Guest User

answered with delay - RTP + SIP

a guest
Feb 17th, 2015
410
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 68.20 KB | None | 0 0
  1. ast*CLI> sip set debug on
  2. SIP Debugging enabled
  3.  
  4. <--- Transmitting (no NAT) to 192.168.88.182:5060 --->
  5. SIP/2.0 180 Ringing
  6. Via: SIP/2.0/WS 192.0.2.134;branch=z9hG4bK5314555;received=192.168.88.182
  7. From: <sip:[email protected]>;tag=s380d81cec
  8. To: <sip:[email protected]>;tag=as2df952cd
  9. Call-ID: j5m6suht7i1aolb9i99h
  10. CSeq: 8678 INVITE
  11. Server: Asterisk PBX 13.2.0
  12. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  13. Supported: replaces, timer
  14. Contact: <sip:[email protected]:5060;transport=WS>
  15. Content-Length: 0
  16.  
  17.  
  18. <------------>
  19. ast*CLI> rtp set debug on
  20. RTP Debugging Enabled
  21.  
  22. <--- SIP read from WS:192.168.88.188:49766 --->
  23. INVITE sip:[email protected] SIP/2.0
  24. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bK46AkusFhvF0QFCbIqWDMtXm7GVmGJNuA;rport
  25. From: "892"<sip:[email protected]>;tag=84wXBVLIn7HmIFBiuDgW
  26. Contact: "892"<sip:[email protected];rtcweb-breaker=no;click2call=no;transport=ws>;+g.oma.sip-im;language="en,fr"
  27. Call-ID: 93e09629-4e85-9457-dd34-c3d837805991
  28. CSeq: 8877 INVITE
  29. Content-Type: application/sdp
  30. Content-Length: 1593
  31. Route: <sip:192.168.88.251:5060;lr;sipml5-outbound;transport=udp>
  32. Max-Forwards: 70
  33. User-Agent: IM-client/OMA1.0 sipML5-v1.2014.12.11
  34. Organization: Doubango Telecom
  35.  
  36. v=0
  37. o=- 8683603891972356000 2 IN IP4 127.0.0.1
  38. s=Doubango Telecom - chrome
  39. t=0 0
  40. a=group:BUNDLE audio
  41. a=msid-semantic: WMS qkYOoNGUafg12Z5iEdhdZxu4apFJ0k0X2Zbj
  42. m=audio 60359 UDP/TLS/RTP/SAVPF 111 103 104 9 0 8 106 105 13 126
  43. c=IN IP4 192.168.88.188
  44. a=rtcp:60359 IN IP4 192.168.88.188
  45. a=candidate:3254617721 1 udp 2122194687 192.168.88.188 60359 typ host generation 0
  46. a=candidate:3254617721 2 udp 2122194687 192.168.88.188 60359 typ host generation 0
  47. a=candidate:2407430793 1 tcp 1518214911 192.168.88.188 0 typ host tcptype active generation 0
  48. a=candidate:2407430793 2 tcp 1518214911 192.168.88.188 0 typ host tcptype active generation 0
  49. a=ice-ufrag:/fVsWBCRnoY9TAr1
  50. a=ice-pwd:IcVWLgaZd5wbGhZM7uLrfV41
  51. a=ice-options:google-ice
  52. a=fingerprint:sha-256 51:EF:F4:71:0C:EE:2F:A6:D2:2A:85:60:AC:26:68:C2:D3:57:39:88:55:23:53:0C:40:3A:2D:A5:4E:D9:A1:0F
  53. a=setup:actpass
  54. a=mid:audio
  55. a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level
  56. a=extmap:3 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time
  57. a=sendrecv
  58. a=rtcp-mux
  59. a=rtpmap:111 opus/48000/2
  60. a=fmtp:111 minptime=10
  61. a=rtpmap:103 ISAC/16000
  62. a=rtpmap:104 ISAC/32000
  63. a=rtpmap:9 G722/8000
  64. a=rtpmap:0 PCMU/8000
  65. a=rtpmap:8 PCMA/8000
  66. a=rtpmap:106 CN/32000
  67. a=rtpmap:105 CN/16000
  68. a=rtpmap:13 CN/8000
  69. a=rtpmap:126 telephone-event/8000
  70. a=maxptime:60
  71. a=ssrc:2864566026 cname:SXx/wHxfW3L1EWdl
  72. a=ssrc:2864566026 msid:qkYOoNGUafg12Z5iEdhdZxu4apFJ0k0X2Zbj 3fbc9cc5-6471-4ee5-90a5-0d4cb1f622b0
  73. a=ssrc:2864566026 mslabel:qkYOoNGUafg12Z5iEdhdZxu4apFJ0k0X2Zbj
  74. a=ssrc:2864566026 label:3fbc9cc5-6471-4ee5-90a5-0d4cb1f622b0
  75. <------------->
  76. --- (13 headers 39 lines) ---
  77. Using INVITE request as basis request - 93e09629-4e85-9457-dd34-c3d837805991
  78. Found peer '892' for '892' from 192.168.88.188:49766
  79.  
  80. <--- Reliably Transmitting (no NAT) to 192.168.88.188:5060 --->
  81. SIP/2.0 401 Unauthorized
  82. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bK46AkusFhvF0QFCbIqWDMtXm7GVmGJNuA;rport;received=192.168.88.188
  83. From: "892"<sip:[email protected]>;tag=84wXBVLIn7HmIFBiuDgW
  84. To: <sip:[email protected]>;tag=as424e4699
  85. Call-ID: 93e09629-4e85-9457-dd34-c3d837805991
  86. CSeq: 8877 INVITE
  87. Server: Asterisk PBX 13.2.0
  88. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  89. Supported: replaces, timer
  90. WWW-Authenticate: Digest algorithm=MD5, realm="192.168.88.251", nonce="477407fb"
  91. Content-Length: 0
  92.  
  93.  
  94. <------------>
  95. Scheduling destruction of SIP dialog '93e09629-4e85-9457-dd34-c3d837805991' in 32000 ms (Method: INVITE)
  96.  
  97. <--- SIP read from WS:192.168.88.188:49766 --->
  98. ACK sip:[email protected] SIP/2.0
  99. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bK46AkusFhvF0QFCbIqWDMtXm7GVmGJNuA;rport
  100. From: "892"<sip:[email protected]>;tag=84wXBVLIn7HmIFBiuDgW
  101. To: <sip:[email protected]>;tag=as424e4699
  102. Call-ID: 93e09629-4e85-9457-dd34-c3d837805991
  103. CSeq: 8877 ACK
  104. Content-Length: 0
  105. Route: <sip:192.168.88.251:5060;lr;sipml5-outbound;transport=udp>
  106. Max-Forwards: 70
  107.  
  108. <------------->
  109. --- (9 headers 0 lines) ---
  110.  
  111. <--- SIP read from WS:192.168.88.188:49766 --->
  112. INVITE sip:[email protected] SIP/2.0
  113. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKzEiDM8ZvpUEq01WwHsGKRTE5BTTUcRTh;rport
  114. From: "892"<sip:[email protected]>;tag=84wXBVLIn7HmIFBiuDgW
  115. Contact: "892"<sip:[email protected];rtcweb-breaker=no;click2call=no;transport=ws>;+g.oma.sip-im;language="en,fr"
  116. Call-ID: 93e09629-4e85-9457-dd34-c3d837805991
  117. CSeq: 8878 INVITE
  118. Content-Type: application/sdp
  119. Content-Length: 1593
  120. Route: <sip:192.168.88.251:5060;lr;sipml5-outbound;transport=udp>
  121. Max-Forwards: 70
  122. Authorization: Digest username="892",realm="192.168.88.251",nonce="477407fb",uri="sip:[email protected]",response="4528d99fa7e74402448a81ecadc3580c",algorithm=MD5
  123. User-Agent: IM-client/OMA1.0 sipML5-v1.2014.12.11
  124. Organization: Doubango Telecom
  125.  
