Hello The attached file contains the trace log level 5... thanks Rafael Zygmuntowicz Michal <m.zygmuntowicz@onet.pl> escribió: > Could you send a sample ARQ and Q.931 Setup message received by the gk > (trace file log level 5) > from Cisco AS? I suspect Setup message does not provide all the fields, > but I am > not sure. I am working on the fix... > > ----- Original Message ----- > From: "Rafael J. Risco G.V." <rrisco@millicom.net.pe> > Sent: Thursday, October 30, 2003 11:12 PM > > > > In this simple scenario we are using a Cisco AS5350 as a pstn gateway > > > registered in the GNUGK and using Radauth and RadAccounting modules, > the > > problem is that when a call originated in some PSTN phone tries to > reach > > another endpoint -6603000- the radacct module shows in the > Calling-Station-Id > > field the value "micpegw01" (the GW Alias) instead of the calling > number > > (199109990), note that the radius "Access-Request" code receives the > correct > > value. > > > > It seems to me that the Radacct module is somehow bugged since it's > kind > > of 'concealing' the real Calling-Station-Id replacing it by the GW > Alias, how > > is this normal or what? > > > > ------------------------------------------------------- > This SF.net email is sponsored by: SF.net Giveback Program. > Does SourceForge.net help you be more productive? Does it > help you create better code? SHARE THE LOVE, and help us help > YOU! Click Here: http://sourceforge.net/donate/ > _______________________________________________ > List: Openh323gk-users@lists.sourceforge.net > Archive: http://sourceforge.net/mailarchive/forum.php?forum_id=8549 > Homepage: http://www.gnugk.org/ >
Subject: RadAcct issue with pstn incoming calls Hello In this simple scenario we are using a Cisco AS5350 as a pstn gateway registered in the GNUGK and using Radauth and RadAccounting modules, the problem is that when a call originated in some PSTN phone tries to reach another endpoint -6603000- the radacct module shows in the Calling-Station-Id field the value "micpegw01" (the GW Alias) instead of the calling number (199109990), note that the radius "Access-Request" code receives the correct value. It seems to me that the Radacct module is somehow bugged since it's kind of 'concealing' the real Calling-Station-Id replacing it by the GW Alias, how is this normal or what? if the problem lies elsewhere please let me know, I send below my .ini file and cisco config .... AND TRACE LEVEL 5 LOG: thanks Rafael Risco Millicom Peru (199109990)PSTN-----|AS5350|--->|GNUGK|------>|H323Endpoint|(6603000) | | | |Radiator| | AAA | | mysql | AS53350: 192.168.1.145 GNUGK: 192.168.1.132 H323 EndPoint: 192.168.1.58 Thu Oct 30 12:30:53 2003: DEBUG: Packet dump: *** Received from 192.168.1.132 port 10453 .... Code: Access-Request Identifier: 165 Authentic: ~}<12><10><189><29><241><142>(<149>69<160><179><172><26> Attributes: User-Name = "micpegw01" CHAP-Password = <234><221>sW CHAP-Challenge = 8o<182><221> NAS-IP-Address = 192.168.1.132 NAS-Identifier = "MICPEGK02" NAS-Port-Type = Virtual Service-Type = Login-User Framed-IP-Address = 192.168.1.145 Calling-Station-Id = "199109990" Called-Station-Id = "6603000" cisco-h323-conf-id = "h323-conf-id=2991DE7F C08B11D3 8568DCA1 FE7CCFC4" cisco-h323-call-origin = "h323-call-origin=originate" cisco-h323-call-type = "h323-call-type=VoIP" cisco-h323-gw-id = "h323-gw-id=MICPEGK02" Code: Access-Accept Identifier: 165 Authentic:(<149>69<160><179><172><26> Attributes: Session-Timeout = 9999596 Thu Oct 30 12:30:53 2003: DEBUG: Packet dump: *** Received from 192.168.1.132 port 10221 .... Code: Accounting-Request Identifier: 78 Authentic: G<198><210><15><2><131><213><202><2><169><148><137><247>f<210>Z Attributes: Acct-Status-Type = Start NAS-IP-Address = 192.168.1.132 NAS-Identifier = "MICPEGK02" NAS-Port-Type = Virtual Service-Type = Login-User Acct-Session-Id = "4811002f" User-Name = "micpegw01" Framed-IP-Address = 192.168.1.145 Calling-Station-Id = "micpegw01" Called-Station-Id = "6603000" cisco-h323-gw-id = "h323-gw-id=MICPEGK02" cisco-h323-conf-id = "h323-conf-id=2991DE7F C08B11D3 8568DCA1 FE7CCFC4" cisco-h323-call-origin = "h323-call-origin=proxy" cisco-h323-call-type = "h323-call-type=VoIP" cisco-h323-setup-time = "h323-setup-time=12:30:53.000 PET Thu Oct 30 2003" cisco-h323-remote-address = "h323-remote-address=192.168.1.58" Acct-Delay-Time = 0 *** Received from 192.168.1.132 port 10453 .... Code: Access-Request Identifier: 166 Authentic: <31><150><166>^<216><30> Attributes: User-Name = "micpegw01" CHAP-Password = 203><188>-<200>~G<140> CHAP-Challenge = 8o<182><221> NAS-IP-Address = 192.168.1.132 NAS-Identifier = "MICPEGK02" NAS-Port-Type = Virtual Service-Type = Call-Check Framed-IP-Address = 192.168.1.58 Calling-Station-Id = "199109990" Called-Station-Id = "6603000" cisco-h323-conf-id = "h323-conf-id=2991DE7F C08B11D3 8568DCA1 FE7CCFC4" cisco-h323-call-origin = "h323-call-origin=answer" cisco-h323-call-type = "h323-call-type=VoIP" cisco-h323-gw-id = "h323-gw-id=MICPEGK02" Thu Oct 30 12:31:06 2003: DEBUG: Packet dump: *** Received from 192.168.1.132 port 10221 .... Code: Accounting-Request Identifier: 79 Authentic: <10><245>><217><26><218><17> Attributes: Acct-Status-Type = Stop NAS-IP-Address = 192.168.1.132 NAS-Identifier = "MICPEGK02" NAS-Port-Type = Virtual Service-Type = Login-User Acct-Session-Id = "4811002f" User-Name = "micpegw01" Framed-IP-Address = 192.168.1.145 Acct-Session-Time = 4 Calling-Station-Id = "micpegw01" <------ this is the GW H323 Alias Called-Station-Id = "6603000" cisco-h323-gw-id = "h323-gw-id=MICPEGK02" cisco-h323-conf-id = "h323-conf-id=2991DE7F C08B11D3 8568DCA1FE7CCFC4" cisco-h323-call-origin = "h323-call-origin=proxy" cisco-h323-call-type = "h323-call-type=VoIP" cisco-h323-setup-time = "h323-setup-time=12:30:53.000 PET Thu Oct30 2003" cisco-h323-connect-time = "h323-connect-time=12:31:02.000 PET ThuOct 30 2003" cisco-h323-disconnect-time = "h323-disconnect-time=12:31:06.000 PETThu Oct 30 2003" cisco-h323-disconnect-cause = "h323-disconnect-cause=10" cisco-h323-remote-address ="h323-remote-address=192.168.1.58" Acct-Delay-Time = 0 --------------------------------------- GNUGK ini File: aaa_micpegk02.ini --------------------------------------------- [Gatekeeper::Main] Fourtytwo=42 Home=192.168.1.132 TimeToLive=600 TotalBandwidth=10000 Name=MICPEGK02 [RoutedMode] GKRouted=1 H245Routed=0 CallSignalPort=1721 AcceptUnregisteredCalls=1 [GkStatus::Auth] rule=allow #### Auth with H235 Passwd [Gatekeeper::Auth] RadAuth=required;RRQ,ARQ #RadAuth=sufficient;RRQ #RadAuth=optional;ARQ default=allow # Configuration section for RadAuth authenticator module [RadAuth] Servers=192.168.1.132 LocalInterface=192.168.1.132 RadiusPortRange=10000-11000 DefaultAuthPort=1645 SharedSecret=****** RequestTimeout=2000 IdCacheTimeout=9000 SocketDeleteTimeout=60000 RequestRetransmissions=2 RoundRobinServers=1 AppendCiscoAttributes=1 IncludeTerminalAliases=1 IncludeEndpointIP=1 ##### Accounting mechanism [Gatekeeper::Acct] RadAcct=required # Configuration section for RadAcct accounting module [RadAcct] Servers=192.168.1.132 LocalInterface=192.168.1.132 RadiusPortRange=10000-11000 DefaultAcctPort=1646 SharedSecret=****** RequestTimeout=3500 IdCacheTimeout=9000 SocketDeleteTimeout=60000 RequestRetransmissions=4 RoundRobinServers=1 AppendCiscoAttributes=1 IncludeEndpointIP=1 #FixedUsername= ------------------------------------- Cisco AS5350 Configuration: ------------------------------------- ! controller E1 3/0 framing NO-CRC4 ds0-group 0 timeslots 1-15,17-31 type r2-digital r2-semi-compelled ani cas-custom 0 country venezuela use-defaults description E1-R2_BellSouth ! ! interface FastEthernet0/0 ip address 192.168.1.145 255.255.255.0 duplex auto speed auto h323-gateway voip interface h323-gateway voip id MICPEGK02 ipaddr 192.168.1.132 1719 h323-gateway voip h323-id micpegw01 h323-gateway voip tech-prefix 9 h323-gateway voip tech-prefix 1 ! . . . ! voice-port 3/0:0 compand-type a-law ! ! dial-peer cor custom ! ! dial-peer voice 2 pots destination-pattern .T direct-inward-dial port 3/0:0 ! dial-peer voice 3 voip destination-pattern .T session target ras codec g723r63 ! gateway security password 000942654654115F70 level endpoint ! . micpegw01# ----------------------------------------- TRACE LEVEL 5 Gatekeeper(GNU) Version(2.0.7) Ext(pthreads=1) Build(Nov 3 2003, 12:09:10) Sys(Linux i686 2.4.22) . . . 2003/11/10 12:49:58.081 2 RasSrv.cxx(2179) GK Read from 192.168.1.145:52525 2003/11/10 12:49:58.082 3 RasSrv.cxx(2192) GK admissionRequest { requestSeqNum = 25105 callType = pointToPoint <<null>> callModel = direct <<null>> endpointIdentifier = 9 characters { 0038 0037 0030 0031 005f 0065 006e 0064 8701_end 0070 p } destinationInfo = 1 entries { [0]=dialedDigits "6603000" } srcInfo = 2 entries { [0]=dialedDigits "199109990" [1]=h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } } bandWidth = 1280 callReferenceValue = 486 nonStandardData = { nonStandardIdentifier = h221NonStandard { t35CountryCode = 181 t35Extension = 0 manufacturerCode = 18 } data = 22 octets { 80 00 00 08 20 10 1c 44 53 30 20 47 72 6f 75 70 .... ..DS0 Group 20 33 2f 30 3a 30 3/0:0 } } conferenceID = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9c dc a1 fe 7c cf c4 ...w.2.......|.. } activeMC = FALSE answerCall = FALSE canMapAlias = TRUE callIdentifier = { guid = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 ...w.2.......|.. } } tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 947796943 challenge = 16 octets { 49 83 2e a8 70 1c 3e e5 9a ff 24 7e e2 de 12 bf I...p.>...$~.... } random = 181 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } } } cryptoTokens = 1 entries { [0]=cryptoEPPwdHash { alias = h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } timeStamp = 947796943 token = { algorithmOID = 1.2.840.113549.2.5 paramS = { } hash = Hex: 8d 45 d6 83 7b d8 37 ad ec 0d 89 87 2d 88 ed 9f } } } willSupplyUUIEs = FALSE } 2003/11/10 12:49:58.097 1 RasSrv.cxx(1317) GK ARQ Received 2003/11/10 12:49:58.098 3 radproto.cxx(1843) RADIUS Sending PDU to RADIUS server 192.168.1.132 (192.168.1.132:1645) from port:10405[0,231-232], PDU: { code = 1 (Access-Request) id = 231 length = 256 octets authenticator = 16 octets { 0b d2 c6 8f 01 4f 35 ab 32 b5 37 f9 d2 80 84 a8 .....O5.2.7..... } attributes = 14 elements { [0]= { type = 1 (User-Name) length = 11 octets value = 9 octets { 6d 69 63 70 65 67 77 30 31 micpegw01 } } [1]= { type = 3 (CHAP-Password) length = 19 octets value = 17 octets { b5 49 83 2e a8 70 1c 3e e5 9a ff 24 7e e2 de 12 .I...p.>...$~... bf . } } [2]= { type = 60 (CHAP-Challenge) length = 6 octets value = 4 octets { 38 7e 3b cf 8~;. } } [3]= { type = 4 (NAS-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 84 .n.. } } [4]= { type = 32 (NAS-Identifier) length = 11 octets value = 9 octets { 4d 49 43 50 45 47 4b 30 32 MICPEGK02 } } [5]= { type = 61 (NAS-Port-Type) length = 6 octets value = 4 octets { 00 00 00 05 .... } } [6]= { type = 6 (Service-Type) length = 6 octets value = 4 octets { 00 00 00 01 .... } } [7]= { type = 8 (Framed-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 91 .n.. } } [8]= { type = 31 (Calling-Station-Id) length = 11 octets value = 9 octets { 31 39 39 31 30 39 39 39 30 199109990 } } [9]= { type = 30 (Called-Station-Id) length = 9 octets value = 7 octets { 36 36 30 33 30 30 30 6603000 } } [10]= { type = 26 (Vendor-Specific) length = 56 octets vendorId = 9 vendorValue = 50 octets { 18 32 68 33 32 33 2d 63 6f 6e 66 2d 69 64 3d 41 .2h323-conf-id=A 32 39 42 46 31 37 37 20 43 39 33 32 31 31 44 33 29BF177 C93211D3 20 38 35 39 43 44 43 41 31 20 46 45 37 43 43 46 859CDCA1 FE7CCF 43 34 C4 } } [11]= { type = 26 (Vendor-Specific) length = 34 octets vendorId = 9 vendorValue = 28 octets { 1a 1c 68 33 32 33 2d 63 61 6c 6c 2d 6f 72 69 67 ..h323-call-orig 69 6e 3d 6f 72 69 67 69 6e 61 74 65 in=originate } } [12]= { type = 26 (Vendor-Specific) length = 27 octets vendorId = 9 vendorValue = 21 octets { 1b 15 68 33 32 33 2d 63 61 6c 6c 2d 74 79 70 65 ..h323-call-type 3d 56 6f 49 50 =VoIP } } [13]= { type = 26 (Vendor-Specific) length = 28 octets vendorId = 9 vendorValue = 22 octets { 21 16 68 33 32 33 2d 67 77 2d 69 64 3d 4d 49 43 !.h323-gw-id=MIC 50 45 47 4b 30 32 PEGK02 } } } } 2003/11/10 12:49:58.111 3 radproto.cxx(1869) RADIUS Received PDU from RADIUS server 192.168.1.132 (192.168.1.132:1645) by socket port:10405[0,231-232], PDU: { code = 2 (Access-Accept) id = 231 length = 26 octets authenticator = 16 octets { 40 5a 7e 66 f4 5e 3f e1 38 89 60 47 be 46 d2 17 @Z~f.^?.8.`G.F.. } attributes = 1 elements { [0]= { type = 27 (Session-Timeout) length = 6 octets value = 4 octets { 00 98 93 d7 .... } } } } 2003/11/10 12:49:58.113 5 radauth.cxx(890) RADAUTH RadAuth ARQ check set duration limit set: -41 2003/11/10 12:49:58.113 4 gkauth.cxx(296) GkAuth RadAuth check ok 2003/11/10 12:49:58.113 4 gkauth.cxx(296) GkAuth default check ok 2003/11/10 12:49:58.113 4 RasTbl.cxx(776) Alias match for EP 192.168.1.58:1720 2003/11/10 12:49:58.114 2 RasTbl.cxx(1473) GK Available Bandwidth 8720 2003/11/10 12:49:58.114 3 RasSrv.cxx(1565) GK ARQ will request bandwith of 1280 2003/11/10 12:49:58.115 2 RasTbl.cxx(1447) CallTable::Insert(CALL) Call No. 5, total sessions : 1 2003/11/10 12:49:58.116 2 RasSrv.cxx(1676) ACF|192.168.1.145:1720|8701_endp|486|6603000:dialedDigits|199109990:dialedDigits=micpegw01:h323_ID|false; 2003/11/10 12:49:58.118 3 RasSrv.cxx(2119) GK Send to 192.168.1.145:52525 admissionConfirm { requestSeqNum = 25105 bandWidth = 1280 callModel = gatekeeperRouted <<null>> destCallSignalAddress = ipAddress { ip = 4 octets { c8 6e 02 84 .n.. } port = 1721 } irrFrequency = 120 willRespondToIRR = FALSE uuiesRequested = { setup = FALSE callProceeding = FALSE connect = FALSE alerting = FALSE information = FALSE releaseComplete = FALSE facility = FALSE progress = FALSE empty = FALSE status = FALSE statusInquiry = FALSE setupAcknowledge = FALSE notify = FALSE } } 2003/11/10 12:49:58.125 5 RasSrv.cxx(2133) GK Sent Successful 2003/11/10 12:49:58.127 3 ProxyThread.cxx(503) ProxyL Connected from 192.168.1.145:11539 2003/11/10 12:49:58.127 5 ProxyThread.cxx(538) ProxyH(0) add a socket, total 2 2003/11/10 12:49:58.128 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 1, total 2/2 2003/11/10 12:49:58.129 5 ProxyThread.cxx(354) Q931s Reading from 192.168.1.145:11539 2003/11/10 12:49:58.129 3 ProxyChannel.cxx(413) Q931s Received: Setup CRV=486 from 192.168.1.145:11539 2003/11/10 12:49:58.133 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = originator messageType = Setup IE: Bearer-Capability = { 80 90 a3 ... } IE: Calling-Party-Number = { 81 31 39 39 31 30 39 39 39 30 .199109990 } IE: Called-Party-Number = { 81 36 36 30 33 30 30 30 .6603000 } IE: User-User = { 20 a0 06 00 08 91 4a 00 03 01 40 08 00 6d 00 69 .....J...@..m.i 00 63 00 70 00 65 00 67 00 77 00 30 00 31 08 80 .c.p.e.g.w.0.1.. 01 3c 05 12 07 00 40 84 40 00 c0 00 70 00 50 04 .<....@.@...p.P. 9c 30 00 40 00 30 00 a2 9b f1 77 c9 32 11 d3 85 .0.@.0....w.2... 9c dc a1 fe 7c cf c4 00 cd 5d 80 00 07 00 c8 6e ....|....].....n 02 91 06 b8 11 00 a2 9b f1 77 c9 32 11 d3 85 9d .........w.2.... dc a1 fe 7c cf c4 80 bd 01 4d 80 0a 2a 86 48 86 ...|.....M..*.H. f7 0c 0a 01 02 01 c0 38 7e 3b ce 10 47 1a 57 3f .......8~;..G.W? c5 4b c2 dc 32 e3 47 62 3c 73 60 64 02 00 b6 12 .K..2.Gb<s`d.... 00 6d 00 69 00 63 00 70 00 65 00 67 00 77 00 30 .m.i.c.p.e.g.w.0 00 31 00 00 03 01 02 04 7c 38 7e 3b cf 47 1a 57 .1......|8~;.G.W 3f c5 4b c2 dc 32 e3 47 62 3c 73 60 64 00 00 00 ?.K..2.Gb<s`d... b6 6d 69 63 70 65 67 77 30 31 00 00 00 00 00 00 .micpegw01...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 34 02 13 00 00 00 0d 00 00 40 00 .....4........@. 0a 04 00 01 00 c8 6e 02 91 42 53 1e 40 00 00 06 ......n..BS.@... 04 01 00 4d 00 00 40 00 11 14 00 01 00 c8 6e 02 ...M..@.......n. 91 42 52 00 c8 6e 02 91 42 53 01 00 01 00 01 80 .BR..n..BS...... 01 80 10 a0 01 80 13 01 40 b5 00 00 12 0c c0 01 ........@....... 00 02 80 06 00 04 00 00 00 03 .......... } } h225pdu = { h323_uu_pdu = { h323_message_body = setup { protocolIdentifier = 0.0.8.2250.0.3 sourceAddress = 1 entries { [0]=h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } } sourceInfo = { gateway = { protocol = 1 entries { [0]=voice { supportedPrefixes = 7 entries { [0]={ prefix = dialedDigits "511" } [1]={ prefix = dialedDigits "9" } [2]={ prefix = dialedDigits "4" } [3]={ prefix = dialedDigits "2" } [4]={ prefix = dialedDigits "690" } [5]={ prefix = dialedDigits "1" } [6]={ prefix = dialedDigits "0" } } } } } mc = FALSE undefinedNode = FALSE } activeMC = FALSE conferenceID = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9c dc a1 fe 7c cf c4 ...w.2.......|.. } conferenceGoal = create <<null>> callType = pointToPoint <<null>> sourceCallSignalAddress = ipAddress { ip = 4 octets { c8 6e 02 91 .n.. } port = 1720 } callIdentifier = { guid = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 ...w.2.......|.. } } tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 947796943 challenge = 16 octets { 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 3c 73 60 64 G.W?.K..2.Gb<s`d } random = 182 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } nonStandard = { nonStandardIdentifier = 0.1.2.4 data = 124 octets { 38 7e 3b cf 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 8~;.G.W?.K..2.Gb 3c 73 60 64 00 00 00 b6 6d 69 63 70 65 67 77 30 <s`d....micpegw0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 ............ } } } } fastStart = 2 entries { [0]= 19 octets { 00 00 00 0d 00 00 40 00 0a 04 00 01 00 c8 6e 02 ......@.......n. 91 42 53 .BS } [1]= 30 octets { 40 00 00 06 04 01 00 4d 00 00 40 00 11 14 00 01 @......M..@..... 00 c8 6e 02 91 42 52 00 c8 6e 02 91 42 53 ..n..BR..n..BS } } mediaWaitForConnect = FALSE canOverlapSend = FALSE multipleCalls = TRUE maintainConnection = TRUE } h245Tunneling = TRUE nonStandardControl = 1 entries { [0]={ nonStandardIdentifier = h221NonStandard { t35CountryCode = 181 t35Extension = 0 manufacturerCode = 18 } data = 12 octets { c0 01 00 02 80 06 00 04 00 00 00 03 ............ } } } } } } 2003/11/10 12:49:58.145 3 radproto.cxx(1843) RADIUS Sending PDU to RADIUS server 192.168.1.132 (192.168.1.132:1646) from port:10969[0,4-5], PDU: { code = 4 (Accounting-Request) id = 4 length = 345 octets authenticator = 16 octets { c4 ab 4f a1 83 6f 1d a4 63 b2 1e c4 24 ce 6e 51 ..O..o..c...$.nQ } attributes = 17 elements { [0]= { type = 40 (Acct-Status-Type) length = 6 octets value = 4 octets { 00 00 00 01 .... } } [1]= { type = 4 (NAS-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 84 .n.. } } [2]= { type = 32 (NAS-Identifier) length = 11 octets value = 9 octets { 4d 49 43 50 45 47 4b 30 32 MICPEGK02 } } [3]= { type = 61 (NAS-Port-Type) length = 6 octets value = 4 octets { 00 00 00 05 .... } } [4]= { type = 6 (Service-Type) length = 6 octets value = 4 octets { 00 00 00 01 .... } } [5]= { type = 44 (Acct-Session-Id) length = 10 octets value = 8 octets { 61 33 33 30 30 30 30 34 a3300004 } } [6]= { type = 1 (User-Name) length = 11 octets value = 9 octets { 6d 69 63 70 65 67 77 30 31 micpegw01 } } [7]= { type = 8 (Framed-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 91 .n.. } } [8]= { type = 31 (Calling-Station-Id) length = 11 octets value = 9 octets { 6d 69 63 70 65 67 77 30 31 micpegw01 } } [9]= { type = 30 (Called-Station-Id) length = 9 octets value = 7 octets { 36 36 30 33 30 30 30 6603000 } } [10]= { type = 26 (Vendor-Specific) length = 28 octets vendorId = 9 vendorValue = 22 octets { 21 16 68 33 32 33 2d 67 77 2d 69 64 3d 4d 49 43 !.h323-gw-id=MIC 50 45 47 4b 30 32 PEGK02 } } [11]= { type = 26 (Vendor-Specific) length = 56 octets vendorId = 9 vendorValue = 50 octets { 18 32 68 33 32 33 2d 63 6f 6e 66 2d 69 64 3d 41 .2h323-conf-id=A 32 39 42 46 31 37 37 20 43 39 33 32 31 31 44 33 29BF177 C93211D3 20 38 35 39 43 44 43 41 31 20 46 45 37 43 43 46 859CDCA1 FE7CCF 43 34 C4 } } [12]= { type = 26 (Vendor-Specific) length = 30 octets vendorId = 9 vendorValue = 24 octets { 1a 18 68 33 32 33 2d 63 61 6c 6c 2d 6f 72 69 67 ..h323-call-orig 69 6e 3d 70 72 6f 78 79 in=proxy } } [13]= { type = 26 (Vendor-Specific) length = 27 octets vendorId = 9 vendorValue = 21 octets { 1b 15 68 33 32 33 2d 63 61 6c 6c 2d 74 79 70 65 ..h323-call-type 3d 56 6f 49 50 =VoIP } } [14]= { type = 26 (Vendor-Specific) length = 56 octets vendorId = 9 vendorValue = 50 octets { 19 32 68 33 32 33 2d 73 65 74 75 70 2d 74 69 6d .2h323-setup-tim 65 3d 31 32 3a 34 39 3a 35 38 2e 30 30 30 20 50 e=12:49:58.000 P 45 54 20 4d 6f 6e 20 4e 6f 76 20 31 30 20 32 30 ET Mon Nov 10 20 30 33 03 } } [15]= { type = 26 (Vendor-Specific) length = 40 octets vendorId = 9 vendorValue = 34 octets { 17 22 68 33 32 33 2d 72 65 6d 6f 74 65 2d 61 64 ."h323-remote-ad 64 72 65 73 73 3d 32 30 30 2e 31 31 30 2e 36 2e dress=192.168.1. 35 38 58 } } [16]= { type = 41 (Acct-Delay-Time) length = 6 octets value = 4 octets { 00 00 00 00 .... } } } } 2003/11/10 12:49:58.159 3 radproto.cxx(1869) RADIUS Received PDU from RADIUS server 192.168.1.132 (192.168.1.132:1646) by socket port:10969[0,4-5], PDU: { code = 5 (Accounting-Response) id = 4 length = 20 octets authenticator = 16 octets { d5 ee 8e b2 1b 6a 12 8e 78 ca 0d 64 ef 91 77 cf .....j..x..d..w. } attributes = <<null>> } 2003/11/10 12:49:58.164 3 gkacct.cxx(434) GKACCT RadAcct logged event 1 for call no. 5 2003/11/10 12:49:58.165 2 gkacct.cxx(474) GKACCT Successfully logged event 1 for call no. 5 2003/11/10 12:49:58.166 3 ProxyChannel.cxx(1029) GK Call 5 is NAT type 0 2003/11/10 12:49:58.169 5 ProxyChannel.cxx(372) Q931 Send to 192.168.1.58:1720 { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = originator messageType = Setup IE: Bearer-Capability = { 80 90 a3 ... } IE: Calling-Party-Number = { 81 31 39 39 31 30 39 39 39 30 .199109990 } IE: Called-Party-Number = { 81 36 36 30 33 30 30 30 .6603000 } IE: User-User = { 20 b0 06 00 08 91 4a 00 03 01 40 08 00 6d 00 69 .....J...@..m.i 00 63 00 70 00 65 00 67 00 77 00 30 00 31 08 80 .c.p.e.g.w.0.1.. 01 3c 05 12 07 00 40 84 40 00 c0 00 70 00 50 04 .<....@.@...p.P. 9c 30 00 40 00 30 00 01 03 00 99 36 33 30 a2 9b .0.@.0.....630.. f1 77 c9 32 11 d3 85 9c dc a1 fe 7c cf c4 00 5d .w.2.......|...] 5d 80 07 00 c8 6e 02 84 06 b9 11 00 a2 9b f1 77 ]....n.........w c9 32 11 d3 85 9d dc a1 fe 7c cf c4 80 bd 01 4d .2.......|.....M 80 0a 2a 86 48 86 f7 0c 0a 01 02 01 c0 38 7e 3b ..*.H........8~; ce 10 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 3c 73 ..G.W?.K..2.Gb<s 60 64 02 00 b6 12 00 6d 00 69 00 63 00 70 00 65 `d.....m.i.c.p.e 00 67 00 77 00 30 00 31 00 00 03 01 02 04 7c 38 .g.w.0.1......|8 7e 3b cf 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 3c ~;.G.W?.K..2.Gb< 73 60 64 00 00 00 b6 6d 69 63 70 65 67 77 30 31 s`d....micpegw01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 34 02 13 00 00 ...........4.... 00 0d 00 00 40 00 0a 04 00 01 00 c8 6e 02 91 42 ....@.......n..B 53 1e 40 00 00 06 04 01 00 4d 00 00 40 00 11 14 S.@......M..@... 00 01 00 c8 6e 02 91 42 52 00 c8 6e 02 91 42 53 ....n..BR..n..BS 01 00 01 00 01 80 01 80 06 a0 01 80 13 01 40 b5 ..............@. 00 00 12 0c c0 01 00 02 80 06 00 04 00 00 00 03 ................ } } h225pdu = { h323_uu_pdu = { h323_message_body = setup { protocolIdentifier = 0.0.8.2250.0.3 sourceAddress = 1 entries { [0]=h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } } sourceInfo = { gateway = { protocol = 1 entries { [0]=voice { supportedPrefixes = 7 entries { [0]={ prefix = dialedDigits "511" } [1]={ prefix = dialedDigits "9" } [2]={ prefix = dialedDigits "4" } [3]={ prefix = dialedDigits "2" } [4]={ prefix = dialedDigits "690" } [5]={ prefix = dialedDigits "1" } [6]={ prefix = dialedDigits "0" } } } } } mc = FALSE undefinedNode = FALSE } destinationAddress = 1 entries { [0]=dialedDigits "6603000" } activeMC = FALSE conferenceID = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9c dc a1 fe 7c cf c4 ...w.2.......|.. } conferenceGoal = create <<null>> callType = pointToPoint <<null>> sourceCallSignalAddress = ipAddress { ip = 4 octets { c8 6e 02 84 .n.. } port = 1721 } callIdentifier = { guid = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 ...w.2.......|.. } } tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 947796943 challenge = 16 octets { 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 3c 73 60 64 G.W?.K..2.Gb<s`d } random = 182 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } nonStandard = { nonStandardIdentifier = 0.1.2.4 data = 124 octets { 38 7e 3b cf 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 8~;.G.W?.K..2.Gb 3c 73 60 64 00 00 00 b6 6d 69 63 70 65 67 77 30 <s`d....micpegw0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 ............ } } } } fastStart = 2 entries { [0]= 19 octets { 00 00 00 0d 00 00 40 00 0a 04 00 01 00 c8 6e 02 ......@.......n. 91 42 53 .BS } [1]= 30 octets { 40 00 00 06 04 01 00 4d 00 00 40 00 11 14 00 01 @......M..@..... 00 c8 6e 02 91 42 52 00 c8 6e 02 91 42 53 ..n..BR..n..BS } } mediaWaitForConnect = FALSE canOverlapSend = FALSE multipleCalls = TRUE maintainConnection = TRUE } h245Tunneling = TRUE nonStandardControl = 1 entries { [0]={ nonStandardIdentifier = h221NonStandard { t35CountryCode = 181 t35Extension = 0 manufacturerCode = 18 } data = 12 octets { c0 01 00 02 80 06 00 04 00 00 00 03 ............ } } } } } } 2003/11/10 12:49:58.227 3 ProxyThread.cxx(79) Q931d Delete socket 192.168.1.58:1720 2003/11/10 12:49:58.228 3 ProxyThread.cxx(79) Q931s Delete socket 192.168.1.145:11538 2003/11/10 12:49:58.228 3 ProxyThread.cxx(647) ProxyH(0) waiting... 2003/11/10 12:49:58.321 3 ProxyChannel.cxx(675) Q931(8080) Connect to 192.168.1.58:1720 successful 2003/11/10 12:49:58.322 5 ProxyThread.cxx(538) ProxyH(0) add a socket, total 2 2003/11/10 12:49:58.495 3 RasTbl.cxx(1053) Gk Delete Call No. 3 2003/11/10 12:49:58.517 2 RasSrv.cxx(2179) GK Read from 192.168.1.58:22000 2003/11/10 12:49:58.518 3 RasSrv.cxx(2192) GK admissionRequest { requestSeqNum = 26 callType = pointToPoint <<null>> callModel = direct <<null>> endpointIdentifier = 9 characters { 0038 0036 0039 0039 005f 0065 006e 0064 8699_end 0070 p } destinationInfo = 2 entries { [0]=dialedDigits "6603000" [1]=h323_ID 3 characters { 006e 006f 0063 noc } } destCallSignalAddress = ipAddress { ip = 4 octets { c8 6e 06 3a .n.: } port = 1720 } srcInfo = 2 entries { [0]=dialedDigits "199109990" [1]=h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } } srcCallSignalAddress = ipAddress { ip = 4 octets { c8 6e 02 84 .n.. } port = 33795 } bandWidth = 100 callReferenceValue = 486 conferenceID = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9c dc a1 fe 7c cf c4 ...w.2.......|.. } activeMC = FALSE answerCall = TRUE canMapAlias = TRUE callIdentifier = { guid = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 ...w.2.......|.. } } tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 947796943 challenge = 16 octets { 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 3c 73 60 64 G.W?.K..2.Gb<s`d } random = 182 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } nonStandard = { nonStandardIdentifier = 0.1.2.4 data = 124 octets { 38 7e 3b cf 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 8~;.G.W?.K..2.Gb 3c 73 60 64 00 00 00 b6 6d 69 63 70 65 67 77 30 <s`d....micpegw0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 ............ } } } } cryptoTokens = 1 entries { [0]=cryptoEPPwdHash { alias = h323_ID 3 characters { 006e 006f 0063 noc } timeStamp = 1067448446 token = { algorithmOID = 1.2.840.113549.2.5 paramS = { } hash = Hex: 7c 00 0e 43 ce 58 18 53 46 3f f8 09 f3 e7 51 2b } } } willSupplyUUIEs = FALSE } 2003/11/10 12:49:58.525 1 RasSrv.cxx(1317) GK ARQ Received 2003/11/10 12:49:58.526 3 radproto.cxx(1843) RADIUS Sending PDU to RADIUS server 192.168.1.132 (192.168.1.132:1645) from port:10405[0,231-233], PDU: { code = 1 (Access-Request) id = 232 length = 253 octets authenticator = 16 octets { 4d 62 02 0e 6b 9e 2c 32 5d 25 d3 71 08 0f d9 0e Mb..k.,2]%.q.... } attributes = 14 elements { [0]= { type = 1 (User-Name) length = 11 octets value = 9 octets { 6d 69 63 70 65 67 77 30 31 micpegw01 } } [1]= { type = 3 (CHAP-Password) length = 19 octets value = 17 octets { b6 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 3c 73 60 .G.W?.K..2.Gb<s` 64 d } } [2]= { type = 60 (CHAP-Challenge) length = 6 octets value = 4 octets { 38 7e 3b cf 8~;. } } [3]= { type = 4 (NAS-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 84 .n.. } } [4]= { type = 32 (NAS-Identifier) length = 11 octets value = 9 octets { 4d 49 43 50 45 47 4b 30 32 MICPEGK02 } } [5]= { type = 61 (NAS-Port-Type) length = 6 octets value = 4 octets { 00 00 00 05 .... } } [6]= { type = 6 (Service-Type) length = 6 octets value = 4 octets { 00 00 00 0a .... } } [7]= { type = 8 (Framed-IP-Address) length = 6 octets value = 4 octets { c8 6e 06 3a .n.: } } [8]= { type = 31 (Calling-Station-Id) length = 11 octets value = 9 octets { 31 39 39 31 30 39 39 39 30 199109990 } } [9]= { type = 30 (Called-Station-Id) length = 9 octets value = 7 octets { 36 36 30 33 30 30 30 6603000 } } [10]= { type = 26 (Vendor-Specific) length = 56 octets vendorId = 9 vendorValue = 50 octets { 18 32 68 33 32 33 2d 63 6f 6e 66 2d 69 64 3d 41 .2h323-conf-id=A 32 39 42 46 31 37 37 20 43 39 33 32 31 31 44 33 29BF177 C93211D3 20 38 35 39 43 44 43 41 31 20 46 45 37 43 43 46 859CDCA1 FE7CCF 43 34 C4 } } [11]= { type = 26 (Vendor-Specific) length = 31 octets vendorId = 9 vendorValue = 25 octets { 1a 19 68 33 32 33 2d 63 61 6c 6c 2d 6f 72 69 67 ..h323-call-orig 69 6e 3d 61 6e 73 77 65 72 in=answer } } [12]= { type = 26 (Vendor-Specific) length = 27 octets vendorId = 9 vendorValue = 21 octets { 1b 15 68 33 32 33 2d 63 61 6c 6c 2d 74 79 70 65 ..h323-call-type 3d 56 6f 49 50 =VoIP } } [13]= { type = 26 (Vendor-Specific) length = 28 octets vendorId = 9 vendorValue = 22 octets { 21 16 68 33 32 33 2d 67 77 2d 69 64 3d 4d 49 43 !.h323-gw-id=MIC 50 45 47 4b 30 32 PEGK02 } } } } 2003/11/10 12:49:58.539 3 radproto.cxx(1869) RADIUS Received PDU from RADIUS server 192.168.1.132 (192.168.1.132:1645) by socket port:10405[0,231-233], PDU: { code = 2 (Access-Accept) id = 232 length = 20 octets authenticator = 16 octets { f8 c0 7f 6f 76 9e aa 9b 29 ab 64 99 db 7c b6 49 ...ov...).d..|.I } attributes = <<null>> } 2003/11/10 12:49:58.540 4 gkauth.cxx(296) GkAuth RadAuth check ok 2003/11/10 12:49:58.540 4 gkauth.cxx(296) GkAuth default check ok 2003/11/10 12:49:58.541 3 RasSrv.cxx(1565) GK ARQ will request bandwith of 100 2003/11/10 12:49:58.541 3 RasSrv.cxx(1608) GK ACF: found existing call no 5 2003/11/10 12:49:58.542 2 RasSrv.cxx(1676) ACF|192.168.1.58:1720|8699_endp|486|6603000:dialedDigits=noc:h323_ID|199109990:dialedDigits=micpegw01:h323_ID|true; 2003/11/10 12:49:58.542 3 RasSrv.cxx(2119) GK Send to 192.168.1.58:22000 admissionConfirm { requestSeqNum = 26 bandWidth = 100 callModel = gatekeeperRouted <<null>> destCallSignalAddress = ipAddress { ip = 4 octets { c8 6e 02 84 .n.. } port = 1721 } irrFrequency = 120 willRespondToIRR = FALSE uuiesRequested = { setup = FALSE callProceeding = FALSE connect = FALSE alerting = FALSE information = FALSE releaseComplete = FALSE facility = FALSE progress = FALSE empty = FALSE status = FALSE statusInquiry = FALSE setupAcknowledge = FALSE notify = FALSE } } 2003/11/10 12:49:58.544 5 RasSrv.cxx(2133) GK Sent Successful 2003/11/10 12:49:58.578 2 RasSrv.cxx(2179) GK Read from 192.168.1.58:22000 2003/11/10 12:49:58.579 3 RasSrv.cxx(2192) GK registrationRequest { requestSeqNum = 27 protocolIdentifier = 0.0.8.2250.0.2 discoveryComplete = FALSE callSignalAddress = 1 entries { [0]=ipAddress { ip = 4 octets { c8 6e 06 3a .n.: } port = 1720 } } rasAddress = 1 entries { [0]=ipAddress { ip = 4 octets { c8 6e 06 3a .n.: } port = 22000 } } terminalType = { terminal = { } mc = FALSE undefinedNode = FALSE } terminalAlias = 3 entries { [0]=h323_ID 3 characters { 006e 006f 0063 noc } [1]=dialedDigits "6603000" [2]=dialedDigits "6603001" } gatekeeperIdentifier = 9 characters { 004d 0049 0043 0050 0045 0047 004b 0030 MICPEGK0 0032 2 } endpointVendor = { vendor = { t35CountryCode = 97 t35Extension = 0 manufacturerCode = 22 } productId = 11 octets { 41 64 64 50 61 63 20 56 6f 49 50 AddPac VoIP } versionId = 4 octets { 36 2e 30 36 6.06 } } timeToLive = 60 tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 1067448446 challenge = 16 octets { c1 1a 71 2c f0 30 65 ce 20 99 ff 02 e1 82 4a 67 ..q,.0e. .....Jg } random = 163 generalID = 3 characters { 006e 006f 0063 noc } } } cryptoTokens = 1 entries { [0]=cryptoEPPwdHash { alias = h323_ID 3 characters { 006e 006f 0063 noc } timeStamp = 1067448446 token = { algorithmOID = 1.2.840.113549.2.5 paramS = { } hash = Hex: 7c 00 0e 43 ce 58 18 53 46 3f f8 09 f3 e7 51 2b } } } keepAlive = TRUE endpointIdentifier = 9 characters { 0038 0036 0039 0039 005f 0065 006e 0064 8699_end 0070 p } willSupplyUUIEs = FALSE } 2003/11/10 12:49:58.589 1 RasSrv.cxx(946) GK RRQ Received 2003/11/10 12:49:58.589 3 RasSrv.cxx(2119) GK Send to 192.168.1.58:22000 registrationConfirm { requestSeqNum = 27 protocolIdentifier = 0.0.8.2250.0.2 callSignalAddress = 1 entries { [0]=ipAddress { ip = 4 octets { c8 6e 02 84 .n.. } port = 1721 } } gatekeeperIdentifier = 9 characters { 004d 0049 0043 0050 0045 0047 004b 0030 MICPEGK0 0032 2 } endpointIdentifier = 9 characters { 0038 0036 0039 0039 005f 0065 006e 0064 8699_end 0070 p } timeToLive = 60 willRespondToIRR = FALSE maintainConnection = FALSE } 2003/11/10 12:49:58.591 5 RasSrv.cxx(2133) GK Sent Successful 2003/11/10 12:49:58.800 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/1 2003/11/10 12:49:58.800 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/10 12:49:58.801 3 ProxyChannel.cxx(413) Q931d Received: CallProceeding CRV=486 from 192.168.1.58:1720 2003/11/10 12:49:58.802 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = destination messageType = CallProceeding IE: Display = { 6e 6f 63 00 noc. } IE: User-User = { 21 80 06 00 08 91 4a 00 02 02 01 22 11 00 a2 9b !.....J....".... f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 34 02 .w.2.......|..4. 1a 00 00 00 0d 00 00 40 00 11 14 00 01 00 c8 6e .......@.......n 06 3a 59 e8 00 c8 6e 06 3a 59 e9 17 40 00 64 06 .:Y...n.:Y..@.d. 04 01 00 4d 00 00 40 00 0a 04 00 01 00 c8 6e 06 ...M..@.......n. 3a 59 e9 02 80 01 80 :Y..... } } h225pdu = { h323_uu_pdu = { h323_message_body = callProceeding { protocolIdentifier = 0.0.8.2250.0.2 destinationInfo = { terminal = { } mc = FALSE undefinedNode = FALSE } callIdentifier = { guid = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 ...w.2.......|.. } } fastStart = 2 entries { [0]= 26 octets { 00 00 00 0d 00 00 40 00 11 14 00 01 00 c8 6e 06 ......@.......n. 3a 59 e8 00 c8 6e 06 3a 59 e9 :Y...n.:Y. } [1]= 23 octets { 40 00 64 06 04 01 00 4d 00 00 40 00 0a 04 00 01 @.d....M..@..... 00 c8 6e 06 3a 59 e9 ..n.:Y. } } } h245Tunneling = TRUE } } } 2003/11/10 12:49:58.807 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/1 2003/11/10 12:49:58.807 5 ProxyThread.cxx(354) Q931s Reading from 192.168.1.145:11539 2003/11/10 12:49:58.808 3 ProxyChannel.cxx(413) Q931s Received: Facility CRV=486 from 192.168.1.145:11539 2003/11/10 12:49:58.809 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = originator messageType = Facility IE: 0x0 (0) = { } IE: Facility = { } IE: Display = { 63 69 73 63 6f 20 53 79 73 74 65 6d 73 2c 20 49 cisco Systems, I 6e 63 2e nc. } IE: User-User = { 28 10 01 00 10 c0 01 80 7c 01 7a 02 70 01 06 00 (.......|.z.p... 08 81 75 00 06 80 13 80 00 14 00 01 00 00 01 00 ..u............. 00 01 00 00 0c c0 01 00 01 00 05 80 00 18 4a 08 ..............J. 11 86 01 00 80 5c 01 00 01 40 07 c0 02 00 c8 01 .....\...@...... 48 40 00 90 80 00 19 48 10 b5 00 00 12 09 54 33 H@.....H......T3 38 46 61 78 55 44 50 00 90 80 00 16 83 01 50 80 8FaxUDP.......P. 00 15 83 01 40 80 00 12 83 01 10 80 00 08 22 00 ....@.........". 00 00 00 80 01 02 00 00 16 01 00 15 00 12 02 00 ................ 19 00 18 00 08 ..... } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 122 octets { 02 70 01 06 00 08 81 75 00 06 80 13 80 00 14 00 .p.....u........ 01 00 00 01 00 00 01 00 00 0c c0 01 00 01 00 05 ................ 80 00 18 4a 08 11 86 01 00 80 5c 01 00 01 40 07 ...J......\...@. c0 02 00 c8 01 48 40 00 90 80 00 19 48 10 b5 00 .....H@.....H... 00 12 09 54 33 38 46 61 78 55 44 50 00 90 80 00 ...T38FaxUDP.... 16 83 01 50 80 00 15 83 01 40 80 00 12 83 01 10 ...P.....@...... 80 00 08 22 00 00 00 00 80 01 02 00 00 16 01 00 ..."............ 15 00 12 02 00 19 00 18 00 08 .......... } } } } } 2003/11/10 12:49:58.813 2 RasSrv.cxx(2179) GK Read from 192.168.1.145:52525 2003/11/10 12:49:58.813 3 RasSrv.cxx(2192) GK bandwidthRequest { requestSeqNum = 25106 endpointIdentifier = 9 characters { 0038 0037 0030 0031 005f 0065 006e 0064 8701_end 0070 p } conferenceID = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9c dc a1 fe 7c cf c4 ...w.2.......|.. } callReferenceValue = 486 bandWidth = 126 callIdentifier = { guid = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 ...w.2.......|.. } } cryptoTokens = 1 entries { [0]=cryptoEPPwdHash { alias = h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } timeStamp = 947796944 token = { algorithmOID = 1.2.840.113549.2.5 paramS = { } hash = Hex: db 48 28 31 12 82 44 b2 80 15 4f 82 75 aa e9 2c } } } answeredCall = FALSE } 2003/11/10 12:49:58.816 1 RasSrv.cxx(1845) GK BRQ Received 2003/11/10 12:49:58.816 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/1 2003/11/10 12:49:58.817 5 ProxyThread.cxx(354) Q931s Reading from 192.168.1.145:11539 2003/11/10 12:49:58.817 3 ProxyChannel.cxx(413) Q931s Received: Facility CRV=486 from 192.168.1.145:11539 2003/11/10 12:49:58.818 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = originator messageType = Facility IE: 0x0 (0) = { } IE: Facility = { } IE: Display = { 63 69 73 63 6f 20 53 79 73 74 65 6d 73 2c 20 49 cisco Systems, I 6e 63 2e nc. } IE: User-User = { 28 10 01 00 10 c0 01 80 08 01 06 01 00 3c 40 13 (............<@. 8b . } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 6 octets { 01 00 3c 40 13 8b ..<@.. } } } } } 2003/11/10 12:49:58.820 4 gkauth.h(84) GkAuth default check ok 2003/11/10 12:49:58.820 2 RasTbl.cxx(1473) GK Available Bandwidth 9874 2003/11/10 12:49:58.821 2 RasSrv.cxx(1896) BCF|192.168.1.145|8701_endp|126; 2003/11/10 12:49:58.822 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/1 2003/11/10 12:49:58.823 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/10 12:49:58.823 3 ProxyChannel.cxx(413) Q931d Received: Alerting CRV=486 from 192.168.1.58:1720 2003/11/10 12:49:58.824 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = destination messageType = Alerting IE: Display = { 6e 6f 63 00 noc. } IE: User-User = { 23 80 06 00 08 91 4a 00 02 02 01 22 11 00 a2 9b #.....J....".... f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 34 02 .w.2.......|..4. 1a 00 00 00 0d 00 00 40 00 11 14 00 01 00 c8 6e .......@.......n 06 3a 59 e8 00 c8 6e 06 3a 59 e9 17 40 00 64 06 .:Y...n.:Y..@.d. 04 01 00 4d 00 00 40 00 0a 04 00 01 00 c8 6e 06 ...M..@.......n. 3a 59 e9 02 80 01 80 :Y..... } } h225pdu = { h323_uu_pdu = { h323_message_body = alerting { protocolIdentifier = 0.0.8.2250.0.2 destinationInfo = { terminal = { } mc = FALSE undefinedNode = FALSE } callIdentifier = { guid = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 ...w.2.......|.. } } fastStart = 2 entries { [0]= 26 octets { 00 00 00 0d 00 00 40 00 11 14 00 01 00 c8 6e 06 ......@.......n. 3a 59 e8 00 c8 6e 06 3a 59 e9 :Y...n.:Y. } [1]= 23 octets { 40 00 64 06 04 01 00 4d 00 00 40 00 0a 04 00 01 @.d....M..@..... 00 c8 6e 06 3a 59 e9 ..n.:Y. } } } h245Tunneling = TRUE } } } 2003/11/10 12:49:58.828 3 RasSrv.cxx(2119) GK Send to 192.168.1.145:52525 bandwidthConfirm { requestSeqNum = 25106 bandWidth = 126 } 2003/11/10 12:49:58.829 5 RasSrv.cxx(2133) GK Sent Successful 2003/11/10 12:49:59.140 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/1 2003/11/10 12:49:59.141 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/10 12:49:59.142 3 ProxyChannel.cxx(413) Q931d Received: Facility CRV=486 from 192.168.1.58:1720 2003/11/10 12:49:59.144 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = destination messageType = Facility IE: User-User = { 28 10 01 00 04 c0 01 80 5c 01 5a 02 70 01 06 00 (.......\.Z.p... 08 81 75 00 03 80 13 80 00 64 00 01 00 00 01 00 ..u......d...... 00 01 00 00 0c c0 01 00 01 00 03 80 00 00 22 00 ..............". 00 40 00 01 4a 08 11 86 01 00 80 5c 01 00 01 40 .@..J......\...@ 07 c0 02 00 c8 01 48 40 00 90 80 00 02 83 01 10 ......H@........ 80 00 03 83 01 50 00 80 01 02 01 00 00 00 01 00 .....P.......... 00 02 00 00 03 ..... } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 90 octets { 02 70 01 06 00 08 81 75 00 03 80 13 80 00 64 00 .p.....u......d. 01 00 00 01 00 00 01 00 00 0c c0 01 00 01 00 03 ................ 80 00 00 22 00 00 40 00 01 4a 08 11 86 01 00 80 ..."..@..J...... 5c 01 00 01 40 07 c0 02 00 c8 01 48 40 00 90 80 \...@......H@... 00 02 83 01 10 80 00 03 83 01 50 00 80 01 02 01 ..........P..... 00 00 00 01 00 00 02 00 00 03 .......... } } } } } 2003/11/10 12:49:59.160 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/1 2003/11/10 12:49:59.161 5 ProxyThread.cxx(354) Q931s Reading from 192.168.1.145:11539 2003/11/10 12:49:59.162 3 ProxyChannel.cxx(413) Q931s Received: Facility CRV=486 from 192.168.1.145:11539 2003/11/10 12:49:59.164 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = originator messageType = Facility IE: 0x0 (0) = { } IE: Facility = { } IE: Display = { 63 69 73 63 6f 20 53 79 73 74 65 6d 73 2c 20 49 cisco Systems, I 6e 63 2e nc. } IE: User-User = { 28 10 01 00 10 c0 01 80 05 01 03 21 80 01 (..........!.. } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 3 octets { 21 80 01 !.. } } } } } 2003/11/10 12:49:59.183 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/1 2003/11/10 12:49:59.184 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/10 12:49:59.185 3 ProxyChannel.cxx(413) Q931d Received: Facility CRV=486 from 192.168.1.58:1720 2003/11/10 12:49:59.187 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = destination messageType = Facility IE: User-User = { 28 10 01 00 04 c0 01 80 05 01 03 21 80 01 (..........!.. } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 3 octets { 21 80 01 !.. } } } } } 2003/11/10 12:49:59.251 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/1 2003/11/10 12:49:59.252 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/10 12:49:59.253 3 ProxyChannel.cxx(413) Q931d Received: Facility CRV=486 from 192.168.1.58:1720 2003/11/10 12:49:59.254 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = destination messageType = Facility IE: User-User = { 28 10 01 00 04 c0 01 80 04 01 02 20 80 (.......... . } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 2 octets { 20 80 . } } } } } 2003/11/10 12:49:59.392 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/1 2003/11/10 12:49:59.392 5 ProxyThread.cxx(354) Q931s Reading from 192.168.1.145:11539 2003/11/10 12:49:59.392 3 ProxyChannel.cxx(413) Q931s Received: Facility CRV=486 from 192.168.1.145:11539 2003/11/10 12:49:59.393 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = originator messageType = Facility IE: 0x0 (0) = { } IE: Facility = { } IE: Display = { 63 69 73 63 6f 20 53 79 73 74 65 6d 73 2c 20 49 cisco Systems, I 6e 63 2e nc. } IE: User-User = { 28 10 01 00 10 c0 01 80 04 01 02 20 a0 (.......... . } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 2 octets { 20 a0 . } } } } } 2003/11/10 12:50:00.418 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/1 2003/11/10 12:50:00.419 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/10 12:50:00.420 3 ProxyChannel.cxx(413) Q931d Received: Connect CRV=486 from 192.168.1.58:1720 2003/11/10 12:50:00.423 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = destination messageType = Connect IE: Bearer-Capability = { 80 90 a3 ... } IE: Display = { 6e 6f 63 00 noc. } IE: User-User = { 22 80 06 00 08 91 4a 00 02 22 c0 61 00 00 16 0a ".....J..".a.... 41 64 64 50 61 63 20 56 6f 49 50 03 36 2e 30 36 AddPac VoIP.6.06 00 a2 9b f1 77 c9 32 11 d3 85 9c dc a1 fe 7c cf ....w.2.......|. c4 09 10 11 00 a2 9b f1 77 c9 32 11 d3 85 9d dc ........w.2..... a1 fe 7c cf c4 34 02 1a 00 00 00 0d 00 00 40 00 ..|..4........@. 11 14 00 01 00 c8 6e 06 3a 59 e8 00 c8 6e 06 3a ......n.:Y...n.: 59 e9 17 40 00 64 06 04 01 00 4d 00 00 40 00 0a Y..@.d....M..@.. 04 00 01 00 c8 6e 06 3a 59 e9 02 80 01 80 .....n.:Y..... } } h225pdu = { h323_uu_pdu = { h323_message_body = connect { protocolIdentifier = 0.0.8.2250.0.2 destinationInfo = { vendor = { vendor = { t35CountryCode = 97 t35Extension = 0 manufacturerCode = 22 } productId = 11 octets { 41 64 64 50 61 63 20 56 6f 49 50 AddPac VoIP } versionId = 4 octets { 36 2e 30 36 6.06 } } terminal = { } mc = FALSE undefinedNode = FALSE } conferenceID = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9c dc a1 fe 7c cf c4 ...w.2.......|.. } callIdentifier = { guid = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 ...w.2.......|.. } } fastStart = 2 entries { [0]= 26 octets { 00 00 00 0d 00 00 40 00 11 14 00 01 00 c8 6e 06 ......@.......n. 3a 59 e8 00 c8 6e 06 3a 59 e9 :Y...n.:Y. } [1]= 23 octets { 40 00 64 06 04 01 00 4d 00 00 40 00 0a 04 00 01 @.d....M..@..... 00 c8 6e 06 3a 59 e9 ..n.:Y. } } } h245Tunneling = TRUE } } } 2003/11/10 12:50:02.213 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/1 2003/11/10 12:50:02.214 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/10 12:50:02.214 3 ProxyChannel.cxx(413) Q931d Received: ReleaseComplete CRV=486 from 192.168.1.58:1720 2003/11/10 12:50:02.215 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = destination messageType = ReleaseComplete IE: Cause - Normal call clearing = { 80 90 .. } IE: User-User = { 25 80 06 00 08 91 4a 00 02 01 11 00 a2 9b f1 77 %.....J........w c9 32 11 d3 85 9d dc a1 fe 7c cf c4 02 80 01 80 .2.......|...... } } h225pdu = { h323_uu_pdu = { h323_message_body = releaseComplete { protocolIdentifier = 0.0.8.2250.0.2 callIdentifier = { guid = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 ...w.2.......|.. } } } h245Tunneling = TRUE } } } 2003/11/10 12:50:02.224 1 RasTbl.cxx(1623) CDR|5|a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4|2|Mon, 10 Nov 2003 12:50:00 -0500|Mon, 10 Nov 2003 12:50:02 -0500|192.168.1.145:1720|8701_endp|192.168.1.58:1720|8699_endp|6603000:dialedDigits|199109990:dialedDigits=micpegw01:h323_ID|MICPEGK02; 2003/11/10 12:50:02.225 3 radproto.cxx(1843) RADIUS Sending PDU to RADIUS server 192.168.1.132 (192.168.1.132:1646) from port:10969[0,4-6], PDU: { code = 4 (Accounting-Request) id = 5 length = 502 octets authenticator = 16 octets { ee 41 c5 0b 47 e8 1d 8f de bf fe 4c 72 4b e1 a2 .A..G......LrK.. } attributes = 21 elements { [0]= { type = 40 (Acct-Status-Type) length = 6 octets value = 4 octets { 00 00 00 02 .... } } [1]= { type = 4 (NAS-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 84 .n.. } } [2]= { type = 32 (NAS-Identifier) length = 11 octets value = 9 octets { 4d 49 43 50 45 47 4b 30 32 MICPEGK02 } } [3]= { type = 61 (NAS-Port-Type) length = 6 octets value = 4 octets { 00 00 00 05 .... } } [4]= { type = 6 (Service-Type) length = 6 octets value = 4 octets { 00 00 00 01 .... } } [5]= { type = 44 (Acct-Session-Id) length = 10 octets value = 8 octets { 61 33 33 30 30 30 30 34 a3300004 } } [6]= { type = 1 (User-Name) length = 11 octets value = 9 octets { 6d 69 63 70 65 67 77 30 31 micpegw01 } } [7]= { type = 8 (Framed-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 91 .n.. } } [8]= { type = 46 (Acct-Session-Time) length = 6 octets value = 4 octets { 00 00 00 02 .... } } [9]= { type = 31 (Calling-Station-Id) length = 11 octets value = 9 octets { 6d 69 63 70 65 67 77 30 31 micpegw01 } } [10]= { type = 30 (Called-Station-Id) length = 9 octets value = 7 octets { 36 36 30 33 30 30 30 6603000 } } [11]= { type = 26 (Vendor-Specific) length = 28 octets vendorId = 9 vendorValue = 22 octets { 21 16 68 33 32 33 2d 67 77 2d 69 64 3d 4d 49 43 !.h323-gw-id=MIC 50 45 47 4b 30 32 PEGK02 } } [12]= { type = 26 (Vendor-Specific) length = 56 octets vendorId = 9 vendorValue = 50 octets { 18 32 68 33 32 33 2d 63 6f 6e 66 2d 69 64 3d 41 .2h323-conf-id=A 32 39 42 46 31 37 37 20 43 39 33 32 31 31 44 33 29BF177 C93211D3 20 38 35 39 43 44 43 41 31 20 46 45 37 43 43 46 859CDCA1 FE7CCF 43 34 C4 } } [13]= { type = 26 (Vendor-Specific) length = 30 octets vendorId = 9 vendorValue = 24 octets { 1a 18 68 33 32 33 2d 63 61 6c 6c 2d 6f 72 69 67 ..h323-call-orig 69 6e 3d 70 72 6f 78 79 in=proxy } } [14]= { type = 26 (Vendor-Specific) length = 27 octets vendorId = 9 vendorValue = 21 octets { 1b 15 68 33 32 33 2d 63 61 6c 6c 2d 74 79 70 65 ..h323-call-type 3d 56 6f 49 50 =VoIP } } [15]= { type = 26 (Vendor-Specific) length = 56 octets vendorId = 9 vendorValue = 50 octets { 19 32 68 33 32 33 2d 73 65 74 75 70 2d 74 69 6d .2h323-setup-tim 65 3d 31 32 3a 34 39 3a 35 38 2e 30 30 30 20 50 e=12:49:58.000 P 45 54 20 4d 6f 6e 20 4e 6f 76 20 31 30 20 32 30 ET Mon Nov 10 20 30 33 03 } } [16]= { type = 26 (Vendor-Specific) length = 58 octets vendorId = 9 vendorValue = 52 octets { 1c 34 68 33 32 33 2d 63 6f 6e 6e 65 63 74 2d 74 .4h323-connect-t 69 6d 65 3d 31 32 3a 35 30 3a 30 30 2e 30 30 30 ime=12:50:00.000 20 50 45 54 20 4d 6f 6e 20 4e 6f 76 20 31 30 20 PET Mon Nov 10 32 30 30 33 2003 } } [17]= { type = 26 (Vendor-Specific) length = 61 octets vendorId = 9 vendorValue = 55 octets { 1d 37 68 33 32 33 2d 64 69 73 63 6f 6e 6e 65 63 .7h323-disconnec 74 2d 74 69 6d 65 3d 31 32 3a 35 30 3a 30 32 2e t-time=12:50:02. 30 30 30 20 50 45 54 20 4d 6f 6e 20 4e 6f 76 20 000 PET Mon Nov 31 30 20 32 30 30 33 10 2003 } } [18]= { type = 26 (Vendor-Specific) length = 32 octets vendorId = 9 vendorValue = 26 octets { 1e 1a 68 33 32 33 2d 64 69 73 63 6f 6e 6e 65 63 ..h323-disconnec 74 2d 63 61 75 73 65 3d 31 30 t-cause=10 } } [19]= { type = 26 (Vendor-Specific) length = 40 octets vendorId = 9 vendorValue = 34 octets { 17 22 68 33 32 33 2d 72 65 6d 6f 74 65 2d 61 64 ."h323-remote-ad 64 72 65 73 73 3d 32 30 30 2e 31 31 30 2e 36 2e dress=192.168.1. 35 38 58 } } [20]= { type = 41 (Acct-Delay-Time) length = 6 octets value = 4 octets { 00 00 00 00 .... } } } } 2003/11/10 12:50:02.246 2 RasSrv.cxx(2179) GK Read from 192.168.1.58:22000 2003/11/10 12:50:02.247 3 RasSrv.cxx(2192) GK disengageRequest { requestSeqNum = 28 endpointIdentifier = 9 characters { 0038 0036 0039 0039 005f 0065 006e 0064 8699_end 0070 p } conferenceID = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9c dc a1 fe 7c cf c4 ...w.2.......|.. } callReferenceValue = 486 disengageReason = normalDrop <<null>> callIdentifier = { guid = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 ...w.2.......|.. } } gatekeeperIdentifier = 9 characters { 004d 0049 0043 0050 0045 0047 004b 0030 MICPEGK0 0032 2 } tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 947796943 challenge = 16 octets { 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 3c 73 60 64 G.W?.K..2.Gb<s`d } random = 182 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } nonStandard = { nonStandardIdentifier = 0.1.2.4 data = 124 octets { 38 7e 3b cf 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 8~;.G.W?.K..2.Gb 3c 73 60 64 00 00 00 b6 6d 69 63 70 65 67 77 30 <s`d....micpegw0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 ............ } } } } cryptoTokens = 1 entries { [0]=cryptoEPPwdHash { alias = h323_ID 3 characters { 006e 006f 0063 noc } timeStamp = 1067448450 token = { algorithmOID = 1.2.840.113549.2.5 paramS = { } hash = Hex: bc 63 98 b2 19 95 cd ab 23 e8 92 5d 95 aa 87 25 } } } answeredCall = TRUE } 2003/11/10 12:50:02.253 1 RasSrv.cxx(1721) GK DRQ Received 2003/11/10 12:50:02.253 3 radproto.cxx(1869) RADIUS Received PDU from RADIUS server 192.168.1.132 (192.168.1.132:1646) by socket port:10969[0,4-6], PDU: { code = 5 (Accounting-Response) id = 5 length = 20 octets authenticator = 16 octets { 5a 5d ff be ae 7b 26 b8 f5 cf 50 9a 63 0b d8 85 Z]...{&...P.c... } attributes = <<null>> } 2003/11/10 12:50:02.255 4 RasSrv.cxx(1731) GK DRQ: closed conference 2003/11/10 12:50:02.255 4 gkauth.h(84) GkAuth default check ok 2003/11/10 12:50:02.256 3 gkacct.cxx(434) GKACCT RadAcct logged event 2 for call no. 5 2003/11/10 12:50:02.256 2 gkacct.cxx(474) GKACCT Successfully logged event 2 for call no. 5 2003/11/10 12:50:02.257 2 RasSrv.cxx(1768) DCF|192.168.1.58|8699_endp|486|normalDrop; 2003/11/10 12:50:02.257 3 RasSrv.cxx(2119) GK Send to 192.168.1.58:22000 disengageConfirm { requestSeqNum = 28 } 2003/11/10 12:50:02.257 5 RasSrv.cxx(2133) GK Sent Successful 2003/11/10 12:50:02.258 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 1, total 1/2 2003/11/10 12:50:02.259 5 ProxyThread.cxx(354) Q931s Reading from 192.168.1.145:11539 2003/11/10 12:50:02.259 3 ProxyChannel.cxx(413) Q931s Received: ReleaseComplete CRV=486 from 192.168.1.145:11539 2003/11/10 12:50:02.260 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 486 from = originator messageType = ReleaseComplete IE: Cause - Normal call clearing = { 80 90 .. } IE: User-User = { 25 80 06 00 08 91 4a 00 03 11 00 11 00 a2 9b f1 %.....J......... 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 10 80 01 w.2.......|..... 80 . } } h225pdu = { h323_uu_pdu = { h323_message_body = releaseComplete { protocolIdentifier = 0.0.8.2250.0.3 callIdentifier = { guid = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 ...w.2.......|.. } } } h245Tunneling = TRUE } } } 2003/11/10 12:50:02.262 2 RasSrv.cxx(2179) GK Read from 192.168.1.145:52525 2003/11/10 12:50:02.262 3 RasSrv.cxx(2192) GK disengageRequest { requestSeqNum = 25107 endpointIdentifier = 9 characters { 0038 0037 0030 0031 005f 0065 006e 0064 8701_end 0070 p } conferenceID = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9c dc a1 fe 7c cf c4 ...w.2.......|.. } callReferenceValue = 486 disengageReason = normalDrop <<null>> callIdentifier = { guid = 16 octets { a2 9b f1 77 c9 32 11 d3 85 9d dc a1 fe 7c cf c4 ...w.2.......|.. } } tokens = 2 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 947796943 challenge = 16 octets { 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 3c 73 60 64 G.W?.K..2.Gb<s`d } random = 182 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } nonStandard = { nonStandardIdentifier = 0.1.2.4 data = 124 octets { 38 7e 3b cf 47 1a 57 3f c5 4b c2 dc 32 e3 47 62 8~;.G.W?.K..2.Gb 3c 73 60 64 00 00 00 b6 6d 69 63 70 65 67 77 30 <s`d....micpegw0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 ............ } } } [1]={ tokenOID = 2.16.840.1.113777.1.2.179 nonStandard = { nonStandardIdentifier = 2.16.840.1.113777.1.2.179 data = 167 octets { 02 60 25 00 1d 20 01 01 60 25 00 1e 30 80 98 44 .`%.. ..`%..0..D 49 53 43 4f 4e 4e 45 43 54 5f 52 45 41 53 4f 4e ISCONNECT_REASON 3d 30 2c 54 49 4d 45 3d 39 34 37 37 39 36 39 34 =0,TIME=94779694 36 2c 44 55 52 41 54 49 4f 4e 3d 31 2c 44 49 53 6,DURATION=1,DIS 43 4f 4e 4e 45 43 54 5f 53 54 52 49 4e 47 3d 6e CONNECT_STRING=n 6f 72 6d 61 6c 20 63 61 6c 6c 20 63 6c 65 61 72 ormal call clear 69 6e 67 2e 2c 4f 52 49 47 49 4e 3d 30 2c 4c 49 ing.,ORIGIN=0,LI 4e 45 5f 4e 55 4d 42 45 52 3d 44 53 30 20 47 72 NE_NUMBER=DS0 Gr 6f 75 70 20 33 2f 30 3a 30 2c 4f 55 54 42 4f 55 oup 3/0:0,OUTBOU 4e 44 5f 47 54 57 5f 49 50 3d 32 30 30 2e 31 31 ND_GTW_IP=192.16 30 2e 32 2e 31 33 32 8.1.132 } } } } cryptoTokens = 1 entries { [0]=cryptoEPPwdHash { alias = h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } timeStamp = 947796947 token = { algorithmOID = 1.2.840.113549.2.5 paramS = { } hash = Hex: 1f 57 c0 54 47 16 bc ef bc 99 ed 7e 31 3a a1 ad } } } answeredCall = FALSE } 2003/11/10 12:50:02.271 1 RasSrv.cxx(1721) GK DRQ Received 2003/11/10 12:50:02.271 4 RasSrv.cxx(1731) GK DRQ: closed conference 2003/11/10 12:50:02.272 4 gkauth.h(84) GkAuth default check ok 2003/11/10 12:50:02.272 2 RasSrv.cxx(1768) DCF|192.168.1.145|8701_endp|486|normalDrop; 2003/11/10 12:50:02.273 3 ProxyThread.cxx(647) ProxyH(0) waiting... 2003/11/10 12:50:02.273 3 RasSrv.cxx(2119) GK Send to 192.168.1.145:52525 disengageConfirm { requestSeqNum = 25107 } 2003/11/10 12:50:02.273 5 RasSrv.cxx(2133) GK Sent Successful . . .