Hello List: I am trying to prove the IVR ( h323-ivr-out attribute with an alias list ) i place in the table radreply this: UserName Attribute op Value 25002503 Service-Type = Login-User 25002503 Cisco-AVPair = h323-ivr-out=terminal-alias:25002506; This is correct? i'have in [RadAuth] AppendCiscoAttributes=1 IncludeTerminalAliases=1 and in [RadAliasAuth] AppendCiscoAttributes=1 IncludeTerminalAliases=1 Is this all correct? in telnet no see the other alias :( RCF|200.40.XXX.XXX:1720|25002503:dialedDigits|terminal|8783_endp Tue, 17 Feb 2004 15:58:29 -0300 (permanent) C(0/0/0) <1> What is wrong? Radius say this : rad_recv: Access-Request packet from host 200.40.XXX.XXX:10123, id=223, length=134 User-Name = "25002503" CHAP-Password = 0x431a96363660b2cbf60540cb284fac254b NAS-IP-Address = 200.40.XXX.XXX NAS-Identifier = "RadiusGK" NAS-Port-Type = Virtual Service-Type = Login-User CHAP-Challenge = 0x40328a9d Framed-IP-Address = 200.40.XXX.XXX Cisco-AVPair = "h323-ivr-out=terminal-alias:25002503;" modcall: entering group authorize for request 1 modcall[authorize]: module "preprocess" returns ok for request 1 radius_xlat: '25002503' rlm_sql (sql): sql_set_user escaped user --> '25002503' <CUT> sql query </CUT> modcall: entering group Auth-Type for request 1 rlm_chap: login attempt by "25002503" with CHAP password rlm_chap: Using clear text password test for user 25002503 authentication. rlm_chap: chap user 25002503 authenticated succesfully modcall[authenticate]: module "chap" returns ok for request 1 modcall: group Auth-Type returns ok for request 1 Sending Access-Accept of id 223 to 200.40.XXX.XXX:10123 Service-Type = Login-User Cisco-AVPair = "h323-ivr-out=terminal-alias:25002506;" Finished request 1 Going to the next request Gatekeeper log : #################################################################################################################### 2004/02/17 15:58:29.032 2 RasSrv.cxx(2289) GK Read from 200.40.XXX.XXX:2726 2004/02/17 15:58:29.038 3 RasSrv.cxx(2302) GK gatekeeperRequest { requestSeqNum = 58725 protocolIdentifier = 0.0.8.2250.0.4 rasAddress = ipAddress { ip = 4 octets { c8 28 c5 22 .(." } port = 2726 } endpointType = { vendor = { vendor = { t35CountryCode = 9 t35Extension = 0 manufacturerCode = 61 } productId = 23 octets { 45 71 75 69 76 61 6c 65 6e 63 65 20 4f 70 65 6e Equivalence Open 50 68 6f 6e 65 00 00 Phone.. } versionId = 26 octets { 31 2e 38 2e 31 20 28 4f 70 65 6e 48 33 32 33 20 1.8.1 (OpenH323 76 31 2e 31 31 2e 37 29 00 00 v1.11.7).. } } terminal = { } mc = FALSE undefinedNode = FALSE } endpointAlias = 1 entries { [0]=dialedDigits "25002503" } authenticationCapability = 2 entries { [0]=pwdHash <<null>> [1]=authenticationBES radius <<null>> } algorithmOIDs = 3 entries { [0]=0.0.8.235.0.2.6 [1]=1.2.840.113549.2.5 [2]=1.2.840.113548.10.1.2.1 } supportsAltGK = <<null>> } 2004/02/17 15:58:29.081 1 RasSrv.cxx(868) GK GRQ Received 2004/02/17 15:58:29.082 4 gkauth.h(85) GkAuth default check ok 2004/02/17 15:58:29.085 4 RasSrv.cxx(2367) GK GCF will select authentication mechanism: authenticationBES radius <<null>> and algorithm OID: 1.2.840.113548.10.1.2.1 2004/02/17 15:58:29.089 2 RasSrv.cxx(943) GCF|200.40.XXX.XXX|25002503:dialedDigits|terminal; 2004/02/17 15:58:29.092 3 RasSrv.cxx(2229) GK Send to 200.40.XXX.XXX:2726 gatekeeperConfirm { requestSeqNum = 58725 protocolIdentifier = 0.0.8.2250.0.4 gatekeeperIdentifier = 8 characters { 0052 0061 0064 0069 0075 0073 0047 004b RadiusGK } rasAddress = ipAddress { ip = 4 octets { c8 28 e4 b7 .(.. } port = 1719 } authenticationMode = authenticationBES radius <<null>> algorithmOID = 1.2.840.113548.10.1.2.1 } 2004/02/17 15:58:29.104 5 RasSrv.cxx(2243) GK Sent Successful 2004/02/17 15:58:29.313 2 RasSrv.cxx(2289) GK Read from 200.40.XXX.XXX:2726 2004/02/17 15:58:29.315 3 RasSrv.cxx(2302) GK registrationRequest { requestSeqNum = 58726 protocolIdentifier = 0.0.8.2250.0.4 discoveryComplete = TRUE callSignalAddress = 1 entries { [0]=ipAddress { ip = 4 octets { c8 28 c5 22 .(." } port = 1720 } } rasAddress = 1 entries { [0]=ipAddress { ip = 4 octets { c8 28 c5 22 .(." } port = 2726 } } terminalType = { vendor = { vendor = { t35CountryCode = 9 t35Extension = 0 manufacturerCode = 61 } productId = 23 octets { 45 71 75 69 76 61 6c 65 6e 63 65 20 4f 70 65 6e Equivalence Open 50 68 6f 6e 65 00 00 Phone.. } versionId = 26 octets { 31 2e 38 2e 31 20 28 4f 70 65 6e 48 33 32 33 20 1.8.1 (OpenH323 76 31 2e 31 31 2e 37 29 00 00 v1.11.7).. } } terminal = { } mc = FALSE undefinedNode = FALSE } terminalAlias = 1 entries { [0]=dialedDigits "25002503" } gatekeeperIdentifier = 8 characters { 0052 0061 0064 0069 0075 0073 0047 004b RadiusGK } endpointVendor = { vendor = { t35CountryCode = 9 t35Extension = 0 manufacturerCode = 61 } productId = 23 octets { 45 71 75 69 76 61 6c 65 6e 63 65 20 4f 70 65 6e Equivalence Open 50 68 6f 6e 65 00 00 Phone.. } versionId = 26 octets { 31 2e 38 2e 31 20 28 4f 70 65 6e 48 33 32 33 20 1.8.1 (OpenH323 76 31 2e 31 31 2e 37 29 00 00 v1.11.7).. } } tokens = 1 entries { [0]={ tokenOID = 1.2.840.113548.10.1.2.1 timeStamp = 1077054109 challenge = 16 octets { 1a 96 36 36 60 b2 cb f6 05 40 cb 28 4f ac 25 4b ..66`....@.(O.%K } random = 67 generalID = 9 characters { 0032 0035 0030 0030 0032 0035 0030 0033 25002503 0000 } } } keepAlive = FALSE willSupplyUUIEs = TRUE maintainConnection = FALSE supportsAltGK = <<null>> usageReportingCapability = { nonStandardUsageTypes = 0 entries { } startTime = <<null>> endTime = <<null>> terminationCause = <<null>> } callCreditCapability = { canDisplayAmountString = TRUE canEnforceDurationLimit = TRUE } } 2004/02/17 15:58:29.328 1 RasSrv.cxx(970) GK RRQ Received 2004/02/17 15:58:29.329 5 radproto.cxx(2330) RADIUS Created new RADIUS client socket: port:10123[0,223-223] 2004/02/17 15:58:29.330 3 radproto.cxx(1799) RADIUS Sending PDU to RADIUS server 200.40.XXX.XXX (200.40.XXX.XXX:1812) from port:10123[0,223-224], PDU: { code = 1 (Access-Request) id = 223 length = 134 octets authenticator = 16 octets { 23 86 84 fe 7d b5 1a 1f 99 ff e2 52 46 6e 59 da #...}......RFnY. } attributes = 9 elements { [0]= { type = 1 (User-Name) length = 10 octets value = 8 octets { 32 35 30 30 32 35 30 33 25002503 } } [1]= { type = 3 (CHAP-Password) length = 19 octets value = 17 octets { 43 1a 96 36 36 60 b2 cb f6 05 40 cb 28 4f ac 25 C..66`....@.(O.% 4b K } } [2]= { type = 4 (NAS-IP-Address) length = 6 octets value = 4 octets { c8 28 e4 b7 .(.. } } [3]= { type = 32 (NAS-Identifier) length = 10 octets value = 8 octets { 52 61 64 69 75 73 47 4b RadiusGK } } [4]= { type = 61 (NAS-Port-Type) length = 6 octets value = 4 octets { 00 00 00 05 .... } } [5]= { type = 6 (Service-Type) length = 6 octets value = 4 octets { 00 00 00 01 .... } } [6]= { type = 60 (CHAP-Challenge) length = 6 octets value = 4 octets { 40 32 8a 9d @2.. } } [7]= { type = 8 (Framed-IP-Address) length = 6 octets value = 4 octets { c8 28 c5 22 .(." } } [8]= { type = 26 (Vendor-Specific) length = 45 octets vendorId = 9 vendorValue = 39 octets { 01 27 68 33 32 33 2d 69 76 72 2d 6f 75 74 3d 74 .'h323-ivr-out=t 65 72 6d 69 6e 61 6c 2d 61 6c 69 61 73 3a 32 35 erminal-alias:25 30 30 32 35 30 33 3b 002503; } } } } 2004/02/17 15:58:29.433 3 radproto.cxx(1825) RADIUS Received PDU from RADIUS server 200.40.XXX.XXX (200.40.XXX.XXX:1812) by socket port:10123[0,223-224], PDU: { code = 2 (Access-Accept) id = 223 length = 71 octets authenticator = 16 octets { 65 37 ae c7 fe 40 33 71 89 72 ab 3b d1 fa c4 eb e7...@3q.r.;.... } attributes = 2 elements { [0]= { type = 6 (Service-Type) length = 6 octets value = 4 octets { 00 00 00 01 .... } } [1]= { type = 26 (Vendor-Specific) length = 45 octets vendorId = 9 vendorValue = 39 octets { 01 27 68 33 32 33 2d 69 76 72 2d 6f 75 74 3d 74 .'h323-ivr-out=t 65 72 6d 69 6e 61 6c 2d 61 6c 69 61 73 3a 32 35 erminal-alias:25 30 30 32 35 30 36 3b 002506; } } } } 2004/02/17 15:58:29.438 4 gkauth.cxx(364) GkAuth RadAuth check ok 2004/02/17 15:58:29.440 1 RasTbl.cxx(53) New EP|200.40.XXX.XXX:1720|25002503:dialedDigits|terminal|8783_endp 2004/02/17 15:58:29.442 2 RasSrv.cxx(1225) RCF|200.40.XXX.XXX:1720|25002503:dialedDigits|terminal|8783_endp; 2004/02/17 15:58:29.443 3 RasSrv.cxx(2229) GK Send to 200.40.XXX.XXX:2726 registrationConfirm { requestSeqNum = 58726 protocolIdentifier = 0.0.8.2250.0.4 callSignalAddress = 1 entries { [0]=ipAddress { ip = 4 octets { c8 28 e4 b7 .(.. } port = 1721 } } terminalAlias = 1 entries { [0]=dialedDigits "25002503" } gatekeeperIdentifier = 8 characters { 0052 0061 0064 0069 0075 0073 0047 004b RadiusGK } endpointIdentifier = 9 characters { 0038 0037 0038 0033 005f 0065 006e 0064 8783_end 0070 p } willRespondToIRR = FALSE maintainConnection = FALSE } 2004/02/17 15:58:29.446 5 RasSrv.cxx(2243) GK Sent Successful #################################################################################################################### -- Cesar Bermudez. ------------------------------------------------------- SF.Net is sponsored by: Speed Start Your Linux Apps Now. Build and deploy apps & Web services for Linux with a free DVD software kit from IBM. Click Now! http://ads.osdn.com/?ad_id56&alloc_id438&opÌk _______________________________________________ List: Openh323gk-users@lists.sourceforge.net Archive: http://sourceforge.net/mailarchive/forum.php?forum_id?49 Homepage: http://www.gnugk.org/