  126. v=0
  127. o=- 8683603891972356000 2 IN IP4 127.0.0.1
  128. s=Doubango Telecom - chrome
  129. t=0 0
  130. a=group:BUNDLE audio
  131. a=msid-semantic: WMS qkYOoNGUafg12Z5iEdhdZxu4apFJ0k0X2Zbj
  132. m=audio 60359 UDP/TLS/RTP/SAVPF 111 103 104 9 0 8 106 105 13 126
  133. c=IN IP4 192.168.88.188
  134. a=rtcp:60359 IN IP4 192.168.88.188
  135. a=candidate:3254617721 1 udp 2122194687 192.168.88.188 60359 typ host generation 0
  136. a=candidate:3254617721 2 udp 2122194687 192.168.88.188 60359 typ host generation 0
  137. a=candidate:2407430793 1 tcp 1518214911 192.168.88.188 0 typ host tcptype active generation 0
  138. a=candidate:2407430793 2 tcp 1518214911 192.168.88.188 0 typ host tcptype active generation 0
  139. a=ice-ufrag:/fVsWBCRnoY9TAr1
  140. a=ice-pwd:IcVWLgaZd5wbGhZM7uLrfV41
  141. a=ice-options:google-ice
  142. a=fingerprint:sha-256 51:EF:F4:71:0C:EE:2F:A6:D2:2A:85:60:AC:26:68:C2:D3:57:39:88:55:23:53:0C:40:3A:2D:A5:4E:D9:A1:0F
  143. a=setup:actpass
  144. a=mid:audio
  145. a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level
  146. a=extmap:3 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time
  147. a=sendrecv
  148. a=rtcp-mux
  149. a=rtpmap:111 opus/48000/2
  150. a=fmtp:111 minptime=10
  151. a=rtpmap:103 ISAC/16000
  152. a=rtpmap:104 ISAC/32000
  153. a=rtpmap:9 G722/8000
  154. a=rtpmap:0 PCMU/8000
  155. a=rtpmap:8 PCMA/8000
  156. a=rtpmap:106 CN/32000
  157. a=rtpmap:105 CN/16000
  158. a=rtpmap:13 CN/8000
  159. a=rtpmap:126 telephone-event/8000
  160. a=maxptime:60
  161. a=ssrc:2864566026 cname:SXx/wHxfW3L1EWdl
  162. a=ssrc:2864566026 msid:qkYOoNGUafg12Z5iEdhdZxu4apFJ0k0X2Zbj 3fbc9cc5-6471-4ee5-90a5-0d4cb1f622b0
  163. a=ssrc:2864566026 mslabel:qkYOoNGUafg12Z5iEdhdZxu4apFJ0k0X2Zbj
  164. a=ssrc:2864566026 label:3fbc9cc5-6471-4ee5-90a5-0d4cb1f622b0
  165. <------------->
  166. --- (14 headers 39 lines) ---
  167. Using INVITE request as basis request - 93e09629-4e85-9457-dd34-c3d837805991
  168. Found peer '892' for '892' from 192.168.88.188:49766
  169. == Using SIP RTP CoS mark 5
  170. Found RTP audio format 111
  171. Found RTP audio format 103
  172. Found RTP audio format 104
  173. Found RTP audio format 9
  174. Found RTP audio format 0
  175. Found RTP audio format 8
  176. Found RTP audio format 106
  177. Found RTP audio format 105
  178. Found RTP audio format 13
  179. Found RTP audio format 126
  180. Found audio description format opus for ID 111
  181. Found unknown media description format ISAC for ID 103
  182. Found unknown media description format ISAC for ID 104
  183. Found audio description format G722 for ID 9
  184. Found audio description format PCMU for ID 0
  185. Found audio description format PCMA for ID 8
  186. Found unknown media description format CN for ID 106
  187. Found unknown media description format CN for ID 105
  188. Found audio description format CN for ID 13
  189. Found audio description format telephone-event for ID 126
  190. Capabilities: us - (ulaw|alaw|gsm|h263), peer - audio=(ulaw|alaw|g722|opus)/video=(nothing)/text=(nothing), combined - (ulaw|alaw)
  191. Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x3 (telephone-event|CN|), combined - 0x1 (telephone-event|)
  192. Peer audio RTP is at port 192.168.88.188:60359
  193. Looking for 893 in default (domain 192.168.88.251)
  194. sip_route_dump: route/path hop: <sip:[email protected];rtcweb-breaker=no;click2call=no;transport=ws>
  195.  
  196. <--- Transmitting (no NAT) to 192.168.88.188:5060 --->
  197. SIP/2.0 100 Trying
  198. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKzEiDM8ZvpUEq01WwHsGKRTE5BTTUcRTh;rport;received=192.168.88.188
  199. From: "892"<sip:[email protected]>;tag=84wXBVLIn7HmIFBiuDgW
  200. Call-ID: 93e09629-4e85-9457-dd34-c3d837805991
  201. CSeq: 8878 INVITE
  202. Server: Asterisk PBX 13.2.0
  203. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  204. Supported: replaces, timer
  205. Contact: <sip:[email protected]:5060;transport=WS>
  206. Content-Length: 0
  207.  
  208.  
  209. <------------>
  210. -- Executing [893@default:1] Dial("SIP/892-00000096", "SIP/893") in new stack
  211. == Using SIP RTP CoS mark 5
  212. Audio is at 15462
  213. Adding codec ulaw to SDP
  214. Adding codec alaw to SDP
  215. Adding codec gsm to SDP
  216. Adding non-codec 0x1 (telephone-event) to SDP
  217. Reliably Transmitting (no NAT) to 192.168.88.189:54237:
  218. INVITE sip:[email protected];rtcweb-breaker=no;transport=ws SIP/2.0
  219. Via: SIP/2.0/WS 192.168.88.251:5060;branch=z9hG4bK1c39fcc5
  220. Max-Forwards: 70
  221. From: "892" <sip:[email protected]>;tag=as07fb62f4
  222. To: <sip:[email protected];rtcweb-breaker=no;transport=ws>
  223. Contact: <sip:[email protected]:5060;transport=WS>
  224. Call-ID: [email protected]:5060
  225. CSeq: 102 INVITE
  226. User-Agent: Asterisk PBX 13.2.0
  227. Date: Wed, 18 Feb 2015 01:56:38 GMT
  228. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  229. Supported: replaces, timer
  230. Content-Type: application/sdp
  231. Content-Length: 674
  232.  
  233. v=0
  234. o=root 970177399 970177399 IN IP4 192.168.88.251
  235. s=Asterisk PBX 13.2.0
  236. c=IN IP4 192.168.88.251
  237. t=0 0
  238. m=audio 15462 RTP/SAVPF 0 8 3 101
  239. a=rtpmap:0 PCMU/8000
  240. a=rtpmap:8 PCMA/8000
  241. a=rtpmap:3 GSM/8000
  242. a=rtpmap:101 telephone-event/8000
  243. a=fmtp:101 0-16
  244. a=maxptime:150
  245. a=ice-ufrag:6415f5057c92c5b04418c34814e353be
  246. a=ice-pwd:220a778a5db383723483395b46256a96
  247. a=candidate:Hc0a858fb 1 UDP 2130706431 192.168.88.251 15462 typ host
  248. a=candidate:Hc0a858fb 2 UDP 2130706430 192.168.88.251 15463 typ host
  249. a=connection:new
  250. a=setup:actpass
  251. a=fingerprint:SHA-256 0D:6A:59:76:3A:91:CF:86:2D:91:D5:8D:D4:95:CC:06:CB:16:9C:83:4C:C4:34:B1:64:2F:91:10:E8:76:A2:52
  252. a=sendrecv
  253.  
  254. ---
  255. -- Called SIP/893
  256.  
