Dial Rule to capture String in SIP Header

Discuss any topic about Brekeke SIP Server.

Moderator: Brekeke Support Team

Post Reply
tlsoren
Posts: 38
Joined: Wed Feb 15, 2012 8:54 am
Location: Raleigh, NC

Dial Rule to capture String in SIP Header

Post by tlsoren »

1. Brekeke Product Name and Version:Brekeke SIP Server v3.3.4.4 Advanced

2. Java version: Java 7 update 55

3. OS type and the version: Windows Server 2012 R2

4. UA (phone), gateway or other hardware/software involved: Responder 5 Nurse Call SIP Enabled Middleware integration to Connexall Middleware.

5. Your problem: I am looking for the a Dial Rule that will look for certain words within the SIP header, and send the call to Server 1 10.10.4.5. All other calls would be sent to Server 2 10.10.4.6.

So if the From: field of the SIP Header of the SIP Invite Contains the words Code Blue, Staff Assist, or Patient, send to Server 1 with Dial Rule 1. The second dial Rule would send all calls not fired fired off of Rule 1 to Server 2. This second rule I can create without issue, it is the first Dial Rule that I am not sure of the syntax.

Here is a paste of a packet capture of the From: field of the SIP Header, with an example of the Patient text that I am trying to have Rule 1 execute on.

From: Step422_1 Patient <sip:401*422*1@172.20.15.205:5060>; tag=631ce58-cf0f14ac-13c4-55022-3bcf94-7313adbd-3bcf94

Thank you in advance for any help.
TLS
Niloc
Posts: 70
Joined: Tue Sep 19, 2017 9:49 pm
Location: NL

Post by Niloc »

> I am looking for the a Dial Rule that will look for certain words within the SIP header,

Like this
From = Code Blue|Staff Assist|Patient


So rules will be
Rule-1: To Server 1
Matching Pattern
$request = ^INVITE
From = Code Blue|Staff Assist|Patient
To = sip:(.+)@

Deploy Pattern
To = sip:%1@10.10.4.5

Rule-2: To Server 2
Matching Pattern
$request = ^INVITE
To = sip:(.+)@

Deploy Pattern
To = sip:%1@10.10.4.6
tlsoren
Posts: 38
Joined: Wed Feb 15, 2012 8:54 am
Location: Raleigh, NC

Post by tlsoren »

Thank you for help Niloc . We were able to successfully test this today, all good.
TLS
Post Reply