Asterisk Configuration files

Slides:



Advertisements
Similar presentations
Access Control List (ACL)
Advertisements

RIP V1 W.lilakiatsakun.
NETW-250 Troubleshooting Last Update Copyright Kenneth M. Chipps Ph.D. 1.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
Skype & Network Management Taken from class reference : An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning Schulzrinne.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
1 System Settings When this module is complete, you will be able to:  Navigate the admin-level web interface pages  Set a new name for your system 
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Introduction to networking (Yarnfield) Introduction to routing.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
Module 7: Configuring TCP/IP Addressing and Name Resolution.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
NAT Traversal Speaker: Chin-Chang Chang Date:
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
© 2002, Cisco Systems, Inc. All rights reserved..
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 9 Basic Router Troubleshooting.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
Open Source Software Asterisk “Hello World” Initial Demo Mode.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Firewall Policies. Module Objectives By the end of this module participants will be able to: Identify the components used in a firewall policy Create.
Simple Example. sip.conf [101] username=101 type = friend secret = mypassword qualify = yes nat = no host = dynamic context = internal [102] username=102.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
IP Addressing.
Dynamic Host Configuration Protocol (DHCP) DHCP provides a temporary IP address for a limited period of time DHCP has two databases. First one has static.
Network Layer IP Address.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
What does LinkConnect do?
Network Load Balancing Addressing
Chapter 05 Exam Review CCNA Discovery 01 – Computer and Network Fundamentals Presented by: Phillip Place Cisco Academy Instructor Lake Michigan College.
Microsoft Windows NT 4.0 Authentication Protocols
Instructor Materials Chapter 6: VLANs
Configuring Attendant Console
Selecting Unicast or Multicast Mode
SECURING NETWORK TRAFFIC WITH IPSEC
Chapter 4: Routing Concepts
BOOTP and DHCP Objectives
Part1: Ipconfig ping command Tracert command Getmac command
Introduction to Networking
Introducing To Networking
Configuring TMG as a Firewall
Chapter 6: Network Layer
Introduction to Networking
NET323 D: Network Protocols
Net 431: ADVANCED COMPUTER NETWORKS
Routing and Switching Essentials v6.0
* Essential Network Security Book Slides.
Application layer Lecture 7.
NET323 D: Network Protocols
Configuring Internet-related services
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Starting TCP Connection – A High Level View
Networking Theory (part 2)
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
TELNET BY , S.AISHWARYA III-IT.
Computer Networks Protocols
Networking Theory (part 2)
Networking Theory (part 2)
Presentation transcript:

Asterisk Configuration files Asterisk.conf defines the locations for the configuration files, the spool directory, and the modules, as well as a location to write log files to. [directories] astetcdir => /etc/asterisk ; location where Asterisk configuration files are stored astmoddir => /usr/lib/asterisk/modules ; location where Asterisk modules are stored astvarlibdir => /var/lib/asterisk ; location where Asterisk libraries are stored astagidir => /var/lib/asterisk/agi-bin ;location where agi scripts are stored astspooldir => /var/spool/asterisk ; location where all records are stored astrundir => /var/run ; location where Asterisk will store its PID file astlogdir => /var/log/asterisk ; location where Asterisk logs are stored

Manager.conf The Asterisk Manager interface is an API which external programs can use to communicate with, and control, Asterisk. [general] enabled = no port = 5038 bindaddr = 0.0.0.0 [magma] secret = welcome deny=0.0.0.0/0.0.0.0 permit= 192.168.1.0/255.255.255.0 read = system,call,log,verbose,command,agent,user write = system,call,log,verbose,command,agent,user

cdr_custom.conf Asterisk will generate a CDR for every finished call by default; this file defines exactly what gets logged in this CDR line. [mappings] Master.csv => "${CDR(clid)}","${CDR(src)}","${CDR(dst)}","${CDR(dcontext)}","${CDR(channel)}","${CDR(dstchannel)}","${CDR(lastapp)}","${CDR(lastdata)}","${CDR(start)}","${CDR(answer)}","${CDR(end)}","${CDR(duration)}","${CDR(billsec)}","${CDR(disposition)}","${CDR(amaflags)}","${CDR(accountcode)}","${CDR(uniqueid)}","${CDR(userfield)}”

rtp.conf The rtp.conf file controls the Real-time Transport Protocol (RTP) ports that Asterisk uses to generate and receive RTP traffic. [general] rtpstart=10000 rtpend=20000 rtpchecksums=no

Sip.conf [general} section Implements settings on all SIP clients Port The port Asterisk should listen for SIP incoming clients. The default is 5060 Bindaddr If the Asterisk machine has multiple IPs, this option tells Asterisk to listen on a particular IP. Asterisk listens on all interfaces and aliases by default Context The default context for SIP clients

Sip.conf Type of Service (ToS) Sets ToS bits in an IP header to improve performance on routers that respects ToS bits The options are low delay, throughput, reliability, mincost, none Allow and disallow Allows and disallows specific codecs. Codec negotiation is attempted in the order in which codecs are defined. The best practice is to disallow all and then allow a codec explicitly For example: disallow=all allow=g729 allow=alaw allow=ulaw

Sip.conf Maxexpirey The maximum amount of time until a peer’s registration expires Defaultexpirey This sets the default SIP registration expiration time, in seconds, for incoming and outgoing registrations Register Register this Asterisk with another host

Sip.conf Client Options Type The type option sets the connection class for the client. The options are: peer: A device which receives calls from an Asterisk server user: A device that makes calls through an Asterisk server friend: A device that can both send and receive calls through an Asterisk server Secret Set a password for the client Host A client’s IP address. Can also be set to dynamic if a client comes from any IP

Sip.conf Defaultip Asterisk will send a call on this IP if a host is set to dynamic and the SIP client is not registered yet Username A client’s username Context The context to start in extensions.conf Canreinvite Connects end-points directly Nat Can be set to yes, no, or never. If set to yes, Asterisk ignores the IP address in the SIP and SDP headers and responds to the address and port in the IP header. The never option is for devices that cannot handle rport in the SIP header, such as the Uniden UIP200.

Sip.conf Qualify Sets qualify to yes, no, or a time in milliseconds. If you set qualify=yes, NOTIFY messages will be sent periodically to the remote peers to determine whether they are available and what the latency between replies is. A peer is determined unreachable if no reply is received within 2,000 ms (to change this default, set qualify to the number of milliseconds to wait for the reply). Use this option in conjunction with nat=yes to keep the path through the NAT device alive.

Iax.conf [general] section Bandwidth Instead of allowing or disallowing codecs, use low or high bandwidth options to automatically select the low bandwidth consumption codec or high bandwidth consumption codec jitterbuffer Turn the jitterbuffer on or off. The jitterbuffer is used to maximize audio quality by balancing latency against the number of dropped packets dropcount Sets the maximum number of packets per memory size to be dropped in order to reduce latency maxjitterbuffer Sets the maximum size of the jitterbuffer

Iax.conf maxexcessjitterbuffer: Sets the maximum excess jitterbuffer, which, if exceeded, causes the jitterbuffer to slowly shrink in order to improve latency.