  257. <--- SIP read from WS:192.168.88.189:54237 --->
  258. SIP/2.0 100 Trying (sent from the Transaction Layer)
  259. Via: SIP/2.0/WS 192.168.88.251:5060;branch=z9hG4bK1c39fcc5
  260. From: "892"<sip:[email protected]>;tag=as07fb62f4
  261. To: <sip:[email protected];rtcweb-breaker=no;transport=ws>
  262. Call-ID: [email protected]:5060
  263. CSeq: 102 INVITE
  264. Content-Length: 0
  265.  
  266. <------------->
  267. --- (7 headers 0 lines) ---
  268.  
  269. <--- SIP read from WS:192.168.88.189:54237 --->
  270. SIP/2.0 180 Ringing
  271. Via: SIP/2.0/WS 192.168.88.251:5060;branch=z9hG4bK1c39fcc5
  272. From: "892"<sip:[email protected]>;tag=as07fb62f4
  273. To: <sip:[email protected];rtcweb-breaker=no;transport=ws>;tag=qUs5QQHN7x2UdJACwDkc
  274. Contact: <sip:[email protected];transport=ws>
  275. Call-ID: [email protected]:5060
  276. CSeq: 102 INVITE
  277. Content-Length: 0
  278. Allow: ACK, BYE, CANCEL, INVITE, MESSAGE, NOTIFY, OPTIONS, PRACK, REFER, UPDATE
  279.  
  280. <------------->
  281. --- (9 headers 0 lines) ---
  282. sip_route_dump: route/path hop: <sip:[email protected];transport=ws>
  283. -- SIP/893-00000097 is ringing
  284.  
  285. <--- Transmitting (no NAT) to 192.168.88.188:5060 --->
  286. SIP/2.0 180 Ringing
  287. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKzEiDM8ZvpUEq01WwHsGKRTE5BTTUcRTh;rport;received=192.168.88.188
  288. From: "892"<sip:[email protected]>;tag=84wXBVLIn7HmIFBiuDgW
  289. To: <sip:[email protected]>;tag=as6880fdfe
  290. Call-ID: 93e09629-4e85-9457-dd34-c3d837805991
  291. CSeq: 8878 INVITE
  292. Server: Asterisk PBX 13.2.0
  293. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  294. Supported: replaces, timer
  295. Contact: <sip:[email protected]:5060;transport=WS>
  296. Content-Length: 0
  297.  
  298.  
  299. <------------>
  300.  
  301. <--- Transmitting (no NAT) to 192.168.88.182:5060 --->
  302. SIP/2.0 180 Ringing
  303. Via: SIP/2.0/WS 192.0.2.157;branch=z9hG4bK4472428;received=192.168.88.182
  304. From: <sip:[email protected]>;tag=grberh41iu
  305. To: <sip:[email protected]>;tag=as35a3c936
  306. Call-ID: 61r71uq6tdlnd58mga7l
  307. CSeq: 5841 INVITE
  308. Server: Asterisk PBX 13.2.0
  309. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  310. Supported: replaces, timer
  311. Contact: <sip:[email protected]:5060;transport=WS>
  312. Content-Length: 0
  313.  
  314.  
  315. <------------>
  316.  
  317. <--- SIP read from WS:192.168.88.189:54237 --->
  318. SIP/2.0 200 OK
  319. Via: SIP/2.0/WS 192.168.88.251:5060;branch=z9hG4bK1c39fcc5
  320. From: "892"<sip:[email protected]>;tag=as07fb62f4
  321. To: <sip:[email protected];rtcweb-breaker=no;transport=ws>;tag=qUs5QQHN7x2UdJACwDkc
  322. Contact: <sip:[email protected];transport=ws>
  323. Call-ID: [email protected]:5060
  324. CSeq: 102 INVITE
  325. Content-Type: application/sdp
  326. Content-Length: 1173
  327. Allow: ACK, BYE, CANCEL, INVITE, MESSAGE, NOTIFY, OPTIONS, PRACK, REFER, UPDATE
  328.  
  329. v=0
  330. o=- 8114859992596666000 2 IN IP4 127.0.0.1
  331. s=Doubango Telecom - chrome
  332. t=0 0
  333. a=msid-semantic: WMS Fs1u0SkZb0jINU7BPHJ7FrGcLLd9sps8CLEb
  334. m=audio 51702 UDP/TLS/RTP/SAVPF 0 8 101
  335. c=IN IP4 192.168.88.189
  336. a=rtcp:51703 IN IP4 192.168.88.189
  337. a=candidate:2034360604 1 udp 2122194687 192.168.88.189 51702 typ host generation 0
  338. a=candidate:2034360604 2 udp 2122194686 192.168.88.189 51703 typ host generation 0
  339. a=candidate:935468524 1 tcp 1518214911 192.168.88.189 0 typ host tcptype active generation 0
  340. a=candidate:935468524 2 tcp 1518214910 192.168.88.189 0 typ host tcptype active generation 0
  341. a=ice-ufrag:gXUEQL8ecvvgQPuc
  342. a=ice-pwd:VM9RSBhB9AtpjKcqPF+SGRSe
  343. a=fingerprint:sha-256 33:7A:5F:05:75:AB:62:A6:20:78:D5:F7:EF:BB:BB:3A:0A:D2:89:0F:DA:4D:22:50:8C:E7:90:A4:51:34:F8:61
  344. a=setup:active
  345. a=mid:audio
  346. a=sendrecv
  347. a=rtpmap:0 PCMU/8000
  348. a=rtpmap:8 PCMA/8000
  349. a=rtpmap:101 telephone-event/8000
  350. a=ssrc:1231611668 cname:09250feHsqHSHh/c
  351. a=ssrc:1231611668 msid:Fs1u0SkZb0jINU7BPHJ7FrGcLLd9sps8CLEb da1dd764-1e54-4f18-b950-396b45387715
  352. a=ssrc:1231611668 mslabel:Fs1u0SkZb0jINU7BPHJ7FrGcLLd9sps8CLEb
  353. a=ssrc:1231611668 label:da1dd764-1e54-4f18-b950-396b45387715
  354. <------------->
  355. --- (10 headers 25 lines) ---
  356. Found RTP audio format 0
  357. Found RTP audio format 8
  358. Found RTP audio format 101
  359. Found audio description format PCMU for ID 0
  360. Found audio description format PCMA for ID 8
  361. Found audio description format telephone-event for ID 101
  362. Capabilities: us - (ulaw|alaw|gsm|h263), peer - audio=(ulaw|alaw)/video=(nothing)/text=(nothing), combined - (ulaw|alaw)
  363. Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|)
  364. Peer audio RTP is at port 192.168.88.189:51702
  365. sip_route_dump: route/path hop: <sip:[email protected];transport=ws>
  366. [Feb 18 03:56:50] ERROR[5857][C-00000069]: netsock2.c:303 ast_sockaddr_resolve: getaddrinfo("df7jal23ls0d.invalid", "(null)", ...): Name or service not known
  367. [Feb 18 03:56:50] WARNING[5857][C-00000069]: chan_sip.c:16158 __set_address_from_contact: Invalid host name in Contact: (can't resolve in DNS) : 'df7jal23ls0d.invalid'
  368. set_destination: Parsing <sip:[email protected];transport=ws> for address/port to send to
  369. set_destination: URI is for WebSocket, we can't set destination
  370. Transmitting (no NAT) to 192.168.88.189:54237:
  371. ACK sip:[email protected];transport=ws SIP/2.0
  372. Via: SIP/2.0/WS 192.168.88.251:5060;branch=z9hG4bK5dea6168
  373. Max-Forwards: 70
  374. From: "892" <sip:[email protected]>;tag=as07fb62f4
  375. To: <sip:[email protected];rtcweb-breaker=no;transport=ws>;tag=qUs5QQHN7x2UdJACwDkc
  376. Contact: <sip:[email protected]:5060;transport=WS>
  377. Call-ID: [email protected]:5060
  378. CSeq: 102 ACK
  379. User-Agent: Asterisk PBX 13.2.0
  380. Content-Length: 0
  381.  
