Advertisement
amartin

delay before audio is connected after answer

Apr 30th, 2015
418
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 46.99 KB | None | 0 0
  1. <--- SIP read from UDP:192.168.32.10:5062 --->
  2. INVITE sip:[email protected] SIP/2.0
  3. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205
  4. From: "openvpn" <sip:[email protected]>;tag=641944239
  5. CSeq: 1 INVITE
  6. Contact: <sip:[email protected]:5062>
  7. Content-Type: application/sdp
  8. Allow: INVITE, INFO, PRACK, ACK, BYE, CANCEL, OPTIONS, NOTIFY, REGISTER, SUBSCRIBE, REFER, PUBLISH, UPDATE, MESSAGE
  9. Max-Forwards: 70
  10. User-Agent: Yealink SIP-T32G 32.70.0.131
  11. Supported: replaces
  12. Allow-Events: talk,hold,conference,refer,check-sync
  13. Content-Length: 309
  14.  
  15. v=0
  16. o=- 20007 20007 IN IP4 192.168.32.10
  17. s=SDP data
  18. c=IN IP4 192.168.32.10
  19. t=0 0
  20. m=audio 11794 RTP/AVP 0 8 18 9 101
  21. a=rtpmap:0 PCMU/8000
  22. a=rtpmap:8 PCMA/8000
  23. a=rtpmap:18 G729/8000
  24. a=fmtp:18 annexb=yes
  25. a=rtpmap:9 G722/8000
  26. a=fmtp:101 0-15
  27. a=rtpmap:101 telephone-event/8000
  28. a=ptime:20
  29. a=sendrecv
  30. <------------->
  31. --- (14 headers 15 lines) ---
  32. Sending to 192.168.32.10:5062 (no NAT)
  33. Sending to 192.168.32.10:5062 (no NAT)
  34. Using INVITE request as basis request - [email protected]
  35. Found peer '265' for '265' from 192.168.32.10:5062
  36.  
  37. <--- Reliably Transmitting (no NAT) to 192.168.32.10:5062 --->
  38. SIP/2.0 401 Unauthorized
  39. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205;received=192.168.32.10
  40. From: "openvpn" <sip:[email protected]>;tag=641944239
  41. To: <sip:[email protected]>;tag=as12b40f66
  42. CSeq: 1 INVITE
  43. Server: Asterisk PBX 11.12.0
  44. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  45. Supported: replaces, timer
  46. WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="6919de6d"
  47. Content-Length: 0
  48.  
  49.  
  50. <------------>
  51. Scheduling destruction of SIP dialog '[email protected]' in 32000 ms (Method: INVITE)
  52.  
  53. <--- SIP read from UDP:192.168.32.10:5062 --->
  54. INVITE sip:[email protected] SIP/2.0
  55. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205
  56. From: "openvpn" <sip:[email protected]>;tag=641944239
  57. CSeq: 1 INVITE
  58. Contact: <sip:[email protected]:5062>
  59. Content-Type: application/sdp
  60. Allow: INVITE, INFO, PRACK, ACK, BYE, CANCEL, OPTIONS, NOTIFY, REGISTER, SUBSCRIBE, REFER, PUBLISH, UPDATE, MESSAGE
  61. Max-Forwards: 70
  62. User-Agent: Yealink SIP-T32G 32.70.0.131
  63. Supported: replaces
  64. Allow-Events: talk,hold,conference,refer,check-sync
  65. Content-Length: 309
  66.  
  67. v=0
  68. o=- 20007 20007 IN IP4 192.168.32.10
  69. s=SDP data
  70. c=IN IP4 192.168.32.10
  71. t=0 0
  72. m=audio 11794 RTP/AVP 0 8 18 9 101
  73. a=rtpmap:0 PCMU/8000
  74. a=rtpmap:8 PCMA/8000
  75. a=rtpmap:18 G729/8000
  76. a=fmtp:18 annexb=yes
  77. a=rtpmap:9 G722/8000
  78. a=fmtp:101 0-15
  79. a=rtpmap:101 telephone-event/8000
  80. a=ptime:20
  81. a=sendrecv
  82. <------------->
  83. --- (14 headers 15 lines) ---
  84. Ignoring this INVITE request
  85. Retransmitting #1 (no NAT) to 192.168.32.10:5062:
  86. SIP/2.0 401 Unauthorized
  87. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205;received=192.168.32.10
  88. From: "openvpn" <sip:[email protected]>;tag=641944239
  89. To: <sip:[email protected]>;tag=as12b40f66
  90. CSeq: 1 INVITE
  91. Server: Asterisk PBX 11.12.0
  92. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  93. Supported: replaces, timer
  94. WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="6919de6d"
  95. Content-Length: 0
  96.  
  97.  
