Re: Cisco ATA 186 Problem

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



you might want to turn the logging on gnugk up to 5 or 6 to see, in the gnugk logs, why it's (gnugk) denying access.

the way to do that is to telnet to port 7000 and issue debug trc 5



Nyamul Hassaan wrote:
Hi
Thank you guys for your ideas.  However, I'm still faced with registration
problems.  I see 2 GCF messages first, then I see RRJ again.  I've pasted
the debug output (-ttttt 5 levels) below.

I'm using the following Cisco ATA Settings:

UseLoginID => 1
LoginID0 => abcduser
PWD0 => abcdpass
GKID => *
GkOrProxy => 11.22.33.44
ConnectMode => 0x00060402

GnuGK is configured for SimplePasswordAuth and this login works from my
softphone.

What else could I be doing wrong?

Regards
HASSAAN

=================== Status Window ====================
GCF|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|unknown;
GCF|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|unknown;
RRJ|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|terminal|securityDenial;
RRJ|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|terminal|securityDenial;
RRJ|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|terminal|securityDenial;
RRJ|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|terminal|securityDenial;
RRJ|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|terminal|securityDenial;
RRJ|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|terminal|securityDenial;
RRJ|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|terminal|securityDenial;




=================== Debug Info ====================
2005/10/02 04:30:15.204 2       RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30315
2005/10/02 04:30:15.204 3       RasSrv.cxx(219) RAS
gatekeeperRequest {
    requestSeqNum = 1816
    protocolIdentifier = 0.0.8.2250.0.2
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 02                                        ....
      }
      port = 1719
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 181
          t35Extension = 0
          manufacturerCode = 18
        }
        productId =  13 octets {
          43 69 73 63 6f 20 41 54  41 20 31 38 36            Cisco ATA 186
        }
        versionId =  25 octets {
          76 3a 30 78 30 34 30 30  30 33 30 31 20 66 3a 20   v:0x04000301 f:
          62 3a 30 34 30 32 31 39  41                        b:040219A
        }
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    gatekeeperIdentifier =  10 characters {
      0067 0061 0074 0065 006b 0065 0065 0070   gatekeep
      0065 0072                                 er
    }
    endpointAlias = 2 entries {
      [0]=h323_ID  6 characters {
        006d 006d 006b 0074 0030 0032             abcduser
      }
      [1]=h323_ID  6 characters {
        006d 006d 006b 0074 0030 0032             abcduser
      }
    }
  }
2005/10/02 04:30:15.204 1       RasSrv.cxx(343) RAS GRQ Received
2005/10/02 04:30:15.204 2       RasSrv.cxx(1303) RAS GRQ is not meant for
this gatekeeper
2005/10/02 04:30:15.735 2       RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30317
2005/10/02 04:30:15.735 3       RasSrv.cxx(219) RAS
gatekeeperRequest {
    requestSeqNum = 840
    protocolIdentifier = 0.0.8.2250.0.2
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 02                                        ....
      }
      port = 1739
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 181
          t35Extension = 0
          manufacturerCode = 18
        }
        productId =  13 octets {
          43 69 73 63 6f 20 41 54  41 20 31 38 36            Cisco ATA 186
        }
        versionId =  25 octets {
          76 3a 30 78 30 34 30 30  30 33 30 31 20 66 3a 20   v:0x04000301 f:
          62 3a 30 34 30 32 31 39  41                        b:040219A
        }
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    gatekeeperIdentifier =  10 characters {
      0067 0061 0074 0065 006b 0065 0065 0070   gatekeep
      0065 0072                                 er
    }
    endpointAlias = 2 entries {
      [0]=h323_ID  1 characters {
        0030                                      0
      }
      [1]=dialedDigits "1231"
    }
  }
2005/10/02 04:30:15.745 1       RasSrv.cxx(343) RAS GRQ Received