  382.  
  383. ---
  384. -- SIP/893-00000097 answered SIP/892-00000096
  385. Audio is at 19458
  386. Adding codec ulaw to SDP
  387. Adding codec alaw to SDP
  388. Adding codec gsm to SDP
  389. Adding non-codec 0x1 (telephone-event) to SDP
  390.  
  391. <--- Reliably Transmitting (no NAT) to 192.168.88.188:5060 --->
  392. SIP/2.0 200 OK
  393. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKzEiDM8ZvpUEq01WwHsGKRTE5BTTUcRTh;rport;received=192.168.88.188
  394. From: "892"<sip:[email protected]>;tag=84wXBVLIn7HmIFBiuDgW
  395. To: <sip:[email protected]>;tag=as6880fdfe
  396. Call-ID: 93e09629-4e85-9457-dd34-c3d837805991
  397. CSeq: 8878 INVITE
  398. Server: Asterisk PBX 13.2.0
  399. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  400. Supported: replaces, timer
  401. Contact: <sip:[email protected]:5060;transport=WS>
  402. Content-Type: application/sdp
  403. Content-Length: 675
  404.  
  405. v=0
  406. o=root 2096152049 2096152049 IN IP4 192.168.88.251
  407. s=Asterisk PBX 13.2.0
  408. c=IN IP4 192.168.88.251
  409. t=0 0
  410. m=audio 19458 RTP/SAVPF 0 8 3 126
  411. a=rtpmap:0 PCMU/8000
  412. a=rtpmap:8 PCMA/8000
  413. a=rtpmap:3 GSM/8000
  414. a=rtpmap:126 telephone-event/8000
  415. a=fmtp:126 0-16
  416. a=maxptime:150
  417. a=ice-ufrag:19158b2e0616f2c917d8bdcf79fa56cf
  418. a=ice-pwd:06ab20907a1eb3565c7ef76c0b96c8cd
  419. a=candidate:Hc0a858fb 1 UDP 2130706431 192.168.88.251 19458 typ host
  420. a=candidate:Hc0a858fb 2 UDP 2130706430 192.168.88.251 19459 typ host
  421. a=connection:new
  422. a=setup:active
  423. a=fingerprint:SHA-256 0D:6A:59:76:3A:91:CF:86:2D:91:D5:8D:D4:95:CC:06:CB:16:9C:83:4C:C4:34:B1:64:2F:91:10:E8:76:A2:52
  424. a=sendrecv
  425.  
  426. <------------>
  427. -- Channel SIP/892-00000096 joined 'simple_bridge' basic-bridge <c73aad5d-5385-41cd-a3b6-8eaf3fe35d6b>
  428. -- Channel SIP/893-00000097 joined 'simple_bridge' basic-bridge <c73aad5d-5385-41cd-a3b6-8eaf3fe35d6b>
  429.  
  430. <--- SIP read from WS:192.168.88.188:49766 --->
  431. ACK sip:[email protected]:5060;transport=WS SIP/2.0
  432. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bK64oqDhDMv44hQi3EMFA2;rport
  433. From: "892"<sip:[email protected]>;tag=84wXBVLIn7HmIFBiuDgW
  434. To: <sip:[email protected]>;tag=as6880fdfe
  435. Contact: "892"<sip:[email protected];rtcweb-breaker=no;click2call=no;transport=ws>;+g.oma.sip-im;language="en,fr"
  436. Call-ID: 93e09629-4e85-9457-dd34-c3d837805991
  437. CSeq: 8878 ACK
  438. Content-Length: 0
  439. Route: <sip:192.168.88.251:5060;lr;sipml5-outbound;transport=udp>
  440. Max-Forwards: 70
  441. Authorization: Digest username="892",realm="192.168.88.251",nonce="477407fb",uri="sip:[email protected]:5060;transport=WS",response="7f9b2f59c63141c9b1c4801011e97f7f",algorithm=MD5
  442. User-Agent: IM-client/OMA1.0 sipML5-v1.2014.12.11
  443. Organization: Doubango Telecom
  444.  
  445. <------------->
  446. --- (13 headers 0 lines) ---
  447. > 0x7fe19d04ed40 -- Probation passed - setting RTP source address to 192.168.88.189:51702
  448. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020778, ts 1663560784, len 000160)
  449. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032909, ts 1663560784, len 000160)
  450. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020779, ts 1663560944, len 000160)
  451. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032910, ts 1663560944, len 000160)
  452. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020780, ts 1663561104, len 000160)
  453. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032911, ts 1663561104, len 000160)
  454. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020781, ts 1663561264, len 000160)
  455. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032912, ts 1663561264, len 000160)
  456. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020782, ts 1663561424, len 000160)
  457. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032913, ts 1663561424, len 000160)
  458. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020783, ts 1663561584, len 000160)
  459. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032914, ts 1663561584, len 000160)
  460. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020784, ts 1663561744, len 000160)
  461. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032915, ts 1663561744, len 000160)
  462. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020785, ts 1663561904, len 000160)
  463. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032916, ts 1663561904, len 000160)
  464. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020786, ts 1663562064, len 000160)
  465. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032917, ts 1663562064, len 000160)
  466. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020787, ts 1663562224, len 000160)
  467. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032918, ts 1663562224, len 000160)
  468. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020788, ts 1663562384, len 000160)
  469. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032919, ts 1663562384, len 000160)
  470. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020789, ts 1663562544, len 000160)
  471. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032920, ts 1663562544, len 000160)
  472. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020790, ts 1663562704, len 000160)
  473. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032921, ts 1663562704, len 000160)
  474. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020791, ts 1663562864, len 000160)
  475. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032922, ts 1663562864, len 000160)
  476. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020792, ts 1663563024, len 000160)
  477. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032923, ts 1663563024, len 000160)
  478. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020793, ts 1663563184, len 000160)
  479. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032924, ts 1663563184, len 000160)
  480. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020794, ts 1663563344, len 000160)
  481. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032925, ts 1663563344, len 000160)
  482. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020795, ts 1663563504, len 000160)
  483. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032926, ts 1663563504, len 000160)
  484. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020796, ts 1663563664, len 000160)
  485. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032927, ts 1663563664, len 000160)
  486. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020797, ts 1663563824, len 000160)
  487. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032928, ts 1663563824, len 000160)
  488. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020798, ts 1663563984, len 000160)
  489. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032929, ts 1663563984, len 000160)
  490. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020799, ts 1663564144, len 000160)
  491. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032930, ts 1663564144, len 000160)
  492. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020800, ts 1663564304, len 000160)
  493. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032931, ts 1663564304, len 000160)
  494. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020801, ts 1663564464, len 000160)
  495. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032932, ts 1663564464, len 000160)
  496. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020802, ts 1663564624, len 000160)
  497. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032933, ts 1663564624, len 000160)
  498. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020803, ts 1663564784, len 000160)
  499. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032934, ts 1663564784, len 000160)
  500. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020804, ts 1663564944, len 000160)
  501. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032935, ts 1663564944, len 000160)
  502. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020805, ts 1663565104, len 000160)
  503. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032936, ts 1663565104, len 000160)
  504. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020806, ts 1663565264, len 000160)
  505. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032937, ts 1663565264, len 000160)
  506. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020807, ts 1663565424, len 000160)
  507. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032938, ts 1663565424, len 000160)
  508. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020808, ts 1663565584, len 000160)
  509. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032939, ts 1663565584, len 000160)
  510. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020809, ts 1663565744, len 000160)
  511. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032940, ts 1663565744, len 000160)
  512. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020810, ts 1663565904, len 000160)
  513. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032941, ts 1663565904, len 000160)
  514. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020811, ts 1663566064, len 000160)
  515. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032942, ts 1663566064, len 000160)
  516. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020812, ts 1663566224, len 000160)
  517. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032943, ts 1663566224, len 000160)
  518. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020813, ts 1663566384, len 000160)
  519. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032944, ts 1663566384, len 000160)
  520. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020814, ts 1663566544, len 000160)
  521. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032945, ts 1663566544, len 000160)
  522. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020815, ts 1663566704, len 000160)
  523. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032946, ts 1663566704, len 000160)
  524. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020816, ts 1663566864, len 000160)
  525. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032947, ts 1663566864, len 000160)
  526. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020817, ts 1663567024, len 000160)
  527. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032948, ts 1663567024, len 000160)
  528. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020818, ts 1663567184, len 000160)
  529. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032949, ts 1663567184, len 000160)
  530. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020819, ts 1663567344, len 000160)
  531. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032950, ts 1663567344, len 000160)
  532. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020820, ts 1663567504, len 000160)
  533. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032951, ts 1663567504, len 000160)
  534. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020821, ts 1663567664, len 000160)
  535. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032952, ts 1663567664, len 000160)
  536. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020822, ts 1663567824, len 000160)
  537. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032953, ts 1663567824, len 000160)
  538. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020823, ts 1663567984, len 000160)
  539. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032954, ts 1663567984, len 000160)
  540. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020824, ts 1663568144, len 000160)
  541. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032955, ts 1663568144, len 000160)
  542. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020825, ts 1663568304, len 000160)
  543. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032956, ts 1663568304, len 000160)
  544. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020826, ts 1663568464, len 000160)
  545. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032957, ts 1663568464, len 000160)
  546. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020827, ts 1663568624, len 000160)
  547. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032958, ts 1663568624, len 000160)
  548. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020828, ts 1663568784, len 000160)
  549. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032959, ts 1663568784, len 000160)
  550. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020829, ts 1663568944, len 000160)
  551. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032960, ts 1663568944, len 000160)
  552. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020830, ts 1663569104, len 000160)
  553. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032961, ts 1663569104, len 000160)
  554. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020831, ts 1663569264, len 000160)
  555. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032962, ts 1663569264, len 000160)
  556. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020832, ts 1663569424, len 000160)
  557. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032963, ts 1663569424, len 000160)
  558. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020833, ts 1663569584, len 000160)
  559. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032964, ts 1663569584, len 000160)
  560. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020834, ts 1663569744, len 000160)
  561. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032965, ts 1663569744, len 000160)
  562. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020835, ts 1663569904, len 000160)
  563. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032966, ts 1663569904, len 000160)
  564. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020836, ts 1663570064, len 000160)
  565. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032967, ts 1663570064, len 000160)
  566. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020837, ts 1663570224, len 000160)
  567. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032968, ts 1663570224, len 000160)
  568. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020838, ts 1663570384, len 000160)
  569. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032969, ts 1663570384, len 000160)
  570. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020839, ts 1663570544, len 000160)
  571. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032970, ts 1663570544, len 000160)
  572. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020840, ts 1663570704, len 000160)
  573. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032971, ts 1663570704, len 000160)
  574. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020841, ts 1663570864, len 000160)
  575. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032972, ts 1663570864, len 000160)
  576. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020842, ts 1663571024, len 000160)
  577. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032973, ts 1663571024, len 000160)
  578. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020843, ts 1663571184, len 000160)
  579. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032974, ts 1663571184, len 000160)
  580. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020844, ts 1663571344, len 000160)
  581. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032975, ts 1663571344, len 000160)
  582. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020845, ts 1663571504, len 000160)
  583. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032976, ts 1663571504, len 000160)
  584. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020846, ts 1663571664, len 000160)
  585. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032977, ts 1663571664, len 000160)
  586. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020847, ts 1663571824, len 000160)
  587. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032978, ts 1663571824, len 000160)
  588. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020848, ts 1663571984, len 000160)
  589. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032979, ts 1663571984, len 000160)
  590. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020849, ts 1663572144, len 000160)
  591. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032980, ts 1663572144, len 000160)
  592. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020850, ts 1663572304, len 000160)
  593. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032981, ts 1663572304, len 000160)
  594. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020851, ts 1663572464, len 000160)
  595. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032982, ts 1663572464, len 000160)
  596. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020852, ts 1663572624, len 000160)
  597. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032983, ts 1663572624, len 000160)
  598. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020853, ts 1663572784, len 000160)
  599. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032984, ts 1663572784, len 000160)
  600. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020854, ts 1663572944, len 000160)
  601. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032985, ts 1663572944, len 000160)
  602. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020855, ts 1663573104, len 000160)
  603. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032986, ts 1663573104, len 000160)
  604. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020856, ts 1663573264, len 000160)
  605. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032987, ts 1663573264, len 000160)
  606. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020857, ts 1663573424, len 000160)
  607. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032988, ts 1663573424, len 000160)
  608. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020858, ts 1663573584, len 000160)
  609. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032989, ts 1663573584, len 000160)
  610. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020859, ts 1663573744, len 000160)
  611. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032990, ts 1663573744, len 000160)
  612. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020860, ts 1663573904, len 000160)
  613. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032991, ts 1663573904, len 000160)
  614. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020861, ts 1663574064, len 000160)
  615. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032992, ts 1663574064, len 000160)
  616. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020862, ts 1663574224, len 000160)
  617. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032993, ts 1663574224, len 000160)
  618. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020863, ts 1663574384, len 000160)
  619. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032994, ts 1663574384, len 000160)
  620. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020864, ts 1663574544, len 000160)
  621. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032995, ts 1663574544, len 000160)
  622. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020865, ts 1663574704, len 000160)
  623. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032996, ts 1663574704, len 000160)
  624. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020866, ts 1663574864, len 000160)
  625. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032997, ts 1663574864, len 000160)
  626. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020867, ts 1663575024, len 000160)
  627. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032998, ts 1663575024, len 000160)
  628. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020868, ts 1663575184, len 000160)
  629. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 032999, ts 1663575184, len 000160)
  630. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020869, ts 1663575344, len 000160)
  631. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033000, ts 1663575344, len 000160)
  632. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020870, ts 1663575504, len 000160)
  633. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033001, ts 1663575504, len 000160)
  634. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020871, ts 1663575664, len 000160)
  635. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033002, ts 1663575664, len 000160)
  636. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020872, ts 1663575824, len 000160)
  637. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033003, ts 1663575824, len 000160)
  638. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020873, ts 1663575984, len 000160)
  639. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033004, ts 1663575984, len 000160)
  640. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020874, ts 1663576144, len 000160)
  641. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033005, ts 1663576144, len 000160)
  642. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020875, ts 1663576304, len 000160)
  643. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033006, ts 1663576304, len 000160)
  644. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020876, ts 1663576464, len 000160)
  645. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033007, ts 1663576464, len 000160)
  646. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020877, ts 1663576624, len 000160)
  647. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033008, ts 1663576624, len 000160)
  648. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020878, ts 1663576784, len 000160)
  649. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033009, ts 1663576784, len 000160)
  650. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020879, ts 1663576944, len 000160)
  651. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033010, ts 1663576944, len 000160)
  652. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020880, ts 1663577104, len 000160)
  653. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033011, ts 1663577104, len 000160)
  654. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020881, ts 1663577264, len 000160)
  655. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033012, ts 1663577264, len 000160)
  656. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020882, ts 1663577424, len 000160)
  657. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033013, ts 1663577424, len 000160)
  658. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020883, ts 1663577584, len 000160)
  659. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033014, ts 1663577584, len 000160)
  660. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020884, ts 1663577744, len 000160)
  661. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033015, ts 1663577744, len 000160)
  662. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020885, ts 1663577904, len 000160)
  663. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033016, ts 1663577904, len 000160)
  664. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020886, ts 1663578064, len 000160)
  665. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033017, ts 1663578064, len 000160)
  666. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020887, ts 1663578224, len 000160)
  667. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033018, ts 1663578224, len 000160)
  668. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020888, ts 1663578384, len 000160)
  669. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033019, ts 1663578384, len 000160)
  670. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020889, ts 1663578544, len 000160)
  671. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033020, ts 1663578544, len 000160)
  672. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020890, ts 1663578704, len 000160)
  673. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033021, ts 1663578704, len 000160)
  674. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020910, ts 1663581904, len 000160)
  675. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033022, ts 1663581904, len 000160)
  676. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020911, ts 1663582064, len 000160)
  677. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033023, ts 1663582064, len 000160)
  678. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020912, ts 1663582224, len 000160)
  679. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033024, ts 1663582224, len 000160)
  680. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020913, ts 1663582384, len 000160)
  681. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033025, ts 1663582384, len 000160)
  682. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020914, ts 1663582544, len 000160)
  683. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033026, ts 1663582544, len 000160)
  684. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020915, ts 1663582704, len 000160)
  685. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033027, ts 1663582704, len 000160)
  686. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020916, ts 1663582864, len 000160)
  687. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033028, ts 1663582864, len 000160)
  688. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020917, ts 1663583024, len 000160)
  689. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033029, ts 1663583024, len 000160)
  690. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020918, ts 1663583184, len 000160)
  691. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033030, ts 1663583184, len 000160)
  692. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020919, ts 1663583344, len 000160)
  693. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033031, ts 1663583344, len 000160)
  694. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020920, ts 1663583504, len 000160)
  695. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033032, ts 1663583504, len 000160)
  696. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020921, ts 1663583664, len 000160)
  697. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033033, ts 1663583664, len 000160)
  698. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020922, ts 1663583824, len 000160)
  699. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033034, ts 1663583824, len 000160)
  700. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020923, ts 1663583984, len 000160)
  701. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033035, ts 1663583984, len 000160)
  702. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020924, ts 1663584144, len 000160)
  703. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033036, ts 1663584144, len 000160)
  704. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020925, ts 1663584304, len 000160)
  705. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033037, ts 1663584304, len 000160)
  706. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020926, ts 1663584464, len 000160)
  707. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033038, ts 1663584464, len 000160)
  708. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020927, ts 1663584624, len 000160)
  709. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033039, ts 1663584624, len 000160)
  710. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020928, ts 1663584784, len 000160)
  711. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033040, ts 1663584784, len 000160)
  712. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020929, ts 1663584944, len 000160)
  713. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033041, ts 1663584944, len 000160)
  714. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020930, ts 1663585104, len 000160)
  715. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033042, ts 1663585104, len 000160)
  716. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020931, ts 1663585264, len 000160)
  717. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033043, ts 1663585264, len 000160)
  718. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020932, ts 1663585424, len 000160)
  719. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033044, ts 1663585424, len 000160)
  720. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020933, ts 1663585584, len 000160)
  721. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033045, ts 1663585584, len 000160)
  722. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020934, ts 1663585744, len 000160)
  723. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033046, ts 1663585744, len 000160)
  724. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020935, ts 1663585904, len 000160)
  725. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033047, ts 1663585904, len 000160)
  726. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020936, ts 1663586064, len 000160)
  727. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033048, ts 1663586064, len 000160)
  728. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020937, ts 1663586224, len 000160)
  729. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033049, ts 1663586224, len 000160)
  730. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020938, ts 1663586384, len 000160)
  731. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033050, ts 1663586384, len 000160)
  732. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020939, ts 1663586544, len 000160)
  733. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033051, ts 1663586544, len 000160)
  734. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020940, ts 1663586704, len 000160)
  735. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033052, ts 1663586704, len 000160)
  736. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020941, ts 1663586864, len 000160)
  737. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033053, ts 1663586864, len 000160)
  738. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020942, ts 1663587024, len 000160)
  739. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033054, ts 1663587024, len 000160)
  740. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020943, ts 1663587184, len 000160)
  741. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033055, ts 1663587184, len 000160)
  742. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020944, ts 1663587344, len 000160)
  743. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033056, ts 1663587344, len 000160)
  744. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020945, ts 1663587504, len 000160)
  745. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033057, ts 1663587504, len 000160)
  746. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020946, ts 1663587664, len 000160)
  747. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033058, ts 1663587664, len 000160)
  748. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020947, ts 1663587824, len 000160)
  749. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033059, ts 1663587824, len 000160)
  750. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020948, ts 1663587984, len 000160)
  751. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033060, ts 1663587984, len 000160)
  752. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020949, ts 1663588144, len 000160)
  753. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033061, ts 1663588144, len 000160)
  754. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020950, ts 1663588304, len 000160)
  755. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033062, ts 1663588304, len 000160)
  756. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020951, ts 1663588464, len 000160)
  757. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033063, ts 1663588464, len 000160)
  758. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020952, ts 1663588624, len 000160)
  759. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033064, ts 1663588624, len 000160)
  760. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020953, ts 1663588784, len 000160)
  761. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033065, ts 1663588784, len 000160)
  762. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020954, ts 1663588944, len 000160)
  763. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033066, ts 1663588944, len 000160)
  764. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020955, ts 1663589104, len 000160)
  765. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033067, ts 1663589104, len 000160)
  766. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020956, ts 1663589264, len 000160)
  767. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033068, ts 1663589264, len 000160)
  768. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020957, ts 1663589424, len 000160)
  769. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033069, ts 1663589424, len 000160)
  770. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020958, ts 1663589584, len 000160)
  771. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033070, ts 1663589584, len 000160)
  772. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020959, ts 1663589744, len 000160)
  773. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033071, ts 1663589744, len 000160)
  774. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020960, ts 1663589904, len 000160)
  775. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033072, ts 1663589904, len 000160)
  776. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020961, ts 1663590064, len 000160)
  777. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033073, ts 1663590064, len 000160)
  778. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020962, ts 1663590224, len 000160)
  779. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033074, ts 1663590224, len 000160)
  780. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020963, ts 1663590384, len 000160)
  781. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033075, ts 1663590384, len 000160)
  782. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020964, ts 1663590544, len 000160)
  783. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033076, ts 1663590544, len 000160)
  784. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020965, ts 1663590704, len 000160)
  785. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033077, ts 1663590704, len 000160)
  786. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020966, ts 1663590864, len 000160)
  787. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033078, ts 1663590864, len 000160)
  788. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020967, ts 1663591024, len 000160)
  789. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033079, ts 1663591024, len 000160)
  790. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020968, ts 1663591184, len 000160)
  791. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033080, ts 1663591184, len 000160)
  792. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020969, ts 1663591344, len 000160)
  793. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033081, ts 1663591344, len 000160)
  794. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020970, ts 1663591504, len 000160)
  795. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033082, ts 1663591504, len 000160)
  796. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020971, ts 1663591664, len 000160)
  797. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033083, ts 1663591664, len 000160)
  798. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020972, ts 1663591824, len 000160)
  799. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033084, ts 1663591824, len 000160)
  800. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020973, ts 1663591984, len 000160)
  801. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033085, ts 1663591984, len 000160)
  802. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020974, ts 1663592144, len 000160)
  803. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033086, ts 1663592144, len 000160)
  804. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020975, ts 1663592304, len 000160)
  805. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033087, ts 1663592304, len 000160)
  806. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020976, ts 1663592464, len 000160)
  807. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033088, ts 1663592464, len 000160)
  808. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020977, ts 1663592624, len 000160)
  809. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033089, ts 1663592624, len 000160)
  810. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020978, ts 1663592784, len 000160)
  811. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033090, ts 1663592784, len 000160)
  812. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020979, ts 1663592944, len 000160)
  813. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033091, ts 1663592944, len 000160)
  814. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020980, ts 1663593104, len 000160)
  815. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033092, ts 1663593104, len 000160)
  816. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020981, ts 1663593264, len 000160)
  817. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033093, ts 1663593264, len 000160)
  818. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020982, ts 1663593424, len 000160)
  819. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033094, ts 1663593424, len 000160)
  820. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020983, ts 1663593584, len 000160)
  821. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033095, ts 1663593584, len 000160)
  822. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020984, ts 1663593744, len 000160)
  823. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033096, ts 1663593744, len 000160)
  824. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020985, ts 1663593904, len 000160)
  825. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033097, ts 1663593904, len 000160)
  826. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020986, ts 1663594064, len 000160)
  827. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033098, ts 1663594064, len 000160)
  828. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020987, ts 1663594224, len 000160)
  829. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033099, ts 1663594224, len 000160)
  830. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020988, ts 1663594384, len 000160)
  831. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033100, ts 1663594384, len 000160)
  832. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020989, ts 1663594544, len 000160)
  833. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033101, ts 1663594544, len 000160)
  834.  
  835. <--- SIP read from WS:192.168.88.188:49766 --->
  836. REGISTER sip:192.168.88.251 SIP/2.0
  837. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKFB1oE3x4xnfygrwuq2IQALGnQgdcqLXt;rport
  838. From: "892"<sip:[email protected]>;tag=20gbdncDyNsH65SsRDRn
  839. To: "892"<sip:[email protected]>
  840. Contact: "892"<sip:[email protected];rtcweb-breaker=no;transport=ws>;expires=200;click2call=no;+g.oma.sip-im;+audio;language="en,fr"
  841. Call-ID: dc8a463e-01f5-927f-6d0f-31c24e5c091e
  842. CSeq: 18244 REGISTER
  843. Content-Length: 0
  844. Route: <sip:192.168.88.251:5060;lr;sipml5-outbound;transport=udp>
  845. Max-Forwards: 70
  846. Authorization: Digest username="892",realm="192.168.88.251",nonce="709dd0c8",uri="sip:192.168.88.251",response="c2bd91a0f205310feede653161b1704b",algorithm=MD5
  847. User-Agent: IM-client/OMA1.0 sipML5-v1.2014.12.11
  848. Organization: Doubango Telecom
  849.  
  850. <------------->
  851. --- (13 headers 0 lines) ---
  852.  
  853. <--- Transmitting (no NAT) to 192.168.88.188:5060 --->
  854. SIP/2.0 401 Unauthorized
  855. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKFB1oE3x4xnfygrwuq2IQALGnQgdcqLXt;rport;received=192.168.88.188
  856. From: "892"<sip:[email protected]>;tag=20gbdncDyNsH65SsRDRn
  857. To: "892"<sip:[email protected]>;tag=as352de87d
  858. Call-ID: dc8a463e-01f5-927f-6d0f-31c24e5c091e
  859. CSeq: 18244 REGISTER
  860. Server: Asterisk PBX 13.2.0
  861. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  862. Supported: replaces, timer
  863. WWW-Authenticate: Digest algorithm=MD5, realm="192.168.88.251", nonce="490ff754"
  864. Content-Length: 0
  865.  
  866.  
  867. <------------>
  868. Scheduling destruction of SIP dialog 'dc8a463e-01f5-927f-6d0f-31c24e5c091e' in 32000 ms (Method: REGISTER)
  869.  
  870. <--- SIP read from WS:192.168.88.188:49766 --->
  871. REGISTER sip:192.168.88.251 SIP/2.0
  872. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKmmNvOVylIAlHQJecU9HFXLIsHfTZF2KT;rport
  873. From: "892"<sip:[email protected]>;tag=20gbdncDyNsH65SsRDRn
  874. To: "892"<sip:[email protected]>
  875. Contact: "892"<sip:[email protected];rtcweb-breaker=no;transport=ws>;expires=200;click2call=no;+g.oma.sip-im;+audio;language="en,fr"
  876. Call-ID: dc8a463e-01f5-927f-6d0f-31c24e5c091e
  877. CSeq: 18245 REGISTER
  878. Content-Length: 0
  879. Route: <sip:192.168.88.251:5060;lr;sipml5-outbound;transport=udp>
  880. Max-Forwards: 70
  881. Authorization: Digest username="892",realm="192.168.88.251",nonce="490ff754",uri="sip:192.168.88.251",response="b8201f8727a543a59aa058421fd675d3",algorithm=MD5
  882. User-Agent: IM-client/OMA1.0 sipML5-v1.2014.12.11
  883. Organization: Doubango Telecom
  884.  
  885. <------------->
  886. --- (13 headers 0 lines) ---
  887.  
  888. <--- Transmitting (no NAT) to 192.168.88.188:5060 --->
  889. SIP/2.0 200 OK
  890. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKmmNvOVylIAlHQJecU9HFXLIsHfTZF2KT;rport;received=192.168.88.188
  891. From: "892"<sip:[email protected]>;tag=20gbdncDyNsH65SsRDRn
  892. To: "892"<sip:[email protected]>;tag=as352de87d
  893. Call-ID: dc8a463e-01f5-927f-6d0f-31c24e5c091e
  894. CSeq: 18245 REGISTER
  895. Server: Asterisk PBX 13.2.0
  896. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  897. Supported: replaces, timer
  898. Expires: 200
  899. Contact: <sip:[email protected];rtcweb-breaker=no;transport=ws>;expires=200
  900. Date: Wed, 18 Feb 2015 01:56:54 GMT
  901. Content-Length: 0
  902.  
  903.  
  904. <------------>
  905. Scheduling destruction of SIP dialog 'dc8a463e-01f5-927f-6d0f-31c24e5c091e' in 32000 ms (Method: REGISTER)
  906. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020990, ts 1663594704, len 000160)
  907. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033102, ts 1663594704, len 000160)
  908. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020991, ts 1663594864, len 000160)
  909. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033103, ts 1663594864, len 000160)
  910. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020992, ts 1663595024, len 000160)
  911. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033104, ts 1663595024, len 000160)
  912. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020993, ts 1663595184, len 000160)
  913. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033105, ts 1663595184, len 000160)
  914. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020994, ts 1663595344, len 000160)
  915. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033106, ts 1663595344, len 000160)
  916. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020995, ts 1663595504, len 000160)
  917. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033107, ts 1663595504, len 000160)
  918. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020996, ts 1663595664, len 000160)
  919. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033108, ts 1663595664, len 000160)
  920. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020997, ts 1663595824, len 000160)
  921. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033109, ts 1663595824, len 000160)
  922. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020998, ts 1663595984, len 000160)
  923. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033110, ts 1663595984, len 000160)
  924. Got RTP packet from 192.168.88.189:51702 (type 00, seq 020999, ts 1663596144, len 000160)
  925. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033111, ts 1663596144, len 000160)
  926. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021000, ts 1663596304, len 000160)
  927. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033112, ts 1663596304, len 000160)
  928. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021001, ts 1663596464, len 000160)
  929. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033113, ts 1663596464, len 000160)
  930. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021002, ts 1663596624, len 000160)
  931. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033114, ts 1663596624, len 000160)
  932. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021003, ts 1663596784, len 000160)
  933. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033115, ts 1663596784, len 000160)
  934. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021004, ts 1663596944, len 000160)
  935. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033116, ts 1663596944, len 000160)
  936. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021005, ts 1663597104, len 000160)
  937. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033117, ts 1663597104, len 000160)
  938. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021006, ts 1663597264, len 000160)
  939. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033118, ts 1663597264, len 000160)
  940. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021007, ts 1663597424, len 000160)
  941. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033119, ts 1663597424, len 000160)
  942. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021008, ts 1663597584, len 000160)
  943. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033120, ts 1663597584, len 000160)
  944. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021009, ts 1663597744, len 000160)
  945. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033121, ts 1663597744, len 000160)
  946. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021010, ts 1663597904, len 000160)
  947. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033122, ts 1663597904, len 000160)
  948. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021011, ts 1663598064, len 000160)
  949. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033123, ts 1663598064, len 000160)
  950. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021012, ts 1663598224, len 000160)
  951. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033124, ts 1663598224, len 000160)
  952. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021013, ts 1663598384, len 000160)
  953. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033125, ts 1663598384, len 000160)
  954. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021014, ts 1663598544, len 000160)
  955. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033126, ts 1663598544, len 000160)
  956. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021015, ts 1663598704, len 000160)
  957. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033127, ts 1663598704, len 000160)
  958. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021016, ts 1663598864, len 000160)
  959. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033128, ts 1663598864, len 000160)
  960. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021017, ts 1663599024, len 000160)
  961. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033129, ts 1663599024, len 000160)
  962. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021018, ts 1663599184, len 000160)
  963. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033130, ts 1663599184, len 000160)
  964. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021019, ts 1663599344, len 000160)
  965. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033131, ts 1663599344, len 000160)
  966. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021020, ts 1663599504, len 000160)
  967. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033132, ts 1663599504, len 000160)
  968. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021021, ts 1663599664, len 000160)
  969. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033133, ts 1663599664, len 000160)
  970. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021022, ts 1663599824, len 000160)
  971. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033134, ts 1663599824, len 000160)
  972. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021023, ts 1663599984, len 000160)
  973. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033135, ts 1663599984, len 000160)
  974. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021024, ts 1663600144, len 000160)
  975. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033136, ts 1663600144, len 000160)
  976. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021025, ts 1663600304, len 000160)
  977. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033137, ts 1663600304, len 000160)
  978. Got RTP packet from 192.168.88.189:51702 (type 00, seq 021026, ts 1663600464, len 000160)
  979. Sent RTP packet to 192.168.88.188:60359 (type 00, seq 033138, ts 1663600464, len 000160)
  980.  
  981. <--- SIP read from WS:192.168.88.189:54237 --->
  982. BYE sip:[email protected]:5060;transport=WS SIP/2.0
  983. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKiMNAPJ4P6Mga0tGmhfyns0IoToW4Neaw;rport
  984. From: <sip:[email protected]>;tag=qUs5QQHN7x2UdJACwDkc
  985. To: "892"<sip:[email protected]>;tag=as07fb62f4
  986. Call-ID: [email protected]:5060
  987. CSeq: 22917 BYE
  988. Content-Length: 0
  989. Route: <sip:192.168.88.251:5060;lr;sipml5-outbound;transport=udp>
  990. Max-Forwards: 70
  991. Accept-Contact: *;+g.oma.sip-im
  992. Accept-Contact: *;language="en,fr"
  993. Accept-Contact: *;+g.oma.sip-im
  994. Accept-Contact: *;language="en,fr"
  995. User-Agent: IM-client/OMA1.0 sipML5-v1.2014.12.11
  996. Organization: Doubango Telecom
  997.  
  998. <------------->
  999. --- (15 headers 0 lines) ---
  1000. Scheduling destruction of SIP dialog '[email protected]:5060' in 32000 ms (Method: BYE)
  1001.  
  1002. <--- Transmitting (no NAT) to 192.168.88.189:5060 --->
  1003. SIP/2.0 200 OK
  1004. Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKiMNAPJ4P6Mga0tGmhfyns0IoToW4Neaw;rport;received=192.168.88.189
  1005. From: <sip:[email protected]>;tag=qUs5QQHN7x2UdJACwDkc
  1006. To: "892"<sip:[email protected]>;tag=as07fb62f4
  1007. Call-ID: [email protected]:5060
  1008. CSeq: 22917 BYE
  1009. Server: Asterisk PBX 13.2.0
  1010. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  1011. Supported: replaces, timer
  1012. Content-Length: 0
  1013.  
  1014.  
  1015. <------------>
  1016. -- Channel SIP/893-00000097 left 'simple_bridge' basic-bridge <c73aad5d-5385-41cd-a3b6-8eaf3fe35d6b>
  1017. -- Channel SIP/892-00000096 left 'simple_bridge' basic-bridge <c73aad5d-5385-41cd-a3b6-8eaf3fe35d6b>
  1018. == Spawn extension (default, 893, 1) exited non-zero on 'SIP/892-00000096'
  1019. Scheduling destruction of SIP dialog '93e09629-4e85-9457-dd34-c3d837805991' in 32000 ms (Method: INVITE)
  1020. set_destination: Parsing <sip:[email protected];rtcweb-breaker=no;click2call=no;transport=ws> for address/port to send to
  1021. set_destination: URI is for WebSocket, we can't set destination
  1022. Reliably Transmitting (no NAT) to 192.168.88.188:5060:
  1023. BYE sip:[email protected];rtcweb-breaker=no;click2call=no;transport=ws SIP/2.0
  1024. Via: SIP/2.0/WS 192.168.88.251:5060;branch=z9hG4bK0a2204a8
  1025. Max-Forwards: 70
  1026. From: <sip:[email protected]>;tag=as6880fdfe
  1027. To: "892"<sip:[email protected]>;tag=84wXBVLIn7HmIFBiuDgW
  1028. Call-ID: 93e09629-4e85-9457-dd34-c3d837805991
  1029. CSeq: 102 BYE
  1030. User-Agent: Asterisk PBX 13.2.0
  1031. Proxy-Authorization: Digest username="889", realm="192.168.88.251", algorithm=MD5, uri="sip:192.168.88.251", nonce="477407fb", response="5e49881da9b2bc6287c9c1aa04c27537"
  1032. X-Asterisk-HangupCause: Normal Clearing
  1033. X-Asterisk-HangupCauseCode: 16
  1034. Content-Length: 0
  1035.  
  1036.  
  1037. ---
  1038.  
  1039. <--- SIP read from WS:192.168.88.188:49766 --->
  1040. SIP/2.0 200 OK
  1041. Via: SIP/2.0/WS 192.168.88.251:5060;branch=z9hG4bK0a2204a8
  1042. From: <sip:[email protected]>;tag=as6880fdfe
  1043. To: "892"<sip:[email protected]>;tag=84wXBVLIn7HmIFBiuDgW
  1044. Contact: <sip:[email protected];transport=ws>
  1045. Call-ID: 93e09629-4e85-9457-dd34-c3d837805991
  1046. CSeq: 102 BYE
  1047. Content-Length: 0
  1048.  
  1049. <------------->
  1050. --- (8 headers 0 lines) ---
  1051. SIP Response message for INCOMING dialog BYE arrived
  1052. Really destroying SIP dialog '93e09629-4e85-9457-dd34-c3d837805991' Method: INVITE
  1053.  
  1054. <--- Transmitting (no NAT) to 192.168.88.182:5060 --->
  1055. SIP/2.0 180 Ringing
  1056. Via: SIP/2.0/WS 192.0.2.97;branch=z9hG4bK6600227;received=192.168.88.182
  1057. From: <sip:[email protected]>;tag=ev8b7t1gfj
  1058. To: <sip:[email protected]>;tag=as6bbeef1d
  1059. Call-ID: s9iigcbrqmig8r9as7e7
  1060. CSeq: 3015 INVITE
  1061. Server: Asterisk PBX 13.2.0
  1062. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  1063. Supported: replaces, timer
  1064. Contact: <sip:[email protected]:5060;transport=WS>
  1065. Content-Length: 0
  1066.  
  1067.  
  1068. <------------>
  1069. ast*CLI> rtp set debug off
  1070. RTP Debugging Disabled
  1071. ast*CLI> sip set debug off
  1072. SIP Debugging Disabled
  1073. ast*CLI>
Advertisement
Add Comment
Please, Sign In to add comment