  98. ---
  99.  
  100. Retransmitting #2 (no NAT) to 192.168.32.10:5062:
  101. SIP/2.0 401 Unauthorized
  102. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205;received=192.168.32.10
  103. From: "openvpn" <sip:[email protected]>;tag=641944239
  104. To: <sip:[email protected]>;tag=as12b40f66
  105. CSeq: 1 INVITE
  106. Server: Asterisk PBX 11.12.0
  107. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  108. Supported: replaces, timer
  109. WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="6919de6d"
  110. Content-Length: 0
  111.  
  112.  
  113. ---
  114.  
  115.  
  116.  
  117. Retransmitting #3 (no NAT) to 192.168.32.10:5062:
  118. SIP/2.0 401 Unauthorized
  119. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205;received=192.168.32.10
  120. From: "openvpn" <sip:[email protected]>;tag=641944239
  121. To: <sip:[email protected]>;tag=as12b40f66
  122. CSeq: 1 INVITE
  123. Server: Asterisk PBX 11.12.0
  124. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  125. Supported: replaces, timer
  126. WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="6919de6d"
  127. Content-Length: 0
  128.  
  129.  
  130. ---
  131.  
  132.  
  133.  
  134.  
  135.  
  136. Retransmitting #4 (no NAT) to 192.168.32.10:5062:
  137. SIP/2.0 401 Unauthorized
  138. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205;received=192.168.32.10
  139. From: "openvpn" <sip:[email protected]>;tag=641944239
  140. To: <sip:[email protected]>;tag=as12b40f66
  141. CSeq: 1 INVITE
  142. Server: Asterisk PBX 11.12.0
  143. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  144. Supported: replaces, timer
  145. WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="6919de6d"
  146. Content-Length: 0
  147.  
  148.  
  149. ---
  150.  
  151. <--- SIP read from UDP:192.168.32.10:5062 --->
  152. INVITE sip:[email protected] SIP/2.0
  153. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1555084015
  154. From: "openvpn" <sip:[email protected]>;tag=641944239
  155. CSeq: 2 INVITE
  156. Contact: <sip:[email protected]:5062>
  157. Authorization: Digest username="265", realm="asterisk", nonce="6919de6d", uri="sip:[email protected]", response="576f45faadd6c58728f07a4b5da03797", algorithm=MD5
  158. Content-Type: application/sdp
  159. Allow: INVITE, INFO, PRACK, ACK, BYE, CANCEL, OPTIONS, NOTIFY, REGISTER, SUBSCRIBE, REFER, PUBLISH, UPDATE, MESSAGE
  160. Max-Forwards: 70
  161. User-Agent: Yealink SIP-T32G 32.70.0.131
  162. Supported: replaces
  163. Allow-Events: talk,hold,conference,refer,check-sync
  164. Content-Length: 309
  165.  
  166. v=0
  167. o=- 20007 20007 IN IP4 192.168.32.10
  168. s=SDP data
  169. c=IN IP4 192.168.32.10
  170. t=0 0
  171. m=audio 11794 RTP/AVP 0 8 18 9 101
  172. a=rtpmap:0 PCMU/8000
  173. a=rtpmap:8 PCMA/8000
  174. a=rtpmap:18 G729/8000
  175. a=fmtp:18 annexb=yes
  176. a=rtpmap:9 G722/8000
  177. a=fmtp:101 0-15
  178. a=rtpmap:101 telephone-event/8000
  179. a=ptime:20
  180. a=sendrecv
  181. <------------->
  182. --- (15 headers 15 lines) ---
  183. Sending to 192.168.32.10:5062 (no NAT)
  184. Using INVITE request as basis request - [email protected]
  185. Found peer '265' for '265' from 192.168.32.10:5062
  186. == Using SIP RTP CoS mark 5
  187. Found RTP audio format 0
  188. Found RTP audio format 8
  189. Found RTP audio format 18
  190. Found RTP audio format 9
  191. Found RTP audio format 101
  192. Found audio description format PCMU for ID 0
  193. Found audio description format PCMA for ID 8
  194. Found audio description format G729 for ID 18
  195. Found audio description format G722 for ID 9
  196. Found audio description format telephone-event for ID 101
  197. Capabilities: us - (ulaw), peer - audio=(ulaw|alaw|g729|g722)/video=(nothing)/text=(nothing), combined - (ulaw)
  198. Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|)
  199. Peer audio RTP is at port 192.168.32.10:11794
  200. Looking for 146 in menu-internal (domain 10.10.32.10)
  201. list_route: hop: <sip:[email protected]:5062>
  202.  
  203. <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
  204. SIP/2.0 100 Trying
  205. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1555084015;received=192.168.32.10
  206. From: "openvpn" <sip:[email protected]>;tag=641944239
  207. CSeq: 2 INVITE
  208. Server: Asterisk PBX 11.12.0
  209. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  210. Supported: replaces, timer
  211. Contact: <sip:[email protected]:5060>
  212. Content-Length: 0
  213.  
  214.  
  215. <------------>
  216. -- Executing [146@menu-internal:1] Goto("SIP/265-000024e7", "dial-extension,146,1") in new stack
  217. -- Goto (dial-extension,146,1)
  218. -- Executing [146@dial-extension:1] Dial("SIP/265-000024e7", "SIP/146,12") in new stack
  219. == Using SIP RTP CoS mark 5
  220. -- Called SIP/146
  221. == Extension Changed 146[BLF] new state Ringing for Notify User 178
  222. == Extension Changed 146[BLF] new state Ringing for Notify User 169
  223. == Extension Changed 146[BLF] new state Ringing for Notify User 133
  224. -- SIP/146-000024e8 is ringing
  225.  
  226. <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
  227. SIP/2.0 180 Ringing
  228. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1555084015;received=192.168.32.10
  229. From: "openvpn" <sip:[email protected]>;tag=641944239
  230. To: <sip:[email protected]>;tag=as56a0e069
  231. CSeq: 2 INVITE
  232. Server: Asterisk PBX 11.12.0
  233. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  234. Supported: replaces, timer
  235. Contact: <sip:[email protected]:5060>
  236. Content-Length: 0
  237.  
  238.  
  239. <------------>
  240. == Extension Changed 146[BLF] new state Ringing for Notify User 178 (queued)
  241. == Extension Changed 146[BLF] new state Ringing for Notify User 169 (queued)
  242. == Extension Changed 146[BLF] new state Ringing for Notify User 133 (queued)
  243.  
  244. -- Nobody picked up in 12000 ms
  245. -- Executing [146@dial-extension:2] Set("SIP/265-000024e7", "real=146") in new stack
  246. -- Executing [146@dial-extension:3] Goto("SIP/265-000024e7", "playmenu,s,1") in new stack
  247. -- Goto (playmenu,s,1)
  248. -- Executing [s@playmenu:1] BackGround("SIP/265-000024e7", "user_unavail") in new stack
  249. == Extension Changed 146[BLF] new state Idle for Notify User 178
  250. Audio is at 19896
  251. == Extension Changed 146[BLF] new state Idle for Notify User 169 (queued)
  252. Adding codec 100003 (ulaw) to SDP
  253. Adding non-codec 0x1 (telephone-event) to SDP
  254. == Extension Changed 146[BLF] new state Idle for Notify User 133 (queued)
  255.  
  256. <--- Reliably Transmitting (no NAT) to 192.168.32.10:5062 --->
  257. SIP/2.0 200 OK
  258. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1555084015;received=192.168.32.10
  259. From: "openvpn" <sip:[email protected]>;tag=641944239
  260. To: <sip:[email protected]>;tag=as56a0e069
  261. CSeq: 2 INVITE
  262. Server: Asterisk PBX 11.12.0
  263. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  264. Supported: replaces, timer
  265. Contact: <sip:[email protected]:5060>
  266. Content-Type: application/sdp
  267. Content-Length: 234
  268.  
  269. v=0
  270. o=root 370316212 370316212 IN IP4 10.10.32.10
  271. s=Asterisk PBX 11.12.0
  272. c=IN IP4 10.10.32.10
  273. t=0 0
  274. m=audio 19896 RTP/AVP 0 101
  275. a=rtpmap:0 PCMU/8000
  276. a=rtpmap:101 telephone-event/8000
  277. a=fmtp:101 0-16
  278. a=ptime:20
  279. a=sendrecv
  280.  
  281. <------------>
  282. Retransmitting #1 (no NAT) to 192.168.32.10:5062:
  283. SIP/2.0 200 OK
  284. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1555084015;received=192.168.32.10
  285. From: "openvpn" <sip:[email protected]>;tag=641944239
  286. To: <sip:[email protected]>;tag=as56a0e069
  287. CSeq: 2 INVITE
  288. Server: Asterisk PBX 11.12.0
  289. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  290. Supported: replaces, timer
  291. Contact: <sip:[email protected]:5060>
  292. Content-Type: application/sdp
  293. Content-Length: 234
  294.  
  295. v=0
  296. o=root 370316212 370316212 IN IP4 10.10.32.10
  297. s=Asterisk PBX 11.12.0
  298. c=IN IP4 10.10.32.10
  299. t=0 0
  300. m=audio 19896 RTP/AVP 0 101
  301. a=rtpmap:0 PCMU/8000
  302. a=rtpmap:101 telephone-event/8000
  303. a=fmtp:101 0-16
  304. a=ptime:20
  305. a=sendrecv
  306.  
  307. ---
  308. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022480, ts 000160, len 000160)
  309. -- <SIP/265-000024e7> Playing 'user_unavail.slin' (language 'en')
  310. [2015-04-30 11:11:26] WARNING[21037][C-0000191a]: chan_sip.c:23949 handle_response: Remote host can't match request CANCEL to call '[email protected]:5060'. Giving up.
  311. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022481, ts 000320, len 000160)
  312. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022482, ts 000480, len 000160)
  313. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022483, ts 000640, len 000160)
  314.  
  315. <--- SIP read from UDP:192.168.32.10:5062 --->
  316. ACK sip:[email protected]:5060 SIP/2.0
  317. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1389783011
  318. From: "openvpn" <sip:[email protected]>;tag=641944239
  319. To: <sip:[email protected]>;tag=as56a0e069
  320. CSeq: 2 ACK
  321. Contact: <sip:[email protected]:5062>
  322. Max-Forwards: 70
  323. User-Agent: Yealink SIP-T32G 32.70.0.131
  324. Content-Length: 0
  325.  
  326. <------------->
  327. --- (10 headers 0 lines) ---
  328. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022484, ts 000800, len 000160)
  329. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022485, ts 000960, len 000160)
  330. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022486, ts 001120, len 000160)
  331. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023858, ts 159120, len 000160)
  332. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023859, ts 159280, len 000160)
  333. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023860, ts 159440, len 000160)
  334. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022487, ts 001280, len 000160)
  335. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023861, ts 159600, len 000160)
  336. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022488, ts 001440, len 000160)
  337. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023862, ts 159760, len 000160)
  338. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023863, ts 159920, len 000160)
  339. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022489, ts 001600, len 000160)
  340. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023864, ts 160080, len 000160)
  341. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022490, ts 001760, len 000160)
  342. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023865, ts 160240, len 000160)
  343. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022491, ts 001920, len 000160)
  344. Got RTP packet from 192.168.32.10:11794 (type 13, seq 023866, ts 160400, len 000001)
  345. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022492, ts 002080, len 000160)
  346. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022493, ts 002240, len 000160)
  347. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022494, ts 002400, len 000160)
  348. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022495, ts 002560, len 000160)
  349. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022496, ts 002720, len 000160)
  350. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022497, ts 002880, len 000160)
  351. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022498, ts 003040, len 000160)
  352. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022499, ts 003200, len 000160)
  353. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022500, ts 003360, len 000160)
  354. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022501, ts 003520, len 000160)
  355. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022502, ts 003680, len 000160)
  356. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022503, ts 003840, len 000160)
  357. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022504, ts 004000, len 000160)
  358. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022505, ts 004160, len 000160)
  359. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022506, ts 004320, len 000160)
  360. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022507, ts 004480, len 000160)
  361. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022508, ts 004640, len 000160)
  362. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022509, ts 004800, len 000160)
  363. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022510, ts 004960, len 000160)
  364. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022511, ts 005120, len 000160)
  365. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022512, ts 005280, len 000160)
  366. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022513, ts 005440, len 000160)
  367. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022514, ts 005600, len 000160)
  368. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022515, ts 005760, len 000160)
  369. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022516, ts 005920, len 000160)
  370. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022517, ts 006080, len 000160)
  371. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022518, ts 006240, len 000160)
  372. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022519, ts 006400, len 000160)
  373. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022520, ts 006560, len 000160)
  374. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022521, ts 006720, len 000160)
  375. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022522, ts 006880, len 000160)
  376. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022523, ts 007040, len 000160)
  377.  
  378. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022524, ts 007200, len 000160)
  379. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022525, ts 007360, len 000160)
  380. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022526, ts 007520, len 000160)
  381. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022527, ts 007680, len 000160)
  382. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022528, ts 007840, len 000160)
  383. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022529, ts 008000, len 000160)
  384. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022530, ts 008160, len 000160)
  385. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022531, ts 008320, len 000160)
  386. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022532, ts 008480, len 000160)
  387. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022533, ts 008640, len 000160)
  388. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022534, ts 008800, len 000160)
  389. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022535, ts 008960, len 000160)
  390. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022536, ts 009120, len 000160)
  391. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023867, ts 167520, len 000160)
  392. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022537, ts 009280, len 000160)
  393. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023868, ts 167680, len 000160)
  394. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022538, ts 009440, len 000160)
  395. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023869, ts 167840, len 000160)
  396. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022539, ts 009600, len 000160)
  397. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023870, ts 168000, len 000160)
  398. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022540, ts 009760, len 000160)
  399. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023871, ts 168160, len 000160)
  400. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022541, ts 009920, len 000160)
  401. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023872, ts 168320, len 000160)
  402. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022542, ts 010080, len 000160)
  403. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023873, ts 168480, len 000160)
  404. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022543, ts 010240, len 000160)
  405. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023874, ts 168640, len 000160)
  406. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022544, ts 010400, len 000160)
  407. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023875, ts 168800, len 000160)
  408. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022545, ts 010560, len 000160)
  409. Got RTP packet from 192.168.32.10:11794 (type 13, seq 023876, ts 168960, len 000001)
  410. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022546, ts 010720, len 000160)
  411.  
