECT rules in place, this would break the call path, wouldn't it? 10:51:37.138591 IP 10.72.0.2.5080 > 4.55.34.48.sip: SIP, length: 1072 10:51:37.171915 IP 4.55.34.48.sip > 10.72.0.2.5080: SIP, length: 294 10:51:39.087239 IP 4.55.34.48.sip > 10.72.0.2.5080: SIP, length: 924 10:51:39.330646 IP 4.55.34.48.sip > 10.72.0.2.5080: SIP, length: 965 10:51:39.376380 IP 10.72.0.2.5080 > 4.55.34.48.sip: SIP, length: 459 10:51:43.651919 IP 10.72.0.2.5080 > 4.55.34.48.sip: SIP, length: 897 10:51:43.688742 IP 4.55.34.48.sip > 10.72.0.2.5080: SIP, length: 345 On 8/20/10 10:46 AM, M. Ranganathan wrote: It is workable if you do not have remote workers configured. We tested (successfully) against AT&T but without remote workers following that strategy. Ranga -- Michael Scheidell, CTO o: 561-999-5000 d: 561-948-2259 ISN: 1259*1300 > | SECNAP Network Security Corporation . Certified SNORT Integrator . 2008-9 Hot Company Award Winner, World Executive Alliance . Five-Star Partner Program 2009, VARBusiness . Best in Email Security,2010: Network Products Guide . King of Spam Filters, SC Magazine 2008 _____ This email has been scanned and certified safe by SpammerTrapR. For Information please see http://www.secnap.com/products/spammertrap/ _____ _______________________________________________ sipx-users mailing list sipx-users@list.sipfoundry.org List Archive: http://list.sipfoundry.org/archive/sipx-users/
_______________________________________________ sipx-users mailing list sipx-users@list.sipfoundry.org List Archive: http://list.sipfoundry.org/archive/sipx-users/