Hi Michal I am sending you the trace but I dont know how to get gk status line `rv`... how can I do it? rafael PS: top 3 entries of changes.txt : - BUGFIX(RasSrv.cxx) ACF will now contain rewritten destinationInfo (by a virtual queue) only if the matching ARQ comes from the virtual queue - better Called-Station-Id handling - now it is set to an alias that actually matched the destination endpoint - BUGFIX(WaitingARQ.cxx) better mulithreading safety . . . Trace log level 5: START 2003/11/11 12:48:54.442 2 RasSrv.cxx(2223) GK Read from 192.168.1.145:53956 2003/11/11 12:48:54.444 3 RasSrv.cxx(2236) GK admissionRequest { requestSeqNum = 237 callType = pointToPoint <<null>> callModel = direct <<null>> endpointIdentifier = 9 characters { 0037 0037 0030 0039 005f 0065 006e 0064 7709_end 0070 p } destinationInfo = 1 entries { [0]=dialedDigits "6603000" } srcInfo = 2 entries { [0]=dialedDigits "199109990" [1]=h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } } bandWidth = 1280 callReferenceValue = 13 nonStandardData = { nonStandardIdentifier = h221NonStandard { t35CountryCode = 181 t35Extension = 0 manufacturerCode = 18 } data = 22 octets { 80 00 00 08 20 10 1c 44 53 30 20 47 72 6f 75 70 .... ..DS0 Group 20 33 2f 30 3a 30 3/0:0 } } conferenceID = 16 octets { 5c c5 48 6e bf 29 11 d3 80 30 87 19 a3 57 b5 bf \.Hn.)...0...W.. } activeMC = FALSE answerCall = FALSE canMapAlias = TRUE callIdentifier = { guid = 16 octets { 5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf \.Hn.)...1...W.. } } tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 946693449 challenge = 16 octets { 07 bd 56 6b 38 fc 6c 47 7a 1a ce 27 24 e6 33 8f ..Vk8.lGz..'$.3. } random = 214 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } } } cryptoTokens = 1 entries { [0]=cryptoEPPwdHash { alias = h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } timeStamp = 946693449 token = { algorithmOID = 1.2.840.113549.2.5 paramS = { } hash = Hex: a2 86 6f 1e 53 de 1d 2a 1d f9 c6 82 fa fa c3 75 } } } willSupplyUUIEs = FALSE } 2003/11/11 12:48:54.450 1 RasSrv.cxx(1321) GK ARQ Received 2003/11/11 12:48:54.451 3 radproto.cxx(1843) RADIUS Sending PDU to RADIUS server 192.168.1.132 (192.168.1.132:1812) from port:10177[0,189-190], PDU: { code = 1 (Access-Request) id = 189 length = 256 octets authenticator = 16 octets { e2 b3 f1 30 22 1d 12 95 43 e0 a0 09 2c 9f eb 57 ...0"...C...,..W } attributes = 14 elements { [0]= { type = 1 (User-Name) length = 11 octets value = 9 octets { 6d 69 63 70 65 67 77 30 31 micpegw01 } } [1]= { type = 3 (CHAP-Password) length = 19 octets value = 17 octets { d6 07 bd 56 6b 38 fc 6c 47 7a 1a ce 27 24 e6 33 ...Vk8.lGz..'$.3 8f . } } [2]= { type = 60 (CHAP-Challenge) length = 6 octets value = 4 octets { 38 6d 65 49 8meI } } [3]= { type = 4 (NAS-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 82 .n.. } } [4]= { type = 32 (NAS-Identifier) length = 11 octets value = 9 octets { 4d 49 43 50 45 47 4b 30 31 MICPEGK01 } } [5]= { type = 61 (NAS-Port-Type) length = 6 octets value = 4 octets { 00 00 00 05 .... } } [6]= { type = 6 (Service-Type) length = 6 octets value = 4 octets { 00 00 00 01 .... } } [7]= { type = 8 (Framed-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 91 .n.. } } [8]= { type = 31 (Calling-Station-Id) length = 11 octets value = 9 octets { 31 39 39 31 30 39 39 39 30 199109990 } } [9]= { type = 30 (Called-Station-Id) length = 9 octets value = 7 octets { 36 36 30 33 30 30 30 6603000 } } [10]= { type = 26 (Vendor-Specific) length = 56 octets vendorId = 9 vendorValue = 50 octets { 18 32 68 33 32 33 2d 63 6f 6e 66 2d 69 64 3d 35 .2h323-conf-id=5 43 43 35 34 38 36 45 20 42 46 32 39 31 31 44 33 CC5486E BF2911D3 20 38 30 33 30 38 37 31 39 20 41 33 35 37 42 35 80308719 A357B5 42 46 BF } } [11]= { type = 26 (Vendor-Specific) length = 34 octets vendorId = 9 vendorValue = 28 octets { 1a 1c 68 33 32 33 2d 63 61 6c 6c 2d 6f 72 69 67 ..h323-call-orig 69 6e 3d 6f 72 69 67 69 6e 61 74 65 in=originate } } [12]= { type = 26 (Vendor-Specific) length = 27 octets vendorId = 9 vendorValue = 21 octets { 1b 15 68 33 32 33 2d 63 61 6c 6c 2d 74 79 70 65 ..h323-call-type 3d 56 6f 49 50 =VoIP } } [13]= { type = 26 (Vendor-Specific) length = 28 octets vendorId = 9 vendorValue = 22 octets { 21 16 68 33 32 33 2d 67 77 2d 69 64 3d 4d 49 43 !.h323-gw-id=MIC 50 45 47 4b 30 31 PEGK01 } } } } 2003/11/11 12:48:54.465 3 radproto.cxx(1869) RADIUS Received PDU from RADIUS server 192.168.1.132 (192.168.1.132:1812) by socket port:10177[0,189-190], PDU: { code = 2 (Access-Accept) id = 189 length = 44 octets authenticator = 16 octets { e4 38 5a 58 6a fd ec cb a5 0a 8e 3e c4 48 3e d7 .8ZXj......>.H>. } attributes = 4 elements { [0]= { type = 4 (NAS-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 82 .n.. } } [1]= { type = 61 (NAS-Port-Type) length = 6 octets value = 4 octets { 00 00 00 05 .... } } [2]= { type = 6 (Service-Type) length = 6 octets value = 4 octets { 00 00 00 01 .... } } [3]= { type = 8 (Framed-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 91 .n.. } } } } 2003/11/11 12:48:54.476 4 gkauth.cxx(296) GkAuth RadAuth check ok 2003/11/11 12:48:54.477 4 gkauth.cxx(296) GkAuth default check ok 2003/11/11 12:48:54.477 4 RasTbl.cxx(866) Alias match for EP 192.168.1.58:1720 2003/11/11 12:48:54.478 2 RasTbl.cxx(1571) GK Available Bandwidth 8720 2003/11/11 12:48:54.478 3 RasSrv.cxx(1579) GK ARQ will request bandwith of 1280 2003/11/11 12:48:54.479 2 RasTbl.cxx(1545) CallTable::Insert(CALL) Call No. 1, total sessions : 1 2003/11/11 12:48:54.480 2 RasSrv.cxx(1695) ACF|192.168.1.145:1720|7709_endp|13|6603000:dialedDigits|199109990:dialedDigits= micpegw01:h323_ID|false; 2003/11/11 12:48:54.480 3 RasSrv.cxx(2163) GK Send to 192.168.1.145:53956 admissionConfirm { requestSeqNum = 237 bandWidth = 1280 callModel = gatekeeperRouted <<null>> destCallSignalAddress = ipAddress { ip = 4 octets { c8 6e 02 82 .n.. } port = 1721 } irrFrequency = 120 willRespondToIRR = FALSE uuiesRequested = { setup = FALSE callProceeding = FALSE connect = FALSE alerting = FALSE information = FALSE releaseComplete = FALSE facility = FALSE progress = FALSE empty = FALSE status = FALSE statusInquiry = FALSE setupAcknowledge = FALSE notify = FALSE } } 2003/11/11 12:48:54.482 5 RasSrv.cxx(2177) GK Sent Successful 2003/11/11 12:48:54.485 3 ProxyThread.cxx(503) ProxyL Connected from 192.168.1.145:11055 2003/11/11 12:48:54.485 5 ProxyThread.cxx(538) ProxyH(0) add a socket, total 1 2003/11/11 12:48:54.486 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 1, total 1/0 2003/11/11 12:48:54.487 5 ProxyThread.cxx(354) Q931s Reading from 192.168.1.145:11055 2003/11/11 12:48:54.487 3 ProxyChannel.cxx(413) Q931s Received: Setup CRV=13 from 192.168.1.145:11055 2003/11/11 12:48:54.492 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = originator messageType = Setup IE: Bearer-Capability = { 80 90 a3 ... } IE: Calling-Party-Number = { 81 31 39 39 31 30 39 39 39 30 .199109990 } IE: Called-Party-Number = { 81 36 36 30 33 30 30 30 .6603000 } IE: User-User = { 20 a0 06 00 08 91 4a 00 03 01 40 08 00 6d 00 69 .....J...