Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <--- SIP read from UDP:192.168.32.10:5062 --->
- INVITE sip:146@10.10.32.10 SIP/2.0
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>
- Call-ID: 1641701694@192.168.32.10
- CSeq: 1 INVITE
- Contact: <sip:265@192.168.32.10:5062>
- Content-Type: application/sdp
- Allow: INVITE, INFO, PRACK, ACK, BYE, CANCEL, OPTIONS, NOTIFY, REGISTER, SUBSCRIBE, REFER, PUBLISH, UPDATE, MESSAGE
- Max-Forwards: 70
- User-Agent: Yealink SIP-T32G 32.70.0.131
- Supported: replaces
- Allow-Events: talk,hold,conference,refer,check-sync
- Content-Length: 309
- v=0
- o=- 20007 20007 IN IP4 192.168.32.10
- s=SDP data
- c=IN IP4 192.168.32.10
- t=0 0
- m=audio 11794 RTP/AVP 0 8 18 9 101
- a=rtpmap:0 PCMU/8000
- a=rtpmap:8 PCMA/8000
- a=rtpmap:18 G729/8000
- a=fmtp:18 annexb=yes
- a=rtpmap:9 G722/8000
- a=fmtp:101 0-15
- a=rtpmap:101 telephone-event/8000
- a=ptime:20
- a=sendrecv
- <------------->
- --- (14 headers 15 lines) ---
- Sending to 192.168.32.10:5062 (no NAT)
- Sending to 192.168.32.10:5062 (no NAT)
- Using INVITE request as basis request - 1641701694@192.168.32.10
- Found peer '265' for '265' from 192.168.32.10:5062
- <--- Reliably Transmitting (no NAT) to 192.168.32.10:5062 --->
- SIP/2.0 401 Unauthorized
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205;received=192.168.32.10
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as12b40f66
- Call-ID: 1641701694@192.168.32.10
- CSeq: 1 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="6919de6d"
- Content-Length: 0
- <------------>
- Scheduling destruction of SIP dialog '1641701694@192.168.32.10' in 32000 ms (Method: INVITE)
- <--- SIP read from UDP:192.168.32.10:5062 --->
- INVITE sip:146@10.10.32.10 SIP/2.0
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>
- Call-ID: 1641701694@192.168.32.10
- CSeq: 1 INVITE
- Contact: <sip:265@192.168.32.10:5062>
- Content-Type: application/sdp
- Allow: INVITE, INFO, PRACK, ACK, BYE, CANCEL, OPTIONS, NOTIFY, REGISTER, SUBSCRIBE, REFER, PUBLISH, UPDATE, MESSAGE
- Max-Forwards: 70
- User-Agent: Yealink SIP-T32G 32.70.0.131
- Supported: replaces
- Allow-Events: talk,hold,conference,refer,check-sync
- Content-Length: 309
- v=0
- o=- 20007 20007 IN IP4 192.168.32.10
- s=SDP data
- c=IN IP4 192.168.32.10
- t=0 0
- m=audio 11794 RTP/AVP 0 8 18 9 101
- a=rtpmap:0 PCMU/8000
- a=rtpmap:8 PCMA/8000
- a=rtpmap:18 G729/8000
- a=fmtp:18 annexb=yes
- a=rtpmap:9 G722/8000
- a=fmtp:101 0-15
- a=rtpmap:101 telephone-event/8000
- a=ptime:20
- a=sendrecv
- <------------->
- --- (14 headers 15 lines) ---
- Ignoring this INVITE request
- Retransmitting #1 (no NAT) to 192.168.32.10:5062:
- SIP/2.0 401 Unauthorized
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205;received=192.168.32.10
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as12b40f66
- Call-ID: 1641701694@192.168.32.10
- CSeq: 1 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="6919de6d"
- Content-Length: 0
- ---
- Retransmitting #2 (no NAT) to 192.168.32.10:5062:
- SIP/2.0 401 Unauthorized
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205;received=192.168.32.10
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as12b40f66
- Call-ID: 1641701694@192.168.32.10
- CSeq: 1 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="6919de6d"
- Content-Length: 0
- ---
- Retransmitting #3 (no NAT) to 192.168.32.10:5062:
- SIP/2.0 401 Unauthorized
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205;received=192.168.32.10
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as12b40f66
- Call-ID: 1641701694@192.168.32.10
- CSeq: 1 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="6919de6d"
- Content-Length: 0
- ---
- Retransmitting #4 (no NAT) to 192.168.32.10:5062:
- SIP/2.0 401 Unauthorized
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1991747205;received=192.168.32.10
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as12b40f66
- Call-ID: 1641701694@192.168.32.10
- CSeq: 1 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="6919de6d"
- Content-Length: 0
- ---
- <--- SIP read from UDP:192.168.32.10:5062 --->
- INVITE sip:146@10.10.32.10 SIP/2.0
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1555084015
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>
- Call-ID: 1641701694@192.168.32.10
- CSeq: 2 INVITE
- Contact: <sip:265@192.168.32.10:5062>
- Authorization: Digest username="265", realm="asterisk", nonce="6919de6d", uri="sip:146@10.10.32.10", response="576f45faadd6c58728f07a4b5da03797", algorithm=MD5
- Content-Type: application/sdp
- Allow: INVITE, INFO, PRACK, ACK, BYE, CANCEL, OPTIONS, NOTIFY, REGISTER, SUBSCRIBE, REFER, PUBLISH, UPDATE, MESSAGE
- Max-Forwards: 70
- User-Agent: Yealink SIP-T32G 32.70.0.131
- Supported: replaces
- Allow-Events: talk,hold,conference,refer,check-sync
- Content-Length: 309
- v=0
- o=- 20007 20007 IN IP4 192.168.32.10
- s=SDP data
- c=IN IP4 192.168.32.10
- t=0 0
- m=audio 11794 RTP/AVP 0 8 18 9 101
- a=rtpmap:0 PCMU/8000
- a=rtpmap:8 PCMA/8000
- a=rtpmap:18 G729/8000
- a=fmtp:18 annexb=yes
- a=rtpmap:9 G722/8000
- a=fmtp:101 0-15
- a=rtpmap:101 telephone-event/8000
- a=ptime:20
- a=sendrecv
- <------------->
- --- (15 headers 15 lines) ---
- Sending to 192.168.32.10:5062 (no NAT)
- Using INVITE request as basis request - 1641701694@192.168.32.10
- Found peer '265' for '265' from 192.168.32.10:5062
- == Using SIP RTP CoS mark 5
- Found RTP audio format 0
- Found RTP audio format 8
- Found RTP audio format 18
- Found RTP audio format 9
- Found RTP audio format 101
- Found audio description format PCMU for ID 0
- Found audio description format PCMA for ID 8
- Found audio description format G729 for ID 18
- Found audio description format G722 for ID 9
- Found audio description format telephone-event for ID 101
- Capabilities: us - (ulaw), peer - audio=(ulaw|alaw|g729|g722)/video=(nothing)/text=(nothing), combined - (ulaw)
- Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|)
- Peer audio RTP is at port 192.168.32.10:11794
- Looking for 146 in menu-internal (domain 10.10.32.10)
- list_route: hop: <sip:265@192.168.32.10:5062>
- <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
- SIP/2.0 100 Trying
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1555084015;received=192.168.32.10
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>
- Call-ID: 1641701694@192.168.32.10
- CSeq: 2 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- Contact: <sip:146@10.10.32.10:5060>
- Content-Length: 0
- <------------>
- -- Executing [146@menu-internal:1] Goto("SIP/265-000024e7", "dial-extension,146,1") in new stack
- -- Goto (dial-extension,146,1)
- -- Executing [146@dial-extension:1] Dial("SIP/265-000024e7", "SIP/146,12") in new stack
- == Using SIP RTP CoS mark 5
- -- Called SIP/146
- == Extension Changed 146[BLF] new state Ringing for Notify User 178
- == Extension Changed 146[BLF] new state Ringing for Notify User 169
- == Extension Changed 146[BLF] new state Ringing for Notify User 133
- -- SIP/146-000024e8 is ringing
- <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
- SIP/2.0 180 Ringing
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1555084015;received=192.168.32.10
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as56a0e069
- Call-ID: 1641701694@192.168.32.10
- CSeq: 2 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- Contact: <sip:146@10.10.32.10:5060>
- Content-Length: 0
- <------------>
- == Extension Changed 146[BLF] new state Ringing for Notify User 178 (queued)
- == Extension Changed 146[BLF] new state Ringing for Notify User 169 (queued)
- == Extension Changed 146[BLF] new state Ringing for Notify User 133 (queued)
- -- Nobody picked up in 12000 ms
- -- Executing [146@dial-extension:2] Set("SIP/265-000024e7", "real=146") in new stack
- -- Executing [146@dial-extension:3] Goto("SIP/265-000024e7", "playmenu,s,1") in new stack
- -- Goto (playmenu,s,1)
- -- Executing [s@playmenu:1] BackGround("SIP/265-000024e7", "user_unavail") in new stack
- == Extension Changed 146[BLF] new state Idle for Notify User 178
- Audio is at 19896
- == Extension Changed 146[BLF] new state Idle for Notify User 169 (queued)
- Adding codec 100003 (ulaw) to SDP
- Adding non-codec 0x1 (telephone-event) to SDP
- == Extension Changed 146[BLF] new state Idle for Notify User 133 (queued)
- <--- Reliably Transmitting (no NAT) to 192.168.32.10:5062 --->
- SIP/2.0 200 OK
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1555084015;received=192.168.32.10
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as56a0e069
- Call-ID: 1641701694@192.168.32.10
- CSeq: 2 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- Contact: <sip:146@10.10.32.10:5060>
- Content-Type: application/sdp
- Content-Length: 234
- v=0
- o=root 370316212 370316212 IN IP4 10.10.32.10
- s=Asterisk PBX 11.12.0
- c=IN IP4 10.10.32.10
- t=0 0
- m=audio 19896 RTP/AVP 0 101
- a=rtpmap:0 PCMU/8000
- a=rtpmap:101 telephone-event/8000
- a=fmtp:101 0-16
- a=ptime:20
- a=sendrecv
- <------------>
- Retransmitting #1 (no NAT) to 192.168.32.10:5062:
- SIP/2.0 200 OK
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1555084015;received=192.168.32.10
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as56a0e069
- Call-ID: 1641701694@192.168.32.10
- CSeq: 2 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- Contact: <sip:146@10.10.32.10:5060>
- Content-Type: application/sdp
- Content-Length: 234
- v=0
- o=root 370316212 370316212 IN IP4 10.10.32.10
- s=Asterisk PBX 11.12.0
- c=IN IP4 10.10.32.10
- t=0 0
- m=audio 19896 RTP/AVP 0 101
- a=rtpmap:0 PCMU/8000
- a=rtpmap:101 telephone-event/8000
- a=fmtp:101 0-16
- a=ptime:20
- a=sendrecv
- ---
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022480, ts 000160, len 000160)
- -- <SIP/265-000024e7> Playing 'user_unavail.slin' (language 'en')
- [2015-04-30 11:11:26] WARNING[21037][C-0000191a]: chan_sip.c:23949 handle_response: Remote host can't match request CANCEL to call '598771f453f639245e27cd134d149d86@10.10.32.10:5060'. Giving up.
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022481, ts 000320, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022482, ts 000480, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022483, ts 000640, len 000160)
- <--- SIP read from UDP:192.168.32.10:5062 --->
- ACK sip:146@10.10.32.10:5060 SIP/2.0
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1389783011
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as56a0e069
- Call-ID: 1641701694@192.168.32.10
- CSeq: 2 ACK
- Contact: <sip:265@192.168.32.10:5062>
- Max-Forwards: 70
- User-Agent: Yealink SIP-T32G 32.70.0.131
- Content-Length: 0
- <------------->
- --- (10 headers 0 lines) ---
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022484, ts 000800, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022485, ts 000960, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022486, ts 001120, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023858, ts 159120, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023859, ts 159280, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023860, ts 159440, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022487, ts 001280, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023861, ts 159600, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022488, ts 001440, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023862, ts 159760, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023863, ts 159920, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022489, ts 001600, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023864, ts 160080, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022490, ts 001760, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023865, ts 160240, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022491, ts 001920, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 13, seq 023866, ts 160400, len 000001)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022492, ts 002080, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022493, ts 002240, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022494, ts 002400, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022495, ts 002560, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022496, ts 002720, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022497, ts 002880, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022498, ts 003040, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022499, ts 003200, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022500, ts 003360, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022501, ts 003520, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022502, ts 003680, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022503, ts 003840, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022504, ts 004000, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022505, ts 004160, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022506, ts 004320, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022507, ts 004480, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022508, ts 004640, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022509, ts 004800, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022510, ts 004960, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022511, ts 005120, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022512, ts 005280, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022513, ts 005440, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022514, ts 005600, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022515, ts 005760, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022516, ts 005920, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022517, ts 006080, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022518, ts 006240, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022519, ts 006400, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022520, ts 006560, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022521, ts 006720, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022522, ts 006880, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022523, ts 007040, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022524, ts 007200, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022525, ts 007360, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022526, ts 007520, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022527, ts 007680, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022528, ts 007840, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022529, ts 008000, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022530, ts 008160, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022531, ts 008320, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022532, ts 008480, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022533, ts 008640, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022534, ts 008800, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022535, ts 008960, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022536, ts 009120, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023867, ts 167520, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022537, ts 009280, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023868, ts 167680, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022538, ts 009440, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023869, ts 167840, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022539, ts 009600, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023870, ts 168000, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022540, ts 009760, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023871, ts 168160, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022541, ts 009920, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023872, ts 168320, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022542, ts 010080, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023873, ts 168480, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022543, ts 010240, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023874, ts 168640, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022544, ts 010400, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023875, ts 168800, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022545, ts 010560, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 13, seq 023876, ts 168960, len 000001)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022546, ts 010720, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022547, ts 010880, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022548, ts 011040, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022549, ts 011200, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022550, ts 011360, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022551, ts 011520, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022552, ts 011680, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023877, ts 170000, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023878, ts 170160, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022553, ts 011840, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023879, ts 170320, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022554, ts 012000, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023880, ts 170480, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022555, ts 012160, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023881, ts 170640, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022556, ts 012320, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023882, ts 170800, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022557, ts 012480, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023883, ts 170960, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022558, ts 012640, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022559, ts 012800, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023884, ts 171120, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022560, ts 012960, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023885, ts 171280, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022561, ts 013120, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023886, ts 171440, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022562, ts 013280, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023887, ts 171600, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022563, ts 013440, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023888, ts 171760, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023889, ts 171920, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022564, ts 013600, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023890, ts 172080, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022565, ts 013760, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023891, ts 172240, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022566, ts 013920, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023892, ts 172400, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022567, ts 014080, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023893, ts 172560, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022568, ts 014240, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023894, ts 172720, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022569, ts 014400, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023895, ts 172880, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022570, ts 014560, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023896, ts 173040, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022571, ts 014720, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023897, ts 173200, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022572, ts 014880, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022573, ts 015040, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023898, ts 173360, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022574, ts 015200, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023899, ts 173520, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022575, ts 015360, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023900, ts 173680, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022576, ts 015520, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023901, ts 173840, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022577, ts 015680, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023902, ts 174000, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022578, ts 015840, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023903, ts 174160, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022579, ts 016000, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023904, ts 174320, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022580, ts 016160, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023905, ts 174480, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022581, ts 016320, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023906, ts 174640, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022582, ts 016480, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023907, ts 174800, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022583, ts 016640, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023908, ts 174960, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022584, ts 016800, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023909, ts 175120, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022585, ts 016960, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023910, ts 175280, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022586, ts 017120, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023911, ts 175440, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023912, ts 175600, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022587, ts 017280, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022588, ts 017440, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023913, ts 175760, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022589, ts 017600, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023914, ts 175920, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022590, ts 017760, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023915, ts 176080, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022591, ts 017920, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023916, ts 176240, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022592, ts 018080, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023917, ts 176400, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022593, ts 018240, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023918, ts 176560, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022594, ts 018400, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023919, ts 176720, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022595, ts 018560, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023920, ts 176880, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022596, ts 018720, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023921, ts 177040, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022597, ts 018880, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023922, ts 177200, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022598, ts 019040, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023923, ts 177360, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022599, ts 019200, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023924, ts 177520, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022600, ts 019360, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023925, ts 177680, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022601, ts 019520, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023926, ts 177840, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022602, ts 019680, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023927, ts 178000, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022603, ts 019840, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023928, ts 178160, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023929, ts 178320, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022604, ts 020000, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023930, ts 178480, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022605, ts 020160, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023931, ts 178640, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022606, ts 020320, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023932, ts 178800, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022607, ts 020480, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023933, ts 178960, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022608, ts 020640, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023934, ts 179120, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022609, ts 020800, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023935, ts 179280, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022610, ts 020960, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022611, ts 021120, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023936, ts 179440, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022612, ts 021280, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023937, ts 179600, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022613, ts 021440, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023938, ts 179760, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022614, ts 021600, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023939, ts 179920, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022615, ts 021760, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023940, ts 180080, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023941, ts 180240, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022616, ts 021920, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023942, ts 180400, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022617, ts 022080, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023943, ts 180560, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022618, ts 022240, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023944, ts 180720, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022619, ts 022400, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023945, ts 180880, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022620, ts 022560, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023946, ts 181040, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022621, ts 022720, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022622, ts 022880, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023947, ts 181200, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022623, ts 023040, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023948, ts 181360, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022624, ts 023200, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023949, ts 181520, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022625, ts 023360, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023950, ts 181680, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022626, ts 023520, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023951, ts 181840, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022627, ts 023680, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023952, ts 182000, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022628, ts 023840, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023953, ts 182160, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022629, ts 024000, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023954, ts 182320, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022630, ts 024160, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023955, ts 182480, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022631, ts 024320, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023956, ts 182640, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022632, ts 024480, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023957, ts 182800, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023958, ts 182960, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022633, ts 024640, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023959, ts 183120, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022634, ts 024800, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022635, ts 024960, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023960, ts 183280, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023961, ts 183440, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022636, ts 025120, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023962, ts 183600, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022637, ts 025280, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023963, ts 183760, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022638, ts 025440, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023964, ts 183920, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022639, ts 025600, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023965, ts 184080, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022640, ts 025760, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023966, ts 184240, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022641, ts 025920, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023967, ts 184400, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022642, ts 026080, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023968, ts 184560, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022643, ts 026240, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023969, ts 184720, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022644, ts 026400, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023970, ts 184880, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022645, ts 026560, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023971, ts 185040, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022646, ts 026720, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023972, ts 185200, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022647, ts 026880, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023973, ts 185360, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022648, ts 027040, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023974, ts 185520, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022649, ts 027200, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023975, ts 185680, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022650, ts 027360, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023976, ts 185840, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022651, ts 027520, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023977, ts 186000, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022652, ts 027680, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023978, ts 186160, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022653, ts 027840, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023979, ts 186320, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022654, ts 028000, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023980, ts 186480, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022655, ts 028160, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023981, ts 186640, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022656, ts 028320, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023982, ts 186800, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022657, ts 028480, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023983, ts 186960, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022658, ts 028640, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023984, ts 187120, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022659, ts 028800, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023985, ts 187280, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022660, ts 028960, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022661, ts 029120, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023986, ts 187440, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022662, ts 029280, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023987, ts 187600, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022663, ts 029440, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023988, ts 187760, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022664, ts 029600, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023989, ts 187920, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023990, ts 188080, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022665, ts 029760, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023991, ts 188240, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022666, ts 029920, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023992, ts 188400, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022667, ts 030080, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023993, ts 188560, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022668, ts 030240, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022669, ts 030400, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022670, ts 030560, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023994, ts 188720, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 023995, ts 188880, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022671, ts 030720, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 101, seq 023996, ts 189120, len 000004)
- Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 023996, ts 189120, len 000004, mark 1, event 00000004, end 0, duration 00080)
- [2015-04-30 11:11:30] DTMF[15720][C-0000191a]: channel.c:4214 __ast_read: DTMF begin '4' received on SIP/265-000024e7
- [2015-04-30 11:11:30] DTMF[15720][C-0000191a]: channel.c:4218 __ast_read: DTMF begin ignored '4' on SIP/265-000024e7
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022672, ts 030880, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 101, seq 023997, ts 189120, len 000004)
- Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 023997, ts 189120, len 000004, mark 0, event 00000004, end 0, duration 00160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022673, ts 031040, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 101, seq 023998, ts 189120, len 000004)
- Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 023998, ts 189120, len 000004, mark 0, event 00000004, end 0, duration 00320)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022674, ts 031200, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 101, seq 023999, ts 189120, len 000004)
- Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 023999, ts 189120, len 000004, mark 0, event 00000004, end 0, duration 00480)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022675, ts 031360, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 101, seq 024000, ts 189120, len 000004)
- Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 024000, ts 189120, len 000004, mark 0, event 00000004, end 0, duration 00640)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022676, ts 031520, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 101, seq 024001, ts 189120, len 000004)
- Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 024001, ts 189120, len 000004, mark 0, event 00000004, end 0, duration 00800)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022677, ts 031680, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 101, seq 024002, ts 189120, len 000004)
- Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 024002, ts 189120, len 000004, mark 0, event 00000004, end 0, duration 00960)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022678, ts 031840, len 000160)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022679, ts 032000, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 101, seq 024003, ts 189120, len 000004)
- Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 024003, ts 189120, len 000004, mark 0, event 00000004, end 1, duration 01200)
- [2015-04-30 11:11:30] DTMF[15720][C-0000191a]: channel.c:4128 __ast_read: DTMF end '4' received on SIP/265-000024e7, duration 150 ms
- [2015-04-30 11:11:30] DTMF[15720][C-0000191a]: channel.c:4198 __ast_read: DTMF end passthrough '4' on SIP/265-000024e7
- -- Invalid extension '4' in context 'playmenu' on SIP/265-000024e7
- == CDR updated on SIP/265-000024e7
- -- Executing [i@playmenu:1] Playback("SIP/265-000024e7", "invalid_exten") in new stack
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022680, ts 032160, len 000160)
- -- <SIP/265-000024e7> Playing 'invalid_exten.slin' (language 'en')
- Got RTP packet from 192.168.32.10:11794 (type 00, seq 024004, ts 190240, len 000160)
- Got RTP packet from 192.168.32.10:11794 (type 101, seq 024005, ts 189120, len 000004)
- Got RTP RFC2833 from 192.168.32.10:11794 (type 101, seq 024005, ts 189120, len 000004, mark 0, event 00000004, end 1, duration 01200)
- Sent RTP packet to 192.168.32.10:11794 (type 00, seq 022681, ts 032320, len 000160)
- <--- SIP read from UDP:192.168.32.10:5062 --->
- BYE sip:146@10.10.32.10:5060 SIP/2.0
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK826315862
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as56a0e069
- Call-ID: 1641701694@192.168.32.10
- CSeq: 3 BYE
- Contact: <sip:265@192.168.32.10:5062>
- Authorization: Digest username="265", realm="asterisk", nonce="6919de6d", uri="sip:146@10.10.32.10:5060", response="d1cb7d601a7eb7fb772eb4f2fdb13971", algorithm=MD5
- Max-Forwards: 70
- User-Agent: Yealink SIP-T32G 32.70.0.131
- Content-Length: 0
- <------------->
- --- (11 headers 0 lines) ---
- Sending to 192.168.32.10:5062 (no NAT)
- Scheduling destruction of SIP dialog '1641701694@192.168.32.10' in 32000 ms (Method: BYE)
- <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
- SIP/2.0 200 OK
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK826315862;received=192.168.32.10
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as56a0e069
- Call-ID: 1641701694@192.168.32.10
- CSeq: 3 BYE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- Content-Length: 0
- <------------>
- == Spawn extension (playmenu, i, 1) exited non-zero on 'SIP/265-000024e7'
- <--- SIP read from UDP:192.168.32.10:5062 --->
- BYE sip:146@10.10.32.10:5060 SIP/2.0
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK826315862
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as56a0e069
- Call-ID: 1641701694@192.168.32.10
- CSeq: 3 BYE
- Contact: <sip:265@192.168.32.10:5062>
- Authorization: Digest username="265", realm="asterisk", nonce="6919de6d", uri="sip:146@10.10.32.10:5060", response="d1cb7d601a7eb7fb772eb4f2fdb13971", algorithm=MD5
- Max-Forwards: 70
- User-Agent: Yealink SIP-T32G 32.70.0.131
- Content-Length: 0
- <------------->
- --- (11 headers 0 lines) ---
- Sending to 192.168.32.10:5062 (no NAT)
- <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
- SIP/2.0 200 OK
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK826315862;received=192.168.32.10
- From: "openvpn" <sip:265@10.10.32.10>;tag=641944239
- To: <sip:146@10.10.32.10>;tag=as56a0e069
- Call-ID: 1641701694@192.168.32.10
- CSeq: 3 BYE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- Content-Length: 0
- <------------>
- Really destroying SIP dialog '791821738@192.168.32.10' Method: BYE
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement