Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 144105 Details for
Bug 220333
Opal does not send proper duration for RFC2833 DTMF
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Asterisk working RTP debug output
ekiga-dtmf-works-debug.txt (text/plain), 48.93 KB, created by
Andrew Rechenberg
on 2006-12-20 14:43:26 UTC
(
hide
)
Description:
Asterisk working RTP debug output
Filename:
MIME Type:
Creator:
Andrew Rechenberg
Created:
2006-12-20 14:43:26 UTC
Size:
48.93 KB
patch
obsolete
>[root@cinshrfc6vm01 ~]# asterisk -rvvvv >Asterisk 1.4.0-beta4, Copyright (C) 1999 - 2006 Digium, Inc. and others. >Created by Mark Spencer <markster@digium.com> >Asterisk comes with ABSOLUTELY NO WARRANTY; type 'core show warranty' for details. >This is free software, with components licensed under the GNU General Public >License version 2 and other licenses; you are welcome to redistribute it under >certain conditions. Type 'core show license' for details. >========================================================================= > == Parsing '/etc/asterisk/asterisk.conf': Found > == Parsing '/etc/asterisk/extconfig.conf': Found >Connected to Asterisk 1.4.0-beta4 currently running on cinshrfc6vm01 (pid = 2400) >Verbosity is at least 4 >cinshrfc6vm01*CLI> sip debug >SIP Debugging re-enabled >cinshrfc6vm01*CLI> rtp debug >RTP Debugging Enabled >cinshrfc6vm01*CLI> ><--- SIP read from 192.168.20.1:5061 ---> >REGISTER sip:192.168.20.128 SIP/2.0 >CSeq: 1 REGISTER >Via: SIP/2.0/UDP 192.168.20.1:5061;branch=z9hG4bK6e56dc26-1d8e-db11-8b24-000d56bd887d;rport >User-Agent: Ekiga/2.0.2 >From: <sip:3589@192.168.20.128>;tag=aa4cdc26-1d8e-db11-8b24-000d56bd887d >Call-ID: 60f6db26-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >To: <sip:3589@192.168.20.128> >Contact: <sip:3589@192.168.20.1:5061;transport=udp> >Allow: INVITE,ACK,OPTIONS,BYE,CANCEL,NOTIFY,REFER,MESSAGE >Expires: 3600 >Content-Length: 0 >Max-Forwards: 70 > > ><-------------> >--- (12 headers 0 lines) --- >Using latest REGISTER request as basis request >Sending to 192.168.20.1 : 5061 (NAT) > ><--- Transmitting (no NAT) to 192.168.20.1:5061 ---> >SIP/2.0 100 Trying >Via: SIP/2.0/UDP 192.168.20.1:5061;branch=z9hG4bK6e56dc26-1d8e-db11-8b24-000d56bd887d;received=192.168.20.1;rport=5061 >From: <sip:3589@192.168.20.128>;tag=aa4cdc26-1d8e-db11-8b24-000d56bd887d >To: <sip:3589@192.168.20.128> >Call-ID: 60f6db26-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >CSeq: 1 REGISTER >User-Agent: Asterisk PBX >Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY >Supported: replaces >Contact: <sip:3589@192.168.20.128> >Content-Length: 0 > > ><------------> > ><--- Transmitting (no NAT) to 192.168.20.1:5061 ---> >SIP/2.0 401 Unauthorized >Via: SIP/2.0/UDP 192.168.20.1:5061;branch=z9hG4bK6e56dc26-1d8e-db11-8b24-000d56bd887d;received=192.168.20.1;rport=5061 >From: <sip:3589@192.168.20.128>;tag=aa4cdc26-1d8e-db11-8b24-000d56bd887d >To: <sip:3589@192.168.20.128>;tag=as195ba579 >Call-ID: 60f6db26-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >CSeq: 1 REGISTER >User-Agent: Asterisk PBX >Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY >Supported: replaces >WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="34b4d9f6" >Content-Length: 0 > > ><------------> >Scheduling destruction of SIP dialog '60f6db26-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com' in 32000 ms (Method: REGISTER) >cinshrfc6vm01*CLI> ><--- SIP read from 192.168.20.1:5061 ---> >REGISTER sip:192.168.20.128 SIP/2.0 >CSeq: 2 REGISTER >Via: SIP/2.0/UDP 192.168.20.1:5061;branch=z9hG4bK36cedd26-1d8e-db11-8b24-000d56bd887d;rport >User-Agent: Ekiga/2.0.2 >Authorization: Digest username="3589", realm="asterisk", nonce="34b4d9f6", uri="sip:192.168.20.128", response="a97cbfcca2b75babbf66bd2e32d9780e", algorithm=md5 >From: <sip:3589@192.168.20.128>;tag=aa4cdc26-1d8e-db11-8b24-000d56bd887d >Call-ID: 60f6db26-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >To: <sip:3589@192.168.20.128> >Contact: <sip:3589@192.168.20.1:5061;transport=udp> >Allow: INVITE,ACK,OPTIONS,BYE,CANCEL,NOTIFY,REFER,MESSAGE >Expires: 3600 >Content-Length: 0 >Max-Forwards: 70 > > ><-------------> >--- (13 headers 0 lines) --- >Using latest REGISTER request as basis request >Sending to 192.168.20.1 : 5061 (NAT) > ><--- Transmitting (no NAT) to 192.168.20.1:5061 ---> >SIP/2.0 100 Trying >Via: SIP/2.0/UDP 192.168.20.1:5061;branch=z9hG4bK36cedd26-1d8e-db11-8b24-000d56bd887d;received=192.168.20.1;rport=5061 >From: <sip:3589@192.168.20.128>;tag=aa4cdc26-1d8e-db11-8b24-000d56bd887d >To: <sip:3589@192.168.20.128> >Call-ID: 60f6db26-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >CSeq: 2 REGISTER >User-Agent: Asterisk PBX >Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY >Supported: replaces >Contact: <sip:3589@192.168.20.128> >Content-Length: 0 > > ><------------> > -- Saved useragent "Ekiga/2.0.2" for peer 3589 >cinshrfc6vm01*CLI> ><--- Transmitting (no NAT) to 192.168.20.1:5061 ---> >SIP/2.0 200 OK >Via: SIP/2.0/UDP 192.168.20.1:5061;branch=z9hG4bK36cedd26-1d8e-db11-8b24-000d56bd887d;received=192.168.20.1;rport=5061 >From: <sip:3589@192.168.20.128>;tag=aa4cdc26-1d8e-db11-8b24-000d56bd887d >To: <sip:3589@192.168.20.128>;tag=as195ba579 >Call-ID: 60f6db26-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >CSeq: 2 REGISTER >User-Agent: Asterisk PBX >Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY >Supported: replaces >Expires: 3600 >Contact: <sip:3589@192.168.20.1:5061;transport=udp>;expires=3600 >Date: Sat, 11 Nov 2006 14:06:21 GMT >Content-Length: 0 > > ><------------> >Scheduling destruction of SIP dialog '60f6db26-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com' in 32000 ms (Method: REGISTER) >cinshrfc6vm01*CLI> ><--- SIP read from 192.168.20.1:5062 ---> >INVITE sip:1000@192.168.20.128 SIP/2.0 >Date: Tue, 19 Dec 2006 22:23:03 GMT >CSeq: 1 INVITE >Via: SIP/2.0/UDP 192.168.20.1:5062;branch=z9hG4bK30162b29-1d8e-db11-8b24-000d56bd887d;rport >User-Agent: Ekiga/2.0.2 >From: "Andy Rechenberg" <sip:3589@192.168.20.128>;tag=9a352929-1d8e-db11-8b24-000d56bd887d >Call-ID: fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >To: <sip:1000@192.168.20.128> >Contact: <sip:3589@192.168.20.1:5062;transport=udp> >Allow: INVITE,ACK,OPTIONS,BYE,CANCEL,NOTIFY,REFER,MESSAGE >Content-Type: application/sdp >Content-Length: 417 >Max-Forwards: 70 > >v=0 >o=- 1166566983 1166566983 IN IP4 192.168.20.1 >s=Opal SIP Session >c=IN IP4 192.168.20.1 >t=0 0 >m=audio 5000 RTP/AVP 101 0 114 115 3 107 110 8 >a=rtpmap:101 telephone-event/8000 >a=fmtp:101 0-15 >a=rtpmap:0 PCMU/8000 >a=rtpmap:114 SPEEX/16000 >a=rtpmap:115 iLBC/8000 >a=rtpmap:3 GSM/8000 >a=rtpmap:107 MS-GSM/8000 >a=rtpmap:110 SPEEX/8000 >a=rtpmap:8 PCMA/8000 >m=video 5002 RTP/AVP 31 >a=rtpmap:31 H261/90000 > ><-------------> >--- (13 headers 17 lines) --- >Sending to 192.168.20.1 : 5062 (NAT) >Using INVITE request as basis request - fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com > ><--- Reliably Transmitting (no NAT) to 192.168.20.1:5062 ---> >SIP/2.0 407 Proxy Authentication Required >Via: SIP/2.0/UDP 192.168.20.1:5062;branch=z9hG4bK30162b29-1d8e-db11-8b24-000d56bd887d;received=192.168.20.1;rport=5062 >From: "Andy Rechenberg" <sip:3589@192.168.20.128>;tag=9a352929-1d8e-db11-8b24-000d56bd887d >To: <sip:1000@192.168.20.128>;tag=as7c6a9cfe >Call-ID: fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >CSeq: 1 INVITE >User-Agent: Asterisk PBX >Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY >Supported: replaces >Proxy-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="67fbb3f4" >Content-Length: 0 > > ><------------> >Scheduling destruction of SIP dialog 'fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com' in 32000 ms (Method: INVITE) >Found user '3589' >cinshrfc6vm01*CLI> ><--- SIP read from 192.168.20.1:5062 ---> >ACK sip:1000@192.168.20.128 SIP/2.0 >CSeq: 1 ACK >Via: SIP/2.0/UDP 192.168.20.1:5062;branch=z9hG4bK30162b29-1d8e-db11-8b24-000d56bd887d;rport >From: "Andy Rechenberg" <sip:3589@192.168.20.128>;tag=9a352929-1d8e-db11-8b24-000d56bd887d >Call-ID: fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >To: <sip:1000@192.168.20.128>;tag=as7c6a9cfe >Allow: INVITE,ACK,OPTIONS,BYE,CANCEL,NOTIFY,REFER,MESSAGE >Content-Length: 0 >Max-Forwards: 70 > > ><-------------> >--- (9 headers 0 lines) --- >cinshrfc6vm01*CLI> ><--- SIP read from 192.168.20.1:5062 ---> >INVITE sip:1000@192.168.20.128 SIP/2.0 >Date: Tue, 19 Dec 2006 22:23:03 GMT >CSeq: 2 INVITE >Via: SIP/2.0/UDP 192.168.20.1:5062;branch=z9hG4bK24002f29-1d8e-db11-8b24-000d56bd887d;rport >User-Agent: Ekiga/2.0.2 >From: "Andy Rechenberg" <sip:3589@192.168.20.128>;tag=9a352929-1d8e-db11-8b24-000d56bd887d >Call-ID: fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >To: <sip:1000@192.168.20.128> >Contact: <sip:3589@192.168.20.1:5062;transport=udp> >Proxy-Authorization: Digest username="3589", realm="asterisk", nonce="67fbb3f4", uri="sip:1000@192.168.20.128", response="7beab210ec120ece78c66f226ff192e1", algorithm=md5 >Allow: INVITE,ACK,OPTIONS,BYE,CANCEL,NOTIFY,REFER,MESSAGE >Content-Type: application/sdp >Content-Length: 417 >Max-Forwards: 70 > >v=0 >o=- 1166566983 1166566983 IN IP4 192.168.20.1 >s=Opal SIP Session >c=IN IP4 192.168.20.1 >t=0 0 >m=audio 5004 RTP/AVP 101 0 114 115 3 107 110 8 >a=rtpmap:101 telephone-event/8000 >a=fmtp:101 0-15 >a=rtpmap:0 PCMU/8000 >a=rtpmap:114 SPEEX/16000 >a=rtpmap:115 iLBC/8000 >a=rtpmap:3 GSM/8000 >a=rtpmap:107 MS-GSM/8000 >a=rtpmap:110 SPEEX/8000 >a=rtpmap:8 PCMA/8000 >m=video 5006 RTP/AVP 31 >a=rtpmap:31 H261/90000 > ><-------------> >--- (14 headers 17 lines) --- >Sending to 192.168.20.1 : 5062 (NAT) >Using INVITE request as basis request - fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >Found user '3589' >Found RTP audio format 101 >Found RTP audio format 0 >Found RTP audio format 114 >Found RTP audio format 115 >Found RTP audio format 3 >Found RTP audio format 107 >Found RTP audio format 110 >Found RTP audio format 8 >Found RTP video format 31 >Peer audio RTP is at port 192.168.20.1:5004 >Found description format telephone-event for ID 101 >Found description format PCMU for ID 0 >Found description format SPEEX for ID 114 >Found description format iLBC for ID 115 >Found description format GSM for ID 3 >Found description format MS-GSM for ID 107 >Found description format SPEEX for ID 110 >Found description format PCMA for ID 8 >Found description format H261 for ID 31 >Capabilities: us - 0x4 (ulaw), peer - audio=0x4060e (gsm|ulaw|alaw|speex|ilbc|h261)/video=0x40000 (h261), combined - 0x4 (ulaw) >Non-codec capabilities (dtmf): us - 0x1 (telephone-event), peer - 0x1 (telephone-event), combined - 0x1 (telephone-event) >Peer audio RTP is at port 192.168.20.1:5004 >Looking for 1000 in default (domain 192.168.20.128) >list_route: hop: <sip:3589@192.168.20.1:5062;transport=udp> > ><--- Transmitting (no NAT) to 192.168.20.1:5062 ---> >SIP/2.0 100 Trying >Via: SIP/2.0/UDP 192.168.20.1:5062;branch=z9hG4bK24002f29-1d8e-db11-8b24-000d56bd887d;received=192.168.20.1;rport=5062 >From: "Andy Rechenberg" <sip:3589@192.168.20.128>;tag=9a352929-1d8e-db11-8b24-000d56bd887d >To: <sip:1000@192.168.20.128> >Call-ID: fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >CSeq: 2 INVITE >User-Agent: Asterisk PBX >Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY >Supported: replaces >Contact: <sip:1000@192.168.20.128> >Content-Length: 0 > > ><------------> > -- Executing [1000@default:1] Goto("SIP/3589-0a00cec0", "default|s|1") in new stack > -- Goto (default,s,1) > -- Executing [s@default:1] Wait("SIP/3589-0a00cec0", "1") in new stack > -- Executing [s@default:2] Answer("SIP/3589-0a00cec0", "") in new stack >Audio is at 192.168.20.128 port 13602 >Adding codec 0x4 (ulaw) to SDP >Adding non-codec 0x1 (telephone-event) to SDP > ><--- Reliably Transmitting (no NAT) to 192.168.20.1:5062 ---> >SIP/2.0 200 OK >Via: SIP/2.0/UDP 192.168.20.1:5062;branch=z9hG4bK24002f29-1d8e-db11-8b24-000d56bd887d;received=192.168.20.1;rport=5062 >From: "Andy Rechenberg" <sip:3589@192.168.20.128>;tag=9a352929-1d8e-db11-8b24-000d56bd887d >To: <sip:1000@192.168.20.128>;tag=as64bcf735 >Call-ID: fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >CSeq: 2 INVITE >User-Agent: Asterisk PBX >Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY >Supported: replaces >Contact: <sip:1000@192.168.20.128> >Content-Type: application/sdp >Content-Length: 242 > >v=0 >o=root 2400 2400 IN IP4 192.168.20.128 >s=session >c=IN IP4 192.168.20.128 >t=0 0 >m=audio 13602 RTP/AVP 0 101 >a=rtpmap:0 PCMU/8000 >a=rtpmap:101 telephone-event/8000 >a=fmtp:101 0-16 >a=silenceSupp:off - - - - >a=ptime:20 >a=sendrecv > ><------------> > -- Executing [s@default:3] Set("SIP/3589-0a00cec0", "TIMEOUT(digit)=5") in new stack > -- Digit timeout set to 5 > -- Executing [s@default:4] Set("SIP/3589-0a00cec0", "TIMEOUT(response)=10") in new stack > -- Response timeout set to 10 > -- Executing [s@default:5] BackGround("SIP/3589-0a00cec0", "demo-congrats") in new stack >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043091, ts 000160, len 000160) > -- Playing 'demo-congrats' (language 'en') > ><--- SIP read from 192.168.20.1:5062 ---> >ACK sip:1000@192.168.20.128 SIP/2.0 >CSeq: 2 ACK >Via: SIP/2.0/UDP 192.168.20.1:5062;branch=z9hG4bK70add029-1d8e-db11-8b24-000d56bd887d;rport >From: "Andy Rechenberg" <sip:3589@192.168.20.128>;tag=9a352929-1d8e-db11-8b24-000d56bd887d >Call-ID: fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >To: <sip:1000@192.168.20.128>;tag=as64bcf735 >Contact: <sip:3589@192.168.20.1:5062;transport=udp> >Proxy-Authorization: Digest username="3589", realm="asterisk", nonce="67fbb3f4", uri="sip:1000@192.168.20.128", response="a3821755356bae805818f4825cd5e237", algorithm=md5 >Allow: INVITE,ACK,OPTIONS,BYE,CANCEL,NOTIFY,REFER,MESSAGE >Content-Length: 0 >Max-Forwards: 70 > > ><-------------> >--- (11 headers 0 lines) --- >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043092, ts 000320, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043093, ts 000480, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043094, ts 000640, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043095, ts 000800, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043096, ts 000960, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043097, ts 001120, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043098, ts 001280, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043099, ts 001440, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043100, ts 001600, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043101, ts 001760, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043102, ts 001920, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043103, ts 002080, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043104, ts 002240, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043105, ts 002400, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043106, ts 002560, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043107, ts 002720, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043108, ts 002880, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043109, ts 003040, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043110, ts 003200, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043111, ts 003360, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043112, ts 003520, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043113, ts 003680, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043114, ts 003840, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043115, ts 004000, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043116, ts 004160, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043117, ts 004320, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043118, ts 004480, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043119, ts 004640, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043120, ts 004800, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043121, ts 004960, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043122, ts 005120, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043123, ts 005280, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043124, ts 005440, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043125, ts 005600, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043126, ts 005760, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043127, ts 005920, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043128, ts 006080, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043129, ts 006240, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043130, ts 006400, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043131, ts 006560, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060759, ts 000000, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043132, ts 006720, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043133, ts 006880, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060760, ts 000160, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060761, ts 000320, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043134, ts 007040, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060762, ts 000480, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043135, ts 007200, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060763, ts 000640, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043136, ts 007360, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060764, ts 000800, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060765, ts 000960, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060766, ts 001120, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043137, ts 007520, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043138, ts 007680, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060767, ts 001280, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060768, ts 001440, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043139, ts 007840, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060769, ts 001600, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043140, ts 008000, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060770, ts 001760, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043141, ts 008160, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043142, ts 008320, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043143, ts 008480, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060771, ts 001920, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043144, ts 008640, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060772, ts 002080, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043145, ts 008800, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060773, ts 002240, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043146, ts 008960, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060774, ts 002400, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043147, ts 009120, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060775, ts 002560, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060776, ts 002720, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043148, ts 009280, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043149, ts 009440, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060777, ts 002880, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060778, ts 003040, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043150, ts 009600, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043151, ts 009760, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060779, ts 003200, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060780, ts 003360, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060781, ts 003520, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060781, ts 003520, len 000004, mark 1, event 00000005, end 0, duration 00000) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043152, ts 009920, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043153, ts 010080, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060782, ts 003520, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060782, ts 003520, len 000004, mark 0, event 00000005, end 0, duration 00160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060783, ts 003520, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060783, ts 003520, len 000004, mark 0, event 00000005, end 0, duration 00320) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043154, ts 010240, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060784, ts 003520, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060784, ts 003520, len 000004, mark 0, event 00000005, end 0, duration 00480) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043155, ts 010400, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060785, ts 003520, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060785, ts 003520, len 000004, mark 0, event 00000005, end 0, duration 00640) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043156, ts 010560, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043157, ts 010720, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060786, ts 003520, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060786, ts 003520, len 000004, mark 0, event 00000005, end 0, duration 00800) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060787, ts 003520, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060787, ts 003520, len 000004, mark 0, event 00000005, end 0, duration 00960) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043158, ts 010880, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043159, ts 011040, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060788, ts 003520, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060788, ts 003520, len 000004, mark 0, event 00000005, end 0, duration 01120) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043160, ts 011200, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060789, ts 003520, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060789, ts 003520, len 000004, mark 0, event 00000005, end 0, duration 01280) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043161, ts 011360, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043162, ts 011520, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060790, ts 003520, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060790, ts 003520, len 000004, mark 0, event 00000005, end 1, duration 01440) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060791, ts 005120, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060792, ts 005280, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060793, ts 005440, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060794, ts 005600, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060795, ts 005760, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060796, ts 005920, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060797, ts 006080, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060798, ts 006240, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060799, ts 006400, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060800, ts 006560, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060801, ts 006720, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060802, ts 006880, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060803, ts 007040, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060804, ts 007200, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060805, ts 007360, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060806, ts 007520, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060807, ts 007680, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060808, ts 007840, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060809, ts 008000, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060810, ts 008160, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060811, ts 008320, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060812, ts 008480, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060813, ts 008640, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060814, ts 008800, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060815, ts 008960, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060816, ts 009120, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060817, ts 009280, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060817, ts 009280, len 000004, mark 1, event 00000000, end 0, duration 00000) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060818, ts 009280, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060818, ts 009280, len 000004, mark 0, event 00000000, end 0, duration 00160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060819, ts 009280, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060819, ts 009280, len 000004, mark 0, event 00000000, end 0, duration 00320) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060820, ts 009280, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060820, ts 009280, len 000004, mark 0, event 00000000, end 0, duration 00480) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060821, ts 009280, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060821, ts 009280, len 000004, mark 0, event 00000000, end 0, duration 00640) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060822, ts 009280, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060822, ts 009280, len 000004, mark 0, event 00000000, end 0, duration 00800) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060823, ts 009280, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060823, ts 009280, len 000004, mark 0, event 00000000, end 0, duration 00960) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060824, ts 009280, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060824, ts 009280, len 000004, mark 0, event 00000000, end 0, duration 01120) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060825, ts 009280, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060825, ts 009280, len 000004, mark 0, event 00000000, end 1, duration 01280) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060826, ts 010720, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060827, ts 010880, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060828, ts 011040, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060829, ts 011200, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060830, ts 011360, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060831, ts 011520, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060832, ts 011680, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060833, ts 011840, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060834, ts 012000, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060835, ts 012160, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060836, ts 012320, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060837, ts 012480, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060838, ts 012640, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060839, ts 012800, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060840, ts 012960, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060841, ts 013120, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060842, ts 013280, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060843, ts 013440, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060844, ts 013600, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060845, ts 013760, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060846, ts 013920, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060847, ts 014080, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060847, ts 014080, len 000004, mark 1, event 00000000, end 0, duration 00000) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060848, ts 014080, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060848, ts 014080, len 000004, mark 0, event 00000000, end 0, duration 00160) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060849, ts 014080, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060849, ts 014080, len 000004, mark 0, event 00000000, end 0, duration 00320) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060850, ts 014080, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060850, ts 014080, len 000004, mark 0, event 00000000, end 0, duration 00480) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060851, ts 014080, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060851, ts 014080, len 000004, mark 0, event 00000000, end 0, duration 00640) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060852, ts 014080, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060852, ts 014080, len 000004, mark 0, event 00000000, end 0, duration 00800) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060853, ts 014080, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060853, ts 014080, len 000004, mark 0, event 00000000, end 0, duration 00960) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060854, ts 014080, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060854, ts 014080, len 000004, mark 0, event 00000000, end 0, duration 01120) >Got RTP packet from 192.168.20.1:5004 (type 101, seq 060855, ts 014080, len 000004) >Got RTP RFC2833 from 192.168.20.1:5004 (type 101, seq 060855, ts 014080, len 000004, mark 0, event 00000000, end 1, duration 01280) > == CDR updated on SIP/3589-0a00cec0 > -- Executing [500@default:1] Playback("SIP/3589-0a00cec0", "demo-abouttotry") in new stack >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043163, ts 021904, len 000160) > -- Playing 'demo-abouttotry' (language 'en') >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060856, ts 015520, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043164, ts 022064, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060857, ts 015680, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043165, ts 022224, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060858, ts 015840, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060859, ts 016000, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043166, ts 022384, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060860, ts 016160, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043167, ts 022544, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060861, ts 016320, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043168, ts 022704, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043169, ts 022864, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043170, ts 023024, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060862, ts 016480, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043171, ts 023184, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060863, ts 016640, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043172, ts 023344, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043173, ts 023504, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060864, ts 016800, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060865, ts 016960, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043174, ts 023664, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043175, ts 023824, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060866, ts 017120, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060867, ts 017280, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043176, ts 023984, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060868, ts 017440, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060869, ts 017600, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043177, ts 024144, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043178, ts 024304, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060870, ts 017760, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060871, ts 017920, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043179, ts 024464, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043180, ts 024624, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060872, ts 018080, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060873, ts 018240, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043181, ts 024784, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060874, ts 018400, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043182, ts 024944, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060875, ts 018560, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060876, ts 018720, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043183, ts 025104, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043184, ts 025264, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060877, ts 018880, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060878, ts 019040, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043185, ts 025424, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043186, ts 025584, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060879, ts 019200, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060880, ts 019360, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043187, ts 025744, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043188, ts 025904, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060881, ts 019520, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060882, ts 019680, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043189, ts 026064, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060883, ts 019840, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043190, ts 026224, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060884, ts 020000, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043191, ts 026384, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060885, ts 020160, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043192, ts 026544, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060886, ts 020320, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043193, ts 026704, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043194, ts 026864, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060887, ts 020480, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043195, ts 027024, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060888, ts 020640, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043196, ts 027184, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043197, ts 027344, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060889, ts 020800, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060890, ts 020960, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043198, ts 027504, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043199, ts 027664, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043200, ts 027824, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060891, ts 021120, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060892, ts 021280, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043201, ts 027984, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043202, ts 028144, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060893, ts 021440, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060894, ts 021600, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043203, ts 028304, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060895, ts 021760, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043204, ts 028464, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060896, ts 021920, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043205, ts 028624, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060897, ts 022080, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043206, ts 028784, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060898, ts 022240, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043207, ts 028944, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060899, ts 022400, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060900, ts 022560, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043208, ts 029104, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060901, ts 022720, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043209, ts 029264, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060902, ts 022880, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043210, ts 029424, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060903, ts 023040, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060904, ts 023200, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043211, ts 029584, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043212, ts 029744, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060905, ts 023360, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060906, ts 023520, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043213, ts 029904, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060907, ts 023680, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043214, ts 030064, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060908, ts 023840, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043215, ts 030224, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043216, ts 030384, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043217, ts 030544, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060909, ts 024000, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060910, ts 024160, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043218, ts 030704, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043219, ts 030864, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043220, ts 031024, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060911, ts 024320, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060912, ts 024480, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060913, ts 024640, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043221, ts 031184, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043222, ts 031344, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060914, ts 024800, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060915, ts 024960, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043223, ts 031504, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060916, ts 025120, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043224, ts 031664, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060917, ts 025280, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043225, ts 031824, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060918, ts 025440, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060919, ts 025600, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043226, ts 031984, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043227, ts 032144, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060920, ts 025760, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060921, ts 025920, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043228, ts 032304, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043229, ts 032464, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060922, ts 026080, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060923, ts 026240, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043230, ts 032624, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043231, ts 032784, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043232, ts 032944, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060924, ts 026400, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060925, ts 026560, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043233, ts 033104, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043234, ts 033264, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043235, ts 033424, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060926, ts 026720, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060927, ts 026880, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043236, ts 033584, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043237, ts 033744, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060928, ts 027040, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060929, ts 027200, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043238, ts 033904, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060930, ts 027360, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060931, ts 027520, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043239, ts 034064, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043240, ts 034224, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060932, ts 027680, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060933, ts 027840, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043241, ts 034384, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043242, ts 034544, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060934, ts 028000, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060935, ts 028160, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043243, ts 034704, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060936, ts 028320, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060937, ts 028480, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043244, ts 034864, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043245, ts 035024, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060938, ts 028640, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060939, ts 028800, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043246, ts 035184, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043247, ts 035344, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060940, ts 028960, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043248, ts 035504, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060941, ts 029120, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043249, ts 035664, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043250, ts 035824, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060942, ts 029280, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043251, ts 035984, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060943, ts 029440, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043252, ts 036144, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043253, ts 036304, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060944, ts 029600, len 000160) >Got RTP packet from 192.168.20.1:5004 (type 00, seq 060945, ts 029760, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043254, ts 036464, len 000160) >Sent RTP packet to 192.168.20.1:5004 (type 00, seq 043255, ts 036624, len 000160) >cinshrfc6vm01*CLI> ><--- SIP read from 192.168.20.1:5062 ---> >BYE sip:1000@192.168.20.128 SIP/2.0 >CSeq: 4 BYE >Via: SIP/2.0/UDP 192.168.20.1:5062;branch=z9hG4bKe2f27f2c-1d8e-db11-8b24-000d56bd887d;rport >From: "Andy Rechenberg" <sip:3589@192.168.20.128>;tag=9a352929-1d8e-db11-8b24-000d56bd887d >Call-ID: fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >To: <sip:1000@192.168.20.128>;tag=as64bcf735 >Contact: <sip:3589@192.168.20.1:5062;transport=udp> >Proxy-Authorization: Digest username="3589", realm="asterisk", nonce="67fbb3f4", uri="sip:1000@192.168.20.128", response="56dff15a969da7d9f15f3e3150e1314e", algorithm=md5 >Allow: INVITE,ACK,OPTIONS,BYE,CANCEL,NOTIFY,REFER,MESSAGE >Content-Length: 0 >Max-Forwards: 70 > > ><-------------> >--- (11 headers 0 lines) --- >Sending to 192.168.20.1 : 5062 (NAT) > ><--- Transmitting (NAT) to 192.168.20.1:5062 ---> >SIP/2.0 200 OK >Via: SIP/2.0/UDP 192.168.20.1:5062;branch=z9hG4bKe2f27f2c-1d8e-db11-8b24-000d56bd887d;received=192.168.20.1;rport=5062 >From: "Andy Rechenberg" <sip:3589@192.168.20.128>;tag=9a352929-1d8e-db11-8b24-000d56bd887d >To: <sip:1000@192.168.20.128>;tag=as64bcf735 >Call-ID: fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >CSeq: 4 BYE >User-Agent: Asterisk PBX >Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY >Supported: replaces >Contact: <sip:1000@192.168.20.128> >Content-Length: 0 > > ><------------> > == Spawn extension (default, 500, 1) exited non-zero on 'SIP/3589-0a00cec0' >Really destroying SIP dialog 'fa2a2929-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com' Method: BYE >Really destroying SIP dialog '60f6db26-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com' Method: REGISTER >cinshrfc6vm01*CLI> ><--- SIP read from 192.168.20.1:5063 ---> >REGISTER sip:192.168.20.128 SIP/2.0 >CSeq: 3 REGISTER >Via: SIP/2.0/UDP 192.168.20.1:5063;branch=z9hG4bKbc6c77b6-248e-db11-8b24-000d56bd887d;rport >User-Agent: Ekiga/2.0.2 >From: <sip:3589@192.168.20.128>;tag=ce5f77b6-248e-db11-8b24-000d56bd887d >Call-ID: 60f6db26-1d8e-db11-8b24-000d56bd887d@cinshrlnxws01.shermfin.com >To: <sip:3589@192.168.20.128> >Contact: <sip:3589@192.168.20.1:5063;transport=udp> >Allow: INVITE,ACK,OPTIONS,BYE,CANCEL,NOTIFY,REFER,MESSAGE >Expires: 3600 >Content-Length: 0 >Max-Forwards: 70 >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 220333
:
144103
| 144105 |
144106
|
144107