2005/10/02 04:30:15.745 2       RasSrv.cxx(1303) RAS GRQ is not meant for
this gatekeeper
2005/10/02 04:30:20.211 2       RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30315
2005/10/02 04:30:20.211 3       RasSrv.cxx(219) RAS
gatekeeperRequest {
    requestSeqNum = 1816
    protocolIdentifier = 0.0.8.2250.0.2
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 02                                        ....
      }
      port = 1719
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 181
          t35Extension = 0
          manufacturerCode = 18
        }
        productId =  13 octets {
          43 69 73 63 6f 20 41 54  41 20 31 38 36            Cisco ATA 186
        }
        versionId =  25 octets {
          76 3a 30 78 30 34 30 30  30 33 30 31 20 66 3a 20   v:0x04000301 f:
          62 3a 30 34 30 32 31 39  41                        b:040219A
        }
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    gatekeeperIdentifier =  10 characters {
      0067 0061 0074 0065 006b 0065 0065 0070   gatekeep
      0065 0072                                 er
    }
    endpointAlias = 2 entries {
      [0]=h323_ID  6 characters {
        006d 006d 006b 0074 0030 0032             abcduser
      }
      [1]=h323_ID  6 characters {
        006d 006d 006b 0074 0030 0032             abcduser
      }
    }
  }
2005/10/02 04:30:20.211 1       RasSrv.cxx(343) RAS GRQ Received
2005/10/02 04:30:20.211 2       RasSrv.cxx(1303) RAS GRQ is not meant for
this gatekeeper
2005/10/02 04:30:20.732 2       RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30317
2005/10/02 04:30:20.732 3       RasSrv.cxx(219) RAS
gatekeeperRequest {
    requestSeqNum = 840
    protocolIdentifier = 0.0.8.2250.0.2
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 02                                        ....
      }
      port = 1739
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 181
          t35Extension = 0
          manufacturerCode = 18
        }
        productId =  13 octets {
          43 69 73 63 6f 20 41 54  41 20 31 38 36            Cisco ATA 186
        }
        versionId =  25 octets {
          76 3a 30 78 30 34 30 30  30 33 30 31 20 66 3a 20   v:0x04000301 f:
          62 3a 30 34 30 32 31 39  41                        b:040219A
        }
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    gatekeeperIdentifier =  10 characters {
      0067 0061 0074 0065 006b 0065 0065 0070   gatekeep
      0065 0072                                 er
    }
    endpointAlias = 2 entries {
      [0]=h323_ID  1 characters {
        0030                                      0
      }
      [1]=dialedDigits "1231"
    }
  }
2005/10/02 04:30:20.732 1       RasSrv.cxx(343) RAS GRQ Received
2005/10/02 04:30:20.732 2       RasSrv.cxx(1303) RAS GRQ is not meant for
this gatekeeper
2005/10/02 04:30:25.198 2       RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30315
2005/10/02 04:30:25.198 3       RasSrv.cxx(219) RAS
gatekeeperRequest {
    requestSeqNum = 1817
    protocolIdentifier = 0.0.8.2250.0.2
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 02                                        ....
      }
      port = 1719
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 181
          t35Extension = 0
          manufacturerCode = 18
        }
        productId =  13 octets {
          43 69 73 63 6f 20 41 54  41 20 31 38 36            Cisco ATA 186
        }
        versionId =  25 octets {
          76 3a 30 78 30 34 30 30  30 33 30 31 20 66 3a 20   v:0x04000301 f:
          62 3a 30 34 30 32 31 39  41                        b:040219A
        }
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 2 entries {
      [0]=h323_ID  6 characters {
        006d 006d 006b 0074 0030 0032             abcduser
      }
      [1]=h323_ID  6 characters {
        006d 006d 006b 0074 0030 0032             abcduser
      }
    }
  }
2005/10/02 04:30:25.198 1       RasSrv.cxx(343) RAS GRQ Received
2005/10/02 04:30:25.198 3         gkauth.h(830) GKAUTH default GRQ check ok
2005/10/02 04:30:25.198 2       RasSrv.cxx(388)
GCF|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|unknown;
2005/10/02 04:30:25.198 3       RasSrv.cxx(231) RAS Send to
aa.bb.cc.dd:30315
gatekeeperConfirm {
    requestSeqNum = 1817
    protocolIdentifier = 0.0.8.2250.0.2
    gatekeeperIdentifier =  12 characters {
      0067 006b 0073 006b 0079 0068 0069 0067   gkskyhig
      0068 005f 0030 0031                       h_01
    }
    rasAddress = ipAddress {
      ip =  4 octets {
        cb 4c 72 3a                                        .Lr:
      }
      port = 1719
    }
  }
2005/10/02 04:30:25.749 2       RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30317
2005/10/02 04:30:25.749 3       RasSrv.cxx(219) RAS
gatekeeperRequest {
    requestSeqNum = 841
    protocolIdentifier = 0.0.8.2250.0.2
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 02                                        ....
      }
      port = 1739
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 181
          t35Extension = 0
          manufacturerCode = 18
        }
        productId =  13 octets {
          43 69 73 63 6f 20 41 54  41 20 31 38 36            Cisco ATA 186
        }
        versionId =  25 octets {
          76 3a 30 78 30 34 30 30  30 33 30 31 20 66 3a 20   v:0x04000301 f:
          62 3a 30 34 30 32 31 39  41                        b:040219A
        }
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 2 entries {
      [0]=h323_ID  1 characters {
        0030                                      0
      }
      [1]=dialedDigits "1231"
    }
  }
2005/10/02 04:30:25.759 1       RasSrv.cxx(343) RAS GRQ Received
2005/10/02 04:30:25.759 3         gkauth.h(830) GKAUTH default GRQ check ok
2005/10/02 04:30:25.759 2       RasSrv.cxx(388)
GCF|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|unknown;
2005/10/02 04:30:25.759 3       RasSrv.cxx(231) RAS Send to
aa.bb.cc.dd:30317
gatekeeperConfirm {
    requestSeqNum = 841
    protocolIdentifier = 0.0.8.2250.0.2
    gatekeeperIdentifier =  12 characters {
      0067 006b 0073 006b 0079 0068 0069 0067   gkskyhig
      0068 005f 0030 0031                       h_01
    }
    rasAddress = ipAddress {
      ip =  4 octets {
        cb 4c 72 3a                                        .Lr:
      }
      port = 1719
    }
  }
2005/10/02 04:30:26.160 2       RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30315
2005/10/02 04:30:26.160 3       RasSrv.cxx(219) RAS
registrationRequest {
    requestSeqNum = 1818
    protocolIdentifier = 0.0.8.2250.0.2
    discoveryComplete = TRUE
    callSignalAddress = 1 entries {
      [0]=ipAddress {
        ip =  4 octets {
          c0 a8 00 02                                        ....
        }
        port = 1720
      }
    }
    rasAddress = 1 entries {
      [0]=ipAddress {
        ip =  4 octets {
          c0 a8 00 02                                        ....
        }
        port = 1719
      }
    }
    terminalType = {
      vendor = {
        vendor = {
          t35CountryCode = 0
          t35Extension = 0
          manufacturerCode = 0
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    terminalAlias = 2 entries {
      [0]=h323_ID  6 characters {
        006d 006d 006b 0074 0030 0032             abcduser
      }
      [1]=h323_ID  6 characters {
        006d 006d 006b 0074 0030 0032             abcduser
      }
    }
    gatekeeperIdentifier =  12 characters {
      0067 006b 0073 006b 0079 0068 0069 0067   gkskyhig
      0068 005f 0030 0031                       h_01
    }
    endpointVendor = {
      vendor = {
        t35CountryCode = 181
        t35Extension = 0
        manufacturerCode = 18
      }
      productId =  13 octets {
        43 69 73 63 6f 20 41 54  41 20 31 38 36            Cisco ATA 186
      }
      versionId =  25 octets {
        76 3a 30 78 30 34 30 30  30 33 30 31 20 66 3a 20   v:0x04000301 f:
        62 3a 30 34 30 32 31 39  41                        b:040219A
      }
    }
    timeToLive = 300
    keepAlive = FALSE
    willSupplyUUIEs = FALSE
    maintainConnection = FALSE
  }
2005/10/02 04:30:26.160 1       RasSrv.cxx(343) RAS RRQ Received
2005/10/02 04:30:26.160 3       gkauth.cxx(968) GKAUTH SimplePasswordAuth
RRQ check failed
2005/10/02 04:30:26.160 2       RasSrv.cxx(388)
RRJ|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|terminal|securityDenial;
2005/10/02 04:30:26.160 3       RasSrv.cxx(231) RAS Send to
aa.bb.cc.dd:30315
registrationReject {
    requestSeqNum = 1818
    protocolIdentifier = 0.0.8.2250.0.2
    rejectReason = securityDenial <<null>>
    gatekeeperIdentifier =  12 characters {
      0067 006b 0073 006b 0079 0068 0069 0067   gkskyhig
      0068 005f 0030 0031                       h_01
    }
  }
2005/10/02 04:30:26.761 2       RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30317
2005/10/02 04:30:26.761 3       RasSrv.cxx(219) RAS
registrationRequest {
    requestSeqNum = 842
    protocolIdentifier = 0.0.8.2250.0.2
    discoveryComplete = TRUE
    callSignalAddress = 1 entries {
      [0]=ipAddress {
        ip =  4 octets {
          c0 a8 00 02                                        ....
        }
        port = 1721
      }
    }
    rasAddress = 1 entries {
      [0]=ipAddress {
        ip =  4 octets {
          c0 a8 00 02                                        ....
        }
        port = 1739
      }
    }
    terminalType = {
      vendor = {
        vendor = {
          t35CountryCode = 0
          t35Extension = 0
          manufacturerCode = 0
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    terminalAlias = 2 entries {
      [0]=h323_ID  1 characters {
        0030                                      0
      }
      [1]=dialedDigits "1231"
    }
    gatekeeperIdentifier =  12 characters {
      0067 006b 0073 006b 0079 0068 0069 0067   gkskyhig
      0068 005f 0030 0031                       h_01
    }
    endpointVendor = {
      vendor = {
        t35CountryCode = 181
        t35Extension = 0
        manufacturerCode = 18
      }
      productId =  13 octets {
        43 69 73 63 6f 20 41 54  41 20 31 38 36            Cisco ATA 186
      }
      versionId =  25 octets {
        76 3a 30 78 30 34 30 30  30 33 30 31 20 66 3a 20   v:0x04000301 f:
        62 3a 30 34 30 32 31 39  41                        b:040219A
      }
    }
    timeToLive = 300
    keepAlive = FALSE
    willSupplyUUIEs = FALSE
    maintainConnection = FALSE
  }
2005/10/02 04:30:26.761 1       RasSrv.cxx(343) RAS RRQ Received
2005/10/02 04:30:26.771 3       gkauth.cxx(968) GKAUTH SimplePasswordAuth
RRQ check failed
2005/10/02 04:30:26.771 2       RasSrv.cxx(388)
RRJ|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|terminal|securityDenial;
2005/10/02 04:30:26.771 3       RasSrv.cxx(231) RAS Send to
aa.bb.cc.dd:30317
registrationReject {
    requestSeqNum = 842
    protocolIdentifier = 0.0.8.2250.0.2
    rejectReason = securityDenial <<null>>
    gatekeeperIdentifier =  12 characters {
      0067 006b 0073 006b 0079 0068 0069 0067   gkskyhig
      0068 005f 0030 0031                       h_01
    }
  }
2005/10/02 04:30:40.240 2       RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30315
2005/10/02 04:30:40.240 3       RasSrv.cxx(219) RAS
registrationRequest {
    requestSeqNum = 1819
    protocolIdentifier = 0.0.8.2250.0.2
    discoveryComplete = TRUE
    callSignalAddress = 1 entries {
      [0]=ipAddress {
        ip =  4 octets {
          c0 a8 00 02                                        ....
        }
        port = 1720
      }
    }
    rasAddress = 1 entries {
      [0]=ipAddress {
        ip =  4 octets {
          c0 a8 00 02                                        ....
        }
        port = 1719
      }
    }
    terminalType = {
      vendor = {
        vendor = {
          t35CountryCode = 0
          t35Extension = 0
          manufacturerCode = 0
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    terminalAlias = 2 entries {
      [0]=h323_ID  6 characters {
        006d 006d 006b 0074 0030 0032             abcduser
      }
      [1]=h323_ID  6 characters {
        006d 006d 006b 0074 0030 0032             abcduser
      }
    }
    gatekeeperIdentifier =  12 characters {
      0067 006b 0073 006b 0079 0068 0069 0067   gkskyhig
      0068 005f 0030 0031                       h_01
    }
    endpointVendor = {
      vendor = {
        t35CountryCode = 181
        t35Extension = 0
        manufacturerCode = 18
      }
      productId =  13 octets {
        43 69 73 63 6f 20 41 54  41 20 31 38 36            Cisco ATA 186
      }
      versionId =  25 octets {
        76 3a 30 78 30 34 30 30  30 33 30 31 20 66 3a 20   v:0x04000301 f:
        62 3a 30 34 30 32 31 39  41                        b:040219A
      }
    }
    timeToLive = 300
    keepAlive = FALSE
    willSupplyUUIEs = FALSE
    maintainConnection = FALSE
  }
2005/10/02 04:30:40.240 1       RasSrv.cxx(343) RAS RRQ Received
2005/10/02 04:30:40.240 3       gkauth.cxx(968) GKAUTH SimplePasswordAuth
RRQ check failed
2005/10/02 04:30:40.240 2       RasSrv.cxx(388)
RRJ|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|terminal|securityDenial;
2005/10/02 04:30:40.240 3       RasSrv.cxx(231) RAS Send to
aa.bb.cc.dd:30315
registrationReject {
    requestSeqNum = 1819
    protocolIdentifier = 0.0.8.2250.0.2
    rejectReason = securityDenial <<null>>
    gatekeeperIdentifier =  12 characters {
      0067 006b 0073 006b 0079 0068 0069 0067   gkskyhig
      0068 005f 0030 0031                       h_01
    }
  }
2005/10/02 04:30:40.761 2       RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30317
2005/10/02 04:30:40.761 3       RasSrv.cxx(219) RAS
registrationRequest {
    requestSeqNum = 843
    protocolIdentifier = 0.0.8.2250.0.2
    discoveryComplete = TRUE
    callSignalAddress = 1 entries {
      [0]=ipAddress {
        ip =  4 octets {
          c0 a8 00 02                                        ....
        }
        port = 1721
      }
    }
    rasAddress = 1 entries {
      [0]=ipAddress {
        ip =  4 octets {
          c0 a8 00 02                                        ....
        }
        port = 1739
      }
    }
    terminalType = {
      vendor = {
        vendor = {
          t35CountryCode = 0
          t35Extension = 0
          manufacturerCode = 0
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    terminalAlias = 2 entries {
      [0]=h323_ID  1 characters {
        0030                                      0
      }
      [1]=dialedDigits "1231"
    }
    gatekeeperIdentifier =  12 characters {
      0067 006b 0073 006b 0079 0068 0069 0067   gkskyhig
      0068 005f 0030 0031                       h_01
    }
    endpointVendor = {
      vendor = {
        t35CountryCode = 181
        t35Extension = 0
        manufacturerCode = 18
      }
      productId =  13 octets {
        43 69 73 63 6f 20 41 54  41 20 31 38 36            Cisco ATA 186
      }
      versionId =  25 octets {
        76 3a 30 78 30 34 30 30  30 33 30 31 20 66 3a 20   v:0x04000301 f:
        62 3a 30 34 30 32 31 39  41                        b:040219A
      }
    }
    timeToLive = 300
    keepAlive = FALSE
    willSupplyUUIEs = FALSE
    maintainConnection = FALSE
  }
2005/10/02 04:30:40.771 1       RasSrv.cxx(343) RAS RRQ Received
2005/10/02 04:30:40.771 3       gkauth.cxx(968) GKAUTH SimplePasswordAuth
RRQ check failed
2005/10/02 04:30:40.771 2       RasSrv.cxx(388)
RRJ|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|terminal|securityDenial;
2005/10/02 04:30:40.771 3       RasSrv.cxx(231) RAS Send to
aa.bb.cc.dd:30317
registrationReject {
    requestSeqNum = 843
    protocolIdentifier = 0.0.8.2250.0.2
    rejectReason = securityDenial <<null>>
    gatekeeperIdentifier =  12 characters {
      0067 006b 0073 006b 0079 0068 0069 0067   gkskyhig
      0068 005f 0030 0031                       h_01
    }
  }



-------------------------------------------------------
This SF.Net email is sponsored by:
Power Architecture Resource Center: Free content, downloads, discussions,
and more. http://solutions.newsforge.com/ibmarch.tmpl
_______________________________________________________

Posting: mailto:Openh323gk-users@xxxxxxxxxxxxxxxxxxxxx
Archive: http://sourceforge.net/mailarchive/forum.php?forum_id=8549
Unsubscribe: http://lists.sourceforge.net/lists/listinfo/openh323gk-users
Homepage: http://www.gnugk.org/



-------------------------------------------------------
This SF.Net email is sponsored by:
Power Architecture Resource Center: Free content, downloads, discussions,
and more. http://solutions.newsforge.com/ibmarch.tmpl
_______________________________________________________

Posting: mailto:Openh323gk-users@xxxxxxxxxxxxxxxxxxxxx
Archive: http://sourceforge.net/mailarchive/forum.php?forum_id=8549
Unsubscribe: http://lists.sourceforge.net/lists/listinfo/openh323gk-users
Homepage: http://www.gnugk.org/

[Index of Archives]     [SIP]     [Open H.323]     [Gnu Gatekeeper]     [Asterisk PBX]     [ISDN Cause Codes]     [Yosemite News]

  Powered by Linux