Hi William, even so you have a public IP for your GnuGk, you can't block it off by a firewall completely. There are basically 2 common ways to deal with this: a.) one gatekeeper outside the firewall and one gatekeeper inside, using a traversal protocol like H.460.18/.19 to tunnel calls between the two to get past the firewall b.) unblock your gatekeeper IP in the firewall (or just a Q931, H245 and RTP port range on it) and GnuGk will proxy all external calls over this one IP Regards, Jan -- Jan Willamowius, Founder of the GNU Gatekeeper Project EMail : jan@xxxxxxxxxxxxxx Website: http://www.gnugk.org Support: http://www.willamowius.com/gnugk-support.html William Otstot wrote: > We have one interface setup on the gatekeeper with an external IP address > that goes through our firewall. > > > Bill Otstot, Sr. Admin, Networking > Technology Services Division > Wake County Public Schools > 919-431-7074 > Email: botstot@xxxxxxxxx > > > > From: Jan Willamowius <jan@xxxxxxxxxxxxxx> > To: openh323gk-users@xxxxxxxxxxxxxxxxxxxxx, > Date: 02/22/2012 03:32 PM > Subject: Re: Inbound calls and secondary content > > > > Hi William, > > you need to provide details about your network configuration. > Otherwise nobody will be able to help you. > > Regards, > Jan > > William Otstot wrote: > > We have setup GNUGK for our school system and currently have it working > > for outbound calls. I have been unsuccessful with inbound calls and > with > > getting secondary content (a second video stream). Here is our config > > file. Any help would be greatly appreciated. > > > > [Gatekeeper::Main] > > FortyTwo=42 > > Name=BC2 > > TimeToLive=600 > > StatusTraceLevel=2 > > > > ; change this to 1 or 2, if you want CDRs and RAS messages to be printed > > > on the status port > > ; restrict access to the status port by an IP address > > [GkStatus::Auth] > > rule=password > > gkadmin=br3/tRkl2QM= > > > > [RoutedMode] > > EnableH46017=1 > > Enable46018=1 > > EnableH46018=1 > > GKRouted=1 > > CallSignalPort=1720 > > H245Routed=1 > > AcceptUnregisteredCalls=1 > > > > ; enable gatekeeper signaling routed mode, route H.245 channel only if > > neccessary (for NATed endpoints) > > ; proxy calls only for NATed endpoints > > [Proxy] > > Enable=1 > > ProxyForNAT=1 > > ProxyForSameNAT=0 > > InternalNetwork=10.0.0.0/255.0.0.0 > > > > ; if port forwarding is correctly configured for each endpoint, you can > > disable ProxyForNAT > > [RoutingPolicy] > > default=explicit,internal,srv,dns > > > > [Routing::CatchAll] > > CatchAllAlias=inbound ------------------------------------------------------------------------------ Try before you buy = See our experts in action! The most comprehensive online learning library for Microsoft developers is just $99.99! Visual Studio, SharePoint, SQL - plus HTML5, CSS3, MVC3, Metro Style Apps, more. Free future releases when you subscribe now! http://p.sf.net/sfu/learndevnow-dev2 _______________________________________________________ Posting: mailto:Openh323gk-users@xxxxxxxxxxxxxxxxxxxxx Archive: http://sourceforge.net/mailarchive/forum.php?forum_name=openh323gk-users Unsubscribe: http://lists.sourceforge.net/lists/listinfo/openh323gk-users Homepage: http://www.gnugk.org/