@..m.i 00 63 00 70 00 65 00 67 00 77 00 30 00 31 08 80 .c.p.e.g.w.0.1.. 01 3c 05 0b 04 00 00 c0 04 9c 30 00 40 00 30 00 .<........0.@.0. 5c c5 48 6e bf 29 11 d3 80 30 87 19 a3 57 b5 bf \.Hn.)...0...W.. 00 cd 5d 80 00 07 00 c8 6e 02 91 06 b8 11 00 5c ..].....n......\ c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf 80 .Hn.)...1...W... bd 01 4d 80 0a 2a 86 48 86 f7 0c 0a 01 02 01 c0 ..M..*.H........ 38 6d 65 48 10 ee ff 4c 7f 59 2e 5e 10 ca 92 d0 8meH...L.Y.^.... 2e cd 7a 7b 36 02 00 d7 12 00 6d 00 69 00 63 00 ..z{6.....m.i.c. 70 00 65 00 67 00 77 00 30 00 31 00 00 03 01 02 p.e.g.w.0.1..... 04 7c 38 6d 65 49 ee ff 4c 7f 59 2e 5e 10 ca 92 .|8meI..L.Y.^... d0 2e cd 7a 7b 36 00 00 00 d7 6d 69 63 70 65 67 ...z{6....micpeg 77 30 31 00 00 00 00 00 00 00 00 00 00 00 00 00 w01............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 02 ..............4. 13 00 00 00 0d 00 00 40 00 0a 04 00 01 00 c8 6e .......@.......n 02 91 48 fb 1e 40 00 00 06 04 01 00 4d 00 00 40 ..H..@......M..@ 00 11 14 00 01 00 c8 6e 02 91 48 fa 00 c8 6e 02 .......n..H...n. 91 48 fb 01 00 01 00 01 80 01 80 10 a0 01 80 13 .H.............. 01 40 b5 00 00 12 0c c0 01 00 02 80 06 00 04 00 .@.............. 00 00 03 ... } } h225pdu = { h323_uu_pdu = { h323_message_body = setup { protocolIdentifier = 0.0.8.2250.0.3 sourceAddress = 1 entries { [0]=h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } } sourceInfo = { gateway = { protocol = 1 entries { [0]=voice { supportedPrefixes = 4 entries { [0]={ prefix = dialedDigits "9" } [1]={ prefix = dialedDigits "690" } [2]={ prefix = dialedDigits "1" } [3]={ prefix = dialedDigits "0" } } } } } mc = FALSE undefinedNode = FALSE } activeMC = FALSE conferenceID = 16 octets { 5c c5 48 6e bf 29 11 d3 80 30 87 19 a3 57 b5 bf \.Hn.)...0...W.. } conferenceGoal = create <<null>> callType = pointToPoint <<null>> sourceCallSignalAddress = ipAddress { ip = 4 octets { c8 6e 02 91 .n.. } port = 1720 } callIdentifier = { guid = 16 octets { 5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf \.Hn.)...1...W.. } } tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 946693449 challenge = 16 octets { ee ff 4c 7f 59 2e 5e 10 ca 92 d0 2e cd 7a 7b 36 ..L.Y.^......z {6 } random = 215 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } nonStandard = { nonStandardIdentifier = 0.1.2.4 data = 124 octets { 38 6d 65 49 ee ff 4c 7f 59 2e 5e 10 ca 92 d0 2e 8meI..L.Y.^..... cd 7a 7b 36 00 00 00 d7 6d 69 63 70 65 67 77 30 .z {6....micpegw0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 ............ } } } } fastStart = 2 entries { [0]= 19 octets { 00 00 00 0d 00 00 40 00 0a 04 00 01 00 c8 6e 02 ......@.......n. 91 48 fb .H. } [1]= 30 octets { 40 00 00 06 04 01 00 4d 00 00 40 00 11 14 00 01 @......M..@..... 00 c8 6e 02 91 48 fa 00 c8 6e 02 91 48 fb ..n..H...n..H. } } mediaWaitForConnect = FALSE canOverlapSend = FALSE multipleCalls = TRUE maintainConnection = TRUE } h245Tunneling = TRUE nonStandardControl = 1 entries { [0]={ nonStandardIdentifier = h221NonStandard { t35CountryCode = 181 t35Extension = 0 manufacturerCode = 18 } data = 12 octets { c0 01 00 02 80 06 00 04 00 00 00 03 ............ } } } } } } 2003/11/11 12:48:54.507 3 radproto.cxx(1843) RADIUS Sending PDU to RADIUS server 192.168.1.132 (192.168.1.132:1813) from port:10560[0,153-154], PDU: { code = 4 (Accounting-Request) id = 153 length = 345 octets authenticator = 16 octets { 97 e5 83 c3 36 47 2a 01 0e ba df 0e d2 21 fc 32 ....6G*......!.2 } attributes = 17 elements { [0]= { type = 40 (Acct-Status-Type) length = 6 octets value = 4 octets { 00 00 00 01 .... } } [1]= { type = 4 (NAS-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 82 .n.. } } [2]= { type = 32 (NAS-Identifier) length = 11 octets value = 9 octets { 4d 49 43 50 45 47 4b 30 31 MICPEGK01 } } [3]= { type = 61 (NAS-Port-Type) length = 6 octets value = 4 octets { 00 00 00 05 .... } } [4]= { type = 6 (Service-Type) length = 6 octets value = 4 octets { 00 00 00 01 .... } } [5]= { type = 44 (Acct-Session-Id) length = 10 octets value = 8 octets { 64 62 65 32 30 30 30 30 dbe20000 } } [6]= { type = 1 (User-Name) length = 11 octets value = 9 octets { 6d 69 63 70 65 67 77 30 31 micpegw01 } } [7]= { type = 8 (Framed-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 91 .n.. } } [8]= { type = 31 (Calling-Station-Id) length = 11 octets value = 9 octets { 6d 69 63 70 65 67 77 30 31 micpegw01 } } [9]= { type = 30 (Called-Station-Id) length = 9 octets value = 7 octets { 36 36 30 33 30 30 30 6603000 } } [10]= { type = 26 (Vendor-Specific) length = 28 octets vendorId = 9 vendorValue = 22 octets { 21 16 68 33 32 33 2d 67 77 2d 69 64 3d 4d 49 43 !.h323-gw- id=MIC 50 45 47 4b 30 31 PEGK01 } } [11]= { type = 26 (Vendor-Specific) length = 56 octets vendorId = 9 vendorValue = 50 octets { 18 32 68 33 32 33 2d 63 6f 6e 66 2d 69 64 3d 35 .2h323-conf- id=5 43 43 35 34 38 36 45 20 42 46 32 39 31 31 44 33 CC5486E BF2911D3 20 38 30 33 30 38 37 31 39 20 41 33 35 37 42 35 80308719 A357B5 42 46 BF } } [12]= { type = 26 (Vendor-Specific) length = 30 octets vendorId = 9 vendorValue = 24 octets { 1a 18 68 33 32 33 2d 63 61 6c 6c 2d 6f 72 69 67 ..h323-call- orig 69 6e 3d 70 72 6f 78 79 in=proxy } } [13]= { type = 26 (Vendor-Specific) length = 27 octets vendorId = 9 vendorValue = 21 octets { 1b 15 68 33 32 33 2d 63 61 6c 6c 2d 74 79 70 65 ..h323-call- type 3d 56 6f 49 50 =VoIP } } [14]= { type = 26 (Vendor-Specific) length = 56 octets vendorId = 9 vendorValue = 50 octets { 19 32 68 33 32 33 2d 73 65 74 75 70 2d 74 69 6d .2h323-setup- tim 65 3d 31 32 3a 34 38 3a 35 34 2e 30 30 30 20 50 e=12:48:54.000 P 45 54 20 54 75 65 20 4e 6f 76 20 31 31 20 32 30 ET Tue Nov 11 20 30 33 03 } } [15]= { type = 26 (Vendor-Specific) length = 40 octets vendorId = 9 vendorValue = 34 octets { 17 22 68 33 32 33 2d 72 65 6d 6f 74 65 2d 61 64 ."h323-remote- ad 64 72 65 73 73 3d 32 30 30 2e 31 31 30 2e 36 2e dress=192.168.1. 35 38 58 } } [16]= { type = 41 (Acct-Delay-Time) length = 6 octets value = 4 octets { 00 00 00 00 .... } } } } 2003/11/11 12:48:54.527 3 radproto.cxx(1869) RADIUS Received PDU from RADIUS server 192.168.1.132 (192.168.1.132:1813) by socket port:10560[0,153-154], PDU: { code = 5 (Accounting-Response) id = 153 length = 20 octets authenticator = 16 octets { a4 69 f9 f8 53 eb c7 7f ab b5 c1 3c b9 8a b2 0e .i..S......<.... } attributes = <<null>> } 2003/11/11 12:48:54.532 3 gkacct.cxx(434) GKACCT RadAcct logged event 1 for call no. 1 2003/11/11 12:48:54.533 2 gkacct.cxx(474) GKACCT Successfully logged event 1 for call no. 1 2003/11/11 12:48:54.535 3 ProxyChannel.cxx(1046) GK Call 1 is NAT type 0 2003/11/11 12:48:54.539 5 ProxyChannel.cxx(372) Q931 Send to 192.168.1.58:1720 { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = originator messageType = Setup IE: Bearer-Capability = { 80 90 a3 ... } IE: Calling-Party-Number = { 81 31 39 39 31 30 39 39 39 30 .199109990 } IE: Called-Party-Number = { 81 36 36 30 33 30 30 30 .6603000 } IE: User-User = { 20 b0 06 00 08 91 4a 00 03 01 40 08 00 6d 00 69 .....J...@..m.i 00 63 00 70 00 65 00 67 00 77 00 30 00 31 08 80 .c.p.e.g.w.0.1.. 01 3c 05 0b 04 00 00 c0 04 9c 30 00 40 00 30 00 .<........0.@.0. 01 03 00 99 36 33 30 5c c5 48 6e bf 29 11 d3 80 ....630\.Hn.)... 30 87 19 a3 57 b5 bf 00 5d 5d 80 07 00 c8 6e 02 0...W...]]....n. 82 06 b9 11 00 5c c5 48 6e bf 29 11 d3 80 31 87 .....\.Hn.)...1. 19 a3 57 b5 bf 80 bd 01 4d 80 0a 2a 86 48 86 f7 ..W.....M..*.H.. 0c 0a 01 02 01 c0 38 6d 65 48 10 ee ff 4c 7f 59 ......8meH...L.Y 2e 5e 10 ca 92 d0 2e cd 7a 7b 36 02 00 d7 12 00 .^......z{6..... 6d 00 69 00 63 00 70 00 65 00 67 00 77 00 30 00 m.i.c.p.e.g.w.0. 31 00 00 03 01 02 04 7c 38 6d 65 49 ee ff 4c 7f 1......|8meI..L. 59 2e 5e 10 ca 92 d0 2e cd 7a 7b 36 00 00 00 d7 Y.^......z{6.... 6d 69 63 70 65 67 77 30 31 00 00 00 00 00 00 00 micpegw01....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 34 02 13 00 00 00 0d 00 00 40 00 0a ....4........@.. 04 00 01 00 c8 6e 02 91 48 fb 1e 40 00 00 06 04 .....n..H..@.... 01 00 4d 00 00 40 00 11 14 00 01 00 c8 6e 02 91 ..M..@.......n.. 48 fa 00 c8 6e 02 91 48 fb 01 00 01 00 01 80 01 H...n..H........ 80 06 a0 01 80 13 01 40 b5 00 00 12 0c c0 01 00 .......@........ 02 80 06 00 04 00 00 00 03 ......... } } h225pdu = { h323_uu_pdu = { h323_message_body = setup { protocolIdentifier = 0.0.8.2250.0.3 sourceAddress = 1 entries { [0]=h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } } sourceInfo = { gateway = { protocol = 1 entries { [0]=voice { supportedPrefixes = 4 entries { [0]={ prefix = dialedDigits "9" } [1]={ prefix = dialedDigits "690" } [2]={ prefix = dialedDigits "1" } [3]={ prefix = dialedDigits "0" } } } } } mc = FALSE undefinedNode = FALSE } destinationAddress = 1 entries { [0]=dialedDigits "6603000" } activeMC = FALSE conferenceID = 16 octets { 5c c5 48 6e bf 29 11 d3 80 30 87 19 a3 57 b5 bf \.Hn.)...0...W.. } conferenceGoal = create <<null>> callType = pointToPoint <<null>> sourceCallSignalAddress = ipAddress { ip = 4 octets { c8 6e 02 82 .n.. } port = 1721 } callIdentifier = { guid = 16 octets { 5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf \.Hn.)...1...W.. } } tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 946693449 challenge = 16 octets { ee ff 4c 7f 59 2e 5e 10 ca 92 d0 2e cd 7a 7b 36 ..L.Y.^......z {6 } random = 215 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } nonStandard = { nonStandardIdentifier = 0.1.2.4 data = 124 octets { 38 6d 65 49 ee ff 4c 7f 59 2e 5e 10 ca 92 d0 2e 8meI..L.Y.^..... cd 7a 7b 36 00 00 00 d7 6d 69 63 70 65 67 77 30 .z {6....micpegw0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 ............ } } } } fastStart = 2 entries { [0]= 19 octets { 00 00 00 0d 00 00 40 00 0a 04 00 01 00 c8 6e 02 ......@.......n. 91 48 fb .H. } [1]= 30 octets { 40 00 00 06 04 01 00 4d 00 00 40 00 11 14 00 01 @......M..@..... 00 c8 6e 02 91 48 fa 00 c8 6e 02 91 48 fb ..n..H...n..H. } } mediaWaitForConnect = FALSE canOverlapSend = FALSE multipleCalls = TRUE maintainConnection = TRUE } h245Tunneling = TRUE nonStandardControl = 1 entries { [0]={ nonStandardIdentifier = h221NonStandard { t35CountryCode = 181 t35Extension = 0 manufacturerCode = 18 } data = 12 octets { c0 01 00 02 80 06 00 04 00 00 00 03 ............ } } } } } } 2003/11/11 12:48:54.618 4 osutil.cxx(319) PWLib File handle high water mark set: 39 Thread unblock pipe 2003/11/11 12:48:54.620 5 tlibthrd.cxx(688) PWLib Created thread 0x816e9f0 2003/11/11 12:48:54.621 4 tlibthrd.cxx(1194) PWLib Thread high water mark set: 12 2003/11/11 12:48:54.623 2 ProxyThread.cxx(701) Proxy Create a new ConnectThread, total 1 2003/11/11 12:48:54.624 5 tlibthrd.cxx(1199) PWLib Started thread 0x816e9f0 ProxyConnectThread:0816e9f0 2003/11/11 12:48:54.625 2 thread.cxx(28) ProxyConnectThread 23588 started 2003/11/11 12:48:54.627 3 ProxyThread.cxx(647) ProxyH(0) waiting... 2003/11/11 12:48:54.654 3 ProxyChannel.cxx(675) Q931(23588) Connect to 192.168.1.58:1720 successful 2003/11/11 12:48:54.655 5 ProxyThread.cxx(538) ProxyH(0) add a socket, total 2 2003/11/11 12:48:54.867 2 RasSrv.cxx(2223) GK Read from 192.168.1.58:22000 2003/11/11 12:48:54.869 3 RasSrv.cxx(2236) GK admissionRequest { requestSeqNum = 3 callType = pointToPoint <<null>> callModel = direct <<null>> endpointIdentifier = 9 characters { 0037 0037 0030 0038 005f 0065 006e 0064 7708_end 0070 p } destinationInfo = 2 entries { [0]=dialedDigits "6603000" [1]=h323_ID 3 characters { 006e 006f 0063 noc } } destCallSignalAddress = ipAddress { ip = 4 octets { c8 6e 06 3a .n.: } port = 1720 } srcInfo = 2 entries { [0]=dialedDigits "199109990" [1]=h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } } srcCallSignalAddress = ipAddress { ip = 4 octets { c8 6e 02 82 .n.. } port = 32986 } bandWidth = 100 callReferenceValue = 13 conferenceID = 16 octets { 5c c5 48 6e bf 29 11 d3 80 30 87 19 a3 57 b5 bf \.Hn.)...0...W.. } activeMC = FALSE answerCall = TRUE canMapAlias = TRUE callIdentifier = { guid = 16 octets { 5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf \.Hn.)...1...W.. } } tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 946693449 challenge = 16 octets { ee ff 4c 7f 59 2e 5e 10 ca 92 d0 2e cd 7a 7b 36 ..L.Y.^......z{6 } random = 215 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } nonStandard = { nonStandardIdentifier = 0.1.2.4 data = 124 octets { 38 6d 65 49 ee ff 4c 7f 59 2e 5e 10 ca 92 d0 2e 8meI..L.Y.^..... cd 7a 7b 36 00 00 00 d7 6d 69 63 70 65 67 77 30 .z{6....micpegw0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 ............ } } } } cryptoTokens = 1 entries { [0]=cryptoEPPwdHash { alias = h323_ID 3 characters { 006e 006f 0063 noc } timeStamp = 1067535072 token = { algorithmOID = 1.2.840.113549.2.5 paramS = { } hash = Hex: f2 df 29 29 5d 78 c0 2a c4 9f 3e d3 1e aa 19 2f } } } willSupplyUUIEs = FALSE } 2003/11/11 12:48:54.879 1 RasSrv.cxx(1321) GK ARQ Received 2003/11/11 12:48:54.879 3 radproto.cxx(1843) RADIUS Sending PDU to RADIUS server 192.168.1.132 (192.168.1.132:1812) from port:10177[0,189-191], PDU: { code = 1 (Access-Request) id = 190 length = 253 octets authenticator = 16 octets { 29 6b 13 ca be ab 18 92 23 7f 83 37 be 3c 8b 63 )k......#..7.<.c } attributes = 14 elements { [0]= { type = 1 (User-Name) length = 11 octets value = 9 octets { 6d 69 63 70 65 67 77 30 31 micpegw01 } } [1]= { type = 3 (CHAP-Password) length = 19 octets value = 17 octets { d7 ee ff 4c 7f 59 2e 5e 10 ca 92 d0 2e cd 7a 7b ...L.Y.^......z{ 36 6 } } [2]= { type = 60 (CHAP-Challenge) length = 6 octets value = 4 octets { 38 6d 65 49 8meI } } [3]= { type = 4 (NAS-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 82 .n.. } } [4]= { type = 32 (NAS-Identifier) length = 11 octets value = 9 octets { 4d 49 43 50 45 47 4b 30 31 MICPEGK01 } } [5]= { type = 61 (NAS-Port-Type) length = 6 octets value = 4 octets { 00 00 00 05 .... } } [6]= { type = 6 (Service-Type) length = 6 octets value = 4 octets { 00 00 00 0a .... } } [7]= { type = 8 (Framed-IP-Address) length = 6 octets value = 4 octets { c8 6e 06 3a .n.: } } [8]= { type = 31 (Calling-Station-Id) length = 11 octets value = 9 octets { 31 39 39 31 30 39 39 39 30 199109990 } } [9]= { type = 30 (Called-Station-Id) length = 9 octets value = 7 octets { 36 36 30 33 30 30 30 6603000 } } [10]= { type = 26 (Vendor-Specific) length = 56 octets vendorId = 9 vendorValue = 50 octets { 18 32 68 33 32 33 2d 63 6f 6e 66 2d 69 64 3d 35 .2h323-conf-id=5 43 43 35 34 38 36 45 20 42 46 32 39 31 31 44 33 CC5486E BF2911D3 20 38 30 33 30 38 37 31 39 20 41 33 35 37 42 35 80308719 A357B5 42 46 BF } } [11]= { type = 26 (Vendor-Specific) length = 31 octets vendorId = 9 vendorValue = 25 octets { 1a 19 68 33 32 33 2d 63 61 6c 6c 2d 6f 72 69 67 ..h323-call-orig 69 6e 3d 61 6e 73 77 65 72 in=answer } } [12]= { type = 26 (Vendor-Specific) length = 27 octets vendorId = 9 vendorValue = 21 octets { 1b 15 68 33 32 33 2d 63 61 6c 6c 2d 74 79 70 65 ..h323-call-type 3d 56 6f 49 50 =VoIP } } [13]= { type = 26 (Vendor-Specific) length = 28 octets vendorId = 9 vendorValue = 22 octets { 21 16 68 33 32 33 2d 67 77 2d 69 64 3d 4d 49 43 !.h323-gw-id=MIC 50 45 47 4b 30 31 PEGK01 } } } } 2003/11/11 12:48:54.893 3 radproto.cxx(1869) RADIUS Received PDU from RADIUS server 192.168.1.132 (192.168.1.132:1812) by socket port:10177[0,189-191], PDU: { code = 2 (Access-Accept) id = 190 length = 44 octets authenticator = 16 octets { 0f a2 43 f9 2e 9c 12 ab 2e ef 68 68 64 1b af dd ..C.......hhd... } attributes = 4 elements { [0]= { type = 4 (NAS-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 82 .n.. } } [1]= { type = 61 (NAS-Port-Type) length = 6 octets value = 4 octets { 00 00 00 05 .... } } [2]= { type = 6 (Service-Type) length = 6 octets value = 4 octets { 00 00 00 01 .... } } [3]= { type = 8 (Framed-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 91 .n.. } } } } 2003/11/11 12:48:54.897 4 gkauth.cxx(296) GkAuth RadAuth check ok 2003/11/11 12:48:54.897 4 gkauth.cxx(296) GkAuth default check ok 2003/11/11 12:48:54.898 3 RasSrv.cxx(1579) GK ARQ will request bandwith of 100 2003/11/11 12:48:54.898 3 RasSrv.cxx(1622) GK ACF: found existing call no 1 2003/11/11 12:48:54.899 2 RasSrv.cxx(1695) ACF|192.168.1.58:1720|7708_endp|13|6603000:dialedDigits=noc:h323_ID|199109990:di aledDigits=micpegw01:h323_ID|true; 2003/11/11 12:48:54.900 3 RasSrv.cxx(2163) GK Send to 192.168.1.58:22000 admissionConfirm { requestSeqNum = 3 bandWidth = 100 callModel = gatekeeperRouted <<null>> destCallSignalAddress = ipAddress { ip = 4 octets { c8 6e 02 82 .n.. } port = 1721 } irrFrequency = 120 willRespondToIRR = FALSE uuiesRequested = { setup = FALSE callProceeding = FALSE connect = FALSE alerting = FALSE information = FALSE releaseComplete = FALSE facility = FALSE progress = FALSE empty = FALSE status = FALSE statusInquiry = FALSE setupAcknowledge = FALSE notify = FALSE } } 2003/11/11 12:48:54.902 5 RasSrv.cxx(2177) GK Sent Successful 2003/11/11 12:48:55.112 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/0 2003/11/11 12:48:55.112 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/11 12:48:55.113 3 ProxyChannel.cxx(413) Q931d Received: CallProceeding CRV=13 from 192.168.1.58:1720 2003/11/11 12:48:55.115 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = destination messageType = CallProceeding IE: Display = { 6e 6f 63 00 noc. } IE: User-User = { 21 80 06 00 08 91 4a 00 02 02 01 22 11 00 5c c5 !.....J...."..\. 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf 34 02 Hn.)...1...W..4. 1a 00 00 00 0d 00 00 40 00 11 14 00 01 00 c8 6e .......@.......n 06 3a 5a 4a 00 c8 6e 06 3a 5a 4b 17 40 00 64 06 .:ZJ..n.:ZK.@.d. 04 01 00 4d 00 00 40 00 0a 04 00 01 00 c8 6e 06 ...M..@.......n. 3a 5a 4b 02 80 01 80 :ZK.... } } h225pdu = { h323_uu_pdu = { h323_message_body = callProceeding { protocolIdentifier = 0.0.8.2250.0.2 destinationInfo = { terminal = { } mc = FALSE undefinedNode = FALSE } callIdentifier = { guid = 16 octets { 5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf \.Hn.)...1...W.. } } fastStart = 2 entries { [0]= 26 octets { 00 00 00 0d 00 00 40 00 11 14 00 01 00 c8 6e 06 ......@.......n. 3a 5a 4a 00 c8 6e 06 3a 5a 4b :ZJ..n.:ZK } [1]= 23 octets { 40 00 64 06 04 01 00 4d 00 00 40 00 0a 04 00 01 @.d....M..@..... 00 c8 6e 06 3a 5a 4b ..n.:ZK } } } h245Tunneling = TRUE } } } 2003/11/11 12:48:55.120 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/0 2003/11/11 12:48:55.121 5 ProxyThread.cxx(354) Q931s Reading from 192.168.1.145:11055 2003/11/11 12:48:55.121 3 ProxyChannel.cxx(413) Q931s Received: Facility CRV=13 from 192.168.1.145:11055 2003/11/11 12:48:55.123 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = originator messageType = Facility IE: 0x0 (0) = { } IE: Facility = { } IE: Display = { 63 69 73 63 6f 20 53 79 73 74 65 6d 73 2c 20 49 cisco Systems, I 6e 63 2e nc. } IE: User-User = { 28 10 01 00 10 c0 01 80 7c 01 7a 02 70 01 06 00 (.......|.z.p... 08 81 75 00 06 80 13 80 00 14 00 01 00 00 01 00 ..u............. 00 01 00 00 0c c0 01 00 01 00 05 80 00 18 4a 08 ..............J. 11 86 01 00 80 5c 01 00 01 40 07 c0 02 00 c8 01 .....\...@...... 48 40 00 90 80 00 19 48 10 b5 00 00 12 09 54 33 H@.....H......T3 38 46 61 78 55 44 50 00 90 80 00 16 83 01 50 80 8FaxUDP.......P. 00 15 83 01 40 80 00 12 83 01 10 80 00 08 22 00 ....@.........". 00 00 00 80 01 02 00 00 16 01 00 15 00 12 02 00 ................ 19 00 18 00 08 ..... } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 122 octets { 02 70 01 06 00 08 81 75 00 06 80 13 80 00 14 00 .p.....u........ 01 00 00 01 00 00 01 00 00 0c c0 01 00 01 00 05 ................ 80 00 18 4a 08 11 86 01 00 80 5c 01 00 01 40 07 ...J......\...@. c0 02 00 c8 01 48 40 00 90 80 00 19 48 10 b5 00 .....H@.....H... 00 12 09 54 33 38 46 61 78 55 44 50 00 90 80 00 ...T38FaxUDP.... 16 83 01 50 80 00 15 83 01 40 80 00 12 83 01 10 ...P.....@...... 80 00 08 22 00 00 00 00 80 01 02 00 00 16 01 00 ..."............ 15 00 12 02 00 19 00 18 00 08 .......... } } } } } 2003/11/11 12:48:55.129 2 RasSrv.cxx(2223) GK Read from 192.168.1.145:53956 2003/11/11 12:48:55.130 3 RasSrv.cxx(2236) GK bandwidthRequest { requestSeqNum = 238 endpointIdentifier = 9 characters { 0037 0037 0030 0039 005f 0065 006e 0064 7709_end 0070 p } conferenceID = 16 octets { 5c c5 48 6e bf 29 11 d3 80 30 87 19 a3 57 b5 bf \.Hn.)...0...W.. } callReferenceValue = 13 bandWidth = 126 callIdentifier = { guid = 16 octets { 5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf \.Hn.)...1...W.. } } cryptoTokens = 1 entries { [0]=cryptoEPPwdHash { alias = h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } timeStamp = 946693450 token = { algorithmOID = 1.2.840.113549.2.5 paramS = { } hash = Hex: 9d 5d e9 61 74 3b fd 15 ad aa 1f 0b d9 27 ae d8 } } } answeredCall = FALSE } 2003/11/11 12:48:55.133 1 RasSrv.cxx(1868) GK BRQ Received 2003/11/11 12:48:55.134 4 gkauth.h(84) GkAuth default check ok 2003/11/11 12:48:55.134 2 RasTbl.cxx(1571) GK Available Bandwidth 9874 2003/11/11 12:48:55.134 2 RasSrv.cxx(1919) BCF|192.168.1.145|7709_endp|126; 2003/11/11 12:48:55.135 3 RasSrv.cxx(2163) GK Send to 192.168.1.145:53956 bandwidthConfirm { requestSeqNum = 238 bandWidth = 126 } 2003/11/11 12:48:55.136 5 RasSrv.cxx(2177) GK Sent Successful 2003/11/11 12:48:55.137 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/0 2003/11/11 12:48:55.139 5 ProxyThread.cxx(354) Q931s Reading from 192.168.1.145:11055 2003/11/11 12:48:55.140 3 ProxyChannel.cxx(413) Q931s Received: Facility CRV=13 from 192.168.1.145:11055 2003/11/11 12:48:55.142 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = originator messageType = Facility IE: 0x0 (0) = { } IE: Facility = { } IE: Display = { 63 69 73 63 6f 20 53 79 73 74 65 6d 73 2c 20 49 cisco Systems, I 6e 63 2e nc. } IE: User-User = { 28 10 01 00 10 c0 01 80 08 01 06 01 00 3c 40 21 (............<@! 75 u } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 6 octets { 01 00 3c 40 21 75 ..<@!u } } } } } 2003/11/11 12:48:55.153 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/0 2003/11/11 12:48:55.154 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/11 12:48:55.156 3 ProxyChannel.cxx(413) Q931d Received: Alerting CRV=13 from 192.168.1.58:1720 2003/11/11 12:48:55.159 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = destination messageType = Alerting IE: Display = { 6e 6f 63 00 noc. } IE: User-User = { 23 80 06 00 08 91 4a 00 02 02 01 22 11 00 5c c5 #.....J...."..\. 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf 34 02 Hn.)...1...W..4. 1a 00 00 00 0d 00 00 40 00 11 14 00 01 00 c8 6e .......@.......n 06 3a 5a 4a 00 c8 6e 06 3a 5a 4b 17 40 00 64 06 .:ZJ..n.:ZK.@.d. 04 01 00 4d 00 00 40 00 0a 04 00 01 00 c8 6e 06 ...M..@.......n. 3a 5a 4b 02 80 01 80 :ZK.... } } h225pdu = { h323_uu_pdu = { h323_message_body = alerting { protocolIdentifier = 0.0.8.2250.0.2 destinationInfo = { terminal = { } mc = FALSE undefinedNode = FALSE } callIdentifier = { guid = 16 octets { 5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf \.Hn.)...1...W.. } } fastStart = 2 entries { [0]= 26 octets { 00 00 00 0d 00 00 40 00 11 14 00 01 00 c8 6e 06 ......@.......n. 3a 5a 4a 00 c8 6e 06 3a 5a 4b :ZJ..n.:ZK } [1]= 23 octets { 40 00 64 06 04 01 00 4d 00 00 40 00 0a 04 00 01 @.d....M..@..... 00 c8 6e 06 3a 5a 4b ..n.:ZK } } } h245Tunneling = TRUE } } } 2003/11/11 12:48:55.452 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/0 2003/11/11 12:48:55.452 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/11 12:48:55.452 3 ProxyChannel.cxx(413) Q931d Received: Facility CRV=13 from 192.168.1.58:1720 2003/11/11 12:48:55.454 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = destination messageType = Facility IE: User-User = { 28 10 01 00 04 c0 01 80 5c 01 5a 02 70 01 06 00 (.......\.Z.p... 08 81 75 00 03 80 13 80 00 64 00 01 00 00 01 00 ..u......d...... 00 01 00 00 0c c0 01 00 01 00 03 80 00 00 22 00 ..............". 00 40 00 01 4a 08 11 86 01 00 80 5c 01 00 01 40 .@..J......\...@ 07 c0 02 00 c8 01 48 40 00 90 80 00 02 83 01 10 ......H@........ 80 00 03 83 01 50 00 80 01 02 01 00 00 00 01 00 .....P.......... 00 02 00 00 03 ..... } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 90 octets { 02 70 01 06 00 08 81 75 00 03 80 13 80 00 64 00 .p.....u......d. 01 00 00 01 00 00 01 00 00 0c c0 01 00 01 00 03 ................ 80 00 00 22 00 00 40 00 01 4a 08 11 86 01 00 80 ..."..@..J...... 5c 01 00 01 40 07 c0 02 00 c8 01 48 40 00 90 80 \...@......H@... 00 02 83 01 10 80 00 03 83 01 50 00 80 01 02 01 ..........P..... 00 00 00 01 00 00 02 00 00 03 .......... } } } } } 2003/11/11 12:48:55.459 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/0 2003/11/11 12:48:55.459 5 ProxyThread.cxx(354) Q931s Reading from 192.168.1.145:11055 2003/11/11 12:48:55.459 3 ProxyChannel.cxx(413) Q931s Received: Facility CRV=13 from 192.168.1.145:11055 2003/11/11 12:48:55.461 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = originator messageType = Facility IE: 0x0 (0) = { } IE: Facility = { } IE: Display = { 63 69 73 63 6f 20 53 79 73 74 65 6d 73 2c 20 49 cisco Systems, I 6e 63 2e nc. } IE: User-User = { 28 10 01 00 10 c0 01 80 05 01 03 21 80 01 (..........!.. } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 3 octets { 21 80 01 !.. } } } } } 2003/11/11 12:48:55.495 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/0 2003/11/11 12:48:55.496 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/11 12:48:55.496 3 ProxyChannel.cxx(413) Q931d Received: Facility CRV=13 from 192.168.1.58:1720 2003/11/11 12:48:55.497 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = destination messageType = Facility IE: User-User = { 28 10 01 00 04 c0 01 80 05 01 03 21 80 01 (..........!.. } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 3 octets { 21 80 01 !.. } } } } } 2003/11/11 12:48:55.568 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/0 2003/11/11 12:48:55.568 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/11 12:48:55.568 3 ProxyChannel.cxx(413) Q931d Received: Facility CRV=13 from 192.168.1.58:1720 2003/11/11 12:48:55.569 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = destination messageType = Facility IE: User-User = { 28 10 01 00 04 c0 01 80 04 01 02 20 80 (.......... . } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 2 octets { 20 80 . } } } } } 2003/11/11 12:48:55.700 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/0 2003/11/11 12:48:55.700 5 ProxyThread.cxx(354) Q931s Reading from 192.168.1.145:11055 2003/11/11 12:48:55.700 3 ProxyChannel.cxx(413) Q931s Received: Facility CRV=13 from 192.168.1.145:11055 2003/11/11 12:48:55.702 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = originator messageType = Facility IE: 0x0 (0) = { } IE: Facility = { } IE: Display = { 63 69 73 63 6f 20 53 79 73 74 65 6d 73 2c 20 49 cisco Systems, I 6e 63 2e nc. } IE: User-User = { 28 10 01 00 10 c0 01 80 04 01 02 20 a0 (.......... . } } h225pdu = { h323_uu_pdu = { h323_message_body = empty <<null>> h245Tunneling = TRUE h245Control = 1 entries { [0]= 2 octets { 20 a0 . } } } } } 2003/11/11 12:48:56.440 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/0 2003/11/11 12:48:56.441 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/11 12:48:56.441 3 ProxyChannel.cxx(413) Q931d Received: Connect CRV=13 from 192.168.1.58:1720 2003/11/11 12:48:56.443 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = destination messageType = Connect IE: Bearer-Capability = { 80 90 a3 ... } IE: Display = { 6e 6f 63 00 noc. } IE: User-User = { 22 80 06 00 08 91 4a 00 02 22 c0 61 00 00 16 0a ".....J..".a.... 41 64 64 50 61 63 20 56 6f 49 50 03 36 2e 30 36 AddPac VoIP.6.06 00 5c c5 48 6e bf 29 11 d3 80 30 87 19 a3 57 b5 .\.Hn.)...0...W. bf 09 10 11 00 5c c5 48 6e bf 29 11 d3 80 31 87 .....\.Hn.)...1. 19 a3 57 b5 bf 34 02 1a 00 00 00 0d 00 00 40 00 ..W..4........@. 11 14 00 01 00 c8 6e 06 3a 5a 4a 00 c8 6e 06 3a ......n.:ZJ..n.: 5a 4b 17 40 00 64 06 04 01 00 4d 00 00 40 00 0a ZK.@.d....M..@.. 04 00 01 00 c8 6e 06 3a 5a 4b 02 80 01 80 .....n.:ZK.... } } h225pdu = { h323_uu_pdu = { h323_message_body = connect { protocolIdentifier = 0.0.8.2250.0.2 destinationInfo = { vendor = { vendor = { t35CountryCode = 97 t35Extension = 0 manufacturerCode = 22 } productId = 11 octets { 41 64 64 50 61 63 20 56 6f 49 50 AddPac VoIP } versionId = 4 octets { 36 2e 30 36 6.06 } } terminal = { } mc = FALSE undefinedNode = FALSE } conferenceID = 16 octets { 5c c5 48 6e bf 29 11 d3 80 30 87 19 a3 57 b5 bf \.Hn.)...0...W.. } callIdentifier = { guid = 16 octets { 5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf \.Hn.)...1...W.. } } fastStart = 2 entries { [0]= 26 octets { 00 00 00 0d 00 00 40 00 11 14 00 01 00 c8 6e 06 ......@.......n. 3a 5a 4a 00 c8 6e 06 3a 5a 4b :ZJ..n.:ZK } [1]= 23 octets { 40 00 64 06 04 01 00 4d 00 00 40 00 0a 04 00 01 @.d....M..@..... 00 c8 6e 06 3a 5a 4b ..n.:ZK } } } h245Tunneling = TRUE } } } 2003/11/11 12:48:59.504 2 RasSrv.cxx(2223) GK Read from 192.168.1.145:53956 2003/11/11 12:48:59.505 3 RasSrv.cxx(2236) GK registrationRequest { requestSeqNum = 239 protocolIdentifier = 0.0.8.2250.0.3 discoveryComplete = FALSE callSignalAddress = 0 entries { } rasAddress = 1 entries { [0]=ipAddress { ip = 4 octets { c8 6e 02 91 .n.. } port = 53956 } } terminalType = { mc = FALSE undefinedNode = FALSE } gatekeeperIdentifier = 9 characters { 004d 0049 0043 0050 0045 0047 004b 0030 MICPEGK0 0031 1 } endpointVendor = { vendor = { t35CountryCode = 181 t35Extension = 0 manufacturerCode = 18 } } timeToLive = 60 tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 946693454 challenge = 16 octets { 42 6d 83 51 b9 23 e4 8e 9b d1 84 c0 93 0c 3a 10 Bm.Q.#........:. } random = 216 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } } } cryptoTokens = 1 entries { [0]=cryptoEPPwdHash { alias = h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } timeStamp = 946693454 token = { algorithmOID = 1.2.840.113549.2.5 paramS = { } hash = Hex: 5b 67 67 d2 1e 27 27 9d d0 53 05 e9 2e 69 06 89 } } } keepAlive = TRUE endpointIdentifier = 9 characters { 0037 0037 0030 0039 005f 0065 006e 0064 7709_end 0070 p } willSupplyUUIEs = FALSE maintainConnection = TRUE } 2003/11/11 12:48:59.511 1 RasSrv.cxx(947) GK RRQ Received 2003/11/11 12:48:59.512 3 RasSrv.cxx(2163) GK Send to 192.168.1.145:53956 registrationConfirm { requestSeqNum = 239 protocolIdentifier = 0.0.8.2250.0.3 callSignalAddress = 1 entries { [0]=ipAddress { ip = 4 octets { c8 6e 02 82 .n.. } port = 1721 } } gatekeeperIdentifier = 9 characters { 004d 0049 0043 0050 0045 0047 004b 0030 MICPEGK0 0031 1 } endpointIdentifier = 9 characters { 0037 0037 0030 0039 005f 0065 006e 0064 7709_end 0070 p } timeToLive = 60 willRespondToIRR = FALSE maintainConnection = FALSE } 2003/11/11 12:48:59.514 5 RasSrv.cxx(2177) GK Sent Successful 2003/11/11 12:49:00.996 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 2, total 2/0 2003/11/11 12:49:00.997 5 ProxyThread.cxx(354) Q931d Reading from 192.168.1.58:1720 2003/11/11 12:49:00.997 3 ProxyChannel.cxx(413) Q931d Received: ReleaseComplete CRV=13 from 192.168.1.58:1720 2003/11/11 12:49:00.999 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = destination messageType = ReleaseComplete IE: Cause - Normal call clearing = { 80 90 .. } IE: User-User = { 25 80 06 00 08 91 4a 00 02 01 11 00 5c c5 48 6e %.....J.....\.Hn bf 29 11 d3 80 31 87 19 a3 57 b5 bf 02 80 01 80 .)...1...W...... } } h225pdu = { h323_uu_pdu = { h323_message_body = releaseComplete { protocolIdentifier = 0.0.8.2250.0.2 callIdentifier = { guid = 16 octets { 5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf \.Hn.)...1...W.. } } } h245Tunneling = TRUE } } } 2003/11/11 12:49:01.001 1 RasTbl.cxx(1721) CDR|1|5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf|5|Tue, 11 Nov 2003 12:48:56 -0500|Tue, 11 Nov 2003 12:49:01 - 0500|192.168.1.145:1720|7709_endp|192.168.1.58:1720|7708_endp|6603000:dialedDigi ts|199109990:dialedDigits=micpegw01:h323_ID|MICPEGK01; 2003/11/11 12:49:01.002 3 radproto.cxx(1843) RADIUS Sending PDU to RADIUS server 192.168.1.132 (192.168.1.132:1813) from port:10560[0,153-155], PDU: { code = 4 (Accounting-Request) id = 154 length = 502 octets authenticator = 16 octets { 04 ce c2 69 ac f3 c9 8e 45 8c b6 d3 4d ed f8 ba ...i....E...M... } attributes = 21 elements { [0]= { type = 40 (Acct-Status-Type) length = 6 octets value = 4 octets { 00 00 00 02 .... } } [1]= { type = 4 (NAS-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 82 .n.. } } [2]= { type = 32 (NAS-Identifier) length = 11 octets value = 9 octets { 4d 49 43 50 45 47 4b 30 31 MICPEGK01 } } [3]= { type = 61 (NAS-Port-Type) length = 6 octets value = 4 octets { 00 00 00 05 .... } } [4]= { type = 6 (Service-Type) length = 6 octets value = 4 octets { 00 00 00 01 .... } } [5]= { type = 44 (Acct-Session-Id) length = 10 octets value = 8 octets { 64 62 65 32 30 30 30 30 dbe20000 } } [6]= { type = 1 (User-Name) length = 11 octets value = 9 octets { 6d 69 63 70 65 67 77 30 31 micpegw01 } } [7]= { type = 8 (Framed-IP-Address) length = 6 octets value = 4 octets { c8 6e 02 91 .n.. } } [8]= { type = 46 (Acct-Session-Time) length = 6 octets value = 4 octets { 00 00 00 05 .... } } [9]= { type = 31 (Calling-Station-Id) length = 11 octets value = 9 octets { 6d 69 63 70 65 67 77 30 31 micpegw01 } } [10]= { type = 30 (Called-Station-Id) length = 9 octets value = 7 octets { 36 36 30 33 30 30 30 6603000 } } [11]= { type = 26 (Vendor-Specific) length = 28 octets vendorId = 9 vendorValue = 22 octets { 21 16 68 33 32 33 2d 67 77 2d 69 64 3d 4d 49 43 !.h323-gw-id=MIC 50 45 47 4b 30 31 PEGK01 } } [12]= { type = 26 (Vendor-Specific) length = 56 octets vendorId = 9 vendorValue = 50 octets { 18 32 68 33 32 33 2d 63 6f 6e 66 2d 69 64 3d 35 .2h323-conf-id=5 43 43 35 34 38 36 45 20 42 46 32 39 31 31 44 33 CC5486E BF2911D3 20 38 30 33 30 38 37 31 39 20 41 33 35 37 42 35 80308719 A357B5 42 46 BF } } [13]= { type = 26 (Vendor-Specific) length = 30 octets vendorId = 9 vendorValue = 24 octets { 1a 18 68 33 32 33 2d 63 61 6c 6c 2d 6f 72 69 67 ..h323-call-orig 69 6e 3d 70 72 6f 78 79 in=proxy } } [14]= { type = 26 (Vendor-Specific) length = 27 octets vendorId = 9 vendorValue = 21 octets { 1b 15 68 33 32 33 2d 63 61 6c 6c 2d 74 79 70 65 ..h323-call-type 3d 56 6f 49 50 =VoIP } } [15]= { type = 26 (Vendor-Specific) length = 56 octets vendorId = 9 vendorValue = 50 octets { 19 32 68 33 32 33 2d 73 65 74 75 70 2d 74 69 6d .2h323-setup-tim 65 3d 31 32 3a 34 38 3a 35 34 2e 30 30 30 20 50 e=12:48:54.000 P 45 54 20 54 75 65 20 4e 6f 76 20 31 31 20 32 30 ET Tue Nov 11 20 30 33 03 } } [16]= { type = 26 (Vendor-Specific) length = 58 octets vendorId = 9 vendorValue = 52 octets { 1c 34 68 33 32 33 2d 63 6f 6e 6e 65 63 74 2d 74 .4h323-connect-t 69 6d 65 3d 31 32 3a 34 38 3a 35 36 2e 30 30 30 ime=12:48:56.000 20 50 45 54 20 54 75 65 20 4e 6f 76 20 31 31 20 PET Tue Nov 11 32 30 30 33 2003 } } [17]= { type = 26 (Vendor-Specific) length = 61 octets vendorId = 9 vendorValue = 55 octets { 1d 37 68 33 32 33 2d 64 69 73 63 6f 6e 6e 65 63 .7h323-disconnec 74 2d 74 69 6d 65 3d 31 32 3a 34 39 3a 30 31 2e t-time=12:49:01. 30 30 30 20 50 45 54 20 54 75 65 20 4e 6f 76 20 000 PET Tue Nov 31 31 20 32 30 30 33 11 2003 } } [18]= { type = 26 (Vendor-Specific) length = 32 octets vendorId = 9 vendorValue = 26 octets { 1e 1a 68 33 32 33 2d 64 69 73 63 6f 6e 6e 65 63 ..h323-disconnec 74 2d 63 61 75 73 65 3d 31 30 t-cause=10 } } [19]= { type = 26 (Vendor-Specific) length = 40 octets vendorId = 9 vendorValue = 34 octets { 17 22 68 33 32 33 2d 72 65 6d 6f 74 65 2d 61 64 ."h323-remote-ad 64 72 65 73 73 3d 32 30 30 2e 31 31 30 2e 36 2e dress=192.168.1. 35 38 58 } } [20]= { type = 41 (Acct-Delay-Time) length = 6 octets value = 4 octets { 00 00 00 00 .... } } } } 2003/11/11 12:49:01.026 3 radproto.cxx(1869) RADIUS Received PDU from RADIUS server 192.168.1.132 (192.168.1.132:1813) by socket port:10560[0,153-155], PDU: { code = 5 (Accounting-Response) id = 154 length = 20 octets authenticator = 16 octets { 9d 9a 6b 0e df dd a3 a7 01 05 43 68 36 c9 0d 65 ..k.......Ch6..e } attributes = <<null>> } 2003/11/11 12:49:01.028 3 gkacct.cxx(434) GKACCT RadAcct logged event 2 for call no. 1 2003/11/11 12:49:01.028 2 gkacct.cxx(474) GKACCT Successfully logged event 2 for call no. 1 2003/11/11 12:49:01.030 4 ProxyThread.cxx(659) ProxyH(0) 1 sockets selected from 1, total 1/1 2003/11/11 12:49:01.031 5 ProxyThread.cxx(354) Q931s Reading from 192.168.1.145:11055 2003/11/11 12:49:01.031 3 ProxyChannel.cxx(413) Q931s Received: ReleaseComplete CRV=13 from 192.168.1.145:11055 2003/11/11 12:49:01.032 4 ProxyChannel.cxx(372) Q931 Received: { q931pdu = { protocolDiscriminator = 8 callReference = 13 from = originator messageType = ReleaseComplete IE: Cause - Normal call clearing = { 80 90 .. } IE: User-User = { 25 80 06 00 08 91 4a 00 03 11 00 11 00 5c c5 48 %.....J......\.H 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf 10 80 01 n.)...1...W..... 80 . } } h225pdu = { h323_uu_pdu = { h323_message_body = releaseComplete { protocolIdentifier = 0.0.8.2250.0.3 callIdentifier = { guid = 16 octets { 5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf \.Hn.)...1...W.. } } } h245Tunneling = TRUE } } } 2003/11/11 12:49:01.035 2 RasSrv.cxx(2223) GK Read from 192.168.1.145:53956 2003/11/11 12:49:01.036 3 RasSrv.cxx(2236) GK disengageRequest { requestSeqNum = 240 endpointIdentifier = 9 characters { 0037 0037 0030 0039 005f 0065 006e 0064 7709_end 0070 p } conferenceID = 16 octets { 5c c5 48 6e bf 29 11 d3 80 30 87 19 a3 57 b5 bf \.Hn.)...0...W.. } callReferenceValue = 13 disengageReason = normalDrop <<null>> callIdentifier = { guid = 16 octets { 5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf \.Hn.)...1...W.. } } tokens = 2 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 946693449 challenge = 16 octets { ee ff 4c 7f 59 2e 5e 10 ca 92 d0 2e cd 7a 7b 36 ..L.Y.^......z{6 } random = 215 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } nonStandard = { nonStandardIdentifier = 0.1.2.4 data = 124 octets { 38 6d 65 49 ee ff 4c 7f 59 2e 5e 10 ca 92 d0 2e 8meI..L.Y.^..... cd 7a 7b 36 00 00 00 d7 6d 69 63 70 65 67 77 30 .z{6....micpegw0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 ............ } } } [1]={ tokenOID = 2.16.840.1.113777.1.2.179 nonStandard = { nonStandardIdentifier = 2.16.840.1.113777.1.2.179 data = 167 octets { 02 60 25 00 1d 20 01 04 60 25 00 1e 30 80 98 44 .`%.. ..`%..0..D 49 53 43 4f 4e 4e 45 43 54 5f 52 45 41 53 4f 4e ISCONNECT_REASON 3d 30 2c 54 49 4d 45 3d 39 34 36 36 39 33 34 35 =0,TIME=94669345 31 2c 44 55 52 41 54 49 4f 4e 3d 34 2c 44 49 53 1,DURATION=4,DIS 43 4f 4e 4e 45 43 54 5f 53 54 52 49 4e 47 3d 6e CONNECT_STRING=n 6f 72 6d 61 6c 20 63 61 6c 6c 20 63 6c 65 61 72 ormal call clear 69 6e 67 2e 2c 4f 52 49 47 49 4e 3d 30 2c 4c 49 ing.,ORIGIN=0,LI 4e 45 5f 4e 55 4d 42 45 52 3d 44 53 30 20 47 72 NE_NUMBER=DS0 Gr 6f 75 70 20 33 2f 30 3a 30 2c 4f 55 54 42 4f 55 oup 3/0:0,OUTBOU 4e 44 5f 47 54 57 5f 49 50 3d 32 30 30 2e 31 31 ND_GTW_IP=192.16 30 2e 32 2e 31 33 30 8.1.132 } } } } cryptoTokens = 1 entries { [0]=cryptoEPPwdHash { alias = h323_ID 9 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 1 } timeStamp = 946693456 token = { algorithmOID = 1.2.840.113549.2.5 paramS = { } hash = Hex: e6 4b 66 d4 92 28 cf bf 1d 83 fc 71 54 8f d1 59 } } } answeredCall = FALSE } 2003/11/11 12:49:01.048 1 RasSrv.cxx(1744) GK DRQ Received 2003/11/11 12:49:01.048 4 RasSrv.cxx(1754) GK DRQ: closed conference 2003/11/11 12:49:01.049 4 gkauth.h(84) GkAuth default check ok 2003/11/11 12:49:01.049 2 RasSrv.cxx(1791) DCF|192.168.1.145|7709_endp|13|normalDrop; 2003/11/11 12:49:01.050 3 ProxyThread.cxx(647) ProxyH(0) waiting... 2003/11/11 12:49:01.050 3 RasSrv.cxx(2163) GK Send to 192.168.1.145:53956 disengageConfirm { requestSeqNum = 240 } 2003/11/11 12:49:01.051 5 RasSrv.cxx(2177) GK Sent Successful 2003/11/11 12:49:01.052 2 RasSrv.cxx(2223) GK Read from 192.168.1.58:22000 2003/11/11 12:49:01.053 3 RasSrv.cxx(2236) GK disengageRequest { requestSeqNum = 4 endpointIdentifier = 9 characters { 0037 0037 0030 0038 005f 0065 006e 0064 7708_end 0070 p } conferenceID = 16 octets { 5c c5 48 6e bf 29 11 d3 80 30 87 19 a3 57 b5 bf \.Hn.)...0...W.. } callReferenceValue = 13 disengageReason = normalDrop <<null>> callIdentifier = { guid = 16 octets { 5c c5 48 6e bf 29 11 d3 80 31 87 19 a3 57 b5 bf \.Hn.)...1...W.. } } gatekeeperIdentifier = 9 characters { 004d 0049 0043 0050 0045 0047 004b 0030 MICPEGK0 0031 1 } tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 946693449 challenge = 16 octets { ee ff 4c 7f 59 2e 5e 10 ca 92 d0 2e cd 7a 7b 36 ..L.Y.^......z{6 } random = 215 generalID = 10 characters { 006d 0069 0063 0070 0065 0067 0077 0030 micpegw0 0031 0000 1 } nonStandard = { nonStandardIdentifier = 0.1.2.4 data = 124 octets { 38 6d 65 49 ee ff 4c 7f 59 2e 5e 10 ca 92 d0 2e 8meI..L.Y.^..... cd 7a 7b 36 00 00 00 d7 6d 69 63 70 65 67 77 30 .z{6....micpegw0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 ............ } } } } cryptoTokens = 1 entries { [0]=cryptoEPPwdHash { alias = h323_ID 3 characters { 006e 006f 0063 noc } timeStamp = 1067535078 token = { algorithmOID = 1.2.840.113549.2.5 paramS = { } hash = Hex: fa 0b 9c 75 38 20 ab b5 5c f0 98 a7 78 fd b5 5b } } } answeredCall = TRUE } 2003/11/11 12:49:01.061 1 RasSrv.cxx(1744) GK DRQ Received 2003/11/11 12:49:01.062 4 RasSrv.cxx(1754) GK DRQ: closed conference 2003/11/11 12:49:01.062 4 gkauth.h(84) GkAuth default check ok 2003/11/11 12:49:01.062 2 RasSrv.cxx(1791) DCF|192.168.1.58|7708_endp|13|normalDrop; 2003/11/11 12:49:01.063 3 RasSrv.cxx(2163) GK Send to 192.168.1.58:22000 disengageConfirm { requestSeqNum = 4 } 2003/11/11 12:49:01.064 5 RasSrv.cxx(2177) GK Sent Successful Zygmuntowicz Michal <m.zygmuntowicz@onet.pl> escribió: > The warnings can be ignored safely (but I'll fix them:). > > The new trace would be needed, along with output of the gk status line > 'rv' > command for the originating gateway - it is important if the gateway is > registered > with a prefix that matches calling-party-number. > > P.S.: What top 3 entries of changes.txt are saying? > > ----- Original Message ----- > From: "Rafael J. Risco G.V." <rrisco@millicom.net.pe> > Sent: Tuesday, November 11, 2003 6:06 PM > > > > ok, I have just compiled this new version getting this warnings: > > [CUT] > > I still have the same problem... let me known if you need the trace > log level 5 > > from this new test... > > > > ------------------------------------------------------- > This SF.Net email sponsored by: ApacheCon 2003, > 16-19 November in Las Vegas. Learn firsthand the latest > developments in Apache, PHP, Perl, XML, Java, MySQL, > WebDAV, and more! http://www.apachecon.com/ > _______________________________________________ > List: Openh323gk-users@lists.sourceforge.net > Archive: http://sourceforge.net/mailarchive/forum.php?forum_id=8549 > Homepage: http://www.gnugk.org/ > ------------------------------------------------------- This SF.Net email sponsored by: ApacheCon 2003, 16-19 November in Las Vegas. Learn firsthand the latest developments in Apache, PHP, Perl, XML, Java, MySQL, WebDAV, and more! http://www.apachecon.com/ _______________________________________________ List: Openh323gk-users@lists.sourceforge.net Archive: http://sourceforge.net/mailarchive/forum.php?forum_id=8549 Homepage: http://www.gnugk.org/