  412. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022547, ts 010880, len 000160)
  413. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022548, ts 011040, len 000160)
  414. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022549, ts 011200, len 000160)
  415. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022550, ts 011360, len 000160)
  416. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022551, ts 011520, len 000160)
  417. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022552, ts 011680, len 000160)
  418. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023877, ts 170000, len 000160)
  419. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023878, ts 170160, len 000160)
  420. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022553, ts 011840, len 000160)
  421. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023879, ts 170320, len 000160)
  422. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022554, ts 012000, len 000160)
  423. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023880, ts 170480, len 000160)
  424. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022555, ts 012160, len 000160)
  425. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023881, ts 170640, len 000160)
  426. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022556, ts 012320, len 000160)
  427. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023882, ts 170800, len 000160)
  428. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022557, ts 012480, len 000160)
  429. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023883, ts 170960, len 000160)
  430. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022558, ts 012640, len 000160)
  431. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022559, ts 012800, len 000160)
  432. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023884, ts 171120, len 000160)
  433. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022560, ts 012960, len 000160)
  434. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023885, ts 171280, len 000160)
  435. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022561, ts 013120, len 000160)
  436. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023886, ts 171440, len 000160)
  437. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022562, ts 013280, len 000160)
  438. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023887, ts 171600, len 000160)
  439. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022563, ts 013440, len 000160)
  440. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023888, ts 171760, len 000160)
  441. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023889, ts 171920, len 000160)
  442. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022564, ts 013600, len 000160)
  443. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023890, ts 172080, len 000160)
  444. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022565, ts 013760, len 000160)
  445. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023891, ts 172240, len 000160)
  446. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022566, ts 013920, len 000160)
  447. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023892, ts 172400, len 000160)
  448. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022567, ts 014080, len 000160)
  449. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023893, ts 172560, len 000160)
  450. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022568, ts 014240, len 000160)
  451. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023894, ts 172720, len 000160)
  452. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022569, ts 014400, len 000160)
  453. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023895, ts 172880, len 000160)
  454. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022570, ts 014560, len 000160)
  455. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023896, ts 173040, len 000160)
  456. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022571, ts 014720, len 000160)
  457. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023897, ts 173200, len 000160)
  458. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022572, ts 014880, len 000160)
  459. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022573, ts 015040, len 000160)
  460. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023898, ts 173360, len 000160)
  461. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022574, ts 015200, len 000160)
  462. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023899, ts 173520, len 000160)
  463. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022575, ts 015360, len 000160)
  464. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023900, ts 173680, len 000160)
  465. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022576, ts 015520, len 000160)
  466. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023901, ts 173840, len 000160)
  467. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022577, ts 015680, len 000160)
  468. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023902, ts 174000, len 000160)
  469. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022578, ts 015840, len 000160)
  470. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023903, ts 174160, len 000160)
  471. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022579, ts 016000, len 000160)
  472. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023904, ts 174320, len 000160)
  473. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022580, ts 016160, len 000160)
  474. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023905, ts 174480, len 000160)
  475. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022581, ts 016320, len 000160)
  476. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023906, ts 174640, len 000160)
  477. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022582, ts 016480, len 000160)
  478. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023907, ts 174800, len 000160)
  479. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022583, ts 016640, len 000160)
  480. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023908, ts 174960, len 000160)
  481. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022584, ts 016800, len 000160)
  482. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023909, ts 175120, len 000160)
  483. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022585, ts 016960, len 000160)
  484. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023910, ts 175280, len 000160)
  485. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022586, ts 017120, len 000160)
  486. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023911, ts 175440, len 000160)
  487. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023912, ts 175600, len 000160)
  488. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022587, ts 017280, len 000160)
  489. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022588, ts 017440, len 000160)
  490. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023913, ts 175760, len 000160)
  491. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022589, ts 017600, len 000160)
  492. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023914, ts 175920, len 000160)
  493. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022590, ts 017760, len 000160)
  494. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023915, ts 176080, len 000160)
  495. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022591, ts 017920, len 000160)
  496. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023916, ts 176240, len 000160)
  497. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022592, ts 018080, len 000160)
  498. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023917, ts 176400, len 000160)
  499. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022593, ts 018240, len 000160)
  500. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023918, ts 176560, len 000160)
  501. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022594, ts 018400, len 000160)
  502. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023919, ts 176720, len 000160)
  503. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022595, ts 018560, len 000160)
  504. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023920, ts 176880, len 000160)
  505. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022596, ts 018720, len 000160)
  506. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023921, ts 177040, len 000160)
  507. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022597, ts 018880, len 000160)
  508. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023922, ts 177200, len 000160)
  509. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022598, ts 019040, len 000160)
  510. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023923, ts 177360, len 000160)
  511.  
