|
|
Author |
Message |
alexan88 Brekeke Junior Member
Joined: 03 Jan 2010 Posts: 5
Location: Los Angeles
|
Posted: Mon Jan 04, 2010 12:25 am Post subject: Can't get BSS work, if call from outside LAN |
|
|
1. Brekeke Product Name and version:Brekeke SIP Server , Version 2.4.3.0
2. Java version:6
3. OS type and the version:Win2008
4. UA (phone), gateway or other hardware/software involved:Softphone eyebeam, Speech server 2007
5. Select your network pattern from http://www.brekeke-sip.com/bbs/network/networkpatterns.html : pattern 8
6. Your problem:
Hi if i use the softphone in LAN 1 on the pattern , it will work correctly, but when i use the softphone outside the LAN, it will said service unavailable on the softphone status.(BSS call log said 302 moved temporarily)
basicly my topology is like this:
192.168.1.120:7060 -> speech server 2007
192.168.1.120:5060 -> BSS
outside ip is 97.93.32.50:5060
i use this dial plan
http://wiki.brekeke.com/wiki/Configure-Brekeke-SIP-Server-for-OCS
i wonder how to get this thing work, so i can call the application from outside for now( i will eventually purchase sip provider to route the did to my sip server).
this is the wireshark log
No. Time Source Destination Protocol Info
32 2.690959 192.168.1.120 208.54.14.112 SIP Status: 100 Trying
Frame 32 (437 bytes on wire, 437 bytes captured)
Ethernet II, Src: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.120 (192.168.1.120), Dst: 208.54.14.112 (208.54.14.112)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 423
Identification: 0x4cd5 (19669)
Flags: 0x00
Fragment offset: 0
Time to live: 128
Protocol: UDP (0x11)
Header checksum: 0x0000 [incorrect, should be 0x4baa]
[Good: False]
[Bad : True]
[Expert Info (Error/Checksum): Bad checksum]
Source: 192.168.1.120 (192.168.1.120)
Destination: 208.54.14.112 (208.54.14.112)
User Datagram Protocol, Src Port: sip (5060), Dst Port: 43161 (43161)
Session Initiation Protocol
Status-Line: SIP/2.0 100 Trying
Status-Code: 100
[Resent Packet: False]
[Request Frame: 29]
[Response Time (ms): 1]
Message Header
Via: SIP/2.0/UDP 192.168.2.2:57234;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport=43161;received=208.54.14.112
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: 43161
Received: 208.54.14.112
From: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
To: "testfromoutside"<sip:12356@97.93.32.50:5060>
SIP Display info: "testfromoutside"
SIP to address: sip:12356@97.93.32.50:5060
SIP to address User Part: 12356
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 5060
Call-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
CSeq: 1 INVITE
Sequence Number: 1
Method: INVITE
Server: Brekeke SIP Server rev.286 Evaluation
Content-Length: 0
No. Time Source Destination Protocol Info
33 2.692040 192.168.1.120 97.93.32.50 TCP 50053 > 7060 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=8
Frame 33 (66 bytes on wire, 66 bytes captured)
Ethernet II, Src: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.120 (192.168.1.120), Dst: 97.93.32.50 (97.93.32.50)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 52
Identification: 0x4cd6 (19670)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0x0000 [incorrect, should be 0x6a3e]
[Good: False]
[Bad : True]
[Expert Info (Error/Checksum): Bad checksum]
Source: 192.168.1.120 (192.168.1.120)
Destination: 97.93.32.50 (97.93.32.50)
Transmission Control Protocol, Src Port: 50053 (50053), Dst Port: 7060 (7060), Seq: 0, Len: 0
Source port: 50053 (50053)
Destination port: 7060 (7060)
[Stream index: 4]
Sequence number: 0 (relative sequence number)
Header length: 32 bytes
Flags: 0x02 (SYN)
Window size: 8192
Checksum: 0x43d6 [validation disabled]
Options: (12 bytes)
No. Time Source Destination Protocol Info
34 2.692574 97.93.32.50 192.168.1.120 TCP 50053 > 7060 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=8
Frame 34 (66 bytes on wire, 66 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Destination: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Internet Protocol, Src: 97.93.32.50 (97.93.32.50), Dst: 192.168.1.120 (192.168.1.120)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 52
Identification: 0x4cd6 (19670)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 127
Protocol: TCP (0x06)
Header checksum: 0x6b3e [correct]
[Good: True]
[Bad : False]
Source: 97.93.32.50 (97.93.32.50)
Destination: 192.168.1.120 (192.168.1.120)
Transmission Control Protocol, Src Port: 50053 (50053), Dst Port: 7060 (7060), Seq: 0, Len: 0
Source port: 50053 (50053)
Destination port: 7060 (7060)
[Stream index: 5]
Sequence number: 0 (relative sequence number)
Header length: 32 bytes
Flags: 0x02 (SYN)
Window size: 8192
Checksum: 0x2b0d [validation disabled]
Options: (12 bytes)
No. Time Source Destination Protocol Info
35 2.692622 192.168.1.120 97.93.32.50 TCP 7060 > 50053 [SYN, ACK] Seq=0 Ack=1 Win=8192 Len=0 MSS=1460 WS=8
Frame 35 (66 bytes on wire, 66 bytes captured)
Ethernet II, Src: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.120 (192.168.1.120), Dst: 97.93.32.50 (97.93.32.50)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 52
Identification: 0x4cd7 (19671)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0x0000 [incorrect, should be 0x6a3d]
[Good: False]
[Bad : True]
[Expert Info (Error/Checksum): Bad checksum]
Source: 192.168.1.120 (192.168.1.120)
Destination: 97.93.32.50 (97.93.32.50)
Transmission Control Protocol, Src Port: 7060 (7060), Dst Port: 50053 (50053), Seq: 0, Ack: 1, Len: 0
Source port: 7060 (7060)
Destination port: 50053 (50053)
[Stream index: 5]
Sequence number: 0 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 32 bytes
Flags: 0x12 (SYN, ACK)
Window size: 8192
Checksum: 0x43d6 [validation disabled]
Options: (12 bytes)
[SEQ/ACK analysis]
No. Time Source Destination Protocol Info
36 2.693067 97.93.32.50 192.168.1.120 TCP 7060 > 50053 [SYN, ACK] Seq=0 Ack=1 Win=8192 Len=0 MSS=1460 WS=8
Frame 36 (66 bytes on wire, 66 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Destination: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Internet Protocol, Src: 97.93.32.50 (97.93.32.50), Dst: 192.168.1.120 (192.168.1.120)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 52
Identification: 0x4cd7 (19671)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 127
Protocol: TCP (0x06)
Header checksum: 0x6b3d [correct]
[Good: True]
[Bad : False]
Source: 97.93.32.50 (97.93.32.50)
Destination: 192.168.1.120 (192.168.1.120)
Transmission Control Protocol, Src Port: 7060 (7060), Dst Port: 50053 (50053), Seq: 0, Ack: 1, Len: 0
Source port: 7060 (7060)
Destination port: 50053 (50053)
[Stream index: 4]
Sequence number: 0 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 32 bytes
Flags: 0x12 (SYN, ACK)
Window size: 8192
Checksum: 0xa238 [validation disabled]
Options: (12 bytes)
[SEQ/ACK analysis]
No. Time Source Destination Protocol Info
37 2.693102 192.168.1.120 97.93.32.50 TCP 50053 > 7060 [ACK] Seq=1 Ack=1 Win=65536 Len=0
Frame 37 (54 bytes on wire, 54 bytes captured)
Ethernet II, Src: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.120 (192.168.1.120), Dst: 97.93.32.50 (97.93.32.50)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 40
Identification: 0x4cd8 (19672)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0x0000 [incorrect, should be 0x6a48]
[Good: False]
[Bad : True]
[Expert Info (Error/Checksum): Bad checksum]
Source: 192.168.1.120 (192.168.1.120)
Destination: 97.93.32.50 (97.93.32.50)
Transmission Control Protocol, Src Port: 50053 (50053), Dst Port: 7060 (7060), Seq: 1, Ack: 1, Len: 0
Source port: 50053 (50053)
Destination port: 7060 (7060)
[Stream index: 4]
Sequence number: 1 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 20 bytes
Flags: 0x10 (ACK)
Window size: 65536 (scaled)
Checksum: 0x43ca [validation disabled]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Info
38 2.693559 97.93.32.50 192.168.1.120 TCP 50053 > 7060 [ACK] Seq=1 Ack=1 Win=65536 Len=0
Frame 38 (60 bytes on wire, 60 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Destination: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Trailer: 000000000000
Internet Protocol, Src: 97.93.32.50 (97.93.32.50), Dst: 192.168.1.120 (192.168.1.120)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 40
Identification: 0x4cd8 (19672)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 127
Protocol: TCP (0x06)
Header checksum: 0x6b48 [correct]
[Good: True]
[Bad : False]
Source: 97.93.32.50 (97.93.32.50)
Destination: 192.168.1.120 (192.168.1.120)
Transmission Control Protocol, Src Port: 50053 (50053), Dst Port: 7060 (7060), Seq: 1, Ack: 1, Len: 0
Source port: 50053 (50053)
Destination port: 7060 (7060)
[Stream index: 5]
Sequence number: 1 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 20 bytes
Flags: 0x10 (ACK)
Window size: 65536 (scaled)
Checksum: 0x020c [validation disabled]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Info
39 2.703734 192.168.1.120 97.93.32.50 SIP/SDP Request: INVITE sip:789@97.93.32.50:7060, with session description
Frame 39 (1096 bytes on wire, 1096 bytes captured)
Ethernet II, Src: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.120 (192.168.1.120), Dst: 97.93.32.50 (97.93.32.50)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 1082
Identification: 0x4cd9 (19673)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0x0000 [incorrect, should be 0x6635]
[Good: False]
[Bad : True]
[Expert Info (Error/Checksum): Bad checksum]
Source: 192.168.1.120 (192.168.1.120)
Destination: 97.93.32.50 (97.93.32.50)
Transmission Control Protocol, Src Port: 50053 (50053), Dst Port: 7060 (7060), Seq: 1, Ack: 1, Len: 1042
Source port: 50053 (50053)
Destination port: 7060 (7060)
[Stream index: 4]
Sequence number: 1 (relative sequence number)
[Next sequence number: 1043 (relative sequence number)]
Acknowledgement number: 1 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 65536 (scaled)
Checksum: 0x47dc [validation disabled]
[SEQ/ACK analysis]
Session Initiation Protocol
Request-Line: INVITE sip:789@97.93.32.50:7060 SIP/2.0
Method: INVITE
Request-URI: sip:789@97.93.32.50:7060
[Resent Packet: False]
Message Header
Via: SIP/2.0/TCP 192.168.1.120:50053;branch=z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Transport: TCP
Sent-by Address: 192.168.1.120
Sent-by port: 50053
Branch: z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Via: SIP/2.0/UDP 192.168.2.2:57234;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport=43161;received=208.54.14.112
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: 43161
Received: 208.54.14.112
Max-Forwards: 69
Contact: <sip:testoutside@192.168.1.120:50053;transport=tcp>
Contact Binding: <sip:testoutside@192.168.1.120:50053;transport=tcp>
To: "testfromoutside"<sip:789@97.93.32.50:7060>
SIP Display info: "testfromoutside"
SIP to address: sip:789@97.93.32.50:7060
SIP to address User Part: 789
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 7060
From: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
Call-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
CSeq: 1 INVITE
Sequence Number: 1
Method: INVITE
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: eyeBeam release 1102q stamp 51814
P-Behind-NAT: Yes
[Expert Info (Note/Undecoded): Unrecognised SIP header (P-Behind-NAT)]
Record-Route: <sip:192.168.1.120:50053;transport=tcp;lr>
Content-Type: application/sdp
Content-Length: 265
Message Body
No. Time Source Destination Protocol Info
40 2.704557 97.93.32.50 192.168.1.120 SIP/SDP Request: INVITE sip:789@97.93.32.50:7060, with session description
Frame 40 (1096 bytes on wire, 1096 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Destination: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Internet Protocol, Src: 97.93.32.50 (97.93.32.50), Dst: 192.168.1.120 (192.168.1.120)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 1082
Identification: 0x4cd9 (19673)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 127
Protocol: TCP (0x06)
Header checksum: 0x6735 [correct]
[Good: True]
[Bad : False]
Source: 97.93.32.50 (97.93.32.50)
Destination: 192.168.1.120 (192.168.1.120)
Transmission Control Protocol, Src Port: 50053 (50053), Dst Port: 7060 (7060), Seq: 1, Ack: 1, Len: 1042
Source port: 50053 (50053)
Destination port: 7060 (7060)
[Stream index: 5]
Sequence number: 1 (relative sequence number)
[Next sequence number: 1043 (relative sequence number)]
Acknowledgement number: 1 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 65536 (scaled)
Checksum: 0x4e1a [validation disabled]
[SEQ/ACK analysis]
Session Initiation Protocol
Request-Line: INVITE sip:789@97.93.32.50:7060 SIP/2.0
Method: INVITE
Request-URI: sip:789@97.93.32.50:7060
[Resent Packet: False]
Message Header
Via: SIP/2.0/TCP 192.168.1.120:50053;branch=z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Transport: TCP
Sent-by Address: 192.168.1.120
Sent-by port: 50053
Branch: z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Via: SIP/2.0/UDP 192.168.2.2:57234;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport=43161;received=208.54.14.112
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: 43161
Received: 208.54.14.112
Max-Forwards: 69
Contact: <sip:testoutside@192.168.1.120:50053;transport=tcp>
Contact Binding: <sip:testoutside@192.168.1.120:50053;transport=tcp>
To: "testfromoutside"<sip:789@97.93.32.50:7060>
SIP Display info: "testfromoutside"
SIP to address: sip:789@97.93.32.50:7060
SIP to address User Part: 789
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 7060
From: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
Call-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
CSeq: 1 INVITE
Sequence Number: 1
Method: INVITE
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: eyeBeam release 1102q stamp 51814
P-Behind-NAT: Yes
[Expert Info (Note/Undecoded): Unrecognised SIP header (P-Behind-NAT)]
Record-Route: <sip:192.168.1.120:50053;transport=tcp;lr>
Content-Type: application/sdp
Content-Length: 265
Message Body
No. Time Source Destination Protocol Info
41 2.706297 192.168.1.120 97.93.32.50 SIP Status: 100 Trying
Frame 41 (484 bytes on wire, 484 bytes captured)
Ethernet II, Src: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.120 (192.168.1.120), Dst: 97.93.32.50 (97.93.32.50)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 470
Identification: 0x4cda (19674)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0x0000 [incorrect, should be 0x6898]
[Good: False]
[Bad : True]
[Expert Info (Error/Checksum): Bad checksum]
Source: 192.168.1.120 (192.168.1.120)
Destination: 97.93.32.50 (97.93.32.50)
Transmission Control Protocol, Src Port: 7060 (7060), Dst Port: 50053 (50053), Seq: 1, Ack: 1043, Len: 430
Source port: 7060 (7060)
Destination port: 50053 (50053)
[Stream index: 5]
Sequence number: 1 (relative sequence number)
[Next sequence number: 431 (relative sequence number)]
Acknowledgement number: 1043 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 65536 (scaled)
Checksum: 0x4578 [validation disabled]
[SEQ/ACK analysis]
Session Initiation Protocol
Status-Line: SIP/2.0 100 Trying
Status-Code: 100
[Resent Packet: False]
Message Header
FROM: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
TO: "testfromoutside"<sip:789@97.93.32.50:7060>
SIP Display info: "testfromoutside"
SIP to address: sip:789@97.93.32.50:7060
SIP to address User Part: 789
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 7060
CSEQ: 1 INVITE
Sequence Number: 1
Method: INVITE
CALL-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
VIA: SIP/2.0/TCP 192.168.1.120:50053;branch=z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4,SIP/2.0/UDP 192.168.2.2:57234;received=208.54.14.112;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport=43161
Transport: TCP
Sent-by Address: 192.168.1.120
Sent-by port: 50053
Branch: z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Received: 208.54.14.112
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: 43161
CONTENT-LENGTH: 0
No. Time Source Destination Protocol Info
42 2.706931 97.93.32.50 192.168.1.120 SIP Status: 100 Trying
Frame 42 (484 bytes on wire, 484 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Destination: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Internet Protocol, Src: 97.93.32.50 (97.93.32.50), Dst: 192.168.1.120 (192.168.1.120)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 470
Identification: 0x4cda (19674)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 127
Protocol: TCP (0x06)
Header checksum: 0x6998 [correct]
[Good: True]
[Bad : False]
Source: 97.93.32.50 (97.93.32.50)
Destination: 192.168.1.120 (192.168.1.120)
Transmission Control Protocol, Src Port: 7060 (7060), Dst Port: 50053 (50053), Seq: 1, Ack: 1043, Len: 430
Source port: 7060 (7060)
Destination port: 50053 (50053)
[Stream index: 4]
Sequence number: 1 (relative sequence number)
[Next sequence number: 431 (relative sequence number)]
Acknowledgement number: 1043 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 65536 (scaled)
Checksum: 0x5cec [validation disabled]
[SEQ/ACK analysis]
Session Initiation Protocol
Status-Line: SIP/2.0 100 Trying
Status-Code: 100
[Resent Packet: False]
Message Header
FROM: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
TO: "testfromoutside"<sip:789@97.93.32.50:7060>
SIP Display info: "testfromoutside"
SIP to address: sip:789@97.93.32.50:7060
SIP to address User Part: 789
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 7060
CSEQ: 1 INVITE
Sequence Number: 1
Method: INVITE
CALL-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
VIA: SIP/2.0/TCP 192.168.1.120:50053;branch=z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4,SIP/2.0/UDP 192.168.2.2:57234;received=208.54.14.112;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport=43161
Transport: TCP
Sent-by Address: 192.168.1.120
Sent-by port: 50053
Branch: z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Received: 208.54.14.112
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: 43161
CONTENT-LENGTH: 0
No. Time Source Destination Protocol Info
43 2.724003 fe80::6475:598f:64a7:4963 ff02::c SSDP M-SEARCH * HTTP/1.1
Frame 43 (208 bytes on wire, 208 bytes captured)
Ethernet II, Src: AsustekC_10:21:07 (00:1f:c6:10:21:07), Dst: IPv6mcast_00:00:00:0c (33:33:00:00:00:0c)
Destination: IPv6mcast_00:00:00:0c (33:33:00:00:00:0c)
Source: AsustekC_10:21:07 (00:1f:c6:10:21:07)
Type: IPv6 (0x86dd)
Internet Protocol Version 6
User Datagram Protocol, Src Port: 55221 (55221), Dst Port: ssdp (1900)
Hypertext Transfer Protocol
No. Time Source Destination Protocol Info
44 2.727261 204.8.241.43 192.168.1.115 TCP [TCP segment of a reassembled PDU]
Frame 44 (435 bytes on wire, 435 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: AsustekC_10:21:07 (00:1f:c6:10:21:07)
Destination: AsustekC_10:21:07 (00:1f:c6:10:21:07)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Internet Protocol, Src: 204.8.241.43 (204.8.241.43), Dst: 192.168.1.115 (192.168.1.115)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 421
Identification: 0xe585 (58757)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 48
Protocol: TCP (0x06)
Header checksum: 0xe47d [correct]
[Good: True]
[Bad : False]
Source: 204.8.241.43 (204.8.241.43)
Destination: 192.168.1.115 (192.168.1.115)
Transmission Control Protocol, Src Port: http (80), Dst Port: 6456 (6456), Seq: 2747, Ack: 3396, Len: 381
Source port: http (80)
Destination port: 6456 (6456)
[Stream index: 0]
Sequence number: 2747 (relative sequence number)
[Next sequence number: 3128 (relative sequence number)]
Acknowledgement number: 3396 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 49640
Checksum: 0x32b2 [validation disabled]
[SEQ/ACK analysis]
TCP segment data (381 bytes)
No. Time Source Destination Protocol Info
45 2.727529 204.8.241.43 192.168.1.115 HTTP HTTP/1.1 200 OK (text/html)
Frame 45 (60 bytes on wire, 60 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: AsustekC_10:21:07 (00:1f:c6:10:21:07)
Destination: AsustekC_10:21:07 (00:1f:c6:10:21:07)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Trailer: 00
Internet Protocol, Src: 204.8.241.43 (204.8.241.43), Dst: 192.168.1.115 (192.168.1.115)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 45
Identification: 0xe586 (58758)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 48
Protocol: TCP (0x06)
Header checksum: 0xe5f4 [correct]
[Good: True]
[Bad : False]
Source: 204.8.241.43 (204.8.241.43)
Destination: 192.168.1.115 (192.168.1.115)
Transmission Control Protocol, Src Port: http (80), Dst Port: 6456 (6456), Seq: 3128, Ack: 3396, Len: 5
Source port: http (80)
Destination port: 6456 (6456)
[Stream index: 0]
Sequence number: 3128 (relative sequence number)
[Next sequence number: 3133 (relative sequence number)]
Acknowledgement number: 3396 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 49640
Checksum: 0x54b3 [validation disabled]
[SEQ/ACK analysis]
TCP segment data (5 bytes)
[Reassembled TCP Segments (386 bytes): #44(381), #45(5)]
Hypertext Transfer Protocol
Line-based text data: text/html
No. Time Source Destination Protocol Info
46 2.727533 192.168.1.115 204.8.241.43 TCP 6456 > http [ACK] Seq=3396 Ack=3133 Win=16328 Len=0
Frame 46 (60 bytes on wire, 60 bytes captured)
Ethernet II, Src: AsustekC_10:21:07 (00:1f:c6:10:21:07), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: AsustekC_10:21:07 (00:1f:c6:10:21:07)
Type: IP (0x0800)
Trailer: 000000000000
Internet Protocol, Src: 192.168.1.115 (192.168.1.115), Dst: 204.8.241.43 (204.8.241.43)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 40
Identification: 0x56e7 (22247)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0x2499 [correct]
[Good: True]
[Bad : False]
Source: 192.168.1.115 (192.168.1.115)
Destination: 204.8.241.43 (204.8.241.43)
Transmission Control Protocol, Src Port: 6456 (6456), Dst Port: http (80), Seq: 3396, Ack: 3133, Len: 0
Source port: 6456 (6456)
Destination port: http (80)
[Stream index: 0]
Sequence number: 3396 (relative sequence number)
Acknowledgement number: 3133 (relative ack number)
Header length: 20 bytes
Flags: 0x10 (ACK)
Window size: 16328
Checksum: 0x1af6 [validation disabled]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Info
47 2.770728 HonHaiPr_54:27:a2 Broadcast ARP Who has 192.168.1.112? Tell 192.168.1.107
Frame 47 (60 bytes on wire, 60 bytes captured)
Ethernet II, Src: HonHaiPr_54:27:a2 (00:16:cf:54:27:a2), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Destination: Broadcast (ff:ff:ff:ff:ff:ff)
Source: HonHaiPr_54:27:a2 (00:16:cf:54:27:a2)
Type: ARP (0x0806)
Trailer: 0000000000000000000000000000E1B19CA0
Address Resolution Protocol (request)
No. Time Source Destination Protocol Info
48 2.786805 208.54.14.112 192.168.1.120 SIP/SDP Request: INVITE sip:12356@97.93.32.50:5060, with session description
Frame 48 (921 bytes on wire, 921 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Destination: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Internet Protocol, Src: 208.54.14.112 (208.54.14.112), Dst: 192.168.1.120 (192.168.1.120)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 907
Identification: 0x12bc (4796)
Flags: 0x00
Fragment offset: 0
Time to live: 110
Protocol: UDP (0x11)
Header checksum: 0x95df [correct]
[Good: True]
[Bad : False]
Source: 208.54.14.112 (208.54.14.112)
Destination: 192.168.1.120 (192.168.1.120)
User Datagram Protocol, Src Port: 43161 (43161), Dst Port: sip (5060)
Session Initiation Protocol
Request-Line: INVITE sip:12356@97.93.32.50:5060 SIP/2.0
Method: INVITE
Request-URI: sip:12356@97.93.32.50:5060
[Resent Packet: True]
[Suspected resend of frame: 29]
Message Header
Via: SIP/2.0/UDP 192.168.2.2:57234;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: rport
Max-Forwards: 70
Contact: <sip:testoutside@192.168.2.2:57234>
Contact Binding: <sip:testoutside@192.168.2.2:57234>
To: "testfromoutside"<sip:12356@97.93.32.50:5060>
SIP Display info: "testfromoutside"
SIP to address: sip:12356@97.93.32.50:5060
SIP to address User Part: 12356
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 5060
From: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
Call-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
CSeq: 1 INVITE
Sequence Number: 1
Method: INVITE
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
Content-Type: application/sdp
User-Agent: eyeBeam release 1102q stamp 51814
Content-Length: 310
Message Body
No. Time Source Destination Protocol Info
49 2.788119 192.168.1.120 97.93.32.50 SIP/SDP Request: INVITE sip:789@97.93.32.50:7060, with session description
Frame 49 (1096 bytes on wire, 1096 bytes captured)
Ethernet II, Src: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.120 (192.168.1.120), Dst: 97.93.32.50 (97.93.32.50)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 1082
Identification: 0x4cdb (19675)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0x0000 [incorrect, should be 0x6633]
[Good: False]
[Bad : True]
[Expert Info (Error/Checksum): Bad checksum]
Source: 192.168.1.120 (192.168.1.120)
Destination: 97.93.32.50 (97.93.32.50)
Transmission Control Protocol, Src Port: 50053 (50053), Dst Port: 7060 (7060), Seq: 1043, Ack: 431, Len: 1042
Source port: 50053 (50053)
Destination port: 7060 (7060)
[Stream index: 4]
Sequence number: 1043 (relative sequence number)
[Next sequence number: 2085 (relative sequence number)]
Acknowledgement number: 431 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 65024 (scaled)
Checksum: 0x47dc [validation disabled]
[SEQ/ACK analysis]
Session Initiation Protocol
Request-Line: INVITE sip:789@97.93.32.50:7060 SIP/2.0
Method: INVITE
Request-URI: sip:789@97.93.32.50:7060
[Resent Packet: False]
Message Header
Via: SIP/2.0/TCP 192.168.1.120:50053;branch=z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Transport: TCP
Sent-by Address: 192.168.1.120
Sent-by port: 50053
Branch: z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Via: SIP/2.0/UDP 192.168.2.2:57234;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport=43161;received=208.54.14.112
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: 43161
Received: 208.54.14.112
Max-Forwards: 69
Contact: <sip:testoutside@192.168.1.120:50053;transport=tcp>
Contact Binding: <sip:testoutside@192.168.1.120:50053;transport=tcp>
To: "testfromoutside"<sip:789@97.93.32.50:7060>
SIP Display info: "testfromoutside"
SIP to address: sip:789@97.93.32.50:7060
SIP to address User Part: 789
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 7060
From: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
Call-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
CSeq: 1 INVITE
Sequence Number: 1
Method: INVITE
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: eyeBeam release 1102q stamp 51814
P-Behind-NAT: Yes
[Expert Info (Note/Undecoded): Unrecognised SIP header (P-Behind-NAT)]
Record-Route: <sip:192.168.1.120:50053;transport=tcp;lr>
Content-Type: application/sdp
Content-Length: 265
Message Body
No. Time Source Destination Protocol Info
50 2.788943 97.93.32.50 192.168.1.120 SIP/SDP Request: INVITE sip:789@97.93.32.50:7060, with session description
Frame 50 (1096 bytes on wire, 1096 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Destination: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Internet Protocol, Src: 97.93.32.50 (97.93.32.50), Dst: 192.168.1.120 (192.168.1.120)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 1082
Identification: 0x4cdb (19675)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 127
Protocol: TCP (0x06)
Header checksum: 0x6733 [correct]
[Good: True]
[Bad : False]
Source: 97.93.32.50 (97.93.32.50)
Destination: 192.168.1.120 (192.168.1.120)
Transmission Control Protocol, Src Port: 50053 (50053), Dst Port: 7060 (7060), Seq: 1043, Ack: 431, Len: 1042
Source port: 50053 (50053)
Destination port: 7060 (7060)
[Stream index: 5]
Sequence number: 1043 (relative sequence number)
[Next sequence number: 2085 (relative sequence number)]
Acknowledgement number: 431 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 65024 (scaled)
Checksum: 0x485c [validation disabled]
[SEQ/ACK analysis]
Session Initiation Protocol
Request-Line: INVITE sip:789@97.93.32.50:7060 SIP/2.0
Method: INVITE
Request-URI: sip:789@97.93.32.50:7060
[Resent Packet: False]
Message Header
Via: SIP/2.0/TCP 192.168.1.120:50053;branch=z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Transport: TCP
Sent-by Address: 192.168.1.120
Sent-by port: 50053
Branch: z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Via: SIP/2.0/UDP 192.168.2.2:57234;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport=43161;received=208.54.14.112
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: 43161
Received: 208.54.14.112
Max-Forwards: 69
Contact: <sip:testoutside@192.168.1.120:50053;transport=tcp>
Contact Binding: <sip:testoutside@192.168.1.120:50053;transport=tcp>
To: "testfromoutside"<sip:789@97.93.32.50:7060>
SIP Display info: "testfromoutside"
SIP to address: sip:789@97.93.32.50:7060
SIP to address User Part: 789
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 7060
From: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
Call-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
CSeq: 1 INVITE
Sequence Number: 1
Method: INVITE
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: eyeBeam release 1102q stamp 51814
P-Behind-NAT: Yes
[Expert Info (Note/Undecoded): Unrecognised SIP header (P-Behind-NAT)]
Record-Route: <sip:192.168.1.120:50053;transport=tcp;lr>
Content-Type: application/sdp
Content-Length: 265
Message Body
No. Time Source Destination Protocol Info
51 2.789012 192.168.1.120 97.93.32.50 SIP Status: 302 Moved Temporarily
Frame 51 (662 bytes on wire, 662 bytes captured)
Ethernet II, Src: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.120 (192.168.1.120), Dst: 97.93.32.50 (97.93.32.50)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 648
Identification: 0x4cdc (19676)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0x0000 [incorrect, should be 0x67e4]
[Good: False]
[Bad : True]
[Expert Info (Error/Checksum): Bad checksum]
Source: 192.168.1.120 (192.168.1.120)
Destination: 97.93.32.50 (97.93.32.50)
Transmission Control Protocol, Src Port: 7060 (7060), Dst Port: 50053 (50053), Seq: 431, Ack: 2085, Len: 608
Source port: 7060 (7060)
Destination port: 50053 (50053)
[Stream index: 5]
Sequence number: 431 (relative sequence number)
[Next sequence number: 1039 (relative sequence number)]
Acknowledgement number: 2085 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 64512 (scaled)
Checksum: 0x462a [validation disabled]
[SEQ/ACK analysis]
Session Initiation Protocol
Status-Line: SIP/2.0 302 Moved Temporarily
Status-Code: 302
[Resent Packet: False]
Message Header
FROM: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
TO: "testfromoutside"<sip:789@97.93.32.50:7060>;tag=574d2806f
SIP Display info: "testfromoutside"
SIP to address: sip:789@97.93.32.50:7060
SIP to address User Part: 789
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 7060
SIP tag: 574d2806f
CSEQ: 1 INVITE
Sequence Number: 1
Method: INVITE
CALL-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
VIA: SIP/2.0/TCP 192.168.1.120:50053;branch=z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4,SIP/2.0/UDP 192.168.2.2:57234;received=208.54.14.112;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport=43161
Transport: TCP
Sent-by Address: 192.168.1.120
Sent-by port: 50053
Branch: z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Received: 208.54.14.112
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: 43161
CONTACT: <sip:789@97.93.32.50:50018;transport=Tcp;maddr=192.168.1.120;x-mss-call-id=NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.>
Contact Binding: <sip:789@97.93.32.50:50018;transport=Tcp;maddr=192.168.1.120;x-mss-call-id=NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.>
CONTENT-LENGTH: 0
SERVER: RTCC/3.0.0.0
No. Time Source Destination Protocol Info
52 2.789708 97.93.32.50 192.168.1.120 SIP Status: 302 Moved Temporarily
Frame 52 (662 bytes on wire, 662 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Destination: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Internet Protocol, Src: 97.93.32.50 (97.93.32.50), Dst: 192.168.1.120 (192.168.1.120)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 648
Identification: 0x4cdc (19676)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 127
Protocol: TCP (0x06)
Header checksum: 0x68e4 [correct]
[Good: True]
[Bad : False]
Source: 97.93.32.50 (97.93.32.50)
Destination: 192.168.1.120 (192.168.1.120)
Transmission Control Protocol, Src Port: 7060 (7060), Dst Port: 50053 (50053), Seq: 431, Ack: 2085, Len: 608
Source port: 7060 (7060)
Destination port: 50053 (50053)
[Stream index: 4]
Sequence number: 431 (relative sequence number)
[Next sequence number: 1039 (relative sequence number)]
Acknowledgement number: 2085 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 64512 (scaled)
Checksum: 0xdcd1 [validation disabled]
[SEQ/ACK analysis]
Session Initiation Protocol
Status-Line: SIP/2.0 302 Moved Temporarily
Status-Code: 302
[Resent Packet: False]
Message Header
FROM: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
TO: "testfromoutside"<sip:789@97.93.32.50:7060>;tag=574d2806f
SIP Display info: "testfromoutside"
SIP to address: sip:789@97.93.32.50:7060
SIP to address User Part: 789
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 7060
SIP tag: 574d2806f
CSEQ: 1 INVITE
Sequence Number: 1
Method: INVITE
CALL-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
VIA: SIP/2.0/TCP 192.168.1.120:50053;branch=z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4,SIP/2.0/UDP 192.168.2.2:57234;received=208.54.14.112;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport=43161
Transport: TCP
Sent-by Address: 192.168.1.120
Sent-by port: 50053
Branch: z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Received: 208.54.14.112
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: 43161
CONTACT: <sip:789@97.93.32.50:50018;transport=Tcp;maddr=192.168.1.120;x-mss-call-id=NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.>
Contact Binding: <sip:789@97.93.32.50:50018;transport=Tcp;maddr=192.168.1.120;x-mss-call-id=NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.>
CONTENT-LENGTH: 0
SERVER: RTCC/3.0.0.0
No. Time Source Destination Protocol Info
53 2.796383 192.168.1.120 208.54.14.112 SIP Status: 302 Moved Temporarily
Frame 53 (568 bytes on wire, 568 bytes captured)
Ethernet II, Src: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.120 (192.168.1.120), Dst: 208.54.14.112 (208.54.14.112)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 554
Identification: 0x4cdd (19677)
Flags: 0x00
Fragment offset: 0
Time to live: 128
Protocol: UDP (0x11)
Header checksum: 0x0000 [incorrect, should be 0x4b1f]
[Good: False]
[Bad : True]
[Expert Info (Error/Checksum): Bad checksum]
Source: 192.168.1.120 (192.168.1.120)
Destination: 208.54.14.112 (208.54.14.112)
User Datagram Protocol, Src Port: sip (5060), Dst Port: 43161 (43161)
Session Initiation Protocol
Status-Line: SIP/2.0 302 Moved Temporarily
Status-Code: 302
[Resent Packet: False]
[Request Frame: 29]
[Response Time (ms): 106]
Message Header
Via: SIP/2.0/UDP 192.168.2.2:57234;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport=43161;received=208.54.14.112
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: 43161
Received: 208.54.14.112
FROM: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
TO: "testfromoutside"<sip:12356@97.93.32.50:5060>;tag=574d2806f
SIP Display info: "testfromoutside"
SIP to address: sip:12356@97.93.32.50:5060
SIP to address User Part: 12356
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 5060
SIP tag: 574d2806f
CSEQ: 1 INVITE
Sequence Number: 1
Method: INVITE
CALL-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
CONTACT: <sip:789@97.93.32.50:50018;transport=Tcp;maddr=192.168.1.120;x-mss-call-id=NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.>
Contact Binding: <sip:789@97.93.32.50:50018;transport=Tcp;maddr=192.168.1.120;x-mss-call-id=NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.>
SERVER: RTCC/3.0.0.0
Content-Length: 0
No. Time Source Destination Protocol Info
54 2.899995 192.168.1.115 204.8.241.43 HTTP POST /pdas/servlet?rnd=76863268 HTTP/1.1
Frame 54 (733 bytes on wire, 733 bytes captured)
Ethernet II, Src: AsustekC_10:21:07 (00:1f:c6:10:21:07), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: AsustekC_10:21:07 (00:1f:c6:10:21:07)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.115 (192.168.1.115), Dst: 204.8.241.43 (204.8.241.43)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 719
Identification: 0x56e8 (22248)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0x21f1 [correct]
[Good: True]
[Bad : False]
Source: 192.168.1.115 (192.168.1.115)
Destination: 204.8.241.43 (204.8.241.43)
Transmission Control Protocol, Src Port: 6456 (6456), Dst Port: http (80), Seq: 3396, Ack: 3133, Len: 679
Source port: 6456 (6456)
Destination port: http (80)
[Stream index: 0]
Sequence number: 3396 (relative sequence number)
[Next sequence number: 4075 (relative sequence number)]
Acknowledgement number: 3133 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 16328
Checksum: 0x96f1 [validation disabled]
[SEQ/ACK analysis]
Hypertext Transfer Protocol
No. Time Source Destination Protocol Info
55 2.913320 120.136.44.152 192.168.1.115 TLSv1 Application Data, Application Data
Frame 55 (192 bytes on wire, 192 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: AsustekC_10:21:07 (00:1f:c6:10:21:07)
Destination: AsustekC_10:21:07 (00:1f:c6:10:21:07)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Internet Protocol, Src: 120.136.44.152 (120.136.44.152), Dst: 192.168.1.115 (192.168.1.115)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 178
Identification: 0xffa6 (65446)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 53
Protocol: TCP (0x06)
Header checksum: 0xde63 [correct]
[Good: True]
[Bad : False]
Source: 120.136.44.152 (120.136.44.152)
Destination: 192.168.1.115 (192.168.1.115)
Transmission Control Protocol, Src Port: https (443), Dst Port: synapsis-edge (5008), Seq: 473, Ack: 1, Len: 138
Source port: https (443)
Destination port: synapsis-edge (5008)
[Stream index: 1]
Sequence number: 473 (relative sequence number)
[Next sequence number: 611 (relative sequence number)]
Acknowledgement number: 1 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 554
Checksum: 0xc497 [validation disabled]
[SEQ/ACK analysis]
Secure Socket Layer
No. Time Source Destination Protocol Info
56 2.986335 192.168.1.120 97.93.32.50 TCP 50053 > 7060 [ACK] Seq=2085 Ack=1039 Win=64512 Len=0
Frame 56 (54 bytes on wire, 54 bytes captured)
Ethernet II, Src: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.120 (192.168.1.120), Dst: 97.93.32.50 (97.93.32.50)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 40
Identification: 0x4cde (19678)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0x0000 [incorrect, should be 0x6a42]
[Good: False]
[Bad : True]
[Expert Info (Error/Checksum): Bad checksum]
Source: 192.168.1.120 (192.168.1.120)
Destination: 97.93.32.50 (97.93.32.50)
Transmission Control Protocol, Src Port: 50053 (50053), Dst Port: 7060 (7060), Seq: 2085, Ack: 1039, Len: 0
Source port: 50053 (50053)
Destination port: 7060 (7060)
[Stream index: 4]
Sequence number: 2085 (relative sequence number)
Acknowledgement number: 1039 (relative ack number)
Header length: 20 bytes
Flags: 0x10 (ACK)
Window size: 64512 (scaled)
Checksum: 0x43ca [validation disabled]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Info
57 2.986873 97.93.32.50 192.168.1.120 TCP 50053 > 7060 [ACK] Seq=2085 Ack=1039 Win=64512 Len=0
Frame 57 (60 bytes on wire, 60 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Destination: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Trailer: 000000000000
Internet Protocol, Src: 97.93.32.50 (97.93.32.50), Dst: 192.168.1.120 (192.168.1.120)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 40
Identification: 0x4cde (19678)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 127
Protocol: TCP (0x06)
Header checksum: 0x6b42 [correct]
[Good: True]
[Bad : False]
Source: 97.93.32.50 (97.93.32.50)
Destination: 192.168.1.120 (192.168.1.120)
Transmission Control Protocol, Src Port: 50053 (50053), Dst Port: 7060 (7060), Seq: 2085, Ack: 1039, Len: 0
Source port: 50053 (50053)
Destination port: 7060 (7060)
[Stream index: 5]
Sequence number: 2085 (relative sequence number)
Acknowledgement number: 1039 (relative ack number)
Header length: 20 bytes
Flags: 0x10 (ACK)
Window size: 64512 (scaled)
Checksum: 0xf5dd [validation disabled]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Info
58 2.986907 192.168.1.120 97.93.32.50 SIP Status: 486 A SIP invite for this Call-ID has already been received. Consult the SIP peer's logs to determine why the duplicate was sent
Frame 58 (1070 bytes on wire, 1070 bytes captured)
Ethernet II, Src: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d), Dst: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Destination: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Source: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.120 (192.168.1.120), Dst: 97.93.32.50 (97.93.32.50)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 1056
Identification: 0x4cdf (19679)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0x0000 [incorrect, should be 0x6649]
[Good: False]
[Bad : True]
[Expert Info (Error/Checksum): Bad checksum]
Source: 192.168.1.120 (192.168.1.120)
Destination: 97.93.32.50 (97.93.32.50)
Transmission Control Protocol, Src Port: 7060 (7060), Dst Port: 50053 (50053), Seq: 1039, Ack: 2085, Len: 1016
Source port: 7060 (7060)
Destination port: 50053 (50053)
[Stream index: 5]
Sequence number: 1039 (relative sequence number)
[Next sequence number: 2055 (relative sequence number)]
Acknowledgement number: 2085 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 64512 (scaled)
Checksum: 0x47c2 [validation disabled]
[SEQ/ACK analysis]
Session Initiation Protocol
Status-Line: SIP/2.0 100 Trying
Status-Code: 100
[Resent Packet: False]
Message Header
FROM: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
TO: "testfromoutside"<sip:789@97.93.32.50:7060>
SIP Display info: "testfromoutside"
SIP to address: sip:789@97.93.32.50:7060
SIP to address User Part: 789
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 7060
CSEQ: 1 INVITE
Sequence Number: 1
Method: INVITE
CALL-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
VIA: SIP/2.0/TCP 192.168.1.120:50053;branch=z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4,SIP/2.0/UDP 192.168.2.2:57234;received=208.54.14.112;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport=43161
Transport: TCP
Sent-by Address: 192.168.1.120
Sent-by port: 50053
Branch: z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Received: 208.54.14.112
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: 43161
CONTENT-LENGTH: 0
Session Initiation Protocol
Status-Line: SIP/2.0 486 A SIP invite for this Call-ID has already been received. Consult the SIP peer's logs to determine why the duplicate was sent
Status-Code: 100
[Resent Packet: False]
Message Header
FROM: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testoutside@97.93.32.50
SIP tag: 1e4cc555
TO: "testfromoutside"<sip:789@97.93.32.50:7060>;tag=d9fd97eea3
SIP Display info: "testfromoutside"
SIP to address: sip:789@97.93.32.50:7060
SIP to address User Part: 789
SIP to address Host Part: 97.93.32.50
SIP to address Host Port: 7060
SIP tag: d9fd97eea3
CSEQ: 1 INVITE
Sequence Number: 1
Method: INVITE
CALL-ID: NjhkM2I0MTE3ZTYxNjA5NzE0NjczNjRiZDA2NWViZmM.
VIA: SIP/2.0/TCP 192.168.1.120:50053;branch=z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4,SIP/2.0/UDP 192.168.2.2:57234;received=208.54.14.112;branch=z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-;rport=43161
Transport: TCP
Sent-by Address: 192.168.1.120
Sent-by port: 50053
Branch: z9hG4bKffb79e33e2b2d9ca0d7-6d1a9999-9ea553d4
Transport: UDP
Sent-by Address: 192.168.2.2
Sent-by port: 57234
Received: 208.54.14.112
Branch: z9hG4bK-d8754z-2679f22b2655844b-1---d8754z-
RPort: 43161
CONTENT-LENGTH: 0
SERVER: RTCC/3.0.0.0
No. Time Source Destination Protocol Info
59 2.987649 97.93.32.50 192.168.1.120 SIP Status: 486 A SIP invite for this Call-ID has already been received. Consult the SIP peer's logs to determine why the duplicate was sent
Frame 59 (1070 bytes on wire, 1070 bytes captured)
Ethernet II, Src: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e), Dst: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Destination: Vmware_f1:d5:0d (00:0c:29:f1:d5:0d)
Source: Cisco-Li_24:4b:5e (00:23:69:24:4b:5e)
Type: IP (0x0800)
Internet Protocol, Src: 97.93.32.50 (97.93.32.50), Dst: 192.168.1.120 (192.168.1.120)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Total Length: 1056
Identification: 0x4cdf (19679)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 127
Protocol: TCP (0x06)
Header checksum: 0x6749 [correct]
[Good: True]
[Bad : False]
Source: 97.93.32.50 (97.93.32.50)
Destination: 192.168.1.120 (192.168.1.120)
Transmission Control Protocol, Src Port: 7060 (7060), Dst Port: 50053 (50053), Seq: 1039, Ack: 2085, Len: 1016
Source port: 7060 (7060)
Destination port: 50053 (50053)
[Stream index: 4]
Sequence number: 1039 (relative sequence number)
[Next sequence number: 2055 (relative sequence number)]
Acknowledgement number: 2085 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
Window size: 64512 (scaled)
Checksum: 0xdf7a [validation disabled]
[SEQ/ACK analysis]
Session Initiation Protocol
Status-Line: SIP/2.0 100 Trying
Status-Code: 100
[Resent Packet: False]
Message Header
FROM: "testoutsude"<sip:testoutside@97.93.32.50>;tag=1e4cc555
SIP Display info: "testoutsude"
SIP from address: sip:testou |
|
Back to top |
|
james Brekeke Master Guru
Joined: 10 Dec 2007 Posts: 501
|
Posted: Mon Jan 04, 2010 4:08 pm Post subject: |
|
|
Does your BSS support TCP?
You need to use Standard or Advanced Edition. |
|
Back to top |
|
alexan88 Brekeke Junior Member
Joined: 03 Jan 2010 Posts: 5
Location: Los Angeles
|
Posted: Mon Jan 04, 2010 5:13 pm Post subject: |
|
|
So you mean i can't use Evaluation one to tested it first? |
|
Back to top |
|
james Brekeke Master Guru
Joined: 10 Dec 2007 Posts: 501
|
Posted: Tue Jan 05, 2010 11:53 am Post subject: |
|
|
The Evaluation will work too.
Are you using OCS?
Are you using OCS Mediation Server for bridging OCS and SIP? |
|
Back to top |
|
alexan88 Brekeke Junior Member
Joined: 03 Jan 2010 Posts: 5
Location: Los Angeles
|
Posted: Tue Jan 05, 2010 12:02 pm Post subject: |
|
|
Hi James
Thanks for your reply, i use Microsoft Speech Server 2007 that listen on port 7060 tcp and from BSS(5060 udp) i use dialplan that forward to my Microsoft Speech Server 7060.
Thanks
Akho |
|
Back to top |
|
james Brekeke Master Guru
Joined: 10 Dec 2007 Posts: 501
|
Posted: Tue Jan 05, 2010 10:49 pm Post subject: |
|
|
It is hard to read your packets...
Can you upload your packet trace to http://www.pcapr.net/? |
|
Back to top |
|
james Brekeke Master Guru
Joined: 10 Dec 2007 Posts: 501
|
Posted: Tue Jan 05, 2010 11:25 pm Post subject: |
|
|
I tried to read your above log..
The response 302 is not error.
Paste your DialPlan rules here. |
|
Back to top |
|
alexan88 Brekeke Junior Member
Joined: 03 Jan 2010 Posts: 5
Location: Los Angeles
|
Posted: Wed Jan 06, 2010 1:44 am Post subject: |
|
|
Hi James,
thanks for the reply, below is my pcap uploaded url
http://www.pcapr.net/view/alexander/2010/0/3/0/brekeke.pcap.html
and below is my dialplan
Rule-1: From OCS to Brekeke SIP Server
Matching Patterns Deploy Patterns
$addr = 10.1.10.30
$request = ^INVITE
&net.sip.transport.follow.request = true
$auth = false
$continue = true
Rule-2: From Brekeke SIP Server to OCS
Matching Patterns Deploy Patterns
$request = ^INVITE
$registered = false
To = sip:(.+)@
&net.sip.transport.follow.request = true
$auth = false
$continue = true
$transport = TCP
To = sip:+%1@10.1.10.50
btw when i take alook my pcap on pcapr.net, it said that Unrecognised SIP header (P-Behind-NAT), my server indeed behind NAT, if that is the problem do you know what kind of solution that will solve my problem.
Thanks
Akho |
|
Back to top |
|
james Brekeke Master Guru
Joined: 10 Dec 2007 Posts: 501
|
Posted: Thu Jan 07, 2010 2:28 pm Post subject: |
|
|
Hi
Why are not you specifying "192.168.1.120:7060" or "localhost:192.168.1.120:7060" in your dialplan??
I think "P-Behind-NAT" header is not matter. |
|
Back to top |
|
alexan88 Brekeke Junior Member
Joined: 03 Jan 2010 Posts: 5
Location: Los Angeles
|
Posted: Thu Jan 07, 2010 10:18 pm Post subject: |
|
|
Hi James,
yeah i tried and not success either, btw i read some article that said we need to enabled SIP ALG on router, but i think my router dont have that SIP ALG feature.
Regards
Akho |
|
Back to top |
|
james Brekeke Master Guru
Joined: 10 Dec 2007 Posts: 501
|
Posted: Tue Jan 19, 2010 8:21 pm Post subject: |
|
|
Akho.
Use "To = sip:+%1@192.168.1.120:7060" instead of "To = sip:+%1@97.93.32.50:7060" in your DialPlan.
Also, make a test call to 789 from the eyeBeam.
If the problem still happens, paste your actual DialPlan rule here. |
|
Back to top |
|
|
|
|
|