This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Jun 15 12:42:03 rtpengine[5914]: Adding a proxy for control ng stats:127.0.0.1 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Received command 'offer' from 127.0.0.1:42897 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Dump for 'offer' from 127.0.0.1:42897: { "sdp": "v=0#015#012o=- 1667981451757923244 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS zkRmLRFvthOYyRFXBRFD6gcWaNxAgFV8YUxX#015#012m=audio 52535 UDP/TLS/RTP/SAVPF 111 103 104 9 0 8 106 105 13 126#015#012c=IN IP4 client_extern_ip#015#012a=rtcp:6657 IN IP4 client_extern_ip#015#012a=candidate:2609552855 1 udp 2122260223 10.100.1.218 58275 typ host generation 0 network-id 1#015#012a=candidate:2609552855 2 udp 2122260222 10.100.1.218 51788 typ host generation 0 network ... | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] ... -id 1#015#012a=candidate:1838867459 1 udp 1686052607 client_extern_ip 52535 typ srflx raddr 10.100.1.218 rport 58275 generation 0 network-id 1#015#012a=ca |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Jun 15 12:26:33 rtpengine[30307]: [smgj3inrrqlr94okb3q3] Received command 'offer' from 127.0.0.1:42897 | |
Jun 15 12:26:33 rtpengine[30307]: [smgj3inrrqlr94okb3q3] Dump for 'offer' from 127.0.0.1:42897: { "sdp": "v=0#015#012o=- 7714732615179311833 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS s1ET3Gkd8w6JdY7RzltO1ta1uOPg4Zx1x87a#015#012m=audio 21833 UDP/TLS/RTP/SAVPF 111 103 104 9 0 8 106 105 13 126#015#012c=IN IP4 client_extern_ip#015#012a=rtcp:41322 IN IP4 client_extern_ip#015#012a=candidate:2609552855 1 udp 2122260223 10.100.1.218 54898 typ host generation 0 network-id 1#015#012a=candidate:2609552855 2 udp 2122260222 10.100.1.218 62267 typ host generation 0 networ ... | |
Jun 15 12:26:33 rtpengine[30307]: [smgj3inrrqlr94okb3q3] ... k-id 1#015#012a=candidate:1838867459 2 udp 1686052606 client_extern_ip 41322 typ srflx raddr 10.100.1.218 rport 62267 generation 0 network-id 1#015#012a=candidate:1838867459 1 udp 1686052607 client_extern_ip 21833 typ srflx radd |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Jun 10 14:16:15 rtpengine[8816]: [nnc4ljl14kgq6388cboj] Received command 'offer' from 127.0.0.1:60835 | |
Jun 10 14:16:15 rtpengine[8816]: [nnc4ljl14kgq6388cboj] Dump for 'offer' from 127.0.0.1:60835: { "sdp": "v=0#015#012o=- 3444239218100234355 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS RybZXK6gdeboGCwOtpme26nj0B4MuF85nk9I#015#012m=audio 24553 UDP/TLS/RTP/SAVPF 111 103 104 9 0 8 106 105 13 126#015#012c=IN IP4 externip#015#012a=rtcp:52284 IN IP4 externip#015#012a=candidate:2609552855 1 udp 2122260223 10.100.1.218 64663 typ host generation 0 network-id 1#015#012a=candidate:2609552855 2 udp 2122260222 10.100.1.218 63707 typ host generation 0 networ ... | |
Jun 10 14:16:15 rtpengine[8816]: [nnc4ljl14kgq6388cboj] ... k-id 1#015#012a=candidate:1838867459 1 udp 1686052607 externip 24553 typ srflx raddr 10.100.1.218 rport 64663 generation 0 network-id 1#015#012a=candidate:1838867459 2 udp 1686052606 externip 52284 typ srflx raddr 10.100.1.218 rport 63707 generation |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Dec 8 14:52:04 /usr/sbin/kamailio[5640]: DEBUG: <core> [tcp_read.c:360]: tcp_read(): tcp_read: read 1025 bytes:#012INVITE sip:101@10.100.1.163:5060;transport=TCP;user=phone SIP/2.0#015#012Via: SIP/2.0/TCP 10.100.4.145:51220;branch=z9hG4bKefaqz0dxrv28a1z5#015#012Max-Forwards: 70#015#012From: "Tester 4402" <sip:4402@10.100.1.163:5060;transport=TCP>;tag=0gg585t#015#012To: <sip:101@10.100.1.163:5060;transport=TCP;user=phone>#015#012Call-ID: rlg9j0g2b.jlz458lwklb@10.100.1.163#015#012CSeq: 24586 INVITE#015#012Contact: <sip:4402@10.100.4.145:51220;transport=TCP>;+sip.instance="<urn:uuid:0d9a006d-0355-0008-0000-001188704937>"#015#012Allow: INVITE, CANCEL, BYE, ACK, REGISTER, OPTIONS, REFER, SUBSCRIBE, NOTIFY, MESSAGE, INFO, PRACK, UPDATE#015#012Content-Disposition: session#015#012Supported: replaces,100rel#015#012User-Agent: some user agent#015#012Content-Type: application/sdp#015#012Content-Length: 269#015#012#015#012v=0#015#012o=4402 5363 5363 IN IP4 10.100.4.145#015#012s=-#015#012c=IN IP4 10.100.4.145#015#012t=0 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Dec 8 14:49:03 /usr/sbin/kamailio[5640]: DEBUG: <core> [tcp_read.c:360]: tcp_read(): tcp_read: read 1025 bytes:#012INVITE sip:101@10.100.1.163:5060;transport=TCP;user=phone SIP/2.0#015#012Via: SIP/2.0/TCP 10.100.4.145:51220;branch=z9hG4bK32pl2x.ri.i3#015#012Max-Forwards: 70#015#012From: "Tester 4402" <sip:4402@10.100.1.163:5060;transport=TCP>;tag=wpp8iu#015#012To: <sip:101@10.100.1.163:5060;transport=TCP;user=phone>#015#012Call-ID: 1jwvtixkcro6r.lgfws9a3.q@10.100.1.163#015#012CSeq: 21490 INVITE#015#012Contact: <sip:4402@10.100.4.145:51220;transport=TCP>;+sip.instance="<urn:uuid:0d9a006d-0355-0008-0000-001188704937>"#015#012Allow: INVITE, CANCEL, BYE, ACK, REGISTER, OPTIONS, REFER, SUBSCRIBE, NOTIFY, MESSAGE, INFO, PRACK, UPDATE#015#012Content-Disposition: session#015#012Supported: replaces,100rel#015#012User-Agent: some user agent #015#012Content-Type: application/sdp#015#012Content-Length: 271#015#012#015#012v=0#015#012o=4402 28161 28161 IN IP4 10.100.4.145#015#012s=-#015#012c=IN IP4 10.100.4.145#015#012t= |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Nov 23 15:57:06 220000000028 rtpengine[25092]: [7a37578a52ffa9431e00f11732e51b21@127.0.0.1:6050] Received command 'offer' from 127.0.0.1:38696 | |
Nov 23 15:57:06 220000000028 rtpengine[25092]: [7a37578a52ffa9431e00f11732e51b21@127.0.0.1:6050] Dump for 'offer' from 127.0.0.1:38696: { "sdp": "v=0#015#012o=root 1938347507 1938347507 IN IP4 127.0.0.1#015#012s=Callweaver 30280#015#012c=IN IP4 127.0.0.1#015#012t=0 0#015#012m=audio 10480 RTP/AVP 18 8 0#015#012a=rtpmap:18 G729/8000#015#012a=fmtp:18 annexb=no#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012a=sendrecv#015#012", "ICE": "force", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "rtcp-mux": [ "offer" ], "call-id": "7a37578a52ffa9431e00f11732e51b21@127.0.0.1 ... | |
Nov 23 15:57:06 220000000028 rtpengine[25092]: [7a37578a52ffa9431e00f11732e51b21@127.0.0.1:6050] ... :6050", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as611038b8", "command": "offer" } | |
Nov 23 15: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Received command 'offer' from 127.0.0.1:38836 | |
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Dump for 'offer' from 127.0.0.1:38836: { "sdp": "v=0#015#012o=root 2063634125 2063634125 IN IP4 127.0.0.1#015#012s=Callweaver 30280#015#012c=IN IP4 127.0.0.1#015#012t=0 0#015#012m=audio 12898 RTP/AVP 18 8 0#015#012a=rtpmap:18 G729/8000#015#012a=fmtp:18 annexb=no#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012a=sendrecv#015#012", "ICE": "force", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "rtcp-mux": [ "offer" ], "call-id": "006d73de61c31c5163163e101c929baa@127.0.0.1 ... | |
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... :6050", "via-branch": "z9hG4bK5f660d85", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as1679b510", "command": "offer" } | |
Nov 23 10: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Nov 20 16:39:49 rtpengine[4709]: [6d6db5e605ab075b1adc48364161ab97@127.0.0.1:6050] Received command 'offer' from 127.0.0.1:46934 | |
Nov 20 16:39:49 rtpengine[4709]: [6d6db5e605ab075b1adc48364161ab97@127.0.0.1:6050] Dump for 'offer' from 127.0.0.1:46934: { "sdp": "v=0#015#012o=root 286731412 286731412 IN IP4 127.0.0.1#015#012s=Callweaver 30280#015#012c=IN IP4 127.0.0.1#015#012t=0 0#015#012m=audio 10836 RTP/AVP 18 8 0#015#012a=rtpmap:18 G729/8000#015#012a=fmtp:18 annexb=no#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012a=sendrecv#015#012", "ICE": "force", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "rtcp-mux": [ "offer" ], "call-id": "6d6db5e605ab075b1adc48364161ab97@127.0.0.1:6 ... | |
Nov 20 16:39:49 rtpengine[4709]: [6d6db5e605ab075b1adc48364161ab97@127.0.0.1:6050] ... 050", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as2ad410e9", "command": "offer" } | |
Nov 20 16:39:49 rtpengine[4709]: [6d6db5e605ab |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Nov 10 10:52:13 08002762c3f6 rtpengine[5030]: [544226e307c4efcf4085ec4f752ae165@127.0.0.1:6050] Received command 'offer' from 127.0.0.1:44058 | |
Nov 10 10:52:13 08002762c3f6 rtpengine[5030]: [544226e307c4efcf4085ec4f752ae165@127.0.0.1:6050] Dump for 'offer' from 127.0.0.1:44058: { "sdp": "v=0#015#012o=root 359414512 359414512 IN IP4 10.100.1.24#015#012s=Asterisk 30201#015#012c=IN IP4 10.100.1.24#015#012t=0 0#015#012m=audio 11800 RTP/AVP 18 8 0#015#012a=rtpmap:18 G729/8000#015#012a=fmtp:18 annexb=no#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012a=sendrecv#015#012", "ICE": "force", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "rtcp-mux": [ "offer" ], "call-id": "544226e307c4efcf4085ec4f752ae165@127.0.0 ... | |
Nov 10 10:52:13 08002762c3f6 rtpengine[5030]: [544226e307c4efcf4085ec4f752ae165@127.0.0.1:6050] ... .1:6050", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as262f4874", "command": "offer" } | |
Nov 10 10:52: |