  512. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022599, ts 019200, len 000160)
  513. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023924, ts 177520, len 000160)
  514. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022600, ts 019360, len 000160)
  515. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023925, ts 177680, len 000160)
  516. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022601, ts 019520, len 000160)
  517. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023926, ts 177840, len 000160)
  518. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022602, ts 019680, len 000160)
  519. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023927, ts 178000, len 000160)
  520. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022603, ts 019840, len 000160)
  521. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023928, ts 178160, len 000160)
  522. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023929, ts 178320, len 000160)
  523. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022604, ts 020000, len 000160)
  524. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023930, ts 178480, len 000160)
  525. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022605, ts 020160, len 000160)
  526. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023931, ts 178640, len 000160)
  527. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022606, ts 020320, len 000160)
  528. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023932, ts 178800, len 000160)
  529. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022607, ts 020480, len 000160)
  530. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023933, ts 178960, len 000160)
  531. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022608, ts 020640, len 000160)
  532. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023934, ts 179120, len 000160)
  533. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022609, ts 020800, len 000160)
  534. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023935, ts 179280, len 000160)
  535. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022610, ts 020960, len 000160)
  536. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022611, ts 021120, len 000160)
  537. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023936, ts 179440, len 000160)
  538. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022612, ts 021280, len 000160)
  539. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023937, ts 179600, len 000160)
  540. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022613, ts 021440, len 000160)
  541. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023938, ts 179760, len 000160)
  542. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022614, ts 021600, len 000160)
  543. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023939, ts 179920, len 000160)
  544. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022615, ts 021760, len 000160)
  545. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023940, ts 180080, len 000160)
  546. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023941, ts 180240, len 000160)
  547. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022616, ts 021920, len 000160)
  548. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023942, ts 180400, len 000160)
  549. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022617, ts 022080, len 000160)
  550. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023943, ts 180560, len 000160)
  551. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022618, ts 022240, len 000160)
  552.  
  553. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023944, ts 180720, len 000160)
  554. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022619, ts 022400, len 000160)
  555. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023945, ts 180880, len 000160)
  556. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022620, ts 022560, len 000160)
  557. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023946, ts 181040, len 000160)
  558. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022621, ts 022720, len 000160)
  559. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022622, ts 022880, len 000160)
  560. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023947, ts 181200, len 000160)
  561. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022623, ts 023040, len 000160)
  562. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023948, ts 181360, len 000160)
  563. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022624, ts 023200, len 000160)
  564. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023949, ts 181520, len 000160)
  565. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022625, ts 023360, len 000160)
  566. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023950, ts 181680, len 000160)
  567. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022626, ts 023520, len 000160)
  568. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023951, ts 181840, len 000160)
  569. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022627, ts 023680, len 000160)
  570. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023952, ts 182000, len 000160)
  571. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022628, ts 023840, len 000160)
  572. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023953, ts 182160, len 000160)
  573. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022629, ts 024000, len 000160)
  574. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023954, ts 182320, len 000160)
  575. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022630, ts 024160, len 000160)
  576. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023955, ts 182480, len 000160)
  577. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022631, ts 024320, len 000160)
  578. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023956, ts 182640, len 000160)
  579. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022632, ts 024480, len 000160)
  580. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023957, ts 182800, len 000160)
  581. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023958, ts 182960, len 000160)
  582. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022633, ts 024640, len 000160)
  583. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023959, ts 183120, len 000160)
  584. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022634, ts 024800, len 000160)
  585. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022635, ts 024960, len 000160)
  586. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023960, ts 183280, len 000160)
  587. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023961, ts 183440, len 000160)
  588. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022636, ts 025120, len 000160)
  589. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023962, ts 183600, len 000160)
  590. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022637, ts 025280, len 000160)
  591. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023963, ts 183760, len 000160)
  592. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022638, ts 025440, len 000160)
  593. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023964, ts 183920, len 000160)
  594. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022639, ts 025600, len 000160)
  595. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023965, ts 184080, len 000160)
  596. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022640, ts 025760, len 000160)
  597. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023966, ts 184240, len 000160)
  598. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022641, ts 025920, len 000160)
  599. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023967, ts 184400, len 000160)
  600. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022642, ts 026080, len 000160)
  601. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023968, ts 184560, len 000160)
  602. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022643, ts 026240, len 000160)
  603. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023969, ts 184720, len 000160)
  604. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022644, ts 026400, len 000160)
  605. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023970, ts 184880, len 000160)
  606. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022645, ts 026560, len 000160)
  607. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023971, ts 185040, len 000160)
  608. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022646, ts 026720, len 000160)
  609. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023972, ts 185200, len 000160)
  610. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022647, ts 026880, len 000160)
  611. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023973, ts 185360, len 000160)
  612. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022648, ts 027040, len 000160)
  613. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023974, ts 185520, len 000160)
  614. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022649, ts 027200, len 000160)
  615. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023975, ts 185680, len 000160)
  616. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022650, ts 027360, len 000160)
  617. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023976, ts 185840, len 000160)
  618. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022651, ts 027520, len 000160)
  619. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023977, ts 186000, len 000160)
  620. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022652, ts 027680, len 000160)
  621. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023978, ts 186160, len 000160)
  622. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022653, ts 027840, len 000160)
  623. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023979, ts 186320, len 000160)
  624. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022654, ts 028000, len 000160)
  625. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023980, ts 186480, len 000160)
  626. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022655, ts 028160, len 000160)
  627. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023981, ts 186640, len 000160)
  628. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022656, ts 028320, len 000160)
  629. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023982, ts 186800, len 000160)
  630. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022657, ts 028480, len 000160)
  631. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023983, ts 186960, len 000160)
  632. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022658, ts 028640, len 000160)
  633. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023984, ts 187120, len 000160)
  634. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022659, ts 028800, len 000160)
  635. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023985, ts 187280, len 000160)
  636. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022660, ts 028960, len 000160)
  637. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022661, ts 029120, len 000160)
  638. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023986, ts 187440, len 000160)
  639. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022662, ts 029280, len 000160)
  640. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023987, ts 187600, len 000160)
  641. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022663, ts 029440, len 000160)
  642. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023988, ts 187760, len 000160)
  643. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022664, ts 029600, len 000160)
  644. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023989, ts 187920, len 000160)
  645. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023990, ts 188080, len 000160)
  646. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022665, ts 029760, len 000160)
  647. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023991, ts 188240, len 000160)
  648. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022666, ts 029920, len 000160)
  649. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023992, ts 188400, len 000160)
  650. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022667, ts 030080, len 000160)
  651. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023993, ts 188560, len 000160)
  652. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022668, ts 030240, len 000160)
  653. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022669, ts 030400, len 000160)
  654. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022670, ts 030560, len 000160)
  655. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023994, ts 188720, len 000160)
  656. Got RTP packet from 192.168.32.10:11794 (type 00, seq 023995, ts 188880, len 000160)
  657. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022671, ts 030720, len 000160)
  658. Got RTP packet from 192.168.32.10:11794 (type 101, seq 023996, ts 189120, len 000004)
  659. Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 023996, ts 189120, len 000004, mark 1, event 00000004, end 0, duration 00080)
  660. [2015-04-30 11:11:30] DTMF[15720][C-0000191a]: channel.c:4214 __ast_read: DTMF begin '4' received on SIP/265-000024e7
  661. [2015-04-30 11:11:30] DTMF[15720][C-0000191a]: channel.c:4218 __ast_read: DTMF begin ignored '4' on SIP/265-000024e7
  662. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022672, ts 030880, len 000160)
  663. Got RTP packet from 192.168.32.10:11794 (type 101, seq 023997, ts 189120, len 000004)
  664. Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 023997, ts 189120, len 000004, mark 0, event 00000004, end 0, duration 00160)
  665. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022673, ts 031040, len 000160)
  666. Got RTP packet from 192.168.32.10:11794 (type 101, seq 023998, ts 189120, len 000004)
  667. Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 023998, ts 189120, len 000004, mark 0, event 00000004, end 0, duration 00320)
  668. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022674, ts 031200, len 000160)
  669. Got RTP packet from 192.168.32.10:11794 (type 101, seq 023999, ts 189120, len 000004)
  670. Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 023999, ts 189120, len 000004, mark 0, event 00000004, end 0, duration 00480)
  671. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022675, ts 031360, len 000160)
  672. Got RTP packet from 192.168.32.10:11794 (type 101, seq 024000, ts 189120, len 000004)
  673. Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 024000, ts 189120, len 000004, mark 0, event 00000004, end 0, duration 00640)
  674. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022676, ts 031520, len 000160)
  675. Got RTP packet from 192.168.32.10:11794 (type 101, seq 024001, ts 189120, len 000004)
  676. Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 024001, ts 189120, len 000004, mark 0, event 00000004, end 0, duration 00800)
  677. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022677, ts 031680, len 000160)
  678. Got RTP packet from 192.168.32.10:11794 (type 101, seq 024002, ts 189120, len 000004)
  679. Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 024002, ts 189120, len 000004, mark 0, event 00000004, end 0, duration 00960)
  680. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022678, ts 031840, len 000160)
  681. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022679, ts 032000, len 000160)
  682. Got RTP packet from 192.168.32.10:11794 (type 101, seq 024003, ts 189120, len 000004)
  683. Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 024003, ts 189120, len 000004, mark 0, event 00000004, end 1, duration 01200)
  684. [2015-04-30 11:11:30] DTMF[15720][C-0000191a]: channel.c:4128 __ast_read: DTMF end '4' received on SIP/265-000024e7, duration 150 ms
  685. [2015-04-30 11:11:30] DTMF[15720][C-0000191a]: channel.c:4198 __ast_read: DTMF end passthrough '4' on SIP/265-000024e7
  686. -- Invalid extension '4' in context 'playmenu' on SIP/265-000024e7
  687. == CDR updated on SIP/265-000024e7
  688. -- Executing [i@playmenu:1] Playback("SIP/265-000024e7", "invalid_exten") in new stack
  689. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022680, ts 032160, len 000160)
  690. -- <SIP/265-000024e7> Playing 'invalid_exten.slin' (language 'en')
  691. Got RTP packet from 192.168.32.10:11794 (type 00, seq 024004, ts 190240, len 000160)
  692. Got RTP packet from 192.168.32.10:11794 (type 101, seq 024005, ts 189120, len 000004)
  693. Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 024005, ts 189120, len 000004, mark 0, event 00000004, end 1, duration 01200)
  694. Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022681, ts 032320, len 000160)
  695.  
  696. <--- SIP read from UDP:192.168.32.10:5062 --->
  697. BYE sip:[email protected]:5060 SIP/2.0
  698. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK826315862
  699. From: "openvpn" <sip:[email protected]>;tag=641944239
  700. To: <sip:[email protected]>;tag=as56a0e069
  701. CSeq: 3 BYE
  702. Contact: <sip:[email protected]:5062>
  703. Authorization: Digest username="265", realm="asterisk", nonce="6919de6d", uri="sip:[email protected]:5060", response="d1cb7d601a7eb7fb772eb4f2fdb13971", algorithm=MD5
  704. Max-Forwards: 70
  705. User-Agent: Yealink SIP-T32G 32.70.0.131
  706. Content-Length: 0
  707.  
  708. <------------->
  709. --- (11 headers 0 lines) ---
  710. Sending to 192.168.32.10:5062 (no NAT)
  711. Scheduling destruction of SIP dialog '[email protected]' in 32000 ms (Method: BYE)
  712.  
  713. <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
  714. SIP/2.0 200 OK
  715. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK826315862;received=192.168.32.10
  716. From: "openvpn" <sip:[email protected]>;tag=641944239
  717. To: <sip:[email protected]>;tag=as56a0e069
  718. CSeq: 3 BYE
  719. Server: Asterisk PBX 11.12.0
  720. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  721. Supported: replaces, timer
  722. Content-Length: 0
  723.  
  724.  
  725. <------------>
  726. == Spawn extension (playmenu, i, 1) exited non-zero on 'SIP/265-000024e7'
  727.  
  728. <--- SIP read from UDP:192.168.32.10:5062 --->
  729. BYE sip:[email protected]:5060 SIP/2.0
  730. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK826315862
  731. From: "openvpn" <sip:[email protected]>;tag=641944239
  732. To: <sip:[email protected]>;tag=as56a0e069
  733. CSeq: 3 BYE
  734. Contact: <sip:[email protected]:5062>
  735. Authorization: Digest username="265", realm="asterisk", nonce="6919de6d", uri="sip:[email protected]:5060", response="d1cb7d601a7eb7fb772eb4f2fdb13971", algorithm=MD5
  736. Max-Forwards: 70
  737. User-Agent: Yealink SIP-T32G 32.70.0.131
  738. Content-Length: 0
  739.  
  740. <------------->
  741. --- (11 headers 0 lines) ---
  742. Sending to 192.168.32.10:5062 (no NAT)
  743.  
  744. <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
  745. SIP/2.0 200 OK
  746. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK826315862;received=192.168.32.10
  747. From: "openvpn" <sip:[email protected]>;tag=641944239
  748. To: <sip:[email protected]>;tag=as56a0e069
  749. CSeq: 3 BYE
  750. Server: Asterisk PBX 11.12.0
  751. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  752. Supported: replaces, timer
  753. Content-Length: 0
  754.  
  755.  
  756. <------------>
  757.  
  758.  
  759.  
  760. Really destroying SIP dialog '[email protected]' Method